Citrix Systems 4.2 manual Adding Secondary Storage

Page 73

Adding Secondary Storage

Pod. (Visible only if you choose Cluster in the Scope field.) The pod for the storage device.

Cluster. (Visible only if you choose Cluster in the Scope field.) The cluster for the storage device.

Name. The name of the storage device

Protocol. For XenServer, choose either NFS, iSCSI, or PreSetup. For KVM, choose NFS or SharedMountPoint. For vSphere choose either VMFS (iSCSI or FiberChannel) or NFS

Server (for NFS, iSCSI, or PreSetup). The IP address or DNS name of the storage device

Server (for VMFS). The IP address or DNS name of the vCenter server.

Path (for NFS). In NFS this is the exported path from the server.

Path (for VMFS). In vSphere this is a combination of the datacenter name and the datastore name. The format is "/" datacenter name "/" datastore name. For example, "/cloud.dc.VM/ cluster1datastore".

Path (for SharedMountPoint). With KVM this is the path on each host that is where this primary storage is mounted. For example, "/mnt/primary".

SR Name-Label (for PreSetup). Enter the name-label of the SR that has been set up outside CloudPlatform.

Target IQN (for iSCSI). In iSCSI this is the IQN of the target. For example, iqn.1986-03.com.sun:02:01ec9bb549-1271378984

Lun # (for iSCSI). In iSCSI this is the LUN number. For example, 3.

Tags (optional). The comma-separated list of tags for this storage device. It should be an equivalent set or superset of the tags on your disk offerings

The tag sets on primary storage across clusters in a Zone must be identical. For example, if cluster A provides primary storage that has tags T1 and T2, all other clusters in the Zone must also provide primary storage that has tags T1 and T2.

7. Click OK.

8.8. Adding Secondary Storage

Note

Be sure there is nothing stored on the server. Adding the server to CloudPlatform will destroy any existing data.

When you create a new zone, the first secondary storage is added as part of that procedure. You can add secondary storage servers at any time to add more servers to an existing zone.

1.To prepare for the zone-based Secondary Staging Store, you should have created and mounted an NFS share during Management Server installation.

2.Make sure you prepared the system VM template during Management Server installation.

63

Image 73
Contents Page Page Getting More Information and Help User Services OverviewConcepts Cloud Infrastructure ConceptsSetting Up Networking for Users Service OfferingsSteps to Provisioning Your Cloud Infrastructure Working With Hosts 103 Working With Virtual MachinesWorking With Storage 129 Working with Templates 113Managing Networks and Traffic 147 Working with Usage 141Page Troubleshooting 251 Tuning 249Working with System Virtual Machines 229 System Reliability and High Availability 233Event Types 259 Alerts 261 Additional Documentation Available Getting More Information and HelpCitrix Knowledge Center Contacting Support ChapterPage Concepts What Is CloudPlatform?What Can CloudPlatform Do? Multiple Hypervisor SupportDeployment Architecture Overview Cloud Infrastructure Overview Management Server OverviewMore Information Networking OverviewPage Page About Regions Cloud Infrastructure ConceptsAbout Zones Cloud Infrastructure Concepts About Pods About Clusters About Primary Storage About HostsAbout Physical Networks About Secondary StorageBasic Zone Network Traffic Types Advanced Zone Network Traffic Types Basic Zone Guest IP AddressesAdvanced Zone Guest IP Addresses System Reserved IP Addresses Advanced Zone Public IP AddressesAll zones A zone that uses advanced networkingPage Accounts, Users, and Domains AccountsDedicating Resources to Accounts and Domains How to Use Dedicated HostsBehavior of Dedicated Hosts, Clusters, Pods, and Zones Configuring an Ldap Server Using an Ldap Server for User AuthenticationAdding an Ldap Server Trust Store Trust Store Password Removing an Ldap Configuration Example Ldap Configuration CommandsSearch Base Active Directory Query FilterApacheDS Search User Bind DN SSL Keystore Path and PasswordPage User Services Overview Page Supported Browsers User InterfaceLog In to the UI End Users UI OverviewLogging In as the Root Administrator Root Administrators UI OverviewChanging the Root Password Using SSH Keys for AuthenticationCreating an Instance from a Template that Supports SSH Keys Creating the SSH Keypair Output is something similar to what is given belowResetting SSH Keys Logging In Using the SSH KeypairCreating an Instance Page Configuring Projects Using Projects to Organize Users and ResourcesSetting Up Invitations Overview of ProjectsSetting Project Creator Permissions Setting Resource Limits for ProjectsAdding Members to a Project Creating a New ProjectSending Project Membership Invitations Adding Project Members From the UI Accepting a Membership InvitationSuspending or Deleting a Project Using the Project ViewPage Overview of Provisioning Steps Steps to Provisioning Your Cloud InfrastructureAdding Regions optional First Region The Default RegionAdding a Region Adding Third and Subsequent Regions Deleting a Region Create a Secondary Storage Mount Point for the New Zone Adding a ZonePrepare the System VM Template Steps to Add a New Zone Network Offering Description Basic Zone ConfigurationSteps to Provisioning Your Cloud Infrastructure Page Advanced Zone Configuration Page Steps to Provisioning Your Cloud Infrastructure Page NFS Vmfs Adding a PodAdd Cluster KVM or XenServer Adding a ClusterAdd Cluster OVM VMware Cluster Size Limit Add Cluster vSphereAdding a vSphere Cluster Steps to Provisioning Your Cloud Infrastructure Page Adding a Host XenServer, KVM, or OVM Adding a HostRequirements for XenServer, KVM, and OVM Hosts Warning KVM Host Additional Requirements Adding a XenServer, KVM, or OVM HostAdding a Host vSphere Adding Primary StorageAdding Secondary Storage Adding an NFS Secondary Staging Store for Each Zone Initialize and Test Steps to Provisioning Your Cloud Infrastructure Compute and Disk Service Offerings Service OfferingsCreating a New Compute Offering Creating a New Disk Offering Modifying or Deleting a Service Offering System Service OfferingsCreating a New System Service Offering For more information, see .7, Stopping and Starting VMs Page Page Overview of Setting Up Networking for Users Setting Up Networking for UsersAbout Virtual Networks Isolated NetworksNetwork Service Providers Support Matrix Network Service ProvidersRuntime Allocation of Virtual Network Resources IndividualACL Support Matrix for an Isolated Network CombinationSupport Matrix for Shared Network Combination Support Matrix for Basic Zone Network OfferingsCreating a New Network Offering Supported Services Description Isolated Shared See Section Remote Access VPN Changing the Network Offering on a Guest Network Creating and Changing a Virtual Router Network Offering Page Page About Working with Virtual Machines Working With Virtual MachinesBest Practices for Virtual Machines VM Lifecycle Install Required Tools and DriversMonitor VMs for Max Capacity Creating a VM from a template Creating VMsCreating a VM from an ISO Configuring Usage of Linked Clones on VMwareAppending a Display Name to the Guest VM’s Internal Name Accessing VMsAssigning VMs to Hosts Stopping and Starting VMsCreating a New Affinity Group Affinity GroupsAssign a New VM to an Affinity Group Change Affinity Group for an Existing VMView Members of an Affinity Group Virtual Machine Snapshots for VMwareDelete an Affinity Group Using VM Snapshots Configuring VM SnapshotsLimitations on VM Snapshots Changing the VM Name, OS, or Group CPU and Memory Scaling for Running VMs Changing the Service Offering for a VMHow to Dynamically Scale CPU and RAM Configuring Dynamic CPU and RAM ScalingUpdating Existing VMs LimitationsMoving VMs Between Hosts Manual Live Migration Resetting the Virtual Machine Root Volume on RebootDeleting VMs Recovering a Destroyed VMWorking with ISOs Adding an ISO Changing a VMs Base Image Attaching an ISO to a VMPage 102 VCenter and Maintenance Mode Scheduled Maintenance and Maintenance Mode for HostsXenServer and Maintenance Mode Working With HostsDisabling and Enabling Zones, Pods, and Clusters To take a server out of Maintenance ModeRemoving Hosts Working With HostsUsing Cisco UCS as Bare Metal Host CloudPlatform Re-Installing HostsMaintaining Hypervisors on Hosts Removing XenServer and KVM HostsAssociating a Profile with a UCS Blade Registering a UCS ManagerDisassociating a Profile from a UCS Blade Changing Host PasswordOver-Provisioning and Service Offering Limits Limitations on Over-Provisioning in XenServer and KVM Setting Over-Provisioning RatiosRequirements for Over-Provisioning Balloon DriverVlan Provisioning Service Offering Limits and Over-ProvisioningAdding Non Contiguous Vlan Ranges Vlan Allocation ExampleAssigning VLANs to Isolated Networks Working with Templates Default TemplateCreating Templates Overview Requirements for TemplatesCreating a Template from an Existing Virtual Machine Private and Public TemplatesWorking with Templates Uploading Templates Creating a Template from a SnapshotWorking with Templates Creating a Windows Template Exporting TemplatesSystem Preparation for Windows Server 2008 R2 Working with Templates Page Working with Templates System Preparation for Windows Server 2003 R2 Importing Amazon Machine Images Create a grub entry in /boot/grub/grub.conf Exit out of chroot Converting a Hyper-V VM to a Template Adding Password Management to Your Templates Windows OS Installation Linux OS InstallationDeleting Templates 128 Storage Overview Working With StoragePrimary Storage Working With Storage Storage TagsFiber Channel support NFS support Local storage support Storage over-provisioningSecondary Storage Maintenance Mode for Primary StorageBest Practices for Secondary Storage Changing the Secondary Storage IP AddressCreating a New Volume Working With VolumesUsing Local Storage for Data Volumes Changing Secondary Storage ServersTo Create a New Volume Uploading an Existing Volume to a Virtual MachineHypervisor Disk Image Format Attaching a VolumeVM Storage Migration Detaching and Moving VolumesMigrating a VM Root Volume to a New Storage Pool Migrating a Data Volume to a New Storage PoolResizing Volumes Volume Deletion and Garbage Collection Reset VM to New Root Disk on RebootTo enable root disk reset on VM reboot Working with SnapshotsVolume Status Incremental Snapshots and BackupAutomatic Snapshot Creation and Retention VMware Volume Snapshot Performance Snapshot RestoreSnapshot Job Throttling Working with Usage Configuring the Usage ServerAlerttypeusagesanityresult = Working with UsageSetting Usage Limits Parameter Name Definition Globally Configured LimitsDefault Account Resource Limits Per-Domain Limits Guest Traffic Managing Networks and TrafficNetworking in a Pod Managing Networks and Traffic Networking in a ZoneAdvanced Zone Physical Network Configuration Basic Zone Physical Network ConfigurationConfiguring Isolated Guest Network Configure Public Traffic in an Advanced Zone Configuring a Shared Guest Network About Security Groups Using Security Groups to Control Traffic to VMsSecurity Groups in Advanced Zones KVM Only LimitationAdding a Security Group Enabling Security GroupsAdding Ingress and Egress Rules to a Security Group External Firewalls and Load Balancers MPX About Using a NetScaler Load BalancerVPX Configuring SNMPCommunity String on a Rhel ServerInitial Setup of External Firewalls and Load Balancers Adding a Load Balancer Rule Load Balancer RulesConfiguring AutoScale Prerequisites Configuration Managing Networks and Traffic Updating an AutoScale Configuration Disabling and Enabling an AutoScale ConfigurationHealth Checks for Load Balancer Rules Sticky Session Policies for Load Balancer RulesRuntime Considerations About Global Server Load Balancing Global Server Load BalancingComponents of Gslb How Gslb Works in CloudPlatform Configuring Gslb For more information, see Configuring a Gslb Virtual Server4 Enabling Gslb in NetScaler Prerequisites and GuidelinesAdding a Gslb Rule Assigning Load Balancing Rules to Gslb Reconfiguring Networks in VMs Using Multiple Guest NetworksAdding an Additional Guest Network Prerequisites Selecting the Default NetworkAdding a Network Removing a NetworkAcquiring a New IP Address Guest IP RangesReleasing an IP Address Dedicating IP Address Ranges to an Account Reserving Public IP Addresses and VLANs for AccountsGateway Netmask Dedicating Vlan Ranges to an AccountStart IP End IP IP Reservation Considerations IP Reservation in Isolated Guest NetworksBest Practices Configuring Multiple IP Addresses on a Single NICReserving an IP Range Use Cases Port Forwarding and StaticNAT Services ChangesGuidelines Assigning Additional IPs to a VMPrerequisites and Guidelines Multiple Subnets in Shared NetworkAdding Multiple Subnets to a Shared Network About Elastic IP Managing Networks and Traffic About Portable IP Portable IPsAcquiring a Portable IP Configuring Portable IPsGuidelines Transferring Portable IP Static NATEnabling or Disabling Static NAT IP Forwarding and Firewalling Configuring an Egress Firewall RuleEgress Firewall Rules in an Advanced Zone Allow Configuring the Default Egress PolicyDeny Firewall Rules Port Forwarding IP Load BalancingConfiguring Remote Access VPN Remote Access VPNDNS and Dhcp Using Remote Access VPN with Windows Setting Up a Site-to-Site VPN Connection Using Remote Access VPN with Mac OSCreating and Updating a VPN Customer Gateway Note See .27, Configuring a Virtual Private CloudManaging Networks and Traffic Page Updating and Removing a VPN Customer Gateway Creating a VPN gateway for the VPCCidr Creating a VPN Connection NoteManaging Networks and Traffic Restarting and Removing a VPN Connection About Private Vlan Isolation in Advanced Zone Using Private VlanPrerequisites Creating a PVLAN-Enabled Guest NetworkAbout Inter-VLAN Routing Page About Virtual Private Clouds Configuring a Virtual Private CloudMajor Components of a VPC Connectivity Options for a VPC Network Architecture in a VPCVPC Network Considerations Adding a Virtual Private Cloud Adding Tiers Managing Networks and Traffic About Network ACL Lists Configuring Network Access Control ListCreating ACL Lists Creating an ACL Rule Assigning a Custom ACL List to a Tier Creating a Tier with Custom ACL ListAdding a Private Gateway to a VPC See .27.5.2, ACL on Private Gateway Source NAT on Private GatewayCreating a Static Route ACL on Private GatewayDeploying VMs to VPC Tier and Shared Networks Deploying VMs to the TierBlacklisting Routes Acquiring a New IP Address for a VPC Releasing an IP Address Alloted to a VPC Enabling or Disabling Static NAT on a VPC Load Balancing Public Traffic Public LB Adding Load Balancing Rules on a VPCCreating a Network Offering for Public LB Creating a Public LB Rule How Does Internal LB Work in VPC? Load Balancing Tier-to-Tier traffic Internal LBEnabling Internal LB on a VPC Tier Creating an Internal LB Rule Adding a Port Forwarding Rule on a VPC TCP UDP Removing TiersEditing, Restarting, and Removing a Virtual Private Cloud Persistent NetworksPersistent Network Considerations Creating a Persistent Guest Network System VM Template Working with System Virtual MachinesMultiple System VM Support for VMware Console ProxyWorking with System Virtual Machines Changing the Console Proxy SSL Certificate and DomainVirtual Router Configuring the Virtual RouterSecondary Storage VM Upgrading a Virtual Router with System Service OfferingsBest Practices for Virtual Routers System Reliability and High Availability HA-Enabled Virtual MachinesHA for Management Server Dedicated HA HostsPrimary Storage Outage and Data Loss Configuring the API Request RateSecondary Storage Outage and Data Loss Limiting the Rate of API RequestsLimitations on API Throttling 236 Managing the Cloud Using Tags to Organize Resources in the CloudAbout Configuration Parameters Setting Configuration ParametersManaging the Cloud Setting Local Configuration Parameters Setting Global Configuration ParametersGranular Global Configuration Parameters Cluster.cpu.allocated.capacity.disablThethr Administrator Alerts Changing the Database ConfigurationSending Alerts to External Snmp and Syslog Managers Customizing Alerts with Global Configuration SettingsSnmp Alert Details Syslog Alert Details Configuring Snmp and Syslog ManagersDeleting an Snmp or Syslog Manager Customizing the Network Domain NameStopping and Restarting the Management Server CloudPlatform API Provisioning and Authentication APIAllocators User Data and Meta DataCloudPlatform API Performance Monitoring TuningIncrease Management Server Maximum Memory Set Database Buffer Pool SizeTuning Configure XenServer dom0 MemorySet and Monitor Total VM Limits per Host Events TroubleshootingEvent Logs Event NotificationStandard Events TroubleshootingLong Running Job Events Deleting and Archiving Events and Alerts Event Log QueriesWorking with Server Logs ProcedurePermissions Symptom Using cloud-bugtoolLog Collection Utility cloud-bugtool Data Loss on Exported Primary StorageMaintenance mode not working on vCenter Recovering a Lost Virtual RouterSolution CauseUnable to deploy VMs from uploaded vSphere template Unable to power on virtual machine on VMwareLoad balancer rules fail after changing network offering Appendix A. Event Types 260 Appendix B. Alerts Appendix B. Alerts
Related manuals
Manual 6 pages 23.94 Kb Manual 194 pages 3.03 Kb

4.2 specifications

Citrix Systems, a leading provider of virtualization solutions and cloud computing technologies, released version 4.2 of its popular software, Citrix XenApp, which was previously known as Presentation Server. This version marked a significant evolution in providing users with remote access to applications and desktops, emphasizing simplicity, performance, and security.

One of the standout features of Citrix XenApp 4.2 is its improved application streaming capabilities. This technology allows applications to be delivered to users in real-time, reducing the need for extensive local installations and enhancing the user experience. With application streaming, administrators can efficiently manage applications on a central server while ensuring that users have immediate access to the necessary tools.

Another highlight of this version is the enhanced security measures put in place to protect sensitive data. Citrix XenApp 4.2 includes support for SSL encryption, providing a secure communication channel for data transmitted between the server and clients. This is particularly crucial for businesses that need to comply with strict data protection regulations. Additionally, the integration of endpoint security features ensures that unauthorized access to applications is minimized.

Performance enhancements are also a critical focus in this release. Citrix optimized the delivery of applications over various network conditions, ensuring that users experience minimal latency regardless of their location. This was achieved through the incorporation of SmartAccess and SmartControl technologies, which allow administrators to set policies based on user roles, device types, and network conditions. This level of granularity enables organization-wide security without compromising on usability.

The user experience was further improved with a revamped interface, making it easier for end-users to access their applications and data. Simplified menus, clear navigation paths, and the ability to customize user settings contributed to a more efficient workflow, allowing users to focus on their tasks rather than struggling with the software.

Finally, Citrix XenApp 4.2 was designed to be highly scalable. Organizations of all sizes could deploy this solution to deliver applications efficiently, adapting to their specific needs as their user base grows or changes. This flexibility is crucial for businesses looking to future-proof their IT investments while maintaining optimal performance.

In summary, Citrix XenApp 4.2 stands out with its enhanced application streaming, robust security features, improved performance under varying conditions, user-friendly interface, and scalability, making it an ideal choice for organizations seeking to leverage virtualization for remote access to applications and desktops.