Building Custom EdgeSight Reports Part 4 - The Wedding

After the last two articles have demonstrated the schema of the EdgeSight database and the layout of a query, this posting brings together all the pieces to create a report for EdgeSight. A report is based on the query which pulls data from the EdgeSight database. Through the use of special variables, the EdgeSight user interfaces passes parameters to the query to customize the resulting output. This requires special methods to work with.

Slides (German): Skalierbarkeit messbar machen

On 10.09.2010 I held a session at the NRWconf in Wuppertal about performance monitoring and capacity management of Windows Servers. Attached you’ll find my slides.

Pains with EFS and Network Destinations

A few months ago, I have blogged about an annoying anomaly in the handling of EFS-encrypted files. My case was that copying fails for an EFS-encrypted file to a location where it cannot be encrypted by the source system (e.g. a file share). My colleague Helge Klein has apparently uncovered the cause: CopyFile(Ex).

Building Custom EdgeSight Reports Part 3 - The Query

After explaining the schema of the EdgeSight database in the previous article in this series, I will now show you how to formulate SQL queries to retrieve data from the EdgeSight database by starting out slowly and building typical example just like it is used by Citrix for many reports in the product.

Building Custom EdgeSight Reports Part 2 - The Database

Understanding the database schema is the key to building a custom report for EdgeSight. In this article you will learn about important tables and views as well as the relationship between them. This article explains the purpose and layout key tables in the EdgeSight database schema as well as the relationships between them.

Building Custom EdgeSight Reports Part 1 - Kick Off

For quite a while now, Citrix is offering EdgeSight for performance analysis and historical reporting. It started off for endpoints and XenApp (still called Presentation Server at that time) and now includes virtual desktops as well. EdgeSight is offering a huge number of reports seemingly covering all possible aspects of performance analysis.

But in my eyes, the agents are collecting a lot more pieces of information than the reports are able to display. This article is the first in a series describing the EdgeSight database schema, what is necessary for a valid query and how it is built into a report.

Changes to the XML Service to Implement WebInterface User Roaming

In my article about WebInterface user roaming, I have described how to leverage this new feature to route users to specific farms depending on department, location or progress of migrating to a new farm.

Now, I’d like to offer a look under the hood, how WebInterface interacts with the XML service to implement user roaming.

The Danger of Machine Account Password Changes

Every so often I am asked to help analyze weird issues when assigning group memberships or permissions - accounts are not found and the Event Log shows unsettling messages. Many of these situations can be traced back to the operating system using a different machine account password than the domain is aware of.

WebInterface User Roaming

With the release of WebInterface 5.2, Citrix has implemented a new feature called user roaming. A video was posted on the Citrix community site presenting the new features which - unfortunately - does not suffice to describe the power of the latest versions of WebInterface.

This article explains this exciting new feature in WebInterface and shows how it benefits XenApp environments.

My Next Speaker Slots

I thought I’d let you know when and where I’ll be speaking this year. Note that all events are held in German. Sorry for the multilanguage post!