Published on 06 Aug 2009
After the introductory articles about the importance of performance monitoring and the characteristics of terminal servers in that area, I finally dive into the first and most obvious subsystem of an operating system – the processor. The processor or rather the processor cores are the workhorses of the system. They are collectively responsible for executing commands for each of the active processes. But they also switch the context between running processes to reflect the priorities assigned to each process by the operating system. In this article, I will introduce the well-known as well as some rarely used metrics to monitor the load put on the processor subsystem.
Published on 29 Jul 2009
The Microsoft Remote Desktop Services Team has release a very intriguing article about Aero Glass Remoting with Windows Server 2008 R2. Being a tech guy, I have tested this on a development system and I must say that I am officially impressed.
In the last years, I joined the ranks of those migrating to Windows Vista and, later, to Windows 7 RC not only because it was the next incarnation of the Windows operating system but due to Aero which is part of the Home Premium (or higher) editions.
But soon after the initial euphoria subsided, I asked myself who would actually profit from Aero Glass with or without remoting it? Consumers apparently are but this is not my business.
Published on 29 Jul 2009
In the first article of this series, I provided a short overview why performance monitoring is important, what subsystems are to be monitored and named some tools focussed on monitoring terminal servers. Having been concerned with the performance analysis of terminal servers in many projects, I can draw some conclusions about terminal servers before diving deeper into the subject. I’d like to introduce two categories of terminal servers from a performance standpoint.
Published on 27 Jul 2009
After having published the XmlServiceReader, I have described how to use this tool to customize health check in XenApp Health Monitoring and Recovery (HMR). In this article I will cover health checks that to not apply to a single server but assure the operation of the farm as a service independently of individual servers.
Published on 27 Jul 2009
In my experience, terminal servers are not properly monitored resulting in administrators not knowing how a farm performs – neither concerning the peak performance nor the trend of the handled load. This leads to an inaccurate and often inadequate sizing of the terminal server environment because only rough estimates arise from such a negligence.
In this series of articles, I’d like to expand on the topic and stressing why monitoring is important for all environment (including terminal servers), what needs to be monitored and how is can be achieved.
Published on 20 Jul 2009
When EdgeSight is set up correctly, all data is collected without any user interference especially no administrator credentials are required. Unfortunately, this is only true for historical reports generated from the EdgeSight database. As soon as real-time reports are used and workers are started manually on devices in trusted domains, the administrator’s job gets tricky.
Published on 07 Jul 2009
We all know that it is trendy to use a profile solution to rid Windows of some shortcomings of roaming profiles. And quite a number of you have looked at Citrix Profile Management (also known as User Profile Manager). In its current incarnation, UPM is configured using a group policy specifying the profile path. But similar to utilizing the “Set path for TS Roaming Profiles” for Terminal Services (soon to be Remote Desktop Services), this introduces the limitation that all users logging on to a server receive the same profile path – most most likely with some dynamically substituted components like environment variables or, in the case of UPM, fields from the user object in Active Directory.
Unfortunately, both solutions (UPM and “Set path for TS Roaming Profiles”) are inferior to managing profile paths in Active Directory user objects. The latter enables administrators to distribute users across several servers or use components representing an organisational affiliation. Wouldn’t it be neat to combine those to methods of maintaining profile paths?
Published on 30 Jun 2009
I have recently worked on an implementation for a customer and was concerned with a large number of group memberships. Although the solution for authenticating against the operating system are well documented by Microsoft (here, here and here), the XML service does not allow requests larger than 4KB. So if users have a large number of group memberships, authentication via the XML service can fail due to this limitation. But here’s the solution.
Published on 29 Jun 2009
As EdgeSight is a component that is offered by Citrix in several Platinum Editions for strategic products as well as a substitute for Resource Manager in XenApp, customers like to profit from the value-add compared to traditional system management products. EdgeSight is often used to augment the data collected by those tools. But when using EdgeSight with Provisioning Server, things get a little more complex because an agent is assigned a unique ID to match data uploads to the correct database entries.
Published on 17 Jun 2009
I have been involved in the rollout of EdgeSight with several customers. Sounds great so far, doesn’t it? But more than once I needed to tackle with very rigorous security standards causing the setup to take much longer than usual. These standards require installations to be executed with the minimal set of permissions. Unfortunately, most installers are not designed to work that way and vendors do not properly document the permissions expected for their setup wizard.