Building Custom EdgeSight Reports Part 3 - The Query

After explaining the schema of the EdgeSight database in the previous article in this series, I will now show you how to formulate SQL queries to retrieve data from the EdgeSight database by starting out slowly and building typical example just like it is used by Citrix for many reports in the product.

Building Custom EdgeSight Reports Part 2 - The Database

Understanding the database schema is the key to building a custom report for EdgeSight. In this article you will learn about important tables and views as well as the relationship between them. This article explains the purpose and layout key tables in the EdgeSight database schema as well as the relationships between them.

Building Custom EdgeSight Reports Part 1 - Kick Off

For quite a while now, Citrix is offering EdgeSight for performance analysis and historical reporting. It started off for endpoints and XenApp (still called Presentation Server at that time) and now includes virtual desktops as well. EdgeSight is offering a huge number of reports seemingly covering all possible aspects of performance analysis.

But in my eyes, the agents are collecting a lot more pieces of information than the reports are able to display. This article is the first in a series describing the EdgeSight database schema, what is necessary for a valid query and how it is built into a report.

Changes to the XML Service to Implement WebInterface User Roaming

In my article about WebInterface user roaming, I have described how to leverage this new feature to route users to specific farms depending on department, location or progress of migrating to a new farm.

Now, I’d like to offer a look under the hood, how WebInterface interacts with the XML service to implement user roaming.

The Danger of Machine Account Password Changes

Every so often I am asked to help analyze weird issues when assigning group memberships or permissions - accounts are not found and the Event Log shows unsettling messages. Many of these situations can be traced back to the operating system using a different machine account password than the domain is aware of.

WebInterface User Roaming

With the release of WebInterface 5.2, Citrix has implemented a new feature called user roaming. A video was posted on the Citrix community site presenting the new features which - unfortunately - does not suffice to describe the power of the latest versions of WebInterface.

This article explains this exciting new feature in WebInterface and shows how it benefits XenApp environments.

My Next Speaker Slots

I thought I’d let you know when and where I’ll be speaking this year. Note that all events are held in German. Sorry for the multilanguage post!

R2FeatureTalk (German): WMI SNMP-Anbieter (#63)

Watch me explain “WMI SNMP-Anbieter” in Video #63.

Watch all videos here.

R2FeatureTalk (German): Message Queuing DCOM Proxy (#24)

Watch me explain the Message Queuing DCOM Proxy in Video #24.

Watch all videos here.

Microsoft Sync Framework and the Pains with EFS

I have been using SyncToy since the days of good old Windows XP ;-) I has been a reliable companion for swiftly backing up my data. With the update to SyncToy 2.1 on Windows 7 the situation has changed dramatically. As the source directory is EFS-encrypted and the destination directory is a network share, SyncToy fails to create new files at the destination. Unfortunately, the situation is even worse as SyncToy seems to be the victim - like myself.