FlexPod is purpose-built for VDI environments, enabling enterprise workloads to function seamlessly at a global scale, all while reducing costs. FlexPod Datacenter with Citrix XenDesktop/XenApp and VMware vSphere Update 1 for 6, Seats. Follow us. LinkedIn · Twitter. About. FlexPod Advantage combines FlexPod with NetApp All Flash FAS storage, Cisco UCS servers with M4 processors and Cisco NEXUS 9K switches with. DFMIRAGE TIGHTVNC Вы можете прийти к нам.
This document guides you through the detailed steps for deploying the base architecture. This procedure explains everything from physical cabling to network, compute, and storage device configurations. Configuration Guidelines.
This Cisco Validated Design provides details for deploying a fully redundant, highly available seats mixed workload virtual desktop solution with VMware on a FlexPod Datacenter architecture. Configuration guidelines are provided that refer the reader to which redundant component is being configured with each step. Solution Components. What is FlexPod? FlexPod is a defined set of hardware and software that serves as an integrated foundation for both virtualized and non-virtualized solutions.
The design is flexible enough that the networking, computing, and storage can fit in one data center rack or be deployed according to a customer's data center design. Port density enables the networking components to accommodate multiple configurations of this kind. One benefit of the FlexPod architecture is the ability to customize or "flex" the environment to suit a customer's requirements. A FlexPod can easily be scaled as requirements and demand change.
The unit can be scaled both up adding resources to a FlexPod unit and out adding more FlexPod units. The reference architecture detailed in this document highlights the resiliency, cost benefit, and ease of deployment of a Fibre Channel and IP-based storage solution. A storage system capable of serving multiple protocols across a single interface allows for customer choice and investment protection because it truly is a wire-once architecture.
Figure 3. FlexPod Component Families. These components are connected and configured according to the best practices of both Cisco and NetApp to provide an ideal platform for running a variety of enterprise workloads with confidence. FlexPod can scale up for greater performance and capacity adding compute, network, or storage resources individually as needed , or it can scale out for environments that require multiple consistent deployments such as rolling out of additional FlexPod stacks. The reference architecture covered in this document leverages Cisco Nexus for the network switching element and pulls in the Cisco MDS for the SAN switching component.
One of the key benefits of FlexPod is its ability to maintain consistency during scale. Each of the component families shown Cisco UCS, Cisco Nexus, and NetApp AFF offers platform and resource options to scale the infrastructure up or down, while supporting the same features and functionality that are required under the configuration and connectivity best practices of FlexPod.
Why FlexPod? This section describes the components used in the solution outlined in this solution. Cisco Unified Computing System. The manager provides a unified management domain with centralized management capabilities and can control multiple chassis and thousands of virtual machines.
Cisco UCS is a next-generation data center platform that unites computing, networking, and storage access. The platform, optimized for virtual environments, is designed using open industry-standard technologies and aims to reduce total cost of ownership TCO and increase business agility. The system integrates a low-latency; lossless 25 Gigabit Ethernet unified network fabric with enterprise-class, xarchitecture servers. It is an integrated, scalable, multi-chassis platform in which all resources participate in a unified management domain.
Cisco Unified Computing System Components. The unified fabric lowers costs by reducing the number of network adapters, switches, and cables needed, and by decreasing the power and cooling requirements. Cisco security, policy enforcement, and diagnostic features are now extended into virtualized environments to better support changing business and IT requirements.
This capability provides customers with choice for storage access and investment protection. In addition, server administrators can pre-assign storage-access policies for system connectivity to storage resources, simplifying storage connectivity and management and helping increase productivity.
Figure 4. Cisco Data Center Overview. Cisco UCS Manager provides unified, embedded management of all software and hardware components of the Cisco Unified Computing System across multiple chassis, rack servers, and thousands of virtual machines.
The fabric interconnect supports multiple traffic classes over a lossless Ethernet fabric from the server through the fabric interconnect. Figure 5. Figure 6. Figure 7. Figure 8. This enterprise-class server offers market-leading performance, versatility, and density without compromise for workloads ranging from web infrastructure to distributed databases.
With a larger power budget per blade server, it provides uncompromised expandability and capabilities, as in the new Cisco UCS B M5 server with its leading memory-slot capacity and drive capacity. You can configure the Cisco UCS B M5 to meet your local storage requirements without having to buy, power, and cool components that you do not need. Table 1. Ordering Information. Figure 9. Figure Cisco Switching.
Designed with Cisco Cloud Scale technology, it supports highly scalable cloud architectures. A Cisco 40 Gbe bidirectional transceiver allows reuse of an existing 10 Gigabit Ethernet multimode cabling plant for 40 Gigabit Ethernet Support for 1 Gbe and 10 Gbe access connectivity for data centers migrating access switching infrastructure to faster speed. The following is supported:.
It empowers small, midsize, and large enterprises that are rapidly deploying cloud-scale applications using extremely dense virtualized servers, providing the dual benefits of greater bandwidth and consolidation. Small-scale SAN architectures can be built from the foundation using this low-cost, low-power, non-blocking, line-rate, and low-latency, bi-directional airflow capable, fixed standalone SAN switch connecting both storage and host ports.
Additionally, investing in this switch for the lower-speed 4- or 8- or Gb server rack gives you the option to upgrade to Gb server connectivity in the future using the Gb Host Bus Adapter HBA that are available today. This switch also offers state-of-the-art SAN analytics and telemetry capabilities that have been built into this next-generation hardware platform.
This new state-of-the-art technology couples the next-generation port ASIC with a fully dedicated Network Processing Unit designed to complete analytics calculations in real time. The telemetry data extracted from the inspection of the frame headers are calculated on board within the switch and, using an industry-leading open format, can be streamed to any analytics-visualization platform. Dual power supplies also facilitate redundant power grids.
This approach results in lower initial investment and power consumption for entry-level configurations of up to 16 ports compared to a fully loaded switch. Upgrading through an expansion module also reduces the overhead of managing multiple instances of port activation licenses on the switch. This unique combination of port upgrade options allow four possible configurations of 8 ports, 16 ports, 24 ports and 32 ports. Among all the advanced features that this ASIC enables, one of the most notable is inspection of Fibre Channel and Small Computer System Interface SCSI headers at wire speed on every flow in the smallest form-factor Fibre Channel switch without the need for any external taps or appliances.
Traffic encryption is optionally available to meet stringent security requirements. Virtual machine awareness can be extended to intelligent fabric services such as analytics to visualize performance of every flow originating from each virtual machine in the fabric. VMware vSphere 7. VMware provides virtualization software. VMware vCenter Server for vSphere provides central management and complete control and visibility into clusters, hosts, virtual machines, storage, networking, and other critical elements of your virtual infrastructure.
VMware vSphere with Tanzu allows IT Admins to operate with their existing skillset and deliver a self-service access to infrastructure for the Dev Ops teams; while providing observability and troubleshooting for Kubernetes workloads. Deliver Developer-ready Infrastructure: IT teams can use existing vSphere environments to set up an Enterprise-grade Kubernetes infrastructure at a rapid pace within one hour , while enabling enterprise-class governance, reliability, and security.
After this one-time setup, vSphere with Tanzu enables a simple, fast, and self-service provisioning of Tanzu Kubernetes clusters within a few minutes1. Aligning DevOps teams and IT teams is critical to the success of modern application development; to bring efficiency, scale and security to Kubernetes deployments and operations. TKG allows IT admins to manage consistent, compliant, and conformant Kubernetes, while providing developers self-service access to infrastructure.
Deploy existing block and file storage infrastructure BYO storage for containerized workloads. Using application focused management, IT admins can use vCenter Server to observe and troubleshoot Tanzu Kubernetes clusters alongside VMs, implement role-based access and allocate capacity to developer teams.
Improve performance and scale for Monster VMs to support your large scale-up environments. Enterprise IT organizations are tasked with the challenge of provisioning Microsoft Windows apps and desktops while managing cost, centralizing control, and enforcing corporate security policy. Deploying Windows apps to users in any location, regardless of the device type and available network bandwidth, enables a mobile workforce that can improve productivity. Administrators can deploy both RDS published applications and desktops to maximize IT control at low cost or personalized VDI desktops with simplified image management from the same management console.
You use the same architecture and management tools to manage public, private, and hybrid cloud deployments as you do for on premises deployments. Some RDS editions include technologies that further optimize the experience of using Windows applications on a mobile device by automatically translating native mobile-device display, navigation, and controls to Windows applications; enhancing performance over mobile networks; and enabling developers to optimize any custom Windows application for any mobile environment.
They are well suited for users, such as call center employees, who perform a standard set of tasks. Enhancements in this release include:. This release supplies a single set of administrative interfaces to deliver both hosted-shared applications RDS and complete virtual desktops VDI. Cloud deployments are configured, managed, and monitored through the same administrative consoles as deployments on traditional on-premises infrastructure.
They can provide users with their own desktops that they can fully personalize. Deployments that span widely-dispersed locations connected by a WAN can face challenges due to network latency and reliability. Configuring zones can help users in remote regions connect to local resources without forcing connections to traverse large segments of the WAN.
Using zones allows effective Site management from a single Citrix Studio console, Citrix Director, and the Site database. This saves the costs of deploying, staffing, licensing, and maintaining additional Sites containing separate databases in remote locations.
Zones can be helpful in deployments of all sizes. You can use zones to keep applications and desktops closer to end users, which improves performance. For more information, see the Zones article. Improved Database Flow and Configuration. When you configure the databases during Site creation, you can now specify separate locations for the Site, Logging, and Monitoring databases.
Later, you can specify different locations for all three databases. In previous releases, all three databases were created at the same address, and you could not specify a different address for the Site database later.
You can now add more Delivery Controllers when you create a Site, as well as later. In previous releases, you could add more Controllers only after you created the Site. For more information, see the Databases and Controllers articles. Application Limits. Configure application limits to help manage application use.
For example, you can use application limits to manage the number of users accessing an application simultaneously. Similarly, application limits can be used to manage the number of simultaneous instances of resource-intensive applications, this can help maintain server performance and prevent deterioration in service.
For more information, see the Manage applications article. You can now choose to repeat a notification message that is sent to affected machines before the following types of actions begin:. By default, sessions roam between client devices with the user. When the user launches a session and then moves to another device, the same session is used, and applications are available on both devices. The applications follow, regardless of the device or whether current sessions exist.
Similarly, printers and other resources assigned to the application follow. This was an experimental feature in the previous release. For more information, see the Sessions article. This is in addition to the currently-available choices of VM images and snapshots. Support for New and Additional Platforms. See the System requirements article for full support information.
Information about support for third-party product versions is updated periodically. This installation is separate from the default SQL Server Express installation for the site database. If you want to upgrade the LocalDB version, follow the guidance in Database actions. This is as designed. Most enterprises struggle to keep up with the proliferation and management of computers in their environments.
Each computer, whether it is a desktop PC, a server in a data center, or a kiosk-type device, must be managed as an individual entity. The benefits of distributed processing come at the cost of distributed management. It costs time and money to set up, update, support, and ultimately decommission each computer. The initial cost of the machine is often dwarfed by operating costs. Citrix PVS takes a very different approach from traditional imaging solutions by fundamentally changing the relationship between hardware and the software that runs on it.
By streaming a single shared disk image vDisk rather than copying images to individual machines, PVS enables organizations to reduce the number of disk images that they manage, even for the number of machines continues to grow, simultaneously providing the efficiency of centralized management and the benefits of distributed processing.
In addition, because machines are streaming disk data dynamically and in real time from a single shared image, machine image consistency is essentially ensured. At the same time, the configuration, applications, and even the OS of large pools of machines can be completed changed in the time it takes the machines to reboot. Using PVS, any vDisk can be configured in standard-image mode. A vDisk in standard-image mode allows many computers to boot from it simultaneously, greatly reducing the number of images that must be maintained and the amount of storage that is required.
The vDisk is in read-only format, and the image cannot be changed by target devices. If you manage a pool of servers that work as a farm, such as Citrix RDS servers or web servers, maintaining a uniform patch level on your servers can be difficult and time consuming. With traditional imaging solutions, you start with a clean golden master image, but as soon as a server is built with the master image, you must patch that individual server along with all the other individual servers.
Rolling out patches to individual servers in your farm is not only inefficient, but the results can also be unreliable. Patches often fail on an individual server, and you may not realize you have a problem until users start complaining or the server has an outage. After that happens, getting the server resynchronized with the rest of the farm can be challenging, and sometimes a full reimaging of the machine is required. With Citrix PVS, patch management for server farms is simple and reliable.
You start by managing your golden image, and you continue to manage that single golden image. All patching is performed in one place and then streamed to your servers when they boot. Server build consistency is assured because all your servers use a single shared copy of the disk image.
If a server becomes corrupted, simply reboot it, and it is instantly back to the known good state of your master image. Upgrades are extremely fast to implement. After you have your updated image ready for production, you simply assign the new image version to the servers and reboot them. You can deploy the new image to any number of servers in the time it takes them to reboot.
Just as important, rollback can be performed in the same way, so problems with new images do not need to take your servers or your users out of commission for an extended period of time. Benefits for Desktop Administrators. Many organizations are beginning to explore desktop virtualization.
And with a single image to manage instead of hundreds or thousands of desktops, PVS significantly reduces the cost, effort, and complexity for desktop administration. Different types of workers across the enterprise need different types of desktops. Some require simplicity and standardization, and others require high performance and personalization.
With FlexCast, IT can deliver every type of virtual desktop, each specifically tailored to meet the performance, security, and flexibility requirements of each individual user. Not all desktop applications can be supported by virtual desktops. For these scenarios, IT can still reap the benefits of consolidation and single-image management.
Desktop images are stored and managed centrally in the data center and streamed to physical desktops on demand. This model works particularly well for standardized desktops such as those in lab and training environments and call centers and thin-client devices used to access virtual desktops.
Citrix Provisioning Services Solution. Citrix PVS streaming technology allows computers to be provisioned and re-provisioned in real time from a single shared disk image. With this approach, administrators can completely eliminate the need to manage and patch individual systems. Instead, all image management is performed on the master image. The local hard drive of each system can be used for runtime data caching or, in some scenarios, removed from the system entirely, which reduces power use, system failure rate, and security risk.
A device used for this process is referred to as a master target device. The devices that use the vDisks are called target devices. Citrix Provisioning Services Infrastructure. The PVS administrator role determines which components that administrator can manage or view in the console. A PVS farm contains several components. Figure 15 provides a high-level view of a basic PVS infrastructure and shows how PVS components might appear within that implementation. Logical Architecture of Citrix Provisioning Services.
These controllers and their specifications listed in Table 2. Table 2. Max Raw capacity HA. Max Storage Devices HA. Processor Speed. Total Processor Cores Per Node. Ethernet Ports. Rack Units. Maximum number of flexible volumes - SAN. This model was created to keep up with changing business needs and performance and workload requirements by merging the latest technology for data acceleration and ultra-low latency in an end-to-end NVMe storage system, along with additional slots for expansion.
Rear Fiber Channel. Rear Ethernet. Tenants can be in overlapping subnet or can use identical IP subnet range. Enables Single Global Namespace can be consumed around the clouds or multi-site. Best practices are validated and implemented while provisioning. Supports inline dedupe, compression, thin provisioning, etc. Guaranteed dedupe of for VDI. Application based storage provisioning, Performance Monitoring, End-End storage visibility diagrams. A wide array of features allows businesses to store more data using less space.
Starting with ONTAP 9, NetApp guarantees that the use of NetApp storage efficiency technologies on AFF systems reduce the total logical capacity used to store customer data by 75 percent, a data reduction ratio of This space reduction is a combination of several different technologies, such as deduplication, compression, and compaction, which provide additional reduction to the basic features provided by ONTAP.
Compaction combines multiple blocks that are not using their full 4KB of space together into one block. This one block can be more efficiently stored on the disk-to-save space. This process is illustrated in Figure Deduplication reduces the amount of physical storage required for a volume or all the volumes in an AFF aggregate by discarding duplicate blocks and replacing them with references to a single shared block.
Reads of deduplicated data typically incur no performance charge. Writes incur a negligible charge except on overloaded nodes. As data is written during normal use, WAFL uses a batch process to create a catalog of block signatures. After deduplication starts, ONTAP compares the signatures in the catalog to identify duplicate blocks. If a match exists, a byte-by-byte comparison is done to verify that the candidate blocks have not changed since the catalog was created.
Only if all the bytes match is the duplicate block discarded and its disk space reclaimed. Compression reduces the amount of physical storage required for a volume by combining data blocks in compression groups, each of which is stored as a single block. Reads of compressed data are faster than in traditional compression methods because ONTAP decompresses only the compression groups that contain the requested data, not an entire file or LUN. Performance-intensive operations are deferred until the next postprocess compression operation, if any.
Inline data compaction combines data chunks that would ordinarily consume multiple 4 KB blocks into a single 4 KB block on disk. Compaction takes place while data is still in memory, so it is best suited to faster controllers Figure Storage Efficiency Features. Storage Efficiency. Some applications such as Oracle and SQL have unique headers in each of their data blocks that prevent the blocks to be identified as duplicates. So, for such applications, enabling deduplication does not result in significant savings.
So, deduplication is not recommended to be enabled for databases. However, NetApp data compression works very well with databases and we strongly recommend enabling compression for databases. These are guidelines, not rules; environment may have different performance requirements and specific use cases. Table 3. Compression and Deduplication Guidelines.
An SVM is a logical abstraction that represents the set of physical resources of the cluster. An SVM may own resources on multiple nodes concurrently, and those resources can be moved non-disruptively from one node to another. For example, a flexible volume can be non-disruptively moved to a new node and aggregate, or a data LIF can be transparently reassigned to a different physical network port. The SVM abstracts the cluster hardware, and it is not tied to any specific physical hardware.
An SVM can support multiple data protocols concurrently. NetApp Storage Virtual Machine. FlexClone technology references Snapshot metadata to create writable, point-in-time copies of a volume. Copies share data blocks with their parents, consuming no storage except what is required for metadata until changes are written to the copy. Where traditional copies can take minutes or even hours to create, FlexClone software lets you copy even the largest datasets almost instantaneously.
That makes it ideal for situations in which you need multiple copies of identical datasets a virtual desktop deployment, for example or temporary copies of a dataset testing an application against a production dataset. You can clone an existing FlexClone volume, clone a volume containing LUN clones, or clone mirror and vault data. You can split a FlexClone volume from its parent, in which case the copy is allocated its own storage. Figure 21 shows the port and LIF layout.
Instead if a network interface becomes unavailable, the ESXI host chooses a new optimized path to an available network interface. ONTAP 9. With FlexGroup volumes, a storage administrator can easily provision a massive single namespace in a matter of seconds. FlexGroup volumes have virtually no capacity or file count constraints outside of the physical limits of hardware or the total volume limits of ONTAP. Limits are determined by the overall number of constituent member volumes that work in collaboration to dynamically balance load and space allocation evenly across all members.
There is no required maintenance or management overhead with a FlexGroup volume. ONTAP does the rest. Storage QoS. Storage QoS Quality of Service can help you manage risks around meeting your performance objectives. You use Storage QoS to limit the throughput to workloads and to monitor workload performance. You can reactively limit workloads to address performance problems and you can pro-actively limit workloads to prevent performance problems.
You assign a storage object to a policy group to control and monitor a workload. You can monitor workloads without controlling them. Figure 22 shows an example environment before and after using Storage QoS. These workloads get "best effort" performance, which means you have less performance predictability for example, a workload might get such good performance that it negatively impacts other workloads.
On the right are the same workloads assigned to policy groups. The policy groups enforce a maximum throughput limit. Before and After using Storage QoS. That is a significant advantage when you are managing hundreds or thousands of workloads in a VDI deployment. Three default adaptive QoS policy groups are available, as shown in Table 4. You can apply these policy groups directly to a volume. Table 4.
With Vscan you can use integrated antivirus functionality on NetApp storage systems to protect data from being compromised by viruses or other malicious code. NetApp virus scanning, called Vscan, combines best-in-class third-party antivirus software with ONTAP features that give you the flexibility you need to control which files get scanned and when. Storage systems offload scanning operations to external servers hosting antivirus software from third-party vendors.
You can use on-access scanning to check for viruses when clients open, read, rename, or close files over CIFS. File operation is suspended until the external server reports the scan status of the file. Otherwise, it requests a scan from the server. You can use on-demand scanning to check files for viruses immediately or on a schedule. You might want to run scans only in off-peak hours, for example. The external server updates the scan status of the checked files, so that file-access latency for those files assuming they have not been modified is typically reduced when they are next accessed over CIFS.
You can use on-demand scanning for any path in the SVM namespace, even for volumes that are exported only through NFS. Typically, you enable both scanning modes on an SVM. In either mode, the antivirus software takes remedial action on infected files based on your settings in the software. NVE and NAE enable you to use storage efficiency features that would be lost with encryption at the application layer. For greater storage efficiency, you can use aggregate deduplication with NAE.
This process is outlined in Figure ONTAP offers artificial intelligence-driven system monitoring and reporting through a web portal and through a mobile app. Active IQ enables you to optimize your data infrastructure across your global hybrid cloud by delivering actionable predictive analytics and proactive support through a cloud-based portal and mobile app.
Data-driven insights and recommendations from Active IQ are available to all NetApp customers with an active SupportEdge contract features vary by product and support tier. Active IQ identifies issues in your environment that can be resolved by upgrading to a newer version of ONTAP and the Upgrade Advisor component helps you plan for a successful upgrade. Your Active IQ dashboard reports any issues with wellness and helps you correct those issues. Monitor system capacity to make sure you never run out of storage space.
Identify configuration and system issues that are impacting your performance. View storage efficiency metrics and identify ways to store more data in less space. Active IQ displays complete inventory and software and hardware configuration information. View when service contracts are expiring to ensure you remain covered.
VMware administrators can easily perform tasks that improve both server and storage efficiency while still using role-based access control to define the operations that administrators can perform. Performing those tasks at the array level can reduce the workload on the ESXi hosts. The copy offload feature and space reservation feature improve the performance of VSC operations. You can download the plug-in installation package and obtain the instructions for installing the plug-in from the NetApp Support Site.
Here are some of the functionalities provided by the SnapCenter plug-in to help protect your VMs and datastores:. When you back up a datastore, you back up all the VMs in that datastore. If a resource group has a policy attached and a schedule configured, then backups occur automatically according to the schedule.
When you restore a VM, you overwrite the existing content with the backup copy that you select. You can restore existing. You can detach the VMDK after you have restored the files you need. For application-consistent backup and restore operations, the NetApp SnapCenter Server software is required. NetApp Active IQ Unified Manager is a comprehensive monitoring and proactive management tool for NetApp ONTAP systems to help manage the availability, capacity, protection, and performance risks of your storage systems and virtual infrastructure.
It provides comprehensive operational, performance, and proactive insights into the storage environment and the VMs running on it. When an issue occurs on the storage or virtual infrastructure, Active IQ Unified Manager can notify you about the details of the issue to help with identifying the root cause. Some events also provide remedial actions that can be taken to rectify the issue. You can also configure custom alerts for events so that when issues occur, you are notified through email and SNMP traps.
NetApp XCP file analytics is host-based software to scan the file shares, collect and analyzes the data and provide insights into the file system. Architecture and Design Considerations for Desktop Virtualization. There are many reasons to consider a virtual desktop solution such as an ever growing and diverse base of user devices, complexity in management of traditional desktops, security, and even Bring Your Own Device BYOD to work programs. The first step in designing a virtual desktop solution is to understand the user community and the type of tasks that are required to successfully execute their role.
The following user classifications are provided:. These anywhere workers expect access to all of their same applications and data wherever they are. They need access to certain portions of your applications and data, yet administrators still have little control over the devices they use and the locations they work from.
Consequently, IT is stuck making trade-offs on the cost of providing these workers a device vs. These workers access a small set of applications and have limited requirements from their PCs. However, since these workers are interacting with your customers, partners, and employees, they have access to your most critical data. In addition, these workers expect the ability to personalize their PCs, by installing their own applications and storing their own data, such as photos and music, on these devices.
Shared workstation environments have the constant requirement to re-provision desktops with the latest operating systems and applications for the needs of the organization change, tops the list. After the user classifications have been identified and the business requirements for each user classification have been defined, it becomes essential to evaluate the types of virtual desktops that are needed based on user requirements.
There are essentially five potential desktops environments for each user:. With hosted, server-based desktops, a single installed instance of a server operating system, such as Microsoft Windows Server , is shared by multiple users simultaneously. Each user receives a desktop "session" and works in an isolated memory space. The user does not work with and sit in front of the desktop, but instead, the user interacts through a delivery protocol. With published applications, a single installed instance of an application, such as Microsoft Office, is shared by multiple users simultaneously.
Each user receives an application "session" and works in an isolated memory space. The user interacts with the application or desktop directly, but the resources may only available while they are connected to the network. Each of the sections provides some fundamental design decisions for this environment. Understanding Applications and Data. When the desktop user groups and sub-groups have been identified, the next task is to catalog group application and data requirements.
If the applications and data are not identified and co-located, performance will be negatively affected. The process of analyzing the variety of application and data pairs for an organization will likely be complicated by the inclusion cloud applications, for example, SalesForce. This application and data analysis is beyond the scope of this Cisco Validated Design but should not be omitted from the planning process. There are a variety of third-party tools available to assist organizations with this crucial exercise.
Now that user groups, their applications, and their data requirements are understood, some key project and solution sizing questions may be considered. Can we hire or contract for them? Below is a short, non-exhaustive list of sizing questions that should be addressed for each user sub-group:.
Windows 8 or Windows 10? In production? Windows Server or Server ? SQL server or ? Hypervisor Selection. VMware vSphere: VMware vSphere comprises the management infrastructure or virtual center server software and the hypervisor software that virtualizes the hardware resources on the servers. An ever growing and diverse base of user devices, complexity in management of traditional desktops, security, and even Bring Your Own BYO device to work programs are prime reasons for moving to a virtual desktop solution.
Machine Catalogs. Collections of identical Virtual Machines VMs or physical computers are managed as a single entity called a Machine Catalog. Delivery Groups. To deliver desktops and applications to users, you create a Machine Catalog and then allocate machines from the catalog to users by creating Delivery Groups.
Delivery Groups provide desktops, applications, or a combination of desktops and applications to users. Creating a Delivery Group is a flexible way of allocating machines and applications to users. In a Delivery Group, you can:. As part of the creation process, you specify the following Delivery Group properties:. Figure 24 illustrates how users access desktops and applications through machine catalogs and delivery groups.
Citrix Provisioning Services. The advantage of using Citrix PVS is that it allows virtual machines to be provisioned and re-provisioned in real-time from a single shared-disk image. In this way administrators can completely eliminate the need to manage and patch individual systems and reduce the number of disk images that they manage, even for the number of machines continues to grow, simultaneously providing the efficiencies of a centralized management with the benefits of distributed processing.
A device that is used during the vDisk creation process is the Master target device. Devices or virtual machines that use the created vDisks are called target devices. When a target device is turned on, it is set to boot from the network and to communicate with a Provisioning Server. Unlike thin-client technology, processing takes place on the target device. Citrix Provisioning Services Functionality.
The target device downloads the boot file from a Provisioning Server Step 2 and boots. Based on the boot configuration settings, the appropriate vDisk is mounted on the Provisioning Server Step 3. The vDisk software is then streamed to the target device as needed, appearing as a regular hard drive to the system. Instead of immediately pulling all the vDisk contents down to the target device as with traditional imaging solutions , the data is brought across the network in real-time as needed.
This approach allows a target device to get a completely new operating system and set of software in the time it takes to reboot. This approach dramatically decreases the amount of network bandwidth required and making it possible to support a larger number of target devices on a network without impacting performance.
When considering a PVS deployment, there are some design decisions that need to be made regarding the write cache for the target devices that leverage provisioning services. The write cache is a cache of all data that the target device has written. If data is written to the PVS vDisk in a caching mode, the data is not written back to the base vDisk.
Instead, it is written to a write cache file in one of the following locations:. This option frees up the Provisioning Server since it does not have to process write requests and does not have the finite limitation of RAM. At this time, this method is an experimental feature only, and is only supported for NT6. This method also requires a different bootstrap. This provides the fastest method of disk access since memory access is always faster than disk access. When RAM is zero, the target device write cache is only written to the local disk.
When RAM is full, the least recently used block of data is written to the local differencing disk to accommodate newer data on RAM. The amount of RAM specified is the non-paged kernel memory that the target device will consume. Write cache can exist as a temporary file on a Provisioning Server. For additional security, the Provisioning Server can be configured to encrypt write cache files. Since the write-cache file persists on the hard drive between reboots, encrypted data provides data protection in the event a hard drive is stolen.
This cache option allows for the saved changes between reboots. Using this option, a rebooted target device is able to retrieve changes made from previous sessions that differ from the read only vDisk image. If a vDisk is set to this method of caching, each target device that accesses the vDisk automatically has a device-specific, writable disk file created. Any changes made to the vDisk image are written to that file, which is not automatically deleted upon shutdown.
This design enables good scalability to many thousands of desktops. Provisioning Server LTSR was used for Active Directory machine account creation and management as well as for streaming the shared disk to the hypervisor hosts. Distributed Components Configuration.
You can distribute the components of your deployment among a greater number of servers or provide greater scalability and failover by increasing the number of controllers in your site. You can install management consoles on separate computers to manage the deployment remotely. A distributed deployment is necessary for an infrastructure based on remote access through NetScaler Gateway formerly called Access Gateway. Figure 26 shows an example of a distributed components configuration.
A simplified version of this configuration is often deployed for an initial proof-of-concept POC deployment. Example of a Distributed Components Configuration. Multiple Site Configuration. If you have multiple regional sites, you can use Citrix NetScaler to direct user connections to the most appropriate site and StoreFront to deliver desktops and applications to users.
Figure 27 depicts multiple sites with a site created in two data centers. Having two sites globally, rather than just one, minimizes the amount of unnecessary WAN traffic. Multiple Sites. You can use StoreFront to aggregate resources from multiple sites to provide users with a single point of access with NetScaler.
A separate Studio console is required to manage each site; sites cannot be managed as a single entity. You can use Director to support users across sites. Citrix NetScaler accelerates application performance, load balances servers, increases security, and optimizes the user experience. In this example, two NetScalers are used to provide a high availability configuration. Citrix Cloud Services. Easily deliver the Citrix portfolio of products as a service.
Citrix Cloud services simplify the delivery and management of Citrix technologies extending existing on-premises software deployments and creating hybrid workspace services. Server OS machines. You want : Inexpensive server-based delivery to minimize the cost of delivering applications to a large number of users, while providing a secure, high-definition user experience.
Your users : Perform well-defined tasks and do not require personalization or offline access to applications. Users may include task workers such as call center operators and retail workers, or users that share workstations. Application types : Any application. Desktop OS machines. You want : A client-based application delivery solution that is secure, provides centralized management, and supports a large number of users per host server or hypervisor , while providing users with applications that display seamlessly in high-definition.
Your users : Are internal, external contractors, third-party collaborators, and other provisional team members. Users do not require off-line access to hosted applications. Application types : Applications that might not work well with other applications or might interact with the operating system, such as. NET framework. These types of applications are ideal for hosting on virtual machines.
Applications running on older operating systems such as Windows XP or Windows Vista, and older architectures, such as bit or bit. By isolating each application on its own virtual machine, if one machine fails, it does not impact other users. Remote PC Access. You want: Employees with secure remote access to a physical computer without using a VPN. Depending upon the location, you may want to restrict the ability to print or copy and paste outside of the desktop.
This method enables BYO device support without migrating desktop images into the datacenter. Your users: Employees or contractors that have the option to work from home but need access to specific software or data on their corporate desktops to perform their jobs remotely. Host: The same as Desktop OS machines. Application types: Applications that are delivered from an office computer and display seamlessly in high definition on the remote user's device.
The architecture deployed is highly modular. Virtual Desktop and Application Workload Architecture. The workload contains the following hardware as shown in Figure 28 :. The logical architecture of the validated solution which is designed to support up to users within a single 42u rack containing 32 blades in 4 chassis, with physical redundancy for the blade servers for each workload type is outlined in Figure Logical Architecture Overview.
This section includes the software versions of the primary products installed in the environment. Table 5. Software Revisions. Cisco UCS Manager. Cisco VIC Provisioning Services. StoreFront Services. ActiveIQ Unified Manager.
XCP File Analytics. Configuration guidelines are provided that refer to which redundant component is being configured with each step, whether that be A or B. Table 6. VLAN Configuration. Native VLAN. VLAN for in-band management interfaces. We utilized Two VMware Clusters in one vCenter data center to support the solution and testing environment:. This section details the configuration and tuning that was performed on the individual components to produce a complete, validated solution.
Table 7 through Table 13 list the details of all the connections in use. Table 7. Cisco Nexus A Cabling Information. Cisco Nexus A. NetApp Controller 2. NetApp Controller 1. Cisco UCS fabric interconnect A. Cisco UCS fabric interconnect B. Cisco Nexus B. GbE management switch. Table 8. Cisco Nexus B Cabling Information. Table 9. NetApp Controller-1 Cabling Information. When the term e0M is used, the physical Ethernet port to which the table is referring is the port indicated by a wrench icon on the rear of the chassis.
Table NetApp Controller 2 Cabling Information. Network Switch Configuration. Follow these steps precisely because failure to do so could result in an improper configuration. Physical Connectivity. FlexPod Cisco Nexus Base. The following procedures describe how to configure the Cisco Nexus switches for use in a base FlexPod environment. This procedure assumes the use of Cisco Nexus 9.
The interface-vlan feature and ntp commands are used to set this up. In this validation, port speed and duplex are hard set at both ends of every GE connection. Set Up Initial Configuration. Configure the switch. On initial boot and connection to the serial or console port of the switch, the NX-OS setup should automatically start and attempt to enter Power on Auto Provisioning. Continue with Out-of-band mgmt0 management configuration?
Review the configuration summary before enabling the configuration. To enable the appropriate features on the Cisco Nexus switches, follow these steps:. Log in as admin. Since basic FC configurations were entered in the setup script, feature-set fcoe has been automatically installed and enabled. Run the following commands:. Set Global Configurations. To set global configurations, follow this step on both switches:.
Run the following commands to set global configurations:. It is important to configure the local time so that logging time alignment and any backup schedules are correct. Sample clock commands for the United States Eastern timezone are:.
To create the necessary virtual local area networks VLANs , follow this step on both switches:. From the global configuration mode, run the following commands:. To add port profiles, follow these steps:. To add individual port descriptions for troubleshooting activity and verification for switch A, follow these steps:.
This message is expected. If you have fibre optic connections, do not enter the udld enable command. To add individual port descriptions for troubleshooting activity and verification for switch B and to enable aggressive UDLD on copper interfaces connected to Cisco UCS systems, follow this step:.
Create Port Channels. To create the necessary port channels between devices, follow this step on both switches:. Configure Port Channel Parameters. To configure port channel parameters, follow this step on both switches:. Configure Virtual Port Channels. To configure virtual port channels vPCs for switch A, follow this step:. To configure vPCs for switch B, follow this step:. Uplink into Existing Network Infrastructure. Depending on the available network infrastructure, several methods and features can be used to uplink the FlexPod environment.
If an existing Cisco Nexus environment is present, we recommend using vPCs to uplink the Cisco Nexus switches included in the FlexPod environment into the infrastructure. The previously described procedures can be used to create an uplink vPC to the existing environment. Make sure to run copy run start to save the configuration on each switch after the configuration is completed. The following commands can be used to check for correct switch configuration:. Some of these commands need to run after completing the configuration of the FlexPod components to see all results.
Storage Configuration. See the following section NetApp Hardware Universe for planning the physical location of the storage systems:. It also provides configuration information for all the NetApp storage appliances currently supported by ONTAP software and a table of component compatibilities. To confirm that the hardware and software components that you would like to use are supported with the version of ONTAP that you plan to install, follow these steps at the NetApp Support site.
Click the Platforms menu to view the compatibility between different version of the ONTAP software and the NetApp storage appliances with your desired specifications. Alternatively, to compare components by storage appliance, click Compare Storage Systems. NetApp storage systems support a wide variety of disk shelves and disk drives. Complete Configuration Worksheet. Citrix provides business mobility with mobile workplaces with access to access to apps, desktops, data and communications on any device, over any network and cloud to more than million people globally.
The multiple-hypervisor ready FlexPod, which supports both virtual and physical workloads, has been designed to help enterprise data centres face modern challenges including scalable infrastructure, unified infrastructure management and self-provision. One part that stayed behind is storage. He said that the exponential growth of enterprise data in one hand and aging technologies on other hand create a "massive problem of data".
Data SanDisk launches bundled solutions for enterprise data centers. Data Arrow adds Splunk to its quiver. Content from our partners The plan to transform patient outcomes in the Middle East through the use of AI. Why enterprises must prepare for further rise in software supply chain attacks.
The global all-flash storage market is expected to growth at a CAGR of
|Zoom official download for pc||Download teamviewer quicksupport|
|Citrix flexpod||Tightvnc remote deployment|
Agree, the citrix receiver opensuse much necessary
METAL SLUG 5 ZOOM DOWN DOWNLOADВы можете прийти к нам.
Вы можете прийти к нам.
Citrix flexpod free cisco vpn client software for windows 7What is FlexPod?
Следующая статья teamviewer version out of date