Académique Documents
Professionnel Documents
Culture Documents
Copyright and Trademark Notice Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. Other than printing one copy for personal use, no part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Citrix Systems, Inc. Copyright 20012009 Citrix Systems, Inc. All rights reserved. Citrix, ICA (Independent Computing Architecture), NetScaler, and Program Neighborhood are registered trademarks; Citrix XenServer, Citrix Access Essentials, Citrix Access Gateway, Citrix Password Manager, Citrix Application Firewall, Citrix Application Gateway, Citrix Provisioning Services, Citrix Streaming Profiler, Citrix Streaming Client, Citrix Stream Service, Citrix EdgeSight, Citrix WANScaler, Citrix SmoothRoaming, Citrix Authorized Learning Center, Citrix Subscription Advantage, Citrix Technical Support, and Speed Screen are trademarks of Citrix Systems, Inc. in the United States and other countries. FLEXnet Operations and FLEXnet Publisher are trademarks and/or registered trademarks of Acresso Software Inc. and/or InstallShield Co. Inc. Copyright RSA Encryption 19961998 RSA Security Inc. All rights reserved.
C ONTENTS
Contents
Chapter 1
Technology Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 Getting the Boot Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 vDisk Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32 Standard Image Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32 Private Image Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 Difference Disk Image Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35 Understanding Write Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36 Write Cache on a Server Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36 Write Cache in Target Device RAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37 Write Cache on Target Device Hard Drive . . . . . . . . . . . . . . . . . . . . . . . . . .37 Basic HA Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
Chapter 2
Chapter 3
Chapter 4
Managing Stores
Store Administrative Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56
Store Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56 General Tab: Store Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57 Paths Tab: Store Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57 Servers Tab: Store Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58 Store Configuration and Management Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58 Creating a Store . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Chapter 5
Chapter 6
Managing vDisks
vDisks in the Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77 vDisk Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 vDisk Properties Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 General: vDisk Properties Tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 Port Blocker Tab: vDisk Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79 vDisk File Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80 General Tab: vDisk File Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
Mode Tab: vDisk File Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80 Identification Tab: vDisk File Properties . . . . . . . . . . . . . . . . . . . . . . . . . . .81 Options Tab: vDisk File Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82 vDisk Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82 Creating and Configuring a vDisk File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84 Creating a vDisk File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84 Formatting a vDisk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85 Formatting a vDisk From the Provisioning Server . . . . . . . . . . . . . . . . . . . .85 Formatting a vDisk From the Target Device. . . . . . . . . . . . . . . . . . . . . . . . .86 Assigning a vDisk to a Target Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87 Assigning a vDisk to a User Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88 Building the vDisk Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88 Imaging Windows Target Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88 Imaging Linux Target Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91 Creating a Common vDisk Image. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91 Prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92 Building the Common Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93 Configuring the Master Target Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93 Exporting Specific Data Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93 Booting the Master Target Device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94 Adding Additional Target Devices to the Common Image . . . . . . . . . . . . .94 Maintaining vDisks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96 Configuring vDisk Modes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96 Viewing vDisk Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97 Adding Existing vDisks to a vDisk Pool or Store . . . . . . . . . . . . . . . . . . . . . . .98 Unassigning a vDisk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99 Releasing vDisk Locks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100 Deleting a vDisk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100 Deleting Cache on a Difference Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101 Copying vDisks to Different Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102 Copying and Pasting vDisk Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102 Backing Up a vDisk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103 Checking for vDisk Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103 Automatically Updating the vDisk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .104 Incrementally Updating a vDisk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108 Using Maintenance Utilities with a vDisk . . . . . . . . . . . . . . . . . . . . . . . . . . . .113 Working with Physical and vDisks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113
Chapter 7
Target Device Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115 General Tab: Target Device Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116 vDisks: Target Device Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117 Personality: Target Device Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117 Authentication: Target Device Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . .118 Status: Target Device Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118 Logging: Target Device Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119 Target Device Management Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120 Creating New Target Device Entries in the Database . . . . . . . . . . . . . . . . . . .121 Using the Console to Manually Create Target Device Entries . . . . . . . . . .121 Using Auto-add to Create Target Device Entries . . . . . . . . . . . . . . . . . . . .122 Importing Target Device Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123 Disable a Target Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123 Set the Target Device as the Template for this Collection . . . . . . . . . . . . . . . .123 Copy and Paste Target Device Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . .124 Boot Target Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .124 Restart Target Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .124 Shutdown Target Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125 Send Messages to Target Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125 Move Target Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126 Deleting a Target Device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126 Assigning vDisks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126 Checking the Status of a Target Device From the Console . . . . . . . . . . . . . .127 Using the Port Blocker Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128 Enabling the Port Blocker Feature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129 Configuring Port Blocker. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129 Using the Virtual Disk Status Tray. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131 Starting the Virtual Disk Status Tray . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132 Setting Virtual Disk Status Tray Preferences . . . . . . . . . . . . . . . . . . . . . . . . . .132 Managing Target Device Personality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132 Define Target Device Personality for a Single Target Device. . . . . . . . . . . . .133 Define Target Device Personality for Multiple Devices . . . . . . . . . . . . . . . . .134 Using Target Device Personality Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .135
Chapter 8
User Group Management Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141 Enabling or Disabling User Group Management for a Collection. . . . . . . . . .142 Creating a User Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142 Enabling or Disabling User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .143 Deleting User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .143 Assigning a vDisk to a User Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .143 Unassigning User Groups From vDisks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .143
Chapter 9
Chapter 10
Managing Views
View Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153 General Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153 Members Tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154 View Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154 Create a View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154 Paste Device Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155 Delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155 Refresh. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156 Boot Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156 Restart Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156 Shutdown Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .157 Send Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .157
Chapter 11
Preparing Network Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159 Switch Manufacturers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .160 Using UNC Format Names. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .160 Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161 Accessing a Remote Network Share. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161 Reducing Network Utilization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .163 Configuring Windows Features on a Standard vDisk . . . . . . . . . . . . . . . . . . .164 Configuring Recycle Bin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164 Configuring Offline Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165 Configuring Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165 Configuring System Restore for Standard Image. . . . . . . . . . . . . . . . . . . . . . .166 Configuring Logical Prefetcher. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166 Configuring Automatic Disk Defragmentation . . . . . . . . . . . . . . . . . . . . . . . .167 Disabling Windows Automatic Updates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .167 Using Roaming User Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168 Configuring Roaming User Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169 Configuring Folder Redirection with Roaming User Profiles . . . . . . . . . . . . .169 Disabling Offline Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171 Booting Through a Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171 Upgrading NIC Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173 On Provisioning Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173 On Target Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .174 Accessing a LUN Without Using a Network Share. . . . . . . . . . . . . . . . . . . . . . . .174 Prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176 Modifying vDisk Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179
Chapter 12
10
Configuring HA Storage Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .191 Disabling Windows Write Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .194 Testing HA Failover. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195 Offline Database Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .196 Enabling Offline Database Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .197
Chapter 13
Chapter 14
Chapter 15
Managing Printers
Installing Printers on the vDisk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .219 Enabling Printers on the vDisk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .220 Enablement Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .221 Enabling the Printer Management Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . .224
11
Chapter 16
Chapter 17
Auditing
Auditing Managed Objects. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .234 Enabling Auditing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .234 Accessing Audit Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .235 Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .235 Archiving Audit Trail Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .238
Chapter 18
Chapter 19
Glossary
12
C HAPTER 1
This overview includes information on the following topics: Product Introduction Benefits and Special Features Software-Streaming Process Overview The Infrastructure Product Utilities Administrative Roles Technology Overview Basic HA Configuration
Product Introduction
Most enterprises struggle to keep up with the proliferation and management of computers in their environment. Each computer, whether it is a desktop PC, a server in a data center, or a kiosk-type device, must be managed as an individual entity. The benefits of distributed processing come at the cost of distributed management. It costs time and money to set up, update, support and ultimately decommission each computer. The initial cost of the machine is often dwarfed by operational costs. Over the years, various software solutions have been offered that are designed to address the operational challenges faced by IT organizations. For example: Imaging solutions allow backup and duplication of existing machines. Distribution tools can automate many of the tasks required to install and upgrade software across many computers. Simplifies the management of the end points by removing most software and processing locally.
14
Each of these approaches has benefits and limitations. Provisioning Services takes a very different approach by fundamentally changing the relationship between hardware and the software that runs on it. Using Software Streaming Technology, Provisioning Services enables organizations to reduce the number of systems that they manage, even as the number of computers continues to grow. This solution simultaneously provides the efficiencies of a centrally managed solution with the benefits of distributed processing.
Note A single Provisioning Server can stream to both data center and desktop target devices.
Product licenses are issued based on the product edition that you choose. For Citrix product licensing documentation, open the Citrix Knowledge Center, then select Licensing under the Knowledge Resources section:
Chapter 1
15
http://support.citrix.com/pages/licensing/
Datacenter Benefits
Software-streaming technology delivers a better server management model. Because this is a software-based solution, it can be used on all x86 server platforms from stand-alone servers, to rack-mountable servers, blade servers, and virtual servers. Working with existing hardware, this solution provides new levels of flexibility, while providing an environment that meets the standards of high availability and reliability required by a data center.
16
Additional benefits for using Provisioning Services for Datacenter include: On-Demand Server Workload Streaming Delivers the OS, applications, and server configuration information in real-time stream, maximizing performance and minimizing network load. Risk-free server workload rollout - rollback to a previous working image in the time it takes to reboot. Minimizes downtime for roll forward, roll backward operations Maximizes boot performance Minimizes network load.
Standard Server Workload Image Streaming Provisions multiple servers from a single vDisk image. Minimizes storage and image management requirements. Ensures server build consistency.
Dynamic Server Workload Assignment Allows switching of server workloads in the time it takes to reboot. Maximizes flexibility by enabling real-time changes to data center workloads. Reduces the number of servers needed to support disaster recovery and business continuity requirements. Fewer servers needed; disk drives eliminated.
High Availability Built-in support for redundant servers, networks, and databases. Eliminates single points of failure. Supports high data center SLAs.
Static or Dynamic Boot Configuration Choose between dynamic (DHCP/PXE) or static (USB or CD-ROM) boot file delivery and configuration. Supports a variety of different data center infrastructure and management models.
Chapter 1
17
The Provisioning Services solution is fully compatible with virtual machine (VM) technology. VMs can be embedded in vDisks, greatly reducing the amount of network storage that may be required. Disaster Recovery and Testing for Consolidated Servers Set up your server with all the VMs that you want. Configure the VMs and base environment exactly as you want. Create a vDisk from the server and the entire package is virtualized and ready to boot up from any Provisioning Server anywhere. Virtual Machine Provisioning Within moments, move one virtual machine or every virtual machine running on one physical server, to another without having to copy virtual hard drives.
Desktop Benefits
With most companies having more than 100 desktop computers for every server, almost all of the costs associated with managing these computers are incurred when an IT professional has to manually provision, distribute software, or troubleshoot a problem. Software-Streaming technology significantly reduces all these costs. With Provisioning Services for Desktops, software-streaming eliminates the need to image each hard drive or custom configure each machine. Since data no longer has to be stored on the local computer, decommissioning steps, like wiping the hard drive, are no longer necessary. In addition, as the user is forced to move from one set of software to another, the users data can seamlessly move from computer to computer, or from one set of software to another, without any complex migration utilities, long file copies, or even a backup program. Many of ITs support calls are generated by software related problems. Provisioning Services technology protects your vDisks and prevents user sessions from corrupting the software. If a target device becomes infected by spyware or the latest virus, reboot the device and it is instantly cleaned. The days of spending hours removing unwanted software, virus and spyware are over. Security is a top concern of IT departments. The managed desktop has many tools that keep your data safe. Since software streaming allows computers to work without a hard drive installed, data can no longer be stolen by stealing a target device. Target computers can also be configured to block ports to prevent data theft through USB devices and CD-ROM devices.
18
Streaming Software to Target Devices The target device downloads the boot file from a Provisioning Server (refer to Step 2), and then the target device boots. Based on the device boot configuration settings, the appropriate vDisk is located, then mounted on the Streaming Server (refer to step 3). The software on that vDisk is streamed to the target device as needed. To the target device, it appears like a regular hard drive to the system.
Chapter 1
19
Instead of immediately pulling all the vDisk contents down to the target device (as done with traditional or imaging deployment solutions), the data is brought across the network in real-time, as needed. This approach allows a target device to get a completely new operating system and set of software in the time it takes to reboot, without requiring a visit to a workstation. This approach dramatically decreases the amount of network bandwidth required by traditional disk imaging tools; making it possible to support a larger number of target devices on your network without impacting overall network performance. vDisks can be assigned to a single target device as Private Image Mode, or to multiple target devices as Standard Image Mode.
The Infrastructure
The infrastructure design includes a hierarchy that directly relates to administrative roles within a Provisioning Services Farm. The graphic that follows provides a high-level view of the Provisioning Services infrastructure and illustrates how Provisioning Services components might appear within that implementation.
20
Farms
A farm represents the top level of a Provisioning Services infrastructure. Farms provide a Farm Administrator with a method of representing, defining, and managing logical groups of Provisioning Services components into sites. All sites within a farm share that farms Microsoft SQL database. A farm also includes a Citrix License Server, local or network shared storage, and collections of target devices. In the Console window, administrators select the farm that they want to manage or view. Sample tasks that are specific to a farm can include managing: Farm configurations Product licensing High Availability configurations Active Directory configurations User Groups Administrative roles
Note The Console does not need to be directly associated with the farm because remote administration is now supported on any Console that can communicate with that farms network.
Sites
A site provides both a Site Administrator and farm administrator, with a method of representing and managing logical groupings of Provisioning Servers, Device Collections, and local shared storage.
Chapter 1
21
A site administrator can perform any task that a device administrator or device operator can perform. A site administrator can also perform additional tasks such as managing: Print servers Device administrator and device operator role configurations Provisioning Servers Shared storage User Groups
Provisioning Servers within a site, communicate with farm components to obtain the information necessary to boot target devices and to provide target devices with the appropriate vDisk. Provisioning Server(s) must be able to communicate with the store where those vDisks exist.
Device Collections
Device collections provide the ability to create and manage logical groups of target devices, which are typically created and managed by a Device Administrator (a farm and site administrator can also perform a device administrators tasks). A device collection could represent a physical location, a subnet range, or a logical grouping of target devices. Creating Device Collections simplifies device management by performing actions at the collection level rather than at the target-device level.
Note A target device can only be a member of one Device Collection. For device collection details, refer to Managing vDisks.
22
Provisioning Servers
A Provisioning Server is any server that has Stream Services installed. It is used to stream software from vDisks, as needed, to target devices. In some implementations, vDisks reside directly on the Provisioning Server. In larger implementations, Provisioning Servers get the vDisk from a shared-storage location on the network. Provisioning Servers also retrieve and provide configuration information to and from the Provisioning Server Database. Provisioning Server configuration options are available to ensure high availability and load-balancing of target device connections.
Chapter 1
23
Console Window
Action Menu
The Action menu displays Provisioning Services tasks that can be performed on an object that is highlighted in the Console. The same tasks are available when you right-click on the object in the Console. Tasks are object specific and can only be performed if the user has the appropriate role assigned (role-based administration). Your role determines what displays in the Console. For example, if you are a farm administrator, you can perform all tasks and see all objects in the farm. Device administrators can only perform device-collection management tasks on collections to which they have privileges. Administrator roles are described later in this chapter.
Note MMC (Microsoft Management Console) specific console features are not described in this document. Refer to Microsofts MMC documentation for detailed information.
24
Properties Menus
To view or change an objects properties, right-click on the object, then select the Properties menu option. You can also highlight the object in the Console window, then select Properties from the Action menu options. The Properties dialog displays property settings in tabular format.
vDisks
vDisks exist as disk image files on a Provisioning Server or on a shared storage device. vDisk images are configured to be in Private, Standard, or Difference Disk mode. (For more information, refer to vDisk Modes). vDisks are associated with a sites vDisk pool. To view vDisks within a pool, expand the vDisk Pool folder in the Console tree.
vDisk Pools
vDisk pools are the collection of all vDisks available to a site. There is only one vDisk pool per site. The method used to locate a vDisk on a server share is illustrated in the graphic that follows.
Chapter 1
25
1.
The target device begins the boot process by communicating with a Provisioning Server and acquiring a license.
vDisk Pool 2. The Provisioning Server checks the vDisk pool for vDisk information, which includes identifying the Provisioning Server(s) that can provide the vDisk to the target device and the path information that server should use to get to the vDisk. In this example, the vDisk shows that only one Provisioning Server in this site can provide the target device with the vDisk and that the vDisk physically resides on the Finance Server (shared storage at the farm level). 3. The Provisioning Server locates the vDisk on Finance Server, then streams that vDisk, on demand, to the target device.
On the Consoles Create a New vDisk dialog, you can add a new vDisk file to a store and select the Provisioning Server that will create the vDisk file on a Provisioning Server or on shared storage.
26
Target Devices
A device, such as a desktop computer or server, that boots and gets software from a vDisk on the network, is considered a target device.
Note In the product documentation, the term target device is used generically when referring to any device within the a Provisioning Services Farm, which boots and gets software from a vDisk on the network.
Target devices deliver a higher level of security than traditional technologies, by fully utilizing your existing management infrastructure. Each target device continues to have its own unique identity on the network and within your existing network operating system (i.e. Active Directory, Novell E-Directory and other LDAP directories). Target devices can continue to be managed by group policies and existing security policies pushed out by these directory management tools. In addition to using existing policy management tools, greater security is inherit by the fact that there is no longer a hard drive in the target device. If the target device is stolen, data is not lost. Instead, it is easily ported to another target device. A target device can only be a member of one device collection. Expanding a Device Collection folder in the Consoles tree allows you to view members of a device collection and information such as the target device name, IP address, vDisk, and the Provisioning Server currently providing the vDisk. Target device settings are made in the Consoles Device Properties dialog, which includes settings such as printer assignments.
Stores
A store is a logical name that is given to a physical vDisk storage location. The store name is the common name used by all Provisioning Servers within the farm. Example One: The physical vDisk for Windows XP (WINXP1) resides on a Provisioning Server (PVS1) local to a site. The vDisk path is: C:\vDisks\WINXP1.vhd The logical name that is given to this physical location is the store. Store name (logical name): bostonwinxp Example Two: The physical vDisk for Windows XP (WINXP1) resides on a network share (FinanceShare)at the farm level. The vDisk path for Provisioning Server (PVS1) to WINXP1 is:
Chapter 1
27
\\FinanceShare\vDisks\WINXP1.vhd Access or visibility to a store depends on the users administrative privileges: Farm administrators have full access to all stores within the farm. Site administrators have access to only those stores owned by the site. They can delete stores owned by the site but they can not modify store properties or add vDisks to the store. Device administrators and device operators have read-only access and can not view store information. Site Administrators may also have read-only access if that store exists at the farm level, or if that store belongs to another site.
Stores that exist in a farm can be viewed by expanding the Store parent directory in the Consoles tree. The Stores property settings can be modified from the Properties Dialog.
Device Collections
Device collections provide the ability to create and manage logical groups of target devices. A device collection could represent a physical location, a subnet range, or a logical grouping of target devices. Creating device collections simplifies device management by performing actions at the collection level rather than at the target-device level.
User Groups
User groups provide Farm and Site Administrators with the ability to create and manage groups of users based on existing Active Directory or Windows groups. Creating user groups within a site simplifies management tasks by performing actions at the user-group level, rather than at the individual user level. User groups have the same vDisks and settings available if moving from one target device to another.
28
Network Services
Network services include a BOOTP service, Preboot Execution Environment (PXE) service, and a TFTP service. These service options can be used during the boot process to retrieve IP addresses, and locate then download the boot program from the Provisioning Server to the target device. Alternative boot options are also available, refer to Booting From an Optional Boot Device.
Note For network service details, refer to Getting the Boot Program in this document.
Product Utilities
In addition, Provisioning Services includes several tools for use when configuring and managing a Provisioning Services deployment. After installing Provisioning Services software, the following tools become available: Installation Wizard Use this wizard to install Provisioning Services components to create a Provisioning Servers and Master target devices. Configuration Wizard Use this wizard to configure Provisioning-Server components, including network services, and database permissions. This wizard is installed during the Provisioning Services installation process. XenConvert Use this utility to build a vDisk from the Master target devices hard-disk drive. This utility is installed during the target device installation process. Virtual Disk Status Tray Use this target device utility to get target-device connection status and streaming statistical information. This utility is installed during the Provisioning Services target device installation process. Boot Device Manager Use this utility to configure a boot device, such as a USB or CD-ROM, which then receives the boot program from the Provisioning Services. Upgrade Utilities
Chapter 1
29
There are several upgrade methods available. The method you select depends on your network requirements. Programming Utilities Provisioning Services provides programmers with a management application programming utility and a command line utility. These utilities can be accessed by all users. However, users can only use those commands associated with their administrator privileges. For example, a Device Operator is able to use this utility to get a list of all target devices that they have access to.
Administrative Roles
The ability to view and manage objects within a Provisioning Services implementation is determined by the administrative role assigned to a group of users. Provisioning Services makes use of groups that already exist within the network (Windows or Active Directory Groups). All members within a group share the same administrative privileges within a farm. An administrator may have multiple roles if they belong to more than one group. Groups are managed at the farm level through the Consoles Farm Properties dialog. The following roles exist within a Provisioning Services farm: Farm Administrator Site Administrator Device Administrator Device Operator
Farm Administrator
Farm administrators can view and manage all objects within a farm. Farm administrators can also create new sites and manage role memberships throughout the entire farm.
Site Administrator
Site administrators have full management access to the all objects within a site. For example, a site administrator can manage Provisioning Servers, site properties, target devices, device collections, vDisks, vDisk pools, and local vDisk stores. A site administrator can also manage device administrator and device operator memberships.
30
Device Administrator
Device administrators can perform all device-collection management tasks on collections to which they have privileges.
Device Operator
Device operators can view vDisks and target devices, and boot or shut down target devices within a device collection to which they have privileges.
Technology Overview
vDisk technology is the key to software streaming. This technology allows a target device to connect to a Provisioning Server to emulate a local hard drive. The difference between a physical hard drive and a vDisk is unknown to the target device.
The DHCP service delivers IP configurations to a device. It can also deliver the boot program location using options 67, and 60 or 66. Consider delivering the boot program location with a DHCP service to reduce the number of services and increase reliability. The BOOTP service can deliver IP configuration to a target device according to BOOTP tab. It can also deliver the boot program location using optional fields. Use of this service is no longer typical. Use this service only if DHCP does not meet your requirements. The PXE service can deliver the boot program location to a target device according to the PXE Specification Version 2.1. Use this service if a DHCP service exists and cannot be changed, and another PXE service is not used. The TFTP service delivers the boot program to a target device on request. Use it if another TFTP service is not available.
Chapter 1
31
The illustrations that follow, show the boot process without and with using PXE.
Using DHCP to Retrieve IP Address and Scope Options (Without PXE) 1. When a target device boots from the network, DHCP sends a request to the Provisioning Server for an IP address and Scope Option settings (66 and 67). The Provisioning Server returns the information as requested. Using TFTP, a request for the boot file is sent from the target device to the Provisioning Server. The Provisioning Server downloads the boot file on the target device and the target device boots.
2.
Using DHCP and PXE to Retrieve IP Address and Scope Options 1. When a target device boots from the network, DHCP sends a request to the Provisioning Server for an IP address and Scope Option settings (option 60; PXEClient identifier). The Provisioning Server returns the information as requested. The target device sends a request to the Provisioning Server for the boot file name and location to the PXE service (options 66 and 67). The PXE service returns the information to the target device.
2.
32
3.
Using TFTP, a request for the boot file is sent from the target device to the Provisioning Server. The Provisioning Server downloads the boot file on the target device and the target device boots.
Note The BIOS Embedded Bootstrap boot method also exists to allow OEMs to embedded the bootstrap file on the target device.
vDisk Modes
There are three vDisk mode options: Standard Image Mode Private Image Mode Difference Disk Image Mode
Chapter 1
33
To use Standard Image, the vDisk is set to read-only mode. Each target device then builds a write cache that stores any writes the operating system needs to make. There are several write-cache options available. Having a read-only vDisk offers administrators several advantages. First, each time the target device boots, it always boots from a clean vDisk. If a machine becomes infected with a virus or spyware, simply reboot to the clean image. This solution greatly reduces the number of vDisks to maintain in an network. It also reduces the amount of change points required. Other installation methods require a successful install of a software update on each target device. With a Standard Image, you only have to install software one time. Updated vDisks can then be accessed, by all assigned target devices, through the Provisioning Server. As a result, a single successful installation can upgrade thousands of machines. To get new software, a target device just needs to reboot. While each target device is using the same vDisk, there are plenty of instances when a device needs to have some unique characteristics while running. A number of tools are provided to allow for uniqueness within the environment including: Computer Name Each target device is given its own unique network name and each target device is able to have its own computer account within your existing directory management structure. Common Image Allows a vDisk to be used across different hardware platforms. Device Personality While 95% of all software works in a standard image, a number of applications require each target device to have a unique ID, such as a phone extension. This feature allows you to store application specific values in the database and retrieve the target devices unique value as the device loads.
34
Private Image vDisk Mode The benefits for using Private Images instead of a regular hard drive are: pplication flexibility; users can install their own applications. User software and data can seamlessly move from one computer to another in a minutes without elaborate migration procedures. All user data (including E-mail) is automatically backed up to a server. liminates hard drive failures which is the number one cause of hardware problems. Security; prevents data from being downloaded or stolen. ncreased Provisioning-Server load. Private Image vDisks require a lot more storage space. Each vDisks application stack must be maintained.
Chapter 1
35
Note In order to restore a vDisk that uses Difference Disk cache, be sure to backup all vDisk files and Difference Disk cache files prior to making any vDisk modifications.
The benefits of using Difference Disk Mode include: Saves target device specific changes that are made to the vDisk image. Same benefits as Standard Image Mode.
The drawbacks of using Difference Disk Mode include: The cache file is saved so long as the file remains valid. Any changes made to the vDisk force the cache file to be automatically deleted. For example, if the vDisk is set to Private Image Mode, all associated cache files are deleted.
36
Invalidating changes include: Automatic updates Incremental updates Mapping the drive from the Console Changing the location of the Difference Disk file Booting in Private Image mode Changing the write cache path entries for a server (for example, adding, subtracting, or changing the order of those path entries to improve I/O by spreading the load with other servers) Changing a target devices MAC address
Chapter 1
37
For additional security, the Provisioning Server can be configured to encrypt write cache files. Since the write-cache file does exist on the hard drive between reboots, the data will be encrypted in the event a hard drive is stolen.
38
Write Cache on Shared Storage The hard drive does not require any additional software to enable this feature.
Note The write cache file is temporary unless the vDisk mode is set to Difference Disk Image mode.
For additional security, Provisioning Server can be configured to encrypt write cache files on the target device.
Basic HA Configuration
More complex implementations may require a farm of redundant, load-balanced Provisioning Servers, multiple Provisioning Servers sharing the same database, and vDisk storage on a NAS, SAN, or Windows share location. The illustration that follows, shows a farm with multiple Provisioning Servers, network services, and switches. In this implementation, the database resides on a different Provisioning Server than the vDisks. The vDisk images on one Provisioning Server have been copied to a remote Provisioning Server that can connect and communicate with the server where the database was installed. This implementation provides a very basic, highly-available network, which is also configured to provide for server load-balancing.
Chapter 1
39
Basic HA Configuration More complex HA implementations could include duplicating the database on a different Provisioning Server, in real-time. vDisks can optionally be stored in an existing SAN or NAS network that can connect and communicate with the Provisioning Server where the database resides.
40
C HAPTER 2
The farm is initially configured when you run the Configuration Wizard. The wizard prompts you for the farms name, a store, and a device collection. When you first open the Console, those objects display in the tree. The wizard also prompts you for additional farm information such as the name of the license server, your user account information, and those servers that can serve the bootstrap file to target devices. You can always rerun the wizard to change settings. You can also choose to make farm configuration changes using the Farm Properties Dialog.
Connecting to a Farm
To connect to a farm
1. 2. 3.
Right-click on Provisioning Services Console in the Console tree, then select Connect to farm... Under Server Information, type the name or IP address of a Streaming Server on the farm and the port configured for server access. Select to log in using one of the following methods: Use the Windows credentials that you are currently logged with, then optionally enable the Auto-login on application start or reconnect feature. Use different Windows credentials by entering the username, password, and domain associated with those credentials then optionally, enable the Save Password and Auto-login on application start or reconnect feature.
42
4.
Managing Connections
You can manage connections to farms from the Manage Connections dialog. To open the dialog, right-click on the Provisioning Services Console icon in the tree, then select the Manage connections... menu option.
Both farm and site administrators can perform the following farm-level tasks: Managing Site Properties (Site Properties Dialog) Managing Stores Managing Connections
Chapter 2
43
44
Note Changing licensing properties requires that the Provisioning Services Stream Service be restarted on each Provisioning Server for licensing changes to take effect.
Field/Button
Description
Chapter 2
45
Type the name of the Citrix License Server in this textbox. Type the Port number that the license server should use or accept the default, which is 27000. If using the license trade-up feature, which allows you to use Datacenter product licenses that you have available if no Desktop product licenses are currently available, check this checkbox.
46
The following tables describe each tab on the Site Properties dialog.
Remove button
Chapter 2
47
Site Tasks
At the site level you can perform the following Provisioning Services tasks: Creating a New Site in a Farm Rebalancing Devices on the Provisioning Server Importing Target Devices into Collections Accessing Audit Information within a farm or site
1. 2. 3. 4. 5.
Right-click on the Sites folder in the farm where you want to add the new site. The Site Properties dialog appears. On the General tab, type the name and a description for the site in the appropriate text boxes. On the Security tab, click Add to add groups that will have the Site Administrator rights in this site. The Add Security Group dialog appears. Check the box next to each group, then click OK. Optionally, check the Domains\Group Name checkbox to select all groups in the list. On the Options tab, if new target devices are to be added using the AutoAdd feature, select the collection where these target devices should reside (this feature must first be enabled in the farms properties).
To modify an existing sites properties, right-click on the site in the Console, then select Properties. Make any necessary modifications in the Site Properties dialog.
48
C HAPTER 3
The ability to view and manage objects within a Provisioning Server implementation is determined by the administrative role assigned to a group of users. Provisioning Services makes use of groups that already exist within the network (Windows or Active Directory Groups). All members within a group will share the same administrative privileges within a farm. An administrator may have multiple roles if they belong to more than one group. The following administrative roles can be assigned to a group: Farm Administrator Site Administrator Device Administrator Device Operator
After a group is assigned an administrator role through the Console, if a member of that group attempts to connect to a different farm, a dialog displays requesting that a Provisioning Server within that farm be identified (the name and port number). You are also required to either use the Windows credentials you are currently logged in with (default setting), or enter your Active Directory credentials. Provisioning Services does not support using both domain and workgroups simultaneously. When the information is sent to and received by the appropriate server farm, the role that was associated with the group that you are a member of, determines your administrative privileges within this farm. Group role assignments can vary from farm to farm.
50
Farm Administrator
Farm administrators can view and manage all objects within a farm. Farm administrators can also create new sites and manage role memberships throughout the entire farm.
Farms Consist of One Shared Database, a Licensing Server, Shared Storage, Optional Console, and all Components within each Site When the farm is first configured using the Configuration Wizard, the administrator that creates the farm is automatically assigned the Farm Administrator role. While configuring the farm, that administrator selects the option to use either Windows or Active Directory credentials for user authorization within the farm. In the Console, farm-level tasks can only be performed by farm administrators. For example, only a farm administrator can create a new site within the farm.
Adding Farm Administrators
After the Configuration Wizard is run, additional groups can be assigned the Farm Administrator role in the Console. 1. In the Console, right-click on the Farm which the administrator role will be assigned, then select Properties. The Farm Properties dialog appears.
Note The authorization method displays to indicate if Windows or Active Directory credentials are used for user authorization in this farm.
Chapter 3
51
2. 3. 4.
On the Groups tab, highlight all the groups that will be assigned administrative roles in this farm, then click Add. On the Security tab, highlight all groups to which the Farm Administrator role will be assigned, the click Add. Click OK to close the dialog box.
Site Administrator
Site administrators have full management access to the all objects within a site. For example, the site administrator can manage Provisioning Servers, site properties, target devices, device collections, vDisk assignments and vDisk Pools. If a farm administrator assigns a site as the owner of a particular store, the site administrator can also manage that store. Managing a store can include tasks such as adding and removing vDisks from shared storage or assigning Provisioning Servers to the store. The site administrator can also manage device administrator and device operator memberships.
Sites Consist of Provisioning Servers, Device Collections, and Optionally, Consoles, and Site-Based Shared Storage and Consoles
To assign the Site Administrator role to one or more groups and its members
1. 2. 3.
In the Console, right-click on the site for which the administrator role will be assigned, then select Properties. The Site Properties dialog appears. Click the Security tab, then click the Add button. The Add Security Group dialog appears. From the drop-down menu, select each group to associate with the site administrator role, then click OK. Optionally, repeat steps 2 and 3 to continue assigning additional site administrators.
52
4.
Device Administrator
Device administrators manage device collections to which they have privileges. Device collections consist of a logical grouping of devices. For example, a device collection could represent a physical location, a subnet range and a logical grouping of target devices. A target device can only be a member of one device collection.
Device Collection
To assign the Device Administrator role to one or more groups and its members
1. 2.
In the Console tree, expand the site where the device collection exists, then expand the Device Collections folder. Right-click on the device collection that you want to add device administrators to, then select Properties. The Device Collection Properties dialog appears. On the Security tab, under the Groups with Device Administrator access list, click Add. The Add Security Group dialog appears. To assign a group with the device administrator role, select each system group that should have device administrator privileges, then click OK. Click OK to close the dialog box.
3. 4. 5.
Chapter 3
53
Device Operator
A device operator has administrator privileges to perform the following tasks within a Device Collection for which they have privileges: Boot and reboot a target device Shut down a target device View target device properties View vDisk properties for those vDisks assigned to a target device
1. 2. 3. 4. 5.
In the Console tree, expand the site where the device collection exists, then expand the Device Collections folder. Right-click on the device collection that you want to add device operators to, then select Properties. The Device Collection Properties dialog appears. On the Security tab, under the Groups with Device Operator access list, click Add. The Add Security Group dialog appears. To assign a group with the Device Operator role, select each system group from the drop-down list, then click OK. Click OK to close the dialog box.
54
C HAPTER 4
Managing Stores
A store is the logical name for the physical location of the vDisk folder. This folder can exist on a local server or on shared storage. When vDisks files are created in the Console, they are assigned to a store. Within a site, one or more Provisioning Servers are given permission to access that store in order to serve vDisks to target devices.
A Provisioning Server checks the database for the Store name and the physical location where the vDisk resides, in order to provide it to the target device
56
Separating the physical paths to a vDisks storage locations allows for greater flexibility within a farm configuration, particularly when using HA. When HA is implemented, if the active Provisioning Server in a site fails, the target device can get its vDisk from another Provisioning Server that has access to the store and permissions to serve the vDisk. If necessary, copies of vDisks can be maintained on a secondary shared-storage location in the event that connection to the primary shared-storage location is lost. In this case, the default path can be set in the store properties if all Provisioning Servers can use the same path to access the store. If a particular server cannot use the path (the default path is not valid for that server, not because of a connection loss, but because it is simply not valid) then an override path can be set in the store properties for that particular server. Provisioning Servers will always use either the default path (if the override path does not exist in the database) or the override path if it does exists in the database.
Store Properties
Stores are created in the Store Properties dialog. This dialog allows you to: Name and description of the store. Select the owner of the store (the site which will manage the store). Provide a default path to the store (physical path to the vDisk). Define default write cache paths for this store. Select the servers that can provide this store.
Chapter 4
Managing Stores
57
After a store is created, Store information is saved in the Provisioning Services database. Each site has one vDisk Pool, which is a collection of vDisk information required by Provisioning Servers that provide vDisks in that site. The vDisk information can be added to the vDisk pool using the vDisk Properties dialog or by scanning a store for new vDisks that have not yet been added to the database. The Store Properties dialog includes the following tabs: General Tab: Store Properties Paths Tab: Store Properties Servers Tab: Store Properties
Enter the default write View, add, edit, remove, or move the default write cache paths for this store. Entering more than one write cache path allows for vDisk load to be distributed to physically cache paths different drives. When a target device first connects, the Stream Service picks from the list. If using HA, the order of the write cache paths, for any override paths in the server store properties, must match the order of the write cache paths specified here.
58
Select a site from the list View or scroll to select the site where Provisioning Servers that can access this store exist (multiple sites can access the same store). Check the servers that will provide this store All Provisioning Servers within the selected site display in this list. Check the box next to all servers that are permitted to access this store. If the store is only for a specific site, only those servers within that site are valid selections. If the default path is not valid for a selected Provisioning Server, you must define an override path in that servers properties dialog, on the Store tab.
Creating a Store
To create a new store
1. 2. 3.
In the Console tree, right-click on Stores, then select the Create store menu option. The Store Properties dialog appears. On the General tab, type the store name (logical name for this storage location) and a description of this store. To provide a site administrator with permission to manage this store, under Security, select the site within this farm that will act as the store owner. Otherwise, leave this blank so that only farm administrators can manage this store.
Chapter 4
Managing Stores
59
4.
On the Paths dialog, type or browse for the default path for this store (physical location of the vDisk folder). If the user is a site administrator, only those sites that they administer will be available in the list.
Note The Browse button is not active until at least one Provisioning Server is selected on
the Servers tab.
5.
The write cache path(s) for the selected store display under the paths list. Optionally, click Add to add additional write-cache paths to use for this store. Entering more than one write cache paths allows for vDisk load to be distributed to physically different drives. When a target device first connects, the Stream Service picks from the list. If using HA, the order of the write-cache paths for any override paths in store properties for that server, must match the order of the write-cache paths specified here. Click the Servers tab. Select a site from the list. All Provisioning Servers in that site appear. Check the box next to each Provisioning Server that will access this store. Repeat this step for each site if necessary. (If this procedure is performed by a site administrator, only those sites that they administer appear.) Click OK to save Property settings.
6.
7.
60
C HAPTER 5
A Provisioning Server is any server that has Stream Services installed. Provisioning Servers are used to stream software from vDisks, as needed, to target devices. In some implementations, vDisks reside directly on the Provisioning Server. In larger implementations, Provisioning Servers get the vDisk from a shared-storage device on the network. Provisioning Servers also retrieve and provide configuration information to and from the Provisioning Services database. Provisioning Server configuration options are available to ensure high availability and load-balancing of target device connections To configure a Provisioning Server and software components for the first time, run the Configuration Wizard (the Configuration Wizard can be re-run on a Provisioning Server at a later date in order to change network configuration settings). Refer to the Installation and Configuration Guide for Configuration Wizard details. After the Provisioning Server software components are successfully installed, and the wizard configurations have been made, servers are managed through the Provisioning Services Console.
62
In the Console, the appearance of the Provisioning Server icon indicates that servers current status.
The Server Properties dialog includes the following tabs: General Network Stores Options
Note Provisioning Services displays a message if a change made on a Provisioning Server Properties dialog requires that the server be rebooted.
Chapter 5
63
64
Network Tab
Maximum transmission unit Number of bytes that fit in a single UDP packet. For standard Ethernet, the default value is correct. If you are attempting to operate over a WAN, then a smaller value may be needed to prevent IP fragmentation. Provisioning Services currently does not support IP fragmentation and reassembly. Also, if you are using a device or software layer that adds bytes to every packet (for security reasons for example), a smaller value may be needed. If your entire infrastructure supports jumbo packets (Provisioning Services NIC, target device NIC and any intervening switches and/or routers) then you can set the MTU to 50 bytes less than your jumbo packet max size to achieve much higher network throughput. I/O burst size The number of bytes that will be transmitted in a single read/write transaction before an ACK is sent from the server or device. The larger the IO burst, the faster the throughput to an individual device, but the more stress placed on the server and network infrastructure. Also, larger IO Bursts increase the likelihood of lost packets and costly retries. Smaller IO bursts reduce single client network throughput, but also reduce server load. Smaller IO bursts also reduce the likelihood of retries. IO Burst Size / MTU size must be <= 32, i.e. only 32 packets can be in a single IO burst before a ACK is needed. Socket communications Enable non-blocking I/O for network communications.
Pacing Tab
Boot pause seconds The amount of time that the device will be told to pause if the Maximum devices booting limit has been reached. The device will display a message to the user and then wait Boot pause seconds before attempting to continue to boot. The device will continue to check with the server every Boot pause seconds until the server allows the device to boot. Maximum boot time The amount of time a device will be considered in the booting state. Once a device starts to boot, the device will be considered booting until the Maximum boot time has elapsed for that device. After this period, it will no longer be considered booting (as far as boot pacing is concerned) even if the device has not actually finished booting. Maximum boot time can be thought of as a time limit per device for the booting state for boot pacing. Maximum devices booting The maximum number of devices a server allows to boot at one time before pausing new booting devices. The number of booting devices must drop below this limit before the server will allow more devices to boot. vDisk creation pacing Amount of pacing delay to introduce when creating a vDisk on this Provisioning Server. Larger values increase the vDisk creation time, but reduce Provisioning Server overhead to allow target devices that are running, to continue to run efficiently.
Device
License timeout Amount of time since last hearing from a target device to hold a license before releasing it for use by another target device. If a target device shuts down abnormally (loses power for example) its license is held for this long.
Chapter 5
65
Store Properties
66
Check for updates daily at Active Directory Enable automatic password support
If your target devices are domain members, and you want to renegotiate machine passwords between Windows Active Directory and the target devices, select the Enable automatic password support, and use the slider to set the number of days between renegotiation. Select the number of days that should pass before the password should be changed.
Chapter 5
67
Management Tasks
In the Console, Provisioning Servers are managed by performing actions on them. To view a list of actions that can be performed on a selected Provisioning Server, choose from the following options: Click the Action menu in the menu bar. Right-click on a Provisioning Server in the Console. Enable the Action pane from the Views menu.
Actions appear disabled if they do not apply to the selected Provisioning Server (refer to Management Tasks for task details).
68
Note After making any changes to a Provisioning Servers properties, restart the Stream Service to implement those changes. Use caution when restarting services. If target devices are connected to the Provisioning Server, changes could prevent the device from reconnecting.
The IP address field on the Network tab must reflect the real static IP address of the Provisioning Server.
Chapter 5
69
Refresh
To refresh the Provisioning Server folder information in the Console, right-click on the Servers folder, then select Refresh.
View
To customize a Console view
1. 2.
Right-click on the Server folder in the Console tree, then select Customize. The Customize View dialog appears. Enable the check box next to each MMC and Snap-in view option, then click OK. The Console view refreshes to display the view options selected.
1. 2. 3. 4.
Right-click on the Provisioning Server to copy properties from, then select Copy server properties. The Copy Server Properties dialog appears. Enable the checkbox next to each property to copy, or click the Select all button to enable all properties to be copied. Click Copy. Right-click on the Provisioning Server that you want to copy properties to, then select Paste server properties.
70
1.
Highlight the Provisioning Server in the Console, than select the Stream Services menu option from the Actions menu, right-click menu, or Actions pane. The Provisioning Server Control dialog appears. Select from the following menu options: Start Starts the Stream Service. Stop Places the Provisioning Server in off-line mode. Restart After modifying Provisioning Server settings, such as adding or removing IPs, restart the Stream Service.
2.
3. 4.
Highlight the Provisioning Servers that you want to take action on, then click that actions button. Click Close to exit the dialog.
Chapter 5
71
If there is an unexpected event, such as a network outage or system crash, and the state of a Provisioning Server becomes unknown for more than ten seconds, it may appear in an unknown state in the Console. When the Provisioning Server comes back online, the status will be automatically updated every ten seconds to provide accurate target device counts for load balancing. However for extended outages, it may be desirable to show the server as offline by clearing the status. The load balancing algorithm accounts for stale status records and is not affected if the status is cleared or not.
Important Before you can delete a Provisioning Server, you must first mark the server as down or take the server off line, otherwise the Delete menu option will not appear. The Stream Service can not be deleted.
When you delete a Provisioning Server, you do not affect vDisk image files or the contents of the server drives. However, you do lose all paths to the vDisk image files on that server. After deleting a Provisioning Server, target devices are no longer assigned to any vDisk image files on that server. The target device records remain stored in the Virtual LAN Drive database, but the device cannot access any vDisk that was associated with the deleted Provisioning Server.
Note If there are vDisks associated with the Provisioning Server being deleted, it is recommended that backup copies are created and stored in the vDisk directory prior to deleting.
To delete a Provisioning Server
1.
In the Console, highlight the Provisioning Server that you want to delete, then select Show connected devices from the Action menu, right-click menu, or Action pane. The Connected Target Devices dialog appears.
Note Prior to shutting down target devices, send those devices notification by clicking the Message button (Showing Provisioning Server Connections).
72
2. 3. 4. 5. 6. 7.
In the Target Device table, highlight all devices in the list, then click Shutdown. The Target Device Control dialog appears. Type a message to notify target devices that the Provisioning Server is being shut down. Scroll to select the number of seconds to delay after the message is received. If the Stream Service is running on the Provisioning Server, stop the Stream Service (Starting, Restarting or Stopping the Stream Service). Unassign all target devices from the Provisioning Server. Highlight the Provisioning Server you want to delete, then choose Delete from the Action menu, right-click menu, or Action pane. A delete confirmation message appears. Click Yes to confirm the deletion. The Provisioning Server is deleted and no longer displays in the Console.
8.
1.
Highlight a Provisioning Server in the Console, then select Show connected devices from the Action menu, right-click menu, or Action pane. The Connected Target Devices dialog appears. Select one or more target devices in the table to perform any of the following connection tasks: Shutdown shuts down target devices that are highlighted in the dialog. Reboot reboots target devices that are highlighted in the dialog. Message opens the Edit Message dialog to allow you to type, and then send a message to target device(s) highlighted in the dialog.
2.
Chapter 5
73
When selecting Shutdown or Reboot, a dialog opens providing the option to type a message that displays on the effected devices. The Shutdown or Reboot options can be delayed by entering a delay time setting.
Note If a message appears confirming that the target device was successfully shut down or rebooted, but the icon in the Console window does not change accordingly, select the refresh button.
Important Target devices that are not in HA mode will not be diverted to a different server. However, if a target devices is misconfigured to have HA enabled, but they are not using a valid HA store configuration, the target device can lock up.
This option causes the redistribution of target devices to available Provisioning Servers. The success of this load balancing option is contingent on how boot options are set on the Target Device Properties dialog and the number of Provisioning Servers that you choose to rebalance connections on. For example, if you want to rebalance all target device connections accessing a vDisk that resides on three different Provisioning Servers in your farm, and all devices are set to boot from the Provisioning Server that is least busy, rebalancing would evenly distribute connections across the three selected Provisioning Servers.
To rebalance Provisioning Server connections
1.
In the Console, highlight the Provisioning Servers to rebalance, right-click then select the Rebalance devices menu option. The Provisioning Server Control dialog appears. Click Rebalance. A rebalance results message appears under the Status column. Click Close to exit the dialog.
2. 3.
74
1. 2.
Right-click the Provisioning Server in the details pane, then select Check for updates. Select Automatic updates or Incremental updates. Click OK on the confirmation message appears. The vDisk is automatically updated or is scheduled to be incrementally updated.
Note The Configuration Wizard starts and configures the necessary services to start automatically. If you need to start and configure the services manually, see the instructions below.
The Stream Service needs to be started in order for the Provisioning Server to operate. Start the following boot services if they have not yet been started: BOOTP Service or PXE Service TFTP Service
Chapter 5
75
76
C HAPTER 6
Managing vDisks
A vDisk is an image file stored on a Provisioning Server or remote storage location, which acts as a hard disk for a target device. When creating a vDisk image file, keep the following facts in mind: For organizational purposes, it is best to store vDisk image files in one directory. For large implementations with many target devices, spreading the I/O across multiple disks can increase efficiency. You can create as many vDisk image files as you want, as long as you have enough space available on the Provisioning Server, or on the storage device containing the vDisk image files. vDisk files use FAT or NTFS file systems. EXT2 and EXT3 can be used for Linux. Depending upon the file system used to store the vDisk, the maximum size of a vDisk is 2 terabytes (NTFS) or 4096MB (FAT). A vDisk may be shared (Standard Image) by one or more target devices, or it can exist for only one target device to access (Private Image). vDisks can be booted directly from a Windows Virtual Server or Hyper-V without having to stream.
The vDisk image is created using the XenConvert utility and vDisk file is created and configured using the Console.
78
Your administrator role determines what displays and which tasks you can perform in the Console. For example, you can view and manage vDisks in sites in which you are a site administrator. However, unless the farm administrator sets a site as the owner of a store, the site administrator can not perform store management tasks.
vDisk Properties
On the Console, the vDisk Properties dialogs allows you to modify vDisk configuration settings. To view an existing vDisks properties, choose one of the following methods: Highlight a vDisk, then select Properties from the Action menu. Right-click on the vDisk, then select Properties. Double-click on the vDisk in the details pane.
Chapter 6
Managing vDisks
79
Load Balancing
Allows you the option to use (or not use) the load balancing algorithm to select the server that is least busy to provide the vDisk to the target device. If using HA, the Use the load balancing algorithm must be selected.
Allow use of this vDisk If this checkbox is checked, the vDisk becomes locked and can not be used by any target device within the farm. This option is helpful when performing vDisk maintenance. Edit file properties button To modify the file properties associated with this vDisk, click the Edit file properties button. vDisk File Properties tabs are defined in the tables that follow.
Overrides
80
Type
Chapter 6
Managing vDisks
81
Cache Type
For Standard Image only, select the write cache type: Cache on server disk Cache on encrypted on server disk Cache in device RAM Cache on devices hard-drive Cache encrypted on device hard-drive
If you select Standard Image and Cache in target device RAM, select the cache size in megabytes. The max size of the RAM write cache is determined by the registry setting WcMaxRamCacheMB in the BNIStack Parameters. This is a DWORD parameter. If the registry entry does not exist, then the default value used is 3584 MB.
Automatic Updates Enable Automatic Updates Enables the Automatic Disk Update process on this vDisk file. Select either of the following update processes: Apply vDisk updates as soon as they are detected by the server; select to apply updates as they are detected. Schedule the next vDisk update to occur on; select to schedule the disk update, then select the date to run the update process. The update process attempts to find a match for the selected vDisk file on already existing target devices and user groups, and then tests for an automatic update.
Description
Version number for use by the Automatic Disk Image update feature and the Incremental Disk Update feature. With the Automatic Disk Image Update feature, if the new vDisk version is greater than the old image version, the vDisk image is replaced for matching Class and Type images. Precedence is: Major, then Minor, then Build. With the Incremental Disk Update feature, the delta file version must match the version number of the vDisk or the delta file is not applied. Initially set to a random Globally Unique Identifier (GUID). The user can set the serial number as needed. The serial number is used in the Incremental Disk Update feature to ensure that a delta file is applied to the correct vDisk image file. For users informational use only. Initially set to a string representing the creation date of the image file. For users informational use only. Set as appropriate for your installation.
Serial #
Date Author
82
For users informational use only. Set as appropriate for your installation. For users informational use only. Set as appropriate for your installation. For users informational use only. Set as appropriate for your installation. For users informational use only. Set as appropriate for your installation. For users informational use only. Set as appropriate for your installation.
Active Directory machine Check the Active Directory machine account password management account password management checkbox to enable the Active Directory password management features. If your target devices belong to a domain and share a vDisk, also refer to the Active Directory section on the Options tab of the Provisioning Server Properties dialog. Printer management Check the Printer management option if you are not using a different printer system that installs valid printers on each target device. To view printer details for an individual target device, refer to the Target Device Properties vDisk tab, then click the Printers button
vDisk Tasks
To manage vDisks, choose from the tasks that follow.
Chapter 6
Managing vDisks
83
Maintaining vDisks
Assigning a vDisk to a Target Device Assigning a vDisk to a User Group Configuring vDisk Modes Viewing vDisk Usage Adding Existing vDisks to a vDisk Pool or Store Unassigning a vDisk Releasing vDisk Locks Deleting a vDisk Deleting Cache on a Difference Disk Copying vDisks to Different Locations Copying and Pasting vDisk Properties Backing Up a vDisk Checking for vDisk Updates Automatically Updating the vDisk Incrementally Updating a vDisk Using Maintenance Utilities with a vDisk Working with Physical and vDisks Accessing Audit Information
84
1.
In the Console tree, right-click on the vDisk Pool in the site where you want to add those vDisks, or right-click on the store where those vDisks exist, then select the Create vDisk menu option. The Create vDisk dialog appears. If you accessed this dialog from the sites vDisk pool, in the drop-down menu, select the store where this vDisk should reside. If you accessed this dialog from the store, from the drop-down menu, select the site where this vDisk will be added. In the Server used to create the vDisk drop-down menu, select the Provisioning Server that will create the vDisk. Optionally, type a description for this new vDisk in the description textbox. In the Size text box, scroll to select the appropriate size to allocate for this vDisk file. If the disk storing the vDisk images is formatted with NTFS, the limit is approximately 2 terabytes. On FAT file systems, the limit is 4096 MB. Type a filename for the vDisk. Optionally, type a description for this new vDisk in the description textbox. In the Size text box, scroll to select the appropriate size to allocate for this vDisk file. If the disk storing the vDisk images is formatted with NTFS, the limit is approximately 2 terabytes. On FAT file systems, the limit is 4096 MB. In the VHD Format text box, select the format as either Fixed or Dynamic (2040 GB for VHD emulating SCSI; 127 GB for VHD emulating IDE).
2.
3. 4. 5.
6. 7.
8.
Chapter 6
Managing vDisks
85
9.
Click Create vDisk, a progress dialog opens. Depending on the disk size and other factors, it may take several minutes or more to create the vDisk. After the vDisk is successfully created, it displays in the Consoles details pane and is ready to be formatted.
Note A vDisk image can not be assigned to, or boot from a target device until that target device exists in the Provisioning Services database. After creating the target device, in the Console, select the Hard Disk boot option. For more details, refer to Creating New Target Device Entries in the Database.
Formatting a vDisk
After you have created and allocated space for the vDisk file on the Provisioning Server, you must format the vDisk. In order for a target device to access the new vDisk, complete one of the following formatting procedures: Formatting a vDisk From the Provisioning Server Formatting a vDisk From the Target Device
1. 2.
The Console exposes the vDisk as a drive to the operating system. Rightclick on the vDisk, then select Mount. On a Windows Explorer window (click My Computer on the Desktop or on the Start Menu).
Note When Provisioning Server software is installed on the server, and the vDisk is mounted, the new drive is created. The drive letter will be the next available drive letter on your system. (For example, if your Provisioning Server has an A: drive, C: drive and D: drive, the vDisk drive will be assigned to E:).
3.
On a Windows Explorer window (click My Computer on the Desktop or on the Start Menu).
86
4.
Caution Formatting erases all data stored on the vDisk. You should only format new vDisks that have not yet been imaged from the target device hard disk.
5. Format the drive using the desired file system.
Administrators can view and edit the contents of a vDisk image file by mounting the vDisk to a drive letter. The mounted file is added as a drive icon in the My Computer window. Mounted vDisks cannot be used by target devices.
To unmount a vDisk and make it available to target devices:
1. 2.
In the Console, highlight the vDisk you want to unmap. From the Tools menu or right-click menu, select the Unmount vDisk option. In the Console window, the vDisk reverts to a dark, gray-green color to indicate it is unmounted and the vDisk disk icon in the My Computer window is changed back to an unmounted.
1. 2. 3. 4.
Ensure that the target device software is installed on the target device. In the Console, create a new vDisk on the Provisioning Server. Assign this vDisk to the Master Target Device. From the Console, configure the target device to boot from its local hard disk, NOT to the assigned vDisk. PXE-Boot the target device. Once started, confirm connectivity from the target device to the Provisioning Server. When the connection is inactive the Target-Device status icon in the system tray has a red X on itif there is no red X, then the connection is good.
Chapter 6
Managing vDisks
87
5.
Access the Disk Management utility in Windows by right-clicking My Computer on the desktop and selecting Manage. The Computer Management window should appear. Select Disk Management from the left window pane. The right window pane will display all of the storage devices connected to the target device. Identify the vDisk as the next available storage device after the boot disk (C:) and any additional physical drives connected to the computer. For example, if the target device has two physical drives, a primary boot disk labeled C:, and an additional storage device labeled D:, then the vDisk will be labeled E:. Right-click the vDisk in the right window pane and select Format. Type a Volume Label if desired, such as vDisk1. Select the desired File system, such as NTFS. Leave the Allocation unit size to the default setting. Select Perform a quick format. Leave the box labeled Enable file and folder compression unchecked, then click OK. Once the format is complete the disk should have a status of Healthy on the right window pane. The disk is now formatted and ready to be imaged from the Master Target Device.
6. 7.
1. 2.
In the Console tree, expand the Sites folder, then expand the appropriate site where this target device will reside. Expand the Device Collections folder, then click on the collections folder where this target device is a member. All target device collection members display in the details pane. Right-click on the desired target device, then select Properties. The Target Device Properties dialog appears. Click on the vDisks tab, then select the vDisks to make available to this target device. Under boot Options, select if you want this target device to be able to use the local hard drive or a custom bootstrap to boot from, then click OK. Enabling multiple vDisks or options will cause a boot menu to display on the target device, allowing the user to select the appropriate boot method.
3. 4. 5.
You can also use the Consoles drag-and-drop or copy-and-paste feature to assign vDisks to a target device.
88
1. 2. 3. 4.
In the Console tree, expand the Sites folder, then expand the appropriate site where this user group resides. Click the User Groups folder. All user groups display in the details pane. Right-click on the desired user group, then select Properties. The User Group Properties dialog appears. Click on the vDisks tab, then select the vDisks to make available to this target device, then click OK. The Consoles drag-and-drop or copy-andpaste feature can also be used to assign vDisks to a user group..
Note Enabling multiple vDisks will cause a boot menu to display when the user logs in, allowing the user to select the appropriate boot method.
Note Prior to building the vDisk image, shut down any indexing services that are running.
Note If using Active Directory, before creating the vDisk image, Citrix recommends that the Master Target Device is a member of the Active Directory domain, and that the host name is not used as the target device name.
Chapter 6
Managing vDisks
89
1. 2. 3.
On the Target Device Properties tab, configure the target device to boot from the hard drive, then assign the vDisk. Boot the target device. Verify the vDisk is connected. The target device vDisk status icon should display in the target device tray. Double-click on the icon to display the vDisk status. The status should be Active. To image the Master Target Devices hard drive to the vDisk, run the XenConvert utility. From the target device, select Start>All Programs>Citrix>XenConvert>XenConvert. The XenConvert Welcome dialog appears.
4.
Note Only those options that are specific to Provisioning Services are available. For information on using XenConvert with XenServer, refer to XenConvert documentation on Citrix Knowledge Center.
5. The From field defaults to the current target device machine name. The To field defaults to Provisioning Services vDisk. Accept the default settings by clicking Next. The Convert This Machine to a Provisioning Services vDisk dialog appears. XenConvert provides the option to image up to four volumes on a vDisk. By default, the first four volumes, beginning with drive C:\, are selected (for example C:\, D:\, E:\ and F:\). To include additional volumes, under the Volumes column, select the volumes to be imaged from the drop-down menu in the order in which those volumes should be imaged. The following information displays for each selected volume. Capacity (GB); total size of the original volume. Usage (GB); amount of space required to image this volume on the master target device. Usage (%); percentage of space used on the original volume. File System; the file system must be NTFS.
6.
90
The following information displays for the vDisk image containing the selected volumes. 7. 8. 9. Capacity (GB); total size of the vDisk. Usage (GB); amount of space required to image all selected volumes on the vDisk. Usage (%); percentage of vDisk capacity required to image all selected volumes.
Check the Empty Recycle Bin checkbox to avoid adding its contents to the vDisk. Check the Log copied files checkbox to save a log file containing all the files that were imaged (XenConvert.txt). If the vDisk image is going to be used by multiple target devices in Standard Image mode, click the Optimize button. Optimizer does not need to be run on Private Image vDisks. Click Next, then verify that the conversion information that displays is correct. Click Convert to begin the image building process. On the warning message that displays, click Yes to confirm the conversion. This will take several minutes to complete. The progress bar indicates when the imaging progress is complete. Click Finish. Shut-down the target device.
13. 14.
The target device can now be set to boot from the vDisk. Use the General tab on the Consoles Target Device Properties dialog to set the target device to boot from the vDisk. Optionally, disconnect the hard disk on the target device. To verify the image was built correctly, set the target device to boot from the vDisk first, optionally, disconnect the hard disk on the target device, then reboot the target device.
Chapter 6
Managing vDisks
91
4.
5. 6. 7. 8. 9.
After the Linux Imager application starts, click Image. Click Begin to begin the imaging process. Allow the imaging process to complete. Click Done to close the Linux Imager application. Shut down the target device. The target device can now be set to boot from the vDisk. Use the General tab on the Consoles Target Device Properties dialog to set the target device to boot from the vDisk. Optionally, disconnect the hard disk on the target device.
92
Prerequisites
Before you configure the common image: Make sure all target devices that will use the common image have the a consistent HAL -- that is, they must have the same number of logical processors
Note A single processor hyper-threading capable system is considered to have two logical processors when the hyper-threading is enabled in the BIOS.
The BIOS structure, which is presented to the OS during the boot process, must be of the same format for all target devices that share a Standard Image. The BIOS Structure contains a list of all the components connected to the motherboard so that the appropriate drivers are loaded to allow the components to function properly. Have either a 3Com Managed PC Boot Agent (MBA) or a PXE-compliant NIC available. This card is the common NIC that is inserted into each target device during the Common Image build process. Install all the latest device drivers on each target device. Device drivers are missing if devices do not respond after you configure the common image. For example, if a target devices USB mouse and keyboard do not respond after you assign the common image to the target device, it is likely that you have not installed drivers for that target devices chipset. Go to device manager and check to insure no yellow exclamation mark display on any devices, especially USB Root HUBs and controllers.
Determine which target device contains the latest motherboard chipset. This target device is used as the first target device in the common image build process. The latest Intel chipset driver always contains all the drivers for the previous chipset, therefore it is not necessary to install as many drivers when you build the common image. Except on the first target device, disable built-in NICs on all target devices that will use the common image (leave the built-in NIC on the first target device enabled). This prevents confusion about which NIC to use during the common image building process. Install Provisioning Services components.
Chapter 6
Managing vDisks
93
Important You must create a vDisk that has enough space to accommodate additional information added by the common image build process.
4. 5. 6. Run the XenConvert utility on the target device to build the vDisk. (Recommended) Make a copy of the original vDisk created in Step 3 and save it in the vDisk directory on the Provisioning Server. On the first target device, copy CIM.exe from C:\Program Files\Citrix\Provisioning Services to a removable storage device, such as a USB flash drive. This utility is used to include disparate target devices in the common image. Shut down the Master Target Device and remove the common NIC.
7.
Note Although the Windows OS must be installed on this target device, the target device software does not have to be installed.
2. Copy CIM.exe from the removable storage device to this target device.
94
3.
At a command prompt, navigate to the directory in where CIM.exe is located, then run the following command to extract the information form the target device into the .dat file: CIM.exe e targetdeviceName.dat where targetdeviceName identifies the first target device that will use the common image. For example, TargetDevice1.dat.
4. 5. 6.
Copy the .dat file created in Step 3 to the removable storage device. Shut down the target device and remove the common NIC. To include additional target devices with disparate hardware in the common image, repeat Step1 through Step 6 for each device, giving each .dat file a unique name.
Note Before booting the Master Target Device, enter the BIOS setup and verify that the common NIC is the NIC used in the boot process.
2. 3. 4. 5. Using the common NIC, boot the Master Target Device from the vDisk, in Private Image mode. Copy CIM.exe and the .dat file associated with the first target device from the removable storage device to the Master Target Device. At a command prompt, navigate to the directory where the CIM.exe and the .dat file are located. Run the following command to merge the information from the .dat file into the common image: CIM.exe m targetdeviceName.dat Shut down the Master Target Device.
6.
2.
Chapter 6
Managing vDisks
95
3.
Allow Windows time to discover and configure all the device drivers on the target device (this will take some time). If prompted by the Found New Hardware Wizard to install new hardware, Cancel out of the wizard and proceed to Step 4.
Note If Windows cant install drivers for the built-in NIC on a target device, and the drivers can not be installed manually, the common NIC and the target devices built-NIC are very similar to each other and the driver installation program tries to update the driver for both NICs. For example, this happens if the common NIC is an Intel Pro 100/s and the target devices built-in NIC is an Intel Pro 100+.
To resolve this conflict, open System Properties. On the Hardware tab, click the Device Manager button. In the Device Manager list, right-click the built-in NIC and click Update Driver to start the Hardware Update Wizard. Choose Install from a list or specific location and specify the location of the NIC's driver files
4.
Open Network Connections, right-click the connection for the built-in NIC and click Properties in the menu that appears. (The icon for the built-in NIC is marked with a red X.) Under This connection uses the following items, select Network Stack and click OK. From a command prompt, run the following command:
5. 6.
C:\Program Files\Citrix\Provisioning Server\regmodify.exe Note After completing Steps 4-6, reboot the target device and allow Windows to discover and configure any remaining devices. If prompted by the Found New Hardware Wizard to install new hardware, proceed through the Wizard to complete the hardware installation.
7. 8. Using the original vDisk, repeat Step1 through Step 6 for each of the additional target devices to be included in the Common Image. Once target devices have been included in the Common Image, on the Console, set the Disk Access mode for the Common Image vDisk to Standard Image mode, then boot the devices.
96
Maintaining vDisks
This section includes several tasks that you can perform through the Console in order to maintain existing vDisks in your network.
1. 2. 3.
On the Console, double-click on the vDisk for which you want to configure the vDisk access mode. The vDisk Properties dialog appears. Click the Edit file properties button, then select the Mode tab. Select the image mode that applies to this vDisk from the Access Mode drop-down menu, then click OK to exit the dialog.
Chapter 6
Managing vDisks
97
4.
From the Cache-Type drop-down list, select from the following write cache methods:
Note Only those write cache options that are supported for the selected vDisk Access Mode appear enabled.
Cache on server disk Cache encrypted on server disk Cache in device RAM Cache on devices HD Cache encrypted on devices HD
Note Refer to the Product and Technology chapter detailed cache option information and considerations.
If the cache on local hard-drive type is selected, ensure that the hard-disk drive is formatted with either EXT2 or EXT3 file system type for Linux devices, or NTFS for Windows devices with a minimum of 500 MB. If the cache on the target device RAM and Standard Image mode are selected, the max size of the RAM write cache is determined by the registry setting WcMaxRamCacheMB in the BNIStack Parameters. This is a DWORD parameter. If the registry entry does not exist, then the default value used is 3584 MB. 5. Click OK to exit the Disk Properties dialog.
1.
Right-click a vDisk in the Console, then select Show usage menu option. The Show vDisk Usage dialog appears.
98
2.
Select one or more target devices in the list to perform any of the following target device connection tasks: Shut Down - shuts down the target device Reboot - reboots the target device Send Message - opens the Edit Message dialog to allow you to type, and then send a message to target devices.
1.
Right-click on a Provisioning Server in the Console, then select the Show Connected devices menu option. The Connected Target Devices dialog appears. Select one or more target devices in the list to perform any of the following target device connection tasks: Shut Down - shuts down the target device Reboot - reboots the target device Message - opens the Edit Message dialog to allow you to type, and then send a message to target devices.
2.
1.
Verify the following: Other servers have access to the shared folder where the store is located. The new server is associated with that store. Enable the Use the load balancing algorithm in that vDisks properties.
2.
In the Console tree, right-click on the vDisk Pool in the site where you want to add those vDisks, or right-click on the store where those vDisks exist, then select the Add existing vDisk menu option. The Add Existing vDisks dialog appears.
Chapter 6
Managing vDisks
99
3.
If you accessed this dialog from the sites vDisk pool, select the store to search from the drop-down menu. If you accessed this dialog from the store, select the site where vDisks will be added from the drop-down menu. In the Select the server to use when searching for new vDisks drop-down menu, select the Provisioning Server that will perform the search. Click Search. Any new vDisks that do not exist in the database display in the text box below. Check the box next to each vDisk that you want to add, or click Select All to add all vDisks in the list, then click Add.
4.
5.
Unassigning a vDisk
You can unassign a vDisk from: Unassign a vDisk from one or more user groups in a site Unassign a vDisk from all target devices within a site
Note vDisks are assigned to target devices through the vDisks tab on the Target Device Properties dialog.
Unassign a vDisk from one or more user groups in a site
1. 2.
In the Console, expand the vDisk Pool in the site or the store where this vDisk exists. In the details pane, right-click on the vDisk to unassign, then select Unassign from Selected User Group(s). The Unassign from User Group dialog appears. Select the checkboxes next to the user groups to unassign from this vDisk, then select Unassign from user group. This step removes the association between the vDisk and the selected user group. It does not affect the vDisk information.
3.
1.
In the Console, expand the vDisk Pool, right-click on the vDisk that you want to un-assign, then select the Unassign from All Site Devices menu option. Click Yes on the confirmation message that appears.
2.
100
Caution Ensure that the vDisk is not in use before removing a lock. Removing a lock for a vDisk, which is in use, may corrupt the image.
To release select vDisk locks
1.
In the Console, right-click on the vDisk for which you want to release locks, and then select the Manage Locks... option. The Manage VDisk Locks dialog appears. If a vDisk has a target device lock on it, that target device name appears in the dialog's list. Select one or more target device from the list, then click Remove lock. You can also choose Select All to remove all target device locks on the this vDisk. Click Close to close the dialog.
2.
3.
Deleting a vDisk
Note You cannot delete a vDisk if one or more target devices or user groups are currently assigned to it. Unassign all target devices from the vDisk, before attempting to delete it.
To delete a vDisk
1.
In the Console, expand vDisk Pool in the tree, then highlight the vDisk that you want to delete in the details pane.
Chapter 6
Managing vDisks
101
2. 3.
Right-click on the vDisk, then select Delete. The Delete vDisks dialog appears. To permanently delete the vDisk from the hard drive, select the checkbox for deleting the vDisk from the hard drive option. Or, do not select the checkbox to delete the vDisk from the store and database.
Caution Unless a backup copy is made before deleting a vDisk image file from the store, the vDisk image file is permanently deleted.
4. Click Yes. The vDisk is deleted.
Note Write cache on a Difference Disk is automatically deleted if that file becomes invalid. For details refer to Difference Disk Image Mode.
To delete a Difference Disk file
1.
In the Console, right-click on the vDisk that is associated with Difference Disk files to delete. Select the Delete Cache from Selected Device(s) menu option. The Delete Cache for Devices dialog appears. Check each target device box for which the cache should be deleted, or click Select all to delete all cache files associated with this vDisk. Click Delete to delete the cache files from the server.
2. 3.
102
1.
Using Windows Explorer, copy the .vhd and .pvp files, then paste these files to each new location.
4. 5.
6.
1.
In the Console, right-click on the vDisk that has the properties settings that you want to share with other vDisks, then select Copy vDisk Properties. The Copy vDisk Properties dialog appears. Select the checkboxes next to the properties that you want to copy to other vDisks, then click Copy.
2.
Chapter 6
Managing vDisks
103
3.
In the details panel, highlight the vDisks that you want to paste properties settings to, then click Paste vDisk properties from the right-click menu.
Backing Up a vDisk
The Provisioning Server treats a vDisk image file like a regular file, but the target device treats it as a hard drive. The procedure for backing up a vDisk image file is the same as backing up any other file on your server. If a vDisk image file becomes corrupt, to restore it requires simply replacing the corrupted file with a previous, functional version.
Important Do not back up a vDisk while it is in use or while it is locked. It is recommended to integrate the backing up of vDisks into your normal Provisioning Server backup routine.
The Consoles Automatic vDisk update method allows groups of target devices to be automatically updated to use one or more new or delta vDisks on a scheduled basis (refer to Automatically Updating the vDisk). The new vDisks are usually newer versions of the current vDisks. The delta vDisks contain incremental changes that have been made to the current vDisk (refer to Incrementally Updating a vDisk). You can schedule for automatic distribution of newer versions of vDisk images to one or more sites. vDisks can be configured to all be activated on a specific day, which permits all of your target devices to update to the new target device vDisk image software on the same day, regardless of when the new vDisk image file actually arrived at the site.
104
To use the Automatic vDisk Update feature, you must select the appropriate Provisioning Server and vDisk settings in the Console.
Caution If using the Difference Disk mode, updating a vDisk invalidates all associated Difference Disk files, causing the write cache on that file to be deleted automatically. Be sure to create backup copies of all Difference Disks before updating the vDisk.
To check for vDisk updates
1. 2.
Right-click a vDisk pool in the Console tree, then select the Check for updates menu option. Choose from the following vDisk update menu options: Automatic Incremental
If updates are found, you can choose to automatically update those vDisks or schedule those updates. Refer to Automatically Updating the vDisk for more information.
Chapter 6
Managing vDisks
105
Since multiple, duplicate vDisk instances can exist within your implementation, and those vDisks can be assigned to one or more target devices or user groups (in the case of Provisioning Server Least Busy and First Available boot behaviors), it is necessary to further qualify the old vDisk that will be replaced by the new vDisk. This is the reason for the Type property of the vDisk. If you want to use the Automatic Disk Image Update feature, you should never assign more than one vDisk from the same Provisioning Server with the same Type, to the same target device or user group.
1. 2. 3.
In the Console, right-click on the original vDisk (ORIGINAL), and select Properties. Select the Mode tab, then select the Edit File properties button. The vDisk File Properties dialog appears. Select the Enable automatic updates for this vDisk option, then click OK.
1. 2.
On the Provisioning Server, open Windows Explorer. Navigate to the directory where you store your vDisk image files.
106
3. 4. 5.
Right-click on the vDisk image file (.vhd) and its properties file (.pvp) that you want to update, then select Copy from the shortcut menu. Right-click again anywhere in the vDisk directory, then select Paste from the shortcut menu. For each file, right-click on the file, then select Rename from the shortcut menu. Enter a new name for the files. (For the documentation purposes, the new vDisk file will be referred to as the NEW.vhd file). You should now have both the original vDisk image file (ORIGINAL.vhd; ORIGINAL.pvp) and a new copy of the vDisk image file (NEW.vhd; NEW.pvp) in your vDisk directory.
To add the new vDisk file to the database, refer to Adding Existing vDisks to a vDisk Pool or Store:
Changing the disk access mode
To change the disk access mode: 1. 2. 3. In the Console, double-click on the new vDisk file (NEW.vhd). Click the Edit file properties button. The vDisk File Properties dialog appears. On the Mode tab, select Private Image, then click OK.
To assign a new vDisk to the target device: 1. 2. 3. 4. In the Console, right-click on a target device, then select Properties. On the vDisks tab, select the original vDisk (ORIGINAL) from the vDisks list, then click the Remove button. From the vDisks list, select the new vDisk (NEW), then click the Add button. Click OK to save the change.
After assigning the new vDisk to the target device, boot the target device from the new vDisk (NEW) to confirm that the new vDisk was updated correctly.
Adding software or data files to the vDisk
Chapter 6
Managing vDisks
107
1.
On the master target device, install or remove the desired software or files. (For example, install a new software application or perform a live update of your anti-virus definition files.) When you have finished updating your new vDisk (NEW) with the desired software or file changes, shut down the target device.
2.
To change the vDisk access mode of the new vDisk 1. 2. 3. 4. In the Console, right-click on the new vDisk (NEW), then select Properties. On the vDisk Properties Mode tab, select the access mode to be exactly the same as that of your original vDisk (ORIGINAL). From the cache drop-down menu, select the same cache type as that selected for your original vDisk (ORIGINAL). Click OK.
Note The Disk Access Mode and Cache Type must be exactly the same for both the original vDisk image (ORIGINAL), and the new copy of the vDisk (NEW).
Incrementing the version number
To increment the version number of the new vDisk image file: 1. 2. 3. 4. In the Console, right-click on the new vDisk (NEW), then click the Edit file properties button. The vDisk File Properties dialog appears. Select the Identification tab. Increment the Build number by one. Click OK.
Update vDisks
To check for vDisk updates 1. Right-click on the vDisk Pool, then select the Check for Updates menu option.
108
2.
Select either the Automatic or Incremental vDisk update option, then click OK button on the confirmation dialog.
Note If selecting the Incremental vDisk update option, in order for incremental updates to be applied, the Check for Incremental Updates to vDisk option must be enabled on the Provisioning Server Properties Options tab.
3. Boot target devices from the newly updated vDisk.
Chapter 6
Managing vDisks
109
Delta files are actually difference files between one vDisk image and another. The delta file can therefore be used to transform one vDisk file into another vDisk file. Usually the two vDisk files are two versions of the same file. For example, version 1.0.1 of the vDisk file may not contain a copy of Microsoft Word. You can copy this vDisk file to a new vDisk file (with a different name), update the version number to 1.0.2, install Microsoft Word on the new image file, and then create a delta file between the two versions of the vDisk. That delta file can then be used to update any 1.0.1 vDisk with Microsoft Word by simply applying the delta file.
Important The delta file incremental update can only be applied to vDisk files that are used in Standard Image mode. vDisks that are used in Private Image mode cannot be incrementally updated, since the act of booting from an image in Private Image mode actually modifies the vDisk file and invalidates it for incremental updates. Also note that if you boot from a vDisk in Private Image mode, or map that vDisk on a Provisioning Server, it cannot be used as a target for incremental updates unless the update is made from the image after it has been booted from and/or mapped. A vDisk file can only be used as a target for incremental updates if it is only changed through the incremental update process. Even mapping an image in private image mode will modify it at the sector level. For example, if you copy an image (a) to (b), then mount image (a), then unmount (a), (a) and (b) are no longer the same.
Incrementally updating vDisks includes the following procedures: Enabling the incremental update feature on a Provisioning Server Creating a delta file used to update the vDisk Applying the delta file
1. 2.
Right-click on a Provisioning Server in the Console, then select Properties. On the Options tab, enable incremental updates by checking the Check for Incremental Updates to a vDisk checkbox.
1.
Start with your original vDisk image file (Image A). Shut down any target devices that are booted from Image A. Image A should match a vDisk file you have in the field that you want to update. Verify the boot mode for Image A is set to one of the Standard Image boot modes.
2.
110
3. 4.
Verify that Image A has a valid Class and Type assigned in its image properties. From Windows Explorer, make a copy of the vDisk and properties files in the vDisk folder. This will be Image B.
Important Do NOT boot, mount, or modify (in any way) Image A after you have made the copy to Image B before creating the delta file. This will invalidate Image A as a predecessor of Image B and corrupt the image after the delta file is applied.
5. 6. 7. 8. 9. Add Image B to the database using the Adding Existing vDisks to a vDisk Pool or Store procedure. Change the boot mode for Image B to boot in Private Image mode. Doing this makes changes made to the vDisk file persistent. Assign Image B to a compatible target device and boot the target device. Install any software updates for the new version of the image file, then shut down the target device normally. Change the boot mode of Image B back to Standard Image mode. This is critical. Otherwise, you will not be able to create a delta file from the two vDisk files. Auto-update only works with vDisks that are in Standard Image mode. Increment the version number (major, minor and/or build) of Image B in its disk properties dialog. This is very important. Failure to do so will cause the image file to be applied repeatedly by the Automatic Update process. Maintain the same Serial # (from the disk properties dialog) for both Image A and Image B. The update service uses the Serial # to help guarantee that a delta file is compatible with a vDisk file. Normally the Serial # is set to a random GUID when the vDisk is created. If you leave this Serial # in place it will help verify that delta files are being applied to the correct vDisk file. Copy AutoUpdate.exe from the Provisioning Server installation directory where your vDisks reside. Run the AutoUpdate.exe utility as follows: AutoUpdate create imagefileA.vhd imagefileB.vhd deltafileAB.pva This creates a delta file named deltafileAB.pva, which is assigned the Class, Type, Version, and Serial# of image A.
10.
11.
12. 13.
Chapter 6
Managing vDisks
111
Once the delta file is created, you can optionally assign an activation date to it. The activation date is used to tell the update service at your field offices that the delta file should only be applied on or after the indicated date. To set the activation date, use the AutoUpdate.exe utility as follows (assume an activation date of February 25, 2008 in this example): AutoUpdate activate deltafileAB.pva 02/25/08 To print the information from the delta file such as activation date, class, type etc. by using AutoUpdate as follows: AutoUpdate info deltafileAB.pva This valid delta file can now be applied to any copy of Image A to convert it into image B.
Note Never apply the delta file to a copy of Image A that has been changed, booted from in private image mode, or even mounted on a Provisioning Server. Doing so will corrupt the image.
Applying the delta file
Delta files are normally applied in your field office or remote sites by the Stream Service running in your network. To have delta files automatically applied in your field offices, you must first schedule the automatic incremental updates using the disk update scheduler. Using the Console, at all of your field offices, you must select the following Provisioning Server and vDisk options before a delta vDisk file can be applied: 1. 2. 3. Right-click on the vDisk, then select the Properties menu option. Click the Edit file properties button. The vDisk File properties dialog appears. On the Mode tab, select the Enable automatic updates for this vDisk option, then select the Schedule the next vDisk update to occur on option to check the vDisk folder and a specific day, and then apply those updates (be sure to select a time of day when you know all of your target devices will be powered down in the field office). Or, select to Apply vDisk updates as soon as they are detected by the server option and those updates be applied as soon as they are detected by the Provisioning Server.
Note *.pva files should be in the same directory as the root of the store, where the corresponding *.vhd and *.pvp files reside.
112
4.
Transfer your delta files to folders containing your vDisks in your field offices. From this point on, the update process is automatic and this procedure only needs to be performed when setting up a Provisioning Server.
5.
The update process checks the following when applying delta files to vDisk images: The Class, Type and Version Numbers (Major, Minor and Build) recorded in the delta file must match those in the image file. The Serial # recorded in the delta file must match that contained in the image file. If an activation date was set on the delta file, the current system date must be greater than or equal to the activation date. That no target device is currently booted from that vDisk.
If all of the above tests pass, the delta file is applied to the vDisk. This modifies the file so that the next time a target device boots from the vDisk, it contains the new software inherent in the delta file. The version number of the image is also updated to match that of the newer image (i.e. Image B in the example above). If one of the tests fail (for example, a target device is booted from the vDisk at the scheduled time), the update is not applied. However, it may be applied the next day at the scheduled update time. Note that the Incremental Update process differs from the Automatic vDisk Update process in that all target devices must actually be powered down for the update to actually occur.
Chapter 6
Managing vDisks
113
The merge option of AutoUpdate applies a delta file to the indicated image the same as the automatic update process does using the Console.
114
C HAPTER 7
A target device becomes a member of a device collection when it is added to the farm. A target device can only be a member in one device collection. However, a target device can exist in any number of views. If a target device is removed from the device collection, it is automatically removed from any associated views. Target Devices are managed and monitored using the Console and Virtual Disk Status Tray utilities. In the Console, actions can be performed on: An individual target device (as described in this chapter) All target devices within a collection (refer to the Managing Device Collections chapter) All target devices within a view (refer to the Managing Views chapter)
When target devices are added to a collection, that devices properties are stored in the Provisioning Services database. Target Device Properties include information such as the device name and description, boot method, and vDisk assignments.
116
Description Class
Chapter 7
117
Select the vDisks for Displays the list of vDisk assigned to this target device. this device Click Add to add additional vDisks. To filter the vDisks that display, select a specific store name and Provisioning Server. Optionally select all stores and all servers to list all vDisks available to this target device. Click Delete to remove a vDisk. Options Provides secondary boot options: - Include the local hard drive as a boot device - Include one or more custom bootstraps as boot options If enabling a custom bootstrap, click Add, then enter the bootstrap file name, menu text to appear (optional), then click OK. If more than one vdisk is listed in the table or if either (or both) secondary boot options are enabled, the user is prompted with a disk menu at the target devices when it is booted. Enter a menu option name to display to the target device. The target device can select which boot options to use. Opens the Target Devices vDisk Printers dialog. This dialog allows you to choose the default printer and any network and local printers to enable or disable for this target device.
Printers... button
118
Username
Password
Target Device Status The following target device status information appears: Current status (active or inactive) IP address Current Provisioning Server Current vDisk name Provisioning Server cache file size in bytes
Chapter 7
119
120
Note Refer to the Installation and Configuration Guide for details on creating a vDisk image on a Master Target Device.
Chapter 7
121
1.
In the Console, right-click on the Device Collection where this target device is to become a member, then select the Create Device menu option. The Create Device dialog appears. Type a name, description, and the MAC address for this target device in the appropriate text boxes.
2.
Note If the target device is a domain member, use the same name as in the Windows domain. When the target device boots from the vDisk, the machine name of the device becomes the name entered. For more information about target devices and Active Directory or NT 4.0 domains, refer to Enabling Automatic Password Management
3. Optionally, if a collection template exists for this collection, you have the option to enable the checkbox next to Apply the collection template to this new device. Click the Add device button. The target device inherits all the template properties except for the target device name and MAC address. Click OK to close the dialog box.The target device is created and assigned to a vDisk.
4. 5.
122
Using the Collections Template with Auto-add to Create Target Device Entries
The Collections Template feature works with the Auto-add feature by automatically applying the properties of a template target device to all target devices that are automatically added to a collection. When using a template, the new target devices MAC addresses is saved and a name is automatically generated using the name from the template, then adding a numerical suffix. All other properties for the target device are inherited from the template.
To configure a template for a collection
1.
Create a target device that will serve as this collections template (to create a target device entry using the Console, refer to Using the Console to Manually Create Target Device Entries). In the Console tree, click the collection that you are configuring to use a template. The target device, created in the previous step, displays in the details pane. Right-click on the target device in the details pane, then select the Set device as template menu option. Click OK on the confirmation dialog that appears. The target device icon changes to indicate that it is the template for this collection.
2.
3. 4.
Chapter 7
123
This target device has been disabled. Please Contact your system administrator.
Once contacted, the system administrator can validate the target device. After the administrator disables the option, the target device can boot successfully. To disable or enable a target device, in the Console, right-click on the target device, then select the Disable or Enable menu option.
Note Enable the Disable target device option on the template target device, to disable all target devices as they are added to a collection.
Note Disable the target device that serves as the template to permit all target devices using this template to be added to the database, but not permit the target device to boot. Target devices receive a message requesting that they first contact the administrator before being allowed to boot. A T appears in light blue on the device serving as the template. New target devices automatically have a name generated and all other properties will be taken from the default template target device. No user interaction is required.
124
1.
In the Consoles details pane, right-click on the target device that you want to copy properties from, then select Copy device properties. The Copy Device Properties dialog appears. Select the checkbox next to the properties that you want to copy, then click Copy. The properties are copied to the clipboard and the dialog closes. Right-click on one or more target devices that will inherit the copied properties, then select the Paste device properties menu option. The Paste Device Properties dialog appears displaying the name and properties of the target device that were copied. Click Close to close the dialog.
2. 3.
4.
1.
Right-click on a collection to boot all target devices in the collection, or highlight only those target devices that you want to boot within the collection tree, then select the Boot devices menu option. The Target Device Control dialog displays with the Boot devices menu option selected in the Settings drop-down menu. Click the Boot devices button to boot target devices. The Status column displays the Boot Signal status until the target device successfully receives the signal, then status changes to Success.
2.
1.
Right-click on a collection in the Console tree or highlight only those target devices that should be restarted within the collection, then select the Restart devices menu option. The Target Device Control dialog displays with the Restart devices menu option selected in the Settings drop-down menu. Target devices display in the Device table. Type the number of seconds to wait before restarting target devices in the Delay text box. Type a message to display on target devices in the Message text box.
2. 3.
Chapter 7
125
4.
Click the Restart devices button to restart target devices. The Status column displays the Restart Signal status until the target device successfully receives the signal, then status changes to Success.
1.
Right-click on the collection to shut down all target devices within the collection, or highlight only those target devices that should be shut-down within a collection, then select the Shutdown devices menu option. The Target Device Control dialog displays with the Shutdown devices menu option selected in the Settings drop-down menu. Target devices display in the Device table. Type the number of seconds to wait before shutting down target devices in the Delay text box. Type a message to display on target devices in the Message text box. Click the Shutdown devices button to shutdown target devices. The Status column displays the Shutdown Signal status until the target device shuts down. As each target device successfully shuts down, the status changes to Success.
2. 3. 4.
1.
Right-click on the collection to send a message to all members within the collection, or highlight only those target devices within the collection that should receive the message, then select the Send message menu option. The Target Device Control dialog displays with the Message to devices menu option selected in the Settings drop-down menu. Target devices are display in the Device table. Type a message to display on target devices in the Message text box. Click the Send message button. The Status column displays the Message Signal status until target devices successfully receives the message, the status changes to Success.
2. 3.
126
1. 2.
In the Console, expand the collection, right-click on the target device in the details pane, then select the Move menu option. From the drop-down menu, select the collection to move this target device into. If applicable, apply the collections device template to the target device being moved, by enabling the Apply target collections template device properties to moved devices. Click Move.
3.
1.
In the Console, right-click on the target devices you want to delete within the collection (multiple selections can be made in the Details view), then select the Delete menu option. Click Yes to confirm the delete request. The target device is deleted from the collection and any associated views. However, the vDisk image file for the target device still exists.
2.
Assigning vDisks
When a target device boots, the software on the vDisk that is assigned to that device becomes available. If one vDisk is assigned to a target device and the Any Server option is set for that vDisk, the Provisioning Server will choose the least busy server to service the device. If a specific server is selected, then that specific server will service the target device. If multiple vDisks are assigned to a target device, the user is presented with a menu at BIOS time to select which vdisk to boot from. After this selection, the Provisioning Server will use the Any Server or specific server option of the chosen vDisk to select the Provisioning Server used to service the device. If the custom bootstrap and/or local HD is selected in the target device properties, the user will be presented with a menu at BIOS time. The menu prompts to select to boot from the vDisk, custom bootstrap, or HD as appropriate.
Chapter 7
127
The quickest method for replacing a vDisk for a target device within a collection is to select the vDisk in the Console, then drag-and-drop the vDisk onto a target device collection in the tree of a second Console window (open a new Console window by selecting the New window from here right-click menu option for either the device collection or the store that contains the vDisk you want to assign.) For additional methods for assigning vDisks to target devices, refer to Assigning a vDisk to a Target Device in the Managing vDisks chapter.
1. 2.
Double-click on the target device in the Console window, then select the Properties menu option. The Device Properties tab appears. Select the Status tab. The Status tab shows: Current status (active or inactive) IP address Current Provisioning Server Current vDisk name Provisioning Server cache file size in bytes
Also, in the Console window, if the target device is active, the Target Device icon appears as a green computer screen. If the target device is inactive, the icon appears as a black computer screen.
128
Important The Port Blocker feature is being deprecated and will not be available in the next Provisioning Services release.
Port Blocker Feature When the Port Blocker feature is enabled on a vDisk, a record for every storagedevice category is stored in the database, which includes if that device category is set to deny or allow its use, and if any exceptions exist that deny or allow a particular device (Override). These settings are made on the Consoles Device Properties tab. After Port Blocker is configured on the vDisk, Port Blocker settings can be made. A target devices property settings override the inherited vDisk property settings. The storage-device category and specific storage-device overrides can be set in the Device Category Overrides table on the Device Properties dialogs, Port Blocker tab. Use the Add button in Device Category Overrides to add storagedevice categories for this device, then use the check block to allow or deny the device to use those storage-device categories. To further customize Port Blocker setting, use the Add button in Device Overrides to deny or allow the use of a particular storage device, regardless if that storage-device does not exist in the Port Blocker category list. The format of the device ID can be retrieved from Windows Device Manager
Device Instance Id.
Chapter 7
129
1. 2.
Note Port Blocker disables devices if the option to deny the device is selected. However, it does not enable devices if the option to allow the device is selected, until the user first enables it using the Windows Device Manager.
The provisioned device inherits vDisk settings. However, those vDisk settings can be overridden on the Target Device Properties Port Blocker tab, so that target device can access storage devices that other target devices can not.
130
2. 3.
Double-click on the vDisk to open the Disk Properties dialog, then select the Port Blocker tab Select only those check boxes under the Device Categories that should be denied. (To quickly deny all devices, select the Deny All checkbox in the table heading.)
4.
Chapter 7
131
Device Classes
Local Hard drives Floppy drives Tape drives Ports (COM ports LPT ports) CD ROM/DVD drives LPT and COM Ports PCMCIA and Flash memory devices USB Mass Storage Devices USB CD-ROM/DVD burners
Interfaces
USB IDE SCSI Firewire 1394
132
1. 2.
Start the Virtual Disk Status Tray, and then select the General tab. Select the Automatically start this program checkbox under Preferences. The tray starts automatically the next time the target device boots.
Adding the Virtual Disk Status tray icon to your system tray
1. 2.
Start the Virtual Disk Status tray, and then select the General tab. Select the Show icon in System Tray checkbox under Preferences. The Virtual Disk Status tray icon appears in your system tray the next time the target device boots.
Chapter 7
133
For example, suppose you are using Provisioning Server to support PCs in three classrooms. Each classroom has its own printer, and you want the PCs in each classroom to default to the correct printer. By using the Target Device Personality feature, you can define a default printer field, and then enter a printer name value for each target device. You define the field and values under Target Device Properties. This information is stored in the database. When the target device boots, the device-specific printer information is retrieved from the database and written to an.INI file on the vDisk. Using a custom script or application that you develop, you can retrieve the printer value and write it to the registry. Using this method, each time a target device boots, it will be set to use the correct default printer in its classroom. The number of fields and amount of data that you can define for each target device is limited to 64Kb or 65536 bytes per target device. Each individual field may be up to 2047 bytes. To use the Target Device Personality feature: Define the personality data field name and string value using the Console. Write a custom script or application to retrieve and use the personality data.
134
3.
Click the Add button. The Add/Edit Personality String dialog appears.
Note There is no fixed limit to the number of field names and associated strings you can add. However, the limits to the total amount of personality data assigned to a single string (names and data combined) is approximately 2047 bytes.
Also, the total amount of data contained in names, strings and delimiters is limited to approximately 64Kb or 65536 bytes per target device. This limit is checked by the administrator when you attempt to add a string. If you exceed the limit, a warning message displays and you are prevented from creating an invalid configuration. Target device personality data is treated like all other properties. This data will be inherited when new target devices are added automatically to the database by either the Add New Target Device Silently option, or with the Add New Target Device with BIOS Prompts option. 4. Enter a name and string value.
Note You can use any name for the field Name, but you cannot repeat a field name in the same target device. Field names are not case sensitive. In other words, the system interprets FIELDNAME and fieldname as the same name. Blank spaces entered before or after the field name are automatically removed. A personality name cannot start with a $. This symbol is used for reserved values such as $DiskName and $WriteCacheType.
5. 6.
Click OK. To add additional fields and values, repeat Steps 5 and 6 as needed. When finished adding data, click OK to exit the Target Device Properties dialog.
Chapter 7
135
2.
Highlight the target devices in the details pane that you want to copy personality settings to, then right-click and select the Paste device properties menu. Click on the Personality strings option (you may also choose to copy other properties at this time), then click Paste.
3.
This file is accessible to any custom script or application. It can be queried by the standard Windows .INI API. Additionally, a command line application, called GetPersonality.exe, is provided to allow easier batch file access to the personality settings. A target devices vDisk name and mode can be retrieved using GetPersonality.exe. The following reserve values are included in the [StringData] section of the Personality.ini file:
$DiskName=<xx> $WriteCacheType=<0 (Private image), all other values are standard image; 1 (Server Disk), 2 (Server Disk Encrypted), 3 (RAM), 4 (Hard Disk), 5 (Hard Disk Encrypted), 6 (RAM Disk), or 7 (Difference Disk). Min=0, Max=7, Default=0>
The xx is the name of the disk. A vDisk name cannot start with a $. This symbol is used for reserved values such as $DiskName and $WriteCacheType. The following message displays if a name that starts with $ is entered:
A name cannot start with a $. This is used for reserve values like $DiskName and $WriteCacheType. The $DiskName and $WriteCacheType values can be retrieved on the target device using GetPersonality.exe.
136
GetPersonality.exe
The command line utility GetPersonality.exe allows users to access the Target Device Personality settings from a Windows batch file. The program queries the INI file for the user and places the personality strings in the locations chosen by the user. GetPersonality.exe supports the following command line options:
GetPersonality FieldName /r=RegistryKeyPath <- Place field in registry GetPersonality FieldName /f=FileName <- Place field in file GetPersonality FieldName /o <- Output field to STDOUT GetPersonality /? or /help <- Display help
Examples
Setting a Registry Key Value
The example below retrieves the Target Device Personality data value from the DefaultPrinter field and writes it to the target device registry to set the default printer for the device. The Target Device Personality String Set in Target Device Properties is:
DefaultPrinter= \\CHESBAY01\SAVIN 9935DPE/2035DPE PCL 5e,winspool,Ne03:
A batch file run on the target device would include the following line:
GetPersonality DefaultPrinter / r=HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Device
Note The actual key name should be the UNC name of the network printer, such as \\dc1\Main, and the value that should be entered for the key would be similar to winspool,Ne01: where Ne01 is a unique number for each installed printer.
Setting Environment Variables. Setting environment variables with personality data is a two-step process. 1. 2. Use the GetPersonality command with the /f option to insert the variable into a temporary file. Use the set command to set the variable. For example, suppose you wanted to set the environment variable Path statement for the target device.
Chapter 7
137
You might define the personality name, as Pathname and define the string value as follows:
%SystemRoot%;%SystemRoot%\System32\Wbem;C:\Program Files\Microsoft Office\OFFICE11\;C:\Program Files\Microsoft SQL Server\80\Tools\Binn\
The /f option creates a temporary file, allowing you to decide on a name, in this case temp.txt. You would then add the following two lines to your batch file: GetPersonality Pathname /f=temp.txt
set /p Path= <temp.txt
Note If the filename you specify with the /f option already exists, GetPersonality will not append the line to the file, but will overwrite the existing line in the file with the new line.
138
C HAPTER 8
By default, vDisks are assigned to target devices. The User assigned vDisks feature allows Farm and Site Administrators to assign vDisks to the user, based on that users existing Active Directory or Windows Workgroups memberships.
140
When a target device first boots, Provisioning Services determines if that device is a member of a Collection that has the user groups feature enabled. If the device is not a member of a Collection that has the user groups enabled, the target device boots using the vDisk that was assigned to that target device. If the device is a member of a Collection that has user groups enabled, the user is prompted to login using their username and domain. When the user logs in, Provisioning Server checks if that user has one or more user groups associated with it. If a user group exists, that user groups vDisk is provided. If multiple vDisks are assigned to the user group, the user is presented with a menu listing all valid vDisk options to choose from.
Note The user and domain name are not used for security purposes. The user and domain name are only used to identify user group associations, which determines vDisk assignments. User authentication is only performed when requesting vDisks assigned to the target device.
Portblocker and personality settings are specific to the target device. Printers should be configured through Active Directory. A user group can have a maximum of ten vDisk assignments. Database caching is not supported when using the User Group feature. Each target device maintains its own Difference Disk, which does not follow the user from machine to machine, and numerous users using the same device all keep their data on the same Difference Disk file. Therefore, if using both the Difference Disk and User Group features, the user experience may differ from target device to target device. Expand the User Groups icon in the Console tree to view all user groups within a selected site. To display or edit a user groups properties, right-click on an existing user group in the Console, then select the Properties menu option. The User Group Properties dialog displays and allows you to view or make modifications to that user group.
Note User groups only appear in the Console for Farm and Site Administrators.
To perform actions on user groups, refer to User Group Management Tasks.
Chapter 8
141
General Tab
Field/Button Name Description Class Description The name of this user group. Describes this user group. Class name used for matching new vDisk images to the appropriate user groups when using the Image Update and the Managed Disk feature. Up to 40 characters can be entered. Check to disable this user group; uncheck to enable this user group. If disabled, a target device uses the vDisk assigned at the target device level.
vDisks Tab
Field/Button vDisks for this user group Description Click Add to add vDisks to this user group from the vDisk drop-down list. Click Remove to remove vDisks that have been made available to this user group. Remove does not delete the physical vDisk.
142
1. 2. 3. 4.
Right-click on the collection in the Console tree, then select the Properties menu option. Select the Options tab. Under User Groups, check or un-check the Enable user login to devices option to enable or disable this feature. Click OK.
To disable select user groups within a collection, refer to Enabling or Disabling User Groups.
1. 2. 3.
In the Console, expand the site where the user group is to be created. Right-click User Groups, then select the Create User Group... menu. The User Group Name dialog appears. In the Groups to search for textbox, leave the text box set to the default * to display all security groups. To display select groups, type part of the name using wildcards *. For example, if you want to see MY_DOMAIN\Builtin\Users, type: User*, Users, or *ser*. However, if you type MY_DOMAIN\Builtin\*, you will get all groups, not just those in the MY_DOMAIN\Builtin path. option. Under Select the name to use, highlight the security group to add to this User Group, then click OK. The User Group Properties dialog appears. On the General tab, type a description of this user group in the Description text box. In the Class textbox, type the class name to associate with this user group. When vDisk updates for vDisks of this class are made, they are correctly applied to vDisks used by this user group. Verify that the Disable this user group checkbox is not selected so that users associated with this user group have that groups vDisks and personality strings available at boot time. Click OK.
4. 5. 6.
7.
8.
Chapter 8
143
1. 2. 3. 4.
In the Console tree, expand the Sites folder, then expand the appropriate site where this user group resides. Click the User Groups folder. All user groups display in the details pane. Right-click on the desired user group, then select Properties. The User Group Properties dialog appears. Click on the vDisks tab, then select the vDisks to make available to this target device, then click OK. The Consoles drag-and-drop or copy-andpaste feature can also be used to assign vDisks to a user group..
Note Enabling multiple vDisks will cause a boot menu to display when the user logs in, allowing the user to select the appropriate boot method.
To assign a vDisk all user groups in a site
In the Console, drag a highlighted vDisk in the details pane, and then drop it on the User Groups node in the tree for that site.
144
Citrix Provisioning Services Administrators Guide To unassign a select user groups from a vDisk
1. 2.
Right-click on the vDisk in the Console, then select Unassign from Selected User Group. The Unassign from User Group dialog appears. Under User groups from which to unassign, check the box next to each user group that should be unassigned, or click Select all to unassign all user groups from this vDisk. Click Unassign. A confirmation message appears. Click Yes to continue. The unassign status appears in the unassign status log below.
3.
1. 2.
Right-click on the vDisk in the Console, then select Unassign from All Site User Group(s)... A confirmation message appears. Click Yes to continue.
C HAPTER 9
Device collections provide the ability to create and manage logical groups of target devices. A device collection could represent a physical location, a subnet range, or a logical grouping of target devices. Creating device collections simplifies device management by performing actions at the collection level rather than at the target-device level.
146
General Tab
Field/Button Name Description Template target device Description The name of this device collection. Describes this device collection. To use the settings of an existing target device as the template to apply to all target devices that are added to this collection, select that device from the drop-down menu, then click OK.
Security Tab
Field/Button Description Groups with Device Assign or unassign device administrators to this Administrator access collection. Device administrators can perform tasks on all device collections to which they have privileges. Groups with Device Operator access Assign or unassign device operators to this collection. Device operators have the following privileges: Boot and reboot a target device Shut down a target device View target device properties View vDisk properties for assigned target devices
Options Tab
Field/Button User Groups Description Enable or disable User Groups from logging into target devices in this collection.
Chapter 9
147
1.
In the Console, right-click on the Device Collections folder where the new collection will exist, then select the Create device collection menu option. The Device Collection Properties dialog appears. On the General tab, type a name for this new device collection in the Name text box, and a description of this collection in the Description text box, then click the Security tab. Under the Device Administrators list, click Add. The Add Security Group dialog appears. To assign a group with the Device Administrator role, type or select the appropriate domain and group name in the text box, then click OK. Optionally, repeat steps 2 and 3 to continue assigning groups as device administrators.
2.
3. 4.
5.
Under the Device Operators list, click Add. The Add Security Group dialog appears.
148
6.
To assign a group with the Device Operator role, type or select the appropriate domain and group name in the text box, then click OK. Optionally, repeat steps 2 and 3 to continue assigning groups as device operators.
7.
Note The .csv text file can be created with a .txt file, NotePad.exe or Excel. It contains one line per target device, which is formatted as follows:
DeviceName,MACAddress,SiteName,CollectionName,Description where; DeviceName=Name of new target device MAC-Address= MAC address of new device; such as 001122334455, 00-11-22-33-44-55, or 00:11:22:33:44:55. The wizard can be accessed from the farm, site, and device collection right-click menus. If accessed from the site or collection, only those target devices in the import file that match the site and collection by name, will be included in the import list. The wizard also provides the option to automatically create the site or collection using the information in the file, if either does not already exist. There is also the option to use the default collections device template, if it exists for that collection. A log file is generated with an audit trail of the import actions. The file is located in: C:\Documents and Settings\All Users\Application Data\Citrix\Provisioning Services\log
Chapter 9
149
1.
In the Console, right-click on the device collection that the target devices should be imported to, then click Target Device>Import devices. The Import Target Devices Wizard displays. Type or browse for the file to import. The target device information is read from the file and displays in the table below. Information can include the target device name, MAC address, and optionally description. Highlight one or more target devices to import. If applying the collection template to the imported target devices, select the Apply collection template device when creating devices checkbox. Click Import to import the .csv text file containing target device information, into the selected collection. The status column indicates if the import was successful.
2.
3. 4. 5.
Deleting Collections
Deleting a collection deletes any target device member records within the collection. The records can be recreated by manually adding them or using the Auto-add feature.
Note Deleting a target device also deletes that device from any views that it was associated with.
If target devices are members of collections within the same site, the members of one collection can be dragged and dropped to other collections, then the original collection can be deleted. If a device collection needs to be moved to a different site or that site becomes obsolete, you can use the export and import features to add the devices to a collection in another site, then the original collection can be deleted.
To delete a collection
1.
In the Console tree, right-click on the collection folder that you want to delete, then select the Delete menu option. A confirmation message appears. Click OK to delete this collection. The collection no longer displays in the Console tree.
2.
150
Refresh
After making changes to a collection, it may be necessary to refresh the collection before those changes appear in the Console. To refresh, right-click on the collection in the tree, then select the Refresh menu option.
1.
Right-click on the collection in the Console tree, then select the Target Device>Boot menu option. The Target Device Control dialog displays with the Boot devices menu option selected in the Settings drop-down menu. Target devices display in the Device table. Click the Boot devices button to boot target devices. The Status column displays the Boot Signal status until the target device successfully receives the signal, then status changes to Success.
2.
1.
Right-click on the collection in the Console tree, then select the Target Device>Restart devices menu option. The Target Device Control dialog displays with the Restart devices menu option selected in the Settings drop-down menu. Devices display in the Device table. Type the number of seconds to wait before restarting target devices in the Delay text box. Type a message to display on target devices in the Message text box. Click the Restart devices button to restart target devices. The Status column displays the Restart Signal status until the target device successfully receives the signal, then status changes to Success.
2. 3. 4.
1.
Right-click on the collection in the Console tree, then select the Target Device>Shutdown devices menu option. The Target Device Control dialog displays with the Shutdown devices menu option selected in the Settings drop-down menu. Target devices display in the Device table.
Chapter 9
151
2. 3. 4.
Type the number of seconds to wait before shutting down target devices in the Delay text box. Type a message to display on target devices in the Message text box. Click the Shutdown devices button to shutdown target devices. The Status column displays the Shutdown Signal status until the target device shuts down. As each target device successfully shuts down, the status changes to Success.
1.
Right-click on the view in the Console tree, then select the Target Device>Send message menu option. The Target Device Control dialog displays with the Message to devices menu option selected in the Settings drop-down menu. Target devices are display in the Device table. Type a message to display on target devices in the Message text box. Click the Send message button. The Status column displays the Message Signal status until target devices successfully receives the message, the status changes to Success.
2. 3.
Move Collections
Target devices can be moved from one collection to another collection within the same site.
To move a collection
1. 2.
In the Console, expand the collection, right-click on the target device, then select the Move menu option. From the drop-down menu, select the collection to move this target device into, then click OK to close the dialog.
152
C HAPTER 10
Managing Views
The Consoles Views feature provides a method that allows you to quickly manage a group of devices. Views are typically created according to business needs. For example, a view can represent a physical location, such as a building or user type. Unlike device collections, a target device can be a member of any number of views. Farm administrators can create and manage views in the Console trees Farm>Views folder. Farm views can include any target device that exists in this farm. Site administrators can create and manage views in the Console trees Farm>Sites>YourSite>Views folder. Site views can only include target devices that exist within that site (YourSite). To display or edit a views properties, right-click on an existing view in the Console, then select the Properties menu option. The View Properties dialog displays and allows you to view or make modifications to that view. To perform actions on all members of a view, such as rebooting all target devices members in this view, refer to View Management.
View Properties
View properties are described in the tables that follow.
General Tab
Field/Button Name Description Description The name of this view. Describes this view.
154
Members Tab
Field/Button Description Members of this view Lists target device members that belong to this view. Add button Remove button Remove All button Opens the Select Devices dialog, from which target devices to add to this view are selected. Removes highlighted target devices from this view. Removes all target devices from this view
View Management
To manage views, select from the following actions: Properties (View Properties) Create a View Paste Device Properties Delete Refresh Boot Devices Restart Devices Shutdown Devices Send Message Active Directory To use the Views feature with the Active Directory Management feature, refer to Managing Domain Computer Accounts.
Create a View
To create a new view
1.
In the Console, right-click on the Views folder where the new view will exist, then select the Create view menu option. The View Properties dialog appears.
Chapter 10
Managing Views
155
2.
On the General tab, type a name for this new view in the Name text box and a description of this view in the Description text box, then click the Members tab. Click the Add button to add new target device members to this view. The Select Devices dialog appears. From the drop-down menus, select the site, then the device collection that you want to add target device(s) from. All members of that device collection appear in the list of available target devices. Highlight one of more target devices in this collection, then click Add to add them to the new view. To add additional target devices from other device collections, repeat steps 4 and 5. Click OK to close the dialog. All selected target devices now display on the Members tab.
3. 4.
5.
6.
1.
In the Consoles details pane, right-click on the target device that you want to copy properties from, then select Copy device properties. The Copy Device Properties dialog appears. Select the checkbox next to the properties that you want to copy, then click Copy. The properties are copied to the clipboard and the dialog closes. Right-click on the view containing the target devices that will inherit the copied properties, then select the Paste device properties menu option. The Paste Device Properties dialog appears displaying the name and properties of the target device that were copied. Under the Paste to... table heading, highlight the target devices that will inherit these properties, then click Paste. Click Close to close the dialog.
2. 3.
4. 5.
Delete
If a view becomes obsolete, you can delete the view. Deleting a view does not delete the target device from the collection.
156
1. 2.
In the Consoles tree, right-click on the view folder that you want to delete, then select the Delete menu option. A confirmation message appears. Click OK to delete this view. The view no longer displays in the Console tree.
Refresh
After making changes to a view, it may be necessary to refresh the view before those changes appear in the Console. To refresh the view, right-click on the view in the tree, then select the Refresh menu option.
Boot Devices
To boot target devices within a view
1.
Right-click on the view in the Console tree, then select the Boot devices menu option. The Target Device Control dialog displays with the Boot devices menu option selected in the Settings drop-down menu. By default, all devices are highlighted in the Device table. Click the Boot devices button to boot target devices. The Status column displays the Boot Signal status until the target device boots. As each target device successfully boots, the status changes to Success.
2.
Restart Devices
To restart target devices within a view
1.
Right-click on the view in the Console tree, then select the Restart devices menu option. The Target Device Control dialog displays with the Restart devices menu option selected in the Settings drop-down menu. By default, all devices are highlighted in the Device table. Type the number of seconds to wait before restarting target devices in the Delay text box. Type a message to display on target devices in the Message text box. Click the Restart devices button to restart target devices. The Status column displays the Restart Signal status until the target device restarts. As each target device successfully restarts, the status changes to Success.
2. 3. 4.
Chapter 10
Managing Views
157
Shutdown Devices
To shutdown target devices members within a view
1.
Right-click on the view in the Console tree, then select the Shutdown devices menu option. The Target Device Control dialog displays with the Shutdown devices menu option selected in the Settings drop-down menu. By default, all devices are highlighted in the Device table. Type the number of seconds to wait before shutting down target devices in the Delay text box. Type a message to display on target devices in the Message text box. Click the Shutdown devices button to shutdown target devices. The Status column displays the Shutdown Signal status until the target device shuts down. As each target device successfully shuts down, the status changes to Success.
2. 3. 4.
Send Message
To send a message to target devices members within a view
1.
Right-click on the view in the Console tree, then select the Send message menu option. The Target Device Control dialog displays with the Message to devices menu option selected in the Settings drop-down menu. By default, all devices are highlighted in the Device table. Type a message to display on target devices in the Message text box. Click the Send message button. The Status column displays the Message Signal status until target devices receive the message. As each target device successfully receives the message, the status changes to Success.
2. 3.
158
C HAPTER 11
The tasks necessary to maintain and manage the network components within your streaming implementation include: Preparing Network Switches Using UNC Format Names Reducing Network Utilization Using Roaming User Profiles Booting Through a Router Upgrading NIC Drivers Accessing a LUN Without Using a Network Share
Note For Provisioning Services networks, you must specify all network switch ports to which target devices are connected as edge-ports.
Managed switches usually offer loop detection software. This software turns off a port until the switch is certain the new connection does not create a loop in the network. While important and useful, the delay this causes prevents your target devices from successfully performing a PXE boot.
160
This problem manifests itself in one of the following ways: Target device (not Windows) login fails Target device appears to hang during the boot process, Target device appears to hang during the shutdown process.
To avoid this problem, you must disable the loop detection function on the ports to which your target devices are connected. To do this, specify all ports to which target devices are connected as edge-ports. This has the same effect as enabling the fast link feature in older switches (disables loop detection).
Note A network speed of at least 100MB is highly recommended. If using a 10MB hub, check whether your network card allows you to turn off autonegotiation. This can resolve potential connection problems.
Switch Manufacturers
This feature is given different names by different switch manufacturers. For example:
Switch Manufacturer Cisco Dell Foundry 3COM Fast Link Option Name PortFast or STP Fast Link Spanning Tree Fastlink Fast Port Fast Start
Chapter 11
161
Syntax
UNC names must conform to the \\SERVERNAME\SHARENAME syntax, where SERVERNAME is the name of the Provisioning Server and SHARENAME is the name of the shared resource. UNC names of directories or files can also include the directory path under the share name, with the following syntax: \\SERVERNAME\SHARENAME\DIRECTORY\FILENAME For example, to define the folder that contains your configuration database file in the following directory: C:\Program Files\Citrix\Provisioning Services On the shared Provisioning Server (server1), enter:
\\server1\Provisioning Services Note UNC names do not require that a resource be network share. UNC can also be used to specify a local storage for use by only a local machine.
2.
162
3.
Make sure permissions are set to allow full control of all files in the vDisk folder and database folder. Click the Permissions button on the Sharing tab, or click the Security tab, then set the correct permissions.
Note In XP it may be necessary to turn off simple sharing, so that you can display the Security tab of the Folder Properties dialog to give permissions to the proper user (the user defined in Step 1 above, or everyone).
To turn off simple sharing, select Start/All Programs/Control Panel. Double-click Folder Options. On the View tab, under Advanced settings, clear the Use simple file sharing (Recommended) checkbox. 4. For the Stream Service, complete Steps 4-A and 4-B: A. B. Go to Control Panel/Computer Management/Component Services, right click on the Stream Service, and select Properties. Click the Log On tab. Change the Log on as: setting to This Account, and set up the service to login to the user and password configured in Step 1.
5.
Verify that all Stream Services are restarted. The Configuration Wizard does this automatically. Stream Services can also be started from the Console or from the Control Panel.
Note The Stream Service cannot access folders using a mapped drive letter for the directory, since the mapped drives do not yet exist when the services start at boot time. Do not use a mapped drive letter to represent the vDisk or database-location directories when configuring Stream Services.
Chapter 11
163
While many of these features can also be useful on a diskless system where the disk is actually on the network, using them decreases cache effectiveness and thereby increases network utilization. In an environment that is sensitive to network utilization, consider reducing the effect of these features by disabling them or adjusting their properties. In particular, System Restore and Offline Folders are not useful on a diskless system and can be detrimental to the performance of Windows on a diskless system. Provisioning Services provides a clearer, more reliable, and simpler restore point than System Restore by simply rebooting the target device. Offline Folders cache network files a feature that is not applicable to a system where all files are on the network. All of these features are configurable through the target device itself. The following features are configurable in the Windows Group Policy. Offline Folders Event Logs
164
1.
Prepare a Standard Image vDisk for configuration. Shutdown all target devices that use the Standard Image vDisk. From the Console, change the Disk Access Mode to Private Image. Boot one target device.
2. 3.
Configure one or more features. Prepare the Standard Image vDisk for use. Shutdown the target device previously used to configure the vDisk. From the Console, change the Disk Access Mode to Standard Image. Boot one or more target devices.
1. 2. 3. 4.
From the target device, or Windows Explorer, right click on the Recycle Bin. Select Properties. Select Global. Select from the following settings: Use one setting for all drives Do not move files to the Recycle Bin. Remove files immediately when deleted.
Chapter 11
165
1. 2. 3. 4.
Open Windows Explorer. Select Tools/Folder Options. Select Offline Folders. Uncheck Enable Offline Folders.
On the domain controller, use the Microsoft Management Console with the Group Policy snap-in, to configure the domain policies for the object that follows.
Object Policy Setting Policy Setting Policy Setting User Configuration\Administrative Templates\Network\Offline Files Disable user configuration of offline files Enabled Synchronize all offline files before logging off Disabled Prevent use of the Offline Files folder Enabled
1. 2. 3. 4.
Select Start/Settings/Control Panel. Open Administrative Tools/Event Viewer. Open the properties for each log. Set the Maximum log size to a relatively low value. Consider 512 kilobytes.
166
Citrix Provisioning Services Administrators Guide To configure using the Windows Group Policy
On the domain controller, use the Microsoft Management Console with the Group Policy snap-in to configure the domain policies for the following object.:
Object Policy Setting Policy Setting Policy Setting Computer Configuration\Windows Settings\Event Log\Settings for Event Logs Maximum Application Log Size. Relatively low value. Consider 512 kilobytes. Maximum Security Log Size. Relatively low value. Consider 512 kilobytes. Maximum System Log Size. Relatively low value. Consider 512 kilobytes.
1. 2. 3. 4.
Select Start, then Control Panel. Open System. Select System Restore. Check Turn off System Restore.
Chapter 11
167
1. 2. 3. 4. 5.
Select Start/Settings/Control Panel/Administrative Tools. Select System. Click the Automatic Updates tab. Select the Turn Off Automatic Updates radio button. Click Apply.
168
6. 7. 8. 9. 10. 11.
Click OK. Select Services. Double-click the Automatic Updates service. Change the Startup Type by selecting Disabled from the drop-down list. If the Automatic Updates service is running, click the Stop button to stop the service. Click OK to save your changes.
1. 2. 3. 4. 5. 6. 7.
Shutdown all target devices that share the vDisk Change the vDisk mode to Private. Boot one target device from that vDisk. Apply Windows updates. Shutdown the target device. Change vDisk mode to Standard Image. Boot all target devices that share this vDisk.
Chapter 11
169
1.
2.
170
3.
4.
Properties
5.
6.
Chapter 11
171
7.
172
In this configuration, a DHCP server must be active on the local subnet (197.100.x.x) of the target device. In the configuration example above, the DHCP service is running on the same machine acting as a router between the two subnets, though it is not mandatory that the DHCP service actually runs on the router itself. This DHCP server provides the IP address and the PXE boot information to the target device. Configure the DHCP service to provide valid IP addresses to any target device booting on the local subnet (197.100.x.x). In order to provide the PXE boot information to the target device, configure the following options in your DHCP server DISABLE Option 60 (Class ID) Enable Option 66 (Boot Server Host Name) Enter the IP address of the TFTP Server. In this configuration, the value is 10.64.0.10. Enable option 67 (Boot file name) Enter the name of the boot file. For a standard configuration, the filename is ARDBP32.bin.
1.
Using the Console, configure the bootstrap settings to use the Gateway and Subnet mask fields. These fields should reflect the gateway and subnet to be used by the target device. In this case, they are 197.100.x.x for the gateway, and 255.255.255.0 for the netmask.
Chapter 11
173
2.
Note The PXE Service on the Provisioning Server in the above configuration is not necessary since options 66 & 67 in the routers DHCP service provide the same information to the target device. You can stop the PXE Service on the Provisioning Server if you have no target devices on the Provisioning Server subnet needing its functionality. The same is true for any DHCP service running on the Provisioning Server itself.
Running PXE and DHCP on the Same Computer
If PXE and DHCP are running on the same Provisioning Server, an option tag must be added to the DHCP configuration. This tag indicates to the target devices (using PXE) that the DHCP server is also the PXE boot server. Verify that option tag 60 is added to your DHCP scope. Provisioning Services setup automatically adds this tag to your scope provided that the Microsoft DHCP server is installed and configured before installing Provisioning Services. The Configuration Wizard sets-up the Tellurian DHCP Server configuration file if you use the wizard to configure Provisioning Services. The following is an example Tellurian DHCP Server configuration file which contains the option 60 tag.
max-lease-time 120; default-lease-time 120; option dhcp-class-identifier "PXEClient"; subnet 192.168.4.0 netmask 255.255.255.0 { option routers 192.168.123.1; range 192.168.4.100 192.168.4.120; }.
On Provisioning Servers
To upgrade NIC drivers on any Provisioning Server, simply follow the manufacturer instructions for upgrading NIC drivers.
174
On Target Devices
Note Do not attempt to upgrade a NIC driver on a vDisk. Do not attempt to upgrade a NIC driver on a hard disk on which the Provisioning Server is currently installed. Improperly upgrading a NIC may make the hard drive unable to boot.
To upgrade NIC drivers for target devices: Go to the target device with the original hard drive from which you made the vDisk image. 1. 2. 3. 4. 5. 6. Set the system BIOS to boot from the hard drive. Re-boot the target device directly from the hard drive. Un-install the target device software from this hard drive. Upgrade NIC driver as directed by the manufacturer's instructions. Re-install the target device software on the hard drive. Re-image the hard drive to make a new vDisk image.
Note Provisioning Services only allows read-only shared access to the SAN LUN(s). Therefore the desired boot modes for Provisioning Services target devices are important when using this feature.
Chapter 11
175
The following table describes the boot mode and its restrictions when using readonly vDisk storage.
Boot Mode Private Image Standard Image with cache on server disk or encrypted cache on server disk Write Cache Limitations Not supported Separate shared read-write write cache location is required for the store. Restrictions Not supported vDisk properties cannot be modified while the LUN is read-only. vDisks cannot be mapped on the Provisioning Server. vDisk properties cannot be modified while the LUN is read-only. vDisks cannot be mapped on the Provisioning Server. vDisk properties cannot be modified while the LUN is read-only. vDisks cannot be mapped on the Provisioning Server.
Standard Image No limitation. with cache in target device RAM Standard Image with cache on the target devices hard drive or cache encrypted on target devices hard drive. Fall back to cache on server disk does not function if the target device hard drive is not found or fails.
Difference Disk Separate shared read-write write Image cache location is required for the store.
vDisk properties cannot be modified while the LUN is read-only. vDisks cannot be mapped on the Provisioning Server.
176
Prerequisites
The following are prerequisites to using this new feature:
Provisioning Servers that will have access to the read-only shared LUN(s) are server class machines (Windows 2003 Server or 2008 Server). The Microsoft iSCSI initiator software is installed on all Provisioning Servers that will have access to the SAN. The vDisk files that will be placed on the read-only shared LUN(s) have already been created and reside on a normal read-write storage location. Creating vDisk files in place on the LUN is more difficult than pre-making the VHD files in a normal read-write store and subsequently copying them to the shared LUN. Therefore this document will describe the procedure assuming the vDisk files have been pre-made and reside in a normal readwrite storage location. The SAN being used has the ability to set a LUN up for shared read-write access or shared read-only access without requiring a shared file system front end. Normally, using a LUN in shared read-write access mode without a shared file system front end will result in a corrupt NTFS volume. Limiting the LUN access to read-only circumvents this problem.
Implementation
On the SAN
1.
Create a volume on the EquaLogic SAN using the EqualLogic Group Manager (or other relevant SAN interface front end). Make the volume large enough to hold all VHD and VHD associated PVP files that will be shared between the Provisioning Servers. Set the access type for the volume to read/write - shared. Note that the volume will be made read-only through the NTFS attributes not through the SAN access rights. While using the volume in read-only shared mode is possible, it requires extra steps to implement the solution. Therefore this procedure describes the process when the volume is set for read-write shared access.
2.
177
1.
Use the iSCSI Initiator to login to the SAN volume on only one of the Provisioning Servers.
Caution Do NOT login to the SAN Volume from more than one server simultaneously until the volume has been marked read-only. If you allow more than one server to simultaneously login to the volume through the iSCSI interface while the volume is read-write, you will corrupt the volume and will need to re-format it. All data on the volume will be lost.
2. Format the volume through the Windows Disk Manager with an NTFS file system and assign a drive letter or mount point path. A mount point path is desirable if you will have many LUN/Volumes exposed on a server as there will be no drive letter limitations. Make sure you use a drive letter/Mount point that will be identical on all servers using the volume. If you cannot make them identical, you will need to use the Provisioning Services/store override paths to point a specific server to a different drive letter/mount point for the volume. Once the volume is formatted and assigned a drive letter/Mount point, the volume should be accessible on this single Provisioning Server as a read/ write volume. Make sure all properties for the VHD and PVP files that will reside on the volume are set correctly (including enabling HA) and then copy all VHD files and their associated PVP files to the volume. Lock files do not need to be copied. The PVP file MUST be copied along with the VHD file. The system will not be able to create a PVP file on the fly once the volume is read-only. Once all files are copied to the volume, you must make the volume readonly. Close all Explorer windows that have access to the volume, then open a command prompt on the server that has access to the volume. Run diskpart.exe. This will start an interactive session with diskpart.exe. Find the volume number by typing the following command: list volume. Note the volume number of your volume and select it by typing the following command: select volume volumeNumber where volumeNumber is the number of the volume identified with the list volume command. After the volume is selected, set the read-only attribute of the volume by typing the following command: attributes volume set readonly.
3.
4.
5. 6. 7.
8.
178
9. 10. 11.
Check that the readonly attribute was set correctly by typing the following command: detail volume. Exit diskpart.exe by typing the command: exit. Using the iSCSI initiator interface, logoff the volume on this server and then re-login to the volume again. Make sure to make the volume a persistent target. You must logoff and then login to the volume to get NTFS on the server to re-read the volume attributes so that it will recognize the volume as read-only. Making the volume a persistent target will ensure the volume is accessible when the server reboots. It is now safe to mount the iSCSI volume on all Provisioning Servers. Using the iSCSI Initiator applet and Microsoft Disk Manager, mount the volume on all Provisioning Servers that need access to the volume. Make the target persistent in the iSCSI interface and try to make all servers mount using the same drive letter or mount point, which makes setting up the Provisioning Services Store easier.
12.
Note It may be necessary to make the Provisioning Services Stream Service on all servers dependent on the iSCSI Service. This ensures that the volumes are available at the proper time should the server reboot and target devices are booted during the server reboot. To do this, edit the registry for the Stream Service, them add the DependsOnService value pointing to the iscsiexe.exe service (MSiSCSI).
13. 14. Run the Console on one of the Provisioning Servers to create a store that points to the drive letter/mount point for the volume. Select which Provisioning Servers have access to the volume for this store.
Note If you are using Cache on server or Difference disk mode for any VHDs on the volume, you MUST enter a Default write cache path for the store that does NOT point to the SAN read-only volume. This path must be in a shared location for all Provisioning Servers. You can use a Windows Network Share or any other read-write shared storage device, but the write cache path cannot point to the read-only volume. The read-only volume can only contain the VHD and PVP files. If you are using one of the target device cache modes (local HD or RAM) then you do not need to set up a shared read-write write cache location for the store.
15. On the Console, right-click on the store then select the Add Existing Disk menu option, which scans the store and adds the VHD files to the database.
Chapter 11
179
16.
Assign the VHD files that are on this store to target devices, then boot those target devices normally. The VHD files on the read-only volume will always display in the Console as locked with the lock type: Read only media: Shared. You cannot remove this lock type. You cannot create a new vDisk on a store once it has been marked as read-only with diskPart.exe. You cannot edit the properties of the VHD once the store has been marked read-only.
3.
4. 5. 6.
7. 8. 9. 10. 11.
180
12.
Once all edits are complete, use the diskpart.exe utility to mark the volume read-only by selecting the volume, then setting the read-only attribute: attributes volume set readonly. Check that the readonly attribute was set correctly by typing the following command: detail volume. Exit diskpart.exe by typing the command: exit. Use the iSCSI Initiator to logoff, then relogin to the volume to re-read the read-only attributes. Use the iSCSI initiator on all Provisioning servers to re-login to the volume.
Caution Do NOT login to the SAN Volume from more than one server simultaneously until the volume has been marked read-only. If you allow more than one server to simultaneously login to the volume through the iSCSI interface while the volume is read-write, you will corrupt the volume and will need to re-format it. All data on the volume will be lost.
C HAPTER 12
Provisioning Services has two options to consider when configuring for a highly available implementation. High Availability Option (HA), which allows target devices to stay connected to a Provisioning Server. Offline Database Support, which allows Provisioning Servers to use a snapshot of the database if the connection to the database is lost.
182
When failover occurs, a target device attempts to connect to the next Provisioning Server in its list. If unable to make a connection, the target device continues to try servers in the list until it successfully connects.
Basic HA Implementation The Provisioning Server to which a target device accesses to login does not necessarily become the Provisioning Server that accesses the vDisk on behalf of the target device. In addition, once connected, if one or more Provisioning Servers can access the vDisk for this target device, the server that is least busy is selected. To purposely force all target devices to connect to a different Provisioning Server in an HA configuration while avoiding having to retry the current server, stop Stream Services on that server. To purposely force all target devices to connect to a different Provisioning Server in an HA configuration, while avoiding having targets timeout and attempt to reconnect to the current server, stop the Stream Service on that server. Upon shutdown, the Stream Service will notify each target device to re-login to another server.
Chapter 12
183
HA Benefits
Benefits of using HA include: Automatic failoverfailure of an active component results in an automatic failover to an alternative component without interruption. Redundant Provisioning Server supportvDisk redundancy is available by making the store where a vDisk resides, accessible by multiple Provisioning Servers. Support for various network shared storage optionssupport for RAID, SAN, NAS and Windows network storage
HA Components
The key to establishing any highly available network is to identify the critical HA components, create redundancy for these components, and ensure automatic failover to the secondary component in the event that the active component fails. The critical components are: Provisioning Server vDisk shared-storage system Database storage device
Note Write caching must be disabled on the hard drive of each Provisioning Server if the storage device is an IDE or SATA drive, in order to avoid the possibility of file corruption or application failure (refer to Disabling Windows Write Caching).
Write caching on the disk is a device-specific property. Some devices, such as a SCSI RAID disk or SAN, may not provide the option.
184
Configuring HA
Configuring HA within a Provisioning Services Farm requires completing the following tasks: Configuring the Boot File for HA Enabling HA on the vDisk Providing Provisioning Servers Access to Stores Optionally: Configuring HA with Shared Storage Disabling Windows Write Caching (for IDE or SATA storage devices only)
Chapter 12
185
Provisioning Servers can also be configured as login servers in the Console using the Configure Bootstrap dialog.
1.
Run the Configuration Wizard and when presented with the TFTP option and bootstrap location dialog, select the Use the Provisioning Server TFTP Service option. Enter or browse for the bootstrap file location, then click Next. The default location is:
C:\Documents and Settings\All Users\Application Data\Citrix\Provisioning Services\Tftpboot
2.
Important If a previous version of Provisioning Server was installed on this server, you may need to change the default location from:
C:\Program Files\Citrix\Provisioning Server\TFTPBoot or C:\Documents and Settings\All Users\Application Data\Citrix\Provisioning Server\TFTPboot
to:
C:\Documents and Settings\All Users\Application Data\Citrix\Provisioning Services\TFTPboot If the default is not changed, the bootstrap file can not be configured from the Console and target devices will fail to boot; receiving a Missing TFTP error message.
3.
In the Provisioning Servers boot list, click the Add button to add additional login Provisioning Servers to the list. Use the Move up or Move down buttons to change the Provisioning Server boot preference order. In an HA implementation, at least two Provisioning Server must be selected as boot servers.
4.
To set advanced configuration settings, highlight the IP address of the Provisioning Server, then click Advanced.
186
5.
Field Verbose Mode
Configure the bootstrap file using the information in the following table:
Description Select the Verbose Mode option if you want to monitor the boot process on the target device (optional) or view system messages. Select Interrupt Safe Mode if you are having trouble with your target device failing early in the boot process.
This setting enables the bootstrap to work with newer Windows OS versions and is enabled by default. Only disable this setting on older XP or Windows Server OS versions that do not support PAE or other advanced memory configurations such as 64 bit, or if your target device is hanging or behaving erratically in early boot phase. Restore Network Connections Selecting this option results in the target device attempting indefinitely to restore its connection to the Provisioning Server. Note: Because the Seconds field does not apply, it becomes inactive when the Restore Network Connections option is selected. Reboot to Hard Drive (a hard drive must exist on the target device) Selecting this option instructs the target device to perform a hardware reset to force a reboot after failing to re-establish communications for a defined number of seconds. The user determines the number of seconds to wait before rebooting. Assuming the network connection can not be established, PXE will fail and the system will reboot to the local hard drive. The default number of seconds is 50, to be compatible with HA configurations.
Enter the time, in milliseconds, between retries when polling for Provisioning Servers. Each Provisioning Server is sent a login request packet in sequence. The first Provisioning Server that responds is used. In non-HA systems, this time-out simply defines how often to retry the single available Provisioning Server with the initial login request. This time-out defines how quickly the round-robin routine will switch from one Provisioning Server to the next in trying to find an active Provisioning Server. The valid range is from 1,000 to 60,000 milliseconds. Enter the time-out, in milliseconds, for all login associated packets, except the initial login polling time-out. The valid range is from 1,000 to 60,000 milliseconds.
6. 7.
Click OK, then click Next. Review configuration settings, then click Finish to confirm configuration settings and restart network services on this server. As configuration settings are saved, they appear in the progress dialog. To exit the Configuration Wizard, click Done.
8.
Chapter 12
187
1.
In the Console, right-click on a Provisioning Server that will be used as a login server, then select the Configure Bootstrap menu option. The Configure Bootstrap dialog appears.
Note Clicking Read DB populates the table with login servers that already exist. When the Stream Service starts, it creates a record in the database with its own IP address. There is only one Stream Service option record per database. If the service is bound to multiple IP addresses, multiple records appear in the database. The Read DB function chooses only one IP address from each Provisioning Server. This function can also be used to populate the boot file with the Stream Service IP settings already configured in the database.
2. 3. 4. Click Add to add a new login Provisioning Server to the bootstrap file. The Streaming Server dialog appears. Type the IP address and port number of this Provisioning Server in the appropriate text boxes. Select to either use subnet mask and gateway settings using DHCP/ BOOTP, or type in the settings to use, then click OK. The Provisioning Server information displays in the list of available login servers. To configure advanced bootstrap settings, on the Options tab, choose from the following settings: Select the Verbose Mode option if you want to monitor the boot process on the target device (optional). This enables system messaging on the target device. Select Interrupt Safe Mode if the target device hangs early in the boot process. Select the Advanced Memory Support checkbox unless using older versions without PAE enabled. .
5.
6.
188
Restore Network Connections - Selecting this option results in the target device attempting indefinitely to restore its connection to the Provisioning Server.
Note Because the Seconds field does not apply, it becomes inactive when the Restore Network Connections option is selected.
Reboot to Hard Drive - Selecting this option instructs the target device to perform a hardware reset to force a reboot after failing to re-establish communications for a defined number of seconds. The user determines the number of seconds to wait before rebooting. Assuming the network connection can not be established, PXE will fail and the system will reboot to the local hard drive. The default number of seconds is 50. 7. 8. 9. Under Timeouts, scroll for the Login Polling Timeout, in milliseconds, between retries when polling for Provisioning Servers. Under Timeouts, scroll for the Login General Timeout, in milliseconds, for all login associated packets, except the initial login polling time-out. Click OK to save your changes.
1. 2.
To enable the HA feature, in the Console, right-click on the vDisk and select the Properties menu option. Select the Options tab, then select the Enable the High Availability feature checkbox. Click OK to save this vDisk property change and continue. Enable load balancing in the vDisks properties.
3.
1. 2.
In the Console, right-click on the Store, then select the Properties menu option. The Store Properties dialog appears. From the drop-down list, select the site where Provisioning Servers that should be able to access this store exists.
Chapter 12
189
3.
Enable the checkbox next to each Provisioning Server that can provide vDisks in this store, then click OK.
Changing this registry key disables Windows Opportunity Locking, providing the fastest possible failover time when contact with the active Provisioning Server is lost. Without this change, failover times can take up to one minute. During this time, Windows does not allow access to the vDisk file that was in use by the failed Provisioning Server. By disabling Windows Opportunity Locking on Provisioning Servers, the Stream Service can have immediate access to vDisk files. However, this reduces caching of remote vDisk data for the entire Provisioning Server.
190
Configuring Service Account Credentials for Provisioning Servers includes the following high-level tasks: 1. 2. 3. Create Service account credentials on the domain controller (Creating Streaming-Service Account Credentials). Assign Service account credentials to the Services (Assigning StreamService Account Credentials Manually). In the HA implementation, configure shared-storage access by sharing vDisk folders, and granting Modify privileges for these folders to Service account credentials (Configuring HA Storage Access). Enabling HA on the vDisk (Enabling HA on the vDisk)
4.
Note Your Microsoft Windows online help contains detailed instructions for creating both local and domain accounts.
Consider the following when creating service account credentials: You must be logged on as an administrator or a member of the Administrator group to create a domain account. You should clear the User must change password at next logon checkbox.
Chapter 12
191
After assigning the Service account credentials to the Stream Service, restart the Stream Service.
192
2.
Sharing Tab 3. 4. 5. Enable the Share this folder radio button, then optionally enter a share name, and comment. Click Permissions. If the Service account credentials user name does not appear in the Group or user names list, click the Add button. Enter the user name of the Service account credentials, and click Check Names to verify. Click OK. Select the service account credentials user name. Enable the Full Control checkbox (the Full Control checkbox and all checkboxes below it should be checked). Click Apply.
6. 7. 8. 9.
Chapter 12
193
10.
Note In Windows XP it may be necessary to turn off simple sharing, so that you can display the Security tab of the Folder Properties dialog to give permissions to the proper user (the user defined in Creating StreamingService Account Credentials, or Everyone).
To turn off simple sharing, select Start > Control Panel. Double-click Folder Options. On the View tab, under Advanced settings, clear the Use simple file sharing (Recommended) checkbox.
Service Account Security Settings 11. If the Service account credentials user name does not appear in the Group or user names list, click the Add button. Enter the user name of the Service account credentials, then click Check Names to verify. Click OK. Select the Service account credentials user name. Enable the Full Control checkbox, then click Apply. Click OK.
194
SAN Configuration
If you are storing the database and vDisks on a SAN, you can use local system accounts for your Stream Service, and unlike a Windows network share, you do not necessarily need to create a special Service Account Credentials to guarantee access to your data. In most cases, a SAN configuration allows you to set up as if the database and vDisks were stored locally on the Provisioning Server.
1. 2. 3. 4. 5. 6. 7.
On the Provisioning Server, open the Control Panel. Select Administrative Tools>Computer Management. Double-click the Disk Management node in the tree. Right-click the storage device for which Windows write caching will be disabled. Select Properties. Click the Hardware tab. Click the Properties button.
Chapter 12
195
8.
Disable Write Caching on the Disk 9. 10. 11. 12. Clear the Enable write caching on the disk checkbox. Click OK, then click OK again. Close the Computer Management window, then the Administrative Tools window. Right-click the Provisioning Server node in the Console, then click Restart service. Alternatively, you can also re-run the Configuration Wizard to re-start the services, or manually restart the services through the Windows Control Panel>Administrative Tools>Services window. (At the Services window, right-click on the Stream Service, then select Start from the shortcut menu.)
Testing HA Failover
To ensure that HA is successfully configured, complete the following
1. 2.
Double-click the vDisk status icon on the target device and then note the IP address of the connected Provisioning Server. Right-click the connected Provisioning Server in the Console. Select Stream Services, then select Stop.
196
3.
Confirm that the IP address of the connected Provisioning Server changes to that of an alternate Provisioning Server in the vDisk status dialog on the target device.
When the database connection becomes available, the Stream Process synchronizes any Provisioning Server or target device status changes made to the snapshot, back to the database.
Considerations
Chapter 12
197
The following features, options, and processes remain unavailable when the database connection is lost, regardless if the Offline Database Support option is enabled: AutoAdd target devices User Groups AutoUpdate or Incremental vDisk updates vDisk creation Active Directory password changes Stream Process startup
1. 2.
In the Console tree, right-click on the Farm, then select Properties. The Farm Properties dialog appears. On the Options tab, check the checkbox next to Offline Database Support.
198
C HAPTER 13
This chapter describes how to manage domains and Active Directory in a Provisioning Services implementation.
Note For more information about using Active Directory organizational units and delegation of control, refer to Microsoft Active Directory documentation.
After all prerequisites have been verified, new target devices can be added and assigned to the vDisk. A machine account must then be created for each target device.
200
Note The Provisioning Server DOES NOT in any way change or extend the Active Directory schema. Provisioning Servers function is to create or modify computer accounts in Active Directory, and reset passwords.
When domain password management is enabled, it: Sets a unique password for a target device. Stores that password in the respective domain computer account. Gives the information necessary to reset the password at the target device before it logs on to the domain.
Chapter 13
201
With password management enabled, the domain password validation process includes: 1. 2. 3. Creating a machine account in the database for a target device, then assign a password to the account. Providing an account name to a target device using the Streaming Service. Having the domain controller validate the password provided by the target device.
202
Chapter 13
203
Note The machine name used for the vDisk image is to never be used within your environment again.
1. Right-click on one or more target devices in the Console window (alternatively, right-click on the device collection itself to add all target devices in this collection to a domain). Select Active Directory, then select Create machine account. From the Domain scroll list, select the domain that the target device(s) belongs to, or type the name of the domain controller that the target devices should be added to (if you leave the text box blank, the first Domain Controller found is used). From the Organization unit (OU) scroll list, select or type the organization unit to which the target device belongs (the syntax is parent/child, lists are comma separated; if nested, the parent goes first). Click the Add devices button to add the selected target devices to the domain and domain controller. A status message displays to indicate if each target device was added successfully. Click Close to exit the dialog.
2.
3.
4.
2.
204
2.
In the Target Device table, highlight those target devices that should be reset, then click the Reset Account button.
Note This target device should have been added to your domain while preparing the first target device.
3. 4. Click Close to exit the dialog. Disable Windows Active Directory automatic password re-negotiation.To do this, on your domain controller, enable the following group policy:
Domain member: Disable machine account password changes.
Note To make this security policy change, you must be logged on with sufficient permissions to add and change computer accounts in Active Directory.
You have the option of disabling machine account password changes at the domain level or local level. If you disable machine account password changes at the domain level, the change applies to all members of the domain. If you change it at the local level (by changing the local security policy on a target device connected to the vDisk in Private Image mode), the change applies only to the target devices using that vDisk.
5.
C HAPTER 14
The following information is detailed in this chapter: Configuring the Bootstrap File From the Console Using the Manage Boot Devices Utility Configuring the BIOS Embedded Bootstrap
IP Settings
The IP Address, Subnet Mask, Gateway, and Port for up to four Provisioning Servers, which will perform login processing.
206
Add button
Click the Add button to add a new Provisioning Server to the file. Up to four Provisioning Servers may be specified for Provisioning Servers.
Highlight an existing Provisioning Server from the list, then click the Edit button to edit this servers IP settings. Select an existing Provisioning Server from the list, then click the remove button to remove this server from the list of available Provisioning Servers.
Move Up and Move Select an existing Provisioning Server, and click to move up or down in the list of Provisioning Servers. The order in which the Provisioning Servers appear in Down buttons the list determines the order in which the Provisioning Servers are accessed should a server fail. Read Servers from Database button To populate the boot file with the Stream Service IP settings already configured in the database, click the Read DB button. This removes any existing settings before populating the list from the database.
Selecting this method requires that a primary and secondary DNS and Domain be identified.
Chapter 14
207
Interrupt Safe Mode Select Interrupt Safe Mode if you are having trouble with your target device failing early in the boot process.
Advanced Memory This setting enables the bootstrap to work with newer Windows OS versions and is enabled by default. Only disable this setting on older XP or Windows Support Server OS 32 bit versions that do not support PAE, or if your target device is hanging or behaving erratically in early boot phase.
208
Restore Network Connections Selecting this option results in the target device attempting indefinitely to restore it's connection to the Provisioning Server. Reboot to Hard Drive (a hard drive must exist on the target device) Selecting this option instructs the target device to perform a hardware reset to force a reboot after failing to re-establish communications for a defined number of seconds. The user determines the number of seconds to wait before rebooting. Assuming the network connection can not be established, PXE will fail and the system will rebooot to the local hard drive. The default number of seconds is 50, to be compatible with HA configurations.
Enter the time, in milliseconds, between retries when polling for Provisioning Servers. Each Provisioning Server is sent a login request packet in sequence. The first Provisioning Server that responds is used. In non-HA systems, this time-out simply defines how often to retry the single available Provisioning Server with the initial login request. This time-out defines how quickly the round-robin routine will switch from one Provisioning Server to the next in trying to find an active Provisioning Server. The valid range is from 1,000 to 60,000 milliseconds. Enter the time-out, in milliseconds, for all login associated packets, except the initial login polling time-out. This time-out is generally longer than the polling time-out, because the Provisioning Server needs time to contact all associated servers, some of which may be down and will require retries and time-outs from the Provisioning Server to the other Provisioning Servers to determine if they are indeed online or not. The valid range is from 1,000 to 60,000 milliseconds.
1.
In the Console, highlight the Servers folder in the tree, or highlight a Provisioning Server, then select Configure bootstrap from the Action menu. The Configure Bootstrap dialog appears.
Chapter 14
209
Select the boot file that was copied to the directory you selected during the Provisioning Server setup. .
Important If a previous version of Provisioning services was installed on this server, you must change the default location from:
C:\Program Files\<CitrixorOEMname>\Provisioning Server\Tftpboot
to:
C:\Documents and Settings\All Users\Application Data\<CitrixorOEMname>\Provisioning services\Tftpboot If the default is not changed, the bootstrap file can not be configured from the Console and target devices will fail to boot; receiving a Missing TFTP error message.
Note If you installed the Console on a separate machine, select the path of the remote Provisioning Server (which has boot services installed).
2. Click Read DB. When the Stream Service starts, it creates a record in the database with its own IP address. There is only one Stream Service option record per database. If the service is bound to multiple IP addresses, multiple records appear in the database. The Read DB function chooses only one IP address from each Provisioning Server. This function can also be used to populate the boot file with the Stream Service IP settings already configured in the database. Choose from the following options: Select the Verbose Mode option if you want to monitor the boot process on the target device (optional). This enables system messaging on the target device. Select Interrupt Safe Mode if the target device hangs early in the boot process. Select Advanced Memory Support option to enable the bootstrap to work with newer Windows OS versions (enabled by default). Only disable this setting on older XP or Windows Server OS 32 bit versions that do not support PAE, or if your target device is hanging or behaving erratically in early boot phase.
3.
4.
210
Restore Network Connections - Selecting this option results in the target device attempting indefinitely to restore its connection to the Provisioning Server. Reboot to Hard Drive - Selecting this option instructs the target device to perform a hardware reset to force a reboot after failing to re-establish communications for a defined number of seconds. The user determines the number of seconds to wait before rebooting. Assuming the network connection can not be established, PXE will fail and the system will reboot to the local hard drive. The default number of seconds is 50. Click the Browse button to search for and select the folder created in Step 1, or enter a full path or UNC name.
Note If the partition containing the vDisks is formatted as a FAT file system, a message displays a warning that this could result in sub-optimal performance. It is recommended that NTFS be used to format the partition containing the vDisks. Do not change the address in the Port field.
Caution All boot services (PXE, TFTP) must be on the same NIC (IP). But the Stream Service can be on a different NIC. The Stream Service allows you to bind to multiple IPs (NICs).
5. Configure the following: Login Polling Timeout Enter the time, in milliseconds, between retries when polling for servers. Each server is sent a login request packet in sequence. The first server that responds is used. This time-out simply defines how often to retry the single available server with the initial login request. If you are using the High Availability feature, this time-out defines how quickly the round-robin routine will switch from one server to the next, in trying to find an active server. The valid range is from 1,000 to 60,000 milliseconds. Login General Timeout Enter the time-out, in milliseconds, for all login associated packets, except the initial login polling time-out. The valid range is from 1,000 to 60,000 milliseconds. 6. Click OK to save your changes.
Chapter 14
211
Note The Boot Device Management utility is not supported on operating systems older than, and including, Windows 2000. Wireless NICs are not supported.
USB CD-ROM (ISO) Hard Disk Partition (currently, only physical hard disk partitons are supported)
Caution When an entire hard drive is selected as boot device, all existing disk partitions are erased and re-created with a single active partition. The targeted partition is reserved as a boot device and cannot be used by the operating system or data.
When a hard disk partition is selected as boot device, the selected disk partition data is deleted and set as an active partition. This active partition becomes the boot device. Boot devices are configured using the Boot Device Management utility. The Manage Boot Devices utility is structured as a wizard-like application, which enables the user to quickly program boot devices. After installing the boot device, complete the procedures that follow.
212
Citrix Provisioning Services 5.1 Installation and Configuration Guide Configuring Boot Devices
1.
From C:\Program Files\Citrix\Provisioning services product installation directory, run BDM.exe. The Boot Device Management window opens. Under Server Lookup, select the radio button that describes the method to use to retrieve Provisioning Server boot information: Use DNS to find the Provisioning Server from which to boot from. If this option is selected and the Use DHCP to retrieve Device IP option is selected (under Device IP Configuration settings), your DHCP server needs to provide option 6 (DNS Server).
2.
Note The boot device uses Host name plus DHCP option 15 (Domain Name, which is optional) as the fully qualified domain name (FQDN) to contact the DNS server to resolve the IP address.
If using HA, specify up to four Provisioning Servers for the same Host name on your DNS server. Use the static IP address of the Provisioning Server from which to boot from. If you select this option, click Add to enter the following Provisioning Server information, then click OK to exit the dialog: IP Address Subnet Mask Gateway Port (default is 6910)
If using HA, enter up to four Provisioning Servers. If you are not using HA, only enter one. Use the Move Up and Move Down buttons to sort the Provisioning Servers boot order. The first Provisioning Server listed will be the server that the target device attempts to boot from. 3. Click Next. The Set Options dialog appears.
Chapter 14
213
4.
Configure the following local boot options, then click Next: Verbose Mode; enable/disables the displaying of extensive boot and diagnostic information that is helpful when debugging issues. Interrupt Safe Mode; enable/disable for debugging issues, which is sometimes required for drivers that exhibit timing or boot behavior problems. Advanced Memory Support; enables/disables the address extensions, to match your operating system settings. Select this option to enable the bootstrap to work with newer Windows OS versions (enabled by default). Only disable this setting on older XP or Windows Server OS 32 bit versions that do not support PAE, or if your target device is hanging or behaving erratically in early boot phase. Network Recovery Method; select to attempt to restore the network connection or to reboot from a hard drive if the target device loses connection to the Provisioning Server, and how long (in seconds) to wait to make this connection. Login Polling Timeout; in general, it is recommended that you start values of one second for each of the polling and general timeouts. You should extend these when using 3DES encryption. You should further extend the timers based upon workload. A reasonable setting for 100 target devices running triple DES in the network would be three seconds. Login General Timeout; a reasonable setting for 100 target devices running triple DES in the network would be ten Seconds for the General Timeout.
5.
On the Burn the Boot Device dialog, configure the target device IP. If the Use DNS to find the Server option is selected and your DHCP service does not provide option 6 (DNS Server), then enter the following required information:
Note If entering server and domain information, the server name must be less than 16 characters and the domain name must be less than 48 characters in length.
Primary DNS Server Address Secondary DNS Server Address Domain Name
214
6. 7. 8. 9.
Configure boot device and media properties, then click Burn. A message appears to acknowledge that the boot device was successfully created. Click Exit to close the utility. If selecting ISO format, use your CD burning software to burn the ISO image. Boot the target device and enter the BIOS Setup. Under the Boot Sequence, move the boot device to the top of the list of bootable devices. Save the change and boot the target device.
After the boot device is programmed, a target device boot sequence can be configured using the Consoles Target Device Disk Properties dialog. These boot behaviors are used after a target device connects to a Provisioning Server. The Console allows multiple vDisk images to be assigned to a target device. The way in which these vDisks boot depends upon the selected boot behavior. When configuring the BIOS to work with the boot device (either USB or ISO image), it is imperative that the NIC PXE option is enabled. The PXE boot option is required in order for the NIC Option ROM to stay resident in memory during the pre-boot process. This way, UNDI will be available to the boot device to properly initialize the NIC. Otherwise, the API not found message would be displayed by the boot device.
Chapter 14
215
If the target device boots using the BIOS-Embedded Bootstrap, the configuration settings are obtained from the devices BIOS. These BIOS settings may indicate using DHCP with DNS to lookup the IP and server information (dynamic), or it may list up to four server IP addresses in the BIOS (static). The first time a target device boots, it reads the product license key and configuration information from the BIOS, locates the Stream Service, and then sends a device registration message to the server. This message contains the information, in addition to the information inherited from the device collection template, necessary to add the device to the Provisioning services database.
Note The target device must have enough information stored in the BIOS to make initial contact with the Provisioning Server.
General Tab
1. Right-click on a Provisioning Server in the Console window, then select the Configure BIOS Bootstrap menu option. The Configure BIOS Bootstrap dialog appears. To allow target device BIOS settings to be automatically updated if connected to this server, on the General tab, check the Automatically update the BIOS on the target device with these settings check box. The next time the target device boots, these settings are automatically applied.
2.
Target Device IP
1. 2. Select the Target Device IP tab on the Configure BIOS Bootstrap dialog. Select from the following methods to use to retrieve target device IP addresses: Use DHCP to retrieve target device IP; default method. Use static target device IP; selecting this method requires that a primary and secondary DNS and Domain be identified.
216
Note When using DNS, the DNS server must be able to resolve the name with the IP address of the server.
Use specific servers Select this option to manually enter Provisioning Server data. If this information was not previously entered, no data appears. To quickly list all servers in the database, click Read Servers from Database button. To change or enter new information, click Edit, then manually enter the information in the Server Address dialog.
Note Selecting the Reset to Default button will display a confirmation message to indicating that automatic BIOS updates on the target devices will be disabled and to use DNS to find the server.
Options Tab
1. On the Options tab, select from the network options that follow: Select the Verbose mode option if you want to monitor the boot process on the target device (optional). This enables system messaging on the target device. Select Interrupt safe mode if the target device hangs early in the boot process. Select the Advanced Memory Support option to enable the bootstrap to work with newer Windows OS versions (enabled by default). Only disable this setting on older XP or Windows Server OS 32 bit versions that do not support PAE, or if your target device is hanging or behaving erratically in the early boot phase.
2.
Select from the following Network Recovery Methods: Restore network connections
Chapter 14
217
Selecting this option results in the target device attempting indefinitely to restore its connection to the Provisioning Server. Reboot to Hard Drive Selecting this option instructs the target device to perform a hardware reset to force a reboot after failing to re-establish communications for a defined number of seconds. The user determines the number of seconds to wait before rebooting. Assuming the network connection can not be established, the target device will fail to contact the server and the system will reboot to the local hard drive. The default number of seconds is 50.
Note If the partition containing the vDisks is formatted as a FAT file system, a message displays a warning that this could result in sub-optimal performance. It is recommended that NTFS be used to format the partition containing the vDisks. Do not change the address in the Port field.
Caution All boot services must be on the same NIC (IP). But the Stream Service can be on a different NIC. The Stream Service allows you to bind to multiple IPs (NICs).
3. Configure the following: Login Polling Timeout Enter the time, in milliseconds, between retries when polling for servers. Each server is sent a login request packet in sequence. The first server that responds is used. This time-out simply defines how often to retry the single available server with the initial login request. If you are using the High Availability feature, this time-out defines how quickly the round-robin routine will switch from one server to the next, in trying to find an active server. The valid range is from 1,000 to 60,000 milliseconds. Login General Timeout Enter the time-out, in milliseconds, for all login associated packets, except the initial login polling time-out. The valid range is from 1,000 to 60,000 milliseconds. 4. Click OK to save your changes.
218
C HAPTER 15
Managing Printers
Provisioning Server provides a Printer Management feature that allows you to manage which printers target devices have access to a vDisk. Printers are managed from the Target Device Properties dialog.
Note This feature should not be enabled if you use Active Directory to manage printers. If you use an existing printer management tool, this feature should be disabled to avoid printer setting conflicts.
There are two types of printers that can appear in the Console window: Network Printers Local Printers.
Before a target device can access a printer, the following tasks must be completed in the order that follows: 1. 2. 3. Installing Printers on the vDisk Enabling Printers on the vDisk Enabling the Printer Management Feature
1. 2. 3.
Change the vDisk image mode to Private Image. Install the required printers on the target device that is using the vDisk. Perform a clean shut-down of the target device that is using the vDisk.
220
4. 5.
If this vDisk is shared by users, change the vDisk image mode back to Shared Image Mode. Verify that the printers appear in the Console: A. B. Right-click on the target device, select the Properties menu option. Select the vDisks tab, then click on the Printers button. Printers associated with that vDisk should appear in the list of available printers.
After successfully installing printers, the next step is to enable printers for target devices that access the vDisk.
Note Disabling printers does not remove the printer information from the vDisk. Changes to the target devices printer assignments do not occur until the target device reboots.
Examples of reasons you may want to disable Printer Management include: You may be using a different printer system that installs the valid printers on each target device and software may delete them or cause conflicting settings. Printers that are included on the vDisk should be accessible to all users. The system needs to be configured before being deployed. Until the Printer Management feature is enabled, changes can be made for different target devices as needed.
Chapter 15
Managing Printers
221
All printers installed on a vDisk appear in the Details panel when the Printers group folder is expanded for that vDisk. The section that follows describes the different methods for enabling printers for one or more target devices.
Note If a disk is a HA vDisk (has a duplicate with same vDisk name), changes to that printer (if it is enabled or disabled for a target device) are automatically made to the duplicate vDisk.
Enablement Methods
Using the Console, you can manage which target devices use which printers. There are several methods for managing target device printer assignments. Choose from the following methods: Enabling printers for target devices using the Printer Settings option Use this method to enable or disable a single printer to multiple target devices accessing a vDisk. Enabling printers for target devices using the Printers group folder Use this method to select printer settings (enable/disable; default) for a single target device. Enabling printers using Copy and Paste Use this method to copy printer settings of one target device (enabled/ disabled; default printer), to one or more target devices selected in the Details panel. Enabling printers using an existing target device as a template Use this method to automatically set printer settings when a target device is added to the network.
Note The Administrator may choose to limit the number of printers for particular target devices or select different default printers for particular target devices. The settings that are selected are saved to the target devices personality information (if the limit for this field, 65K, is reached, a message appears indicating that some of the settings will not be saved and offers suggestions for decreasing the size).
222
Citrix Provisioning Services Administrators Guide Enabling printers for target devices using the Printer Settings option
Use this method to assign a single printer to multiple target devices. This method is very useful when managing the printer-to-all target devices relationship. 1. 2. 3. 4. Open the Console. In the tree, under Provisioning Servers, click the Printers group folder. All printers associated with that group appear in the Details panel. Right-click on a printer in the Details panel, then select the Client Printer Settings... menu option. The printer settings dialog for that printer appears. Enable or disable this printer for one or more target devices using any of the following options: 5. In the Enable column, select the checkbox next to each target device to enable or disable use of this printer. Select the checkbox under the dialogs Enable heading to enable or disable this printer for all target devices assigned to the vDisk.
To select this printer as the default printer for target devices accessing this vDisk, select from the following methods: Select the Default checkbox in the dialogs Default heading to set this printer as the default for all target devices assigned to this vDisk. Highlight one or more target devices, then right-click to open the context menu. Select from the following menu options; Default, Not Default, All Default, or All Not Default. In the Default column, select the checkbox next to each target device that should use this printer as the default printer. If there is only one printer, that printer is automatically set as the default printer.
6.
Click OK to save settings for this printer and exit the dialog.
Enabling printers for target devices using the Printers group folder
Use this method to select printer settings (enable/disable; default) for a single target device.
Note After selecting printer settings for a single target device, you may choose to duplicate this target devices printer settings using the Copy and Paste features.
Chapter 15
Managing Printers
223
1.
Under the target devices vDisk, click the Printers group folder in the tree. Printers that are associated with that group appear in the Details panel.
Note By default, printers are not enabled for a target device and the first printer listed is set as the default printer.
2.
Select or deselect the Enable checkbox next to each printer to enable or disable the printer for this target device. You can also choose from one of the additional selection methods that follow. In the Details panel: Select or unselect the Enable checkbox within the table heading to enable or disable all printers. Highlight a printer, then use the space bar to enable or disable printers.
Use this method to set the same printer settings (enabled/disabled; default printer) that exist for one target device, to one or more target devices that use the same vDisks. This method is particularly useful when adding new target devices and those target devices use the same vDisks, and therefore the same printers, as an existing target device. 1. 2. 3. 4. 5. 6. In the Console window, right-click on the target device that you want to copy printer settings from. Select the Copy menu option. The Copy target device properties dialog appears. Under Options, select Printers, then click OK to exit the dialog. In the Tree, highlight the Target Devices directory so that all target devices appear in the Details panel. Highlight one or more target devices that you want to paste the printer settings to (enable/disable; default). Right-click on the highlighted target devices, then select the Paste menu option.
Use this method if you want all new target devices, that are being added to your network, to automatically share printer settings (enable/disable; default).
224
1. 2. 3.
In the Console window, double-click the target device that you want to select as the template. The Target Device Properties dialog appears. On the General tab, select the Set as default target device option. Click OK to exit the dialog.
Note If the Enable the Printer Management checkbox is selected, the Enable Printer Management menu options appear checked when the Printers group is highlighted,
If the Enable the Printer Management checkbox appears disabled, all printers exist on the selected vDisk. You can also choose from the following methods to enable or disable the Printer Management feature using right-click menus: Printers Group
Chapter 15
Managing Printers
225
In the Tree, under Provisioning Servers, expand a Provisioning Server, then expand the vDisk for which you want to disable Printer Management. Right-click on the Printers folder for that vDisk, then select the Disable Printer Management option. Virtual Disk In the Tree, under Provisioning Servers, right click on the vDisk for which you want to disable Printer Management, then select the Disable Printer Management option.
226
C HAPTER 16
Provisioning Services provides logging to help with troubleshooting and managing a Provisioning Services farm. This chapter contains the following logging information: Configuring Log File Properties Log Files and Locations
Note Changes to target device log properties are immediate. Changes to Server log properties may take up to ninety seconds to take effect.
1. In the Console, right-click on the Provisioning Server, then select the Properties menu option.
228
2.
Note The logging levels that follow are listed from the minimum level to the maximum level of logging information that can be collected. Logging levels are inclusive of previous levels. For example, if you select INFO, log information will include WARN, ERROR, and FATAL.
OFF Logging is disabled for this Provisioning Server. FATAL The FATAL level logs information about an operation that the system could not recover from. ERROR The ERROR level logs information about an operation that produces an error condition. WARN The WARNING level logs information about an operation that completes successfully, but there are issues with the operation. INFO Default logging level. The INFO level logs information about workflow, which generally explains how operations occur. DEBUG The DEBUG level logs details related to a specific operation and is the highest level of logging. If logging is set to DEBUG, all other levels of logging information are displayed in the log file. 3. TRACE TRACE logs all valid operations. In the Max File Size textbox, scroll to select the maximum size that a log file can reach. When the max file size is reached, the file is closed and an index number is appended to the file name, then a new file is created. In the Max Backup Files textbox, scroll to select the maximum number of backup files to retain, then click OK. The oldest log file is automatically deleted when the maximum number of backup files is reached. On the General tab, enable Log events to the servers Windows Event Log to allow for logging events using the Windows Event log on the
4.
5.
Chapter 16
229
Provisioning Server that is communicating with this target device. This log includes errors that may occur after the early boot phase as well as any critical error reporting. Click OK.
Note Provisioning Server logging levels should not be set by modifying the Stream_log.config file manually (refer to Log Files and Locations) because it may cause the logging level to be out of sync.
1. 2.
In the Console, right-click on the target device, then select the Properties menu option. On the Logging tab, select one of the following options: OFF Logging is disabled for this target device. FATAL The FATAL level logs information about an operation that the system could not recover from. ERROR The ERROR level logs information about an operation that produces an error condition. WARN The WARNING level logs information about an operation that completes successfully, but there are issues with the operation. INFO Default logging level. The INFO level logs information about workflow, which generally explains how operations occur. DEBUG
230
The DEBUG level logs details related to a specific operation and is the highest level of logging. If logging is set to DEBUG, all other levels of logging information are displayed in the log file. TRACE TRACE logs all valid operations.
Caution This file should not be edited manually. Logging levels should be set through the Console. Any edits made to this file manually are lost when the Provisioning Server restarts, or when logging levels are changed using the Console.
Stream.log StreamProcess.exe, StreamProcess.exe, Manager.dll, and Streamdb.dll all write to the Stream.log file. MCLI.log MCLI.exe writes MCLI logging information to MCLI.log SoapServer.log SoapServer.exe writes SoapServer logging information to SoapServer.log Console.log Console.exe writes Console logging information to Console.log ConfigWizard.log
Chapter 16
231
ConfigWizard.exe writes Provisioning Server configuration logging information to ConfigWizard.log XenConvert.txt XenConvert.exe writes vDisk image conversion information to XenConvert.txt
232
C HAPTER 17
Auditing
Provisioning Services provides an auditing tool that records configuration actions on components within the Provisioning Services farm, to the Provisioning Services database. This provides administrators with a way to troubleshoot and monitor recent changes that might impact system performance and behavior. The Provisioning Services administrator privileges determines the audit information that can be viewed and the menu options that are visible. For example; a Farm Administrator can view all audit information within the farm, unlike a Device Administrator whom can only view audit information for those device collections they have privileges to.
Note Auditing is off by default. Also, if the Provisioning Services database becomes unavailable, no actions are recorded.
This chapter contains the following logging information: Auditing Managed Objects Enabling Auditing Accessing Audit Information Archiving Audit Trail Information
234
Only those tasks that are performed from one of the following Provisioning Services utilities are recorded: Console MCLI SOAP Server PowerShell
Tasks that are not performed using these utilities, such as booting target devices or Provisioning Servers by other methods, are not recorded.
Enabling Auditing
The auditing feature is disabled by default.
To enable auditing
1. 2.
In the Console tree, right-click on the farm, then select the farm Properties menu option. On the Options tab, under Auditing, check the Enable auditing checkbox.
Chapter 17
Auditing
235
Console
In the Console, a farm administrator can right-click on a parent or child node in the Console tree to access audit information. The audit information that other administrators can access depends on the role they were assigned. The tree allows for a drill-down approach when accessing the level of audit information needed. Right-click on a: Farm, to view audit information for all managed objects within this farm or to archive audit information. Site, to view audit information for all managed objects within a site. Provisioning Servers, to view audit information for all servers within a site, or right-click on a single server to view audit information for that server. Collection, to view audit information on all managed objects that are members of this collection. Stores, to view audit information for all stores within a site or farm, or right-click on a single store to view audit information for that store. Target devices, to view audit information for all target devices within a site, or right-click on a single target device to view audit information for that device. vDisks, to view audit information for all vDisks within a site or farm, or right-click on a single vDisk to view audit information for that vDisk.
1.
In the Console, right-click on a managed object, then select the Audit Trail... menu option. The Audit Trail dialog displays or a message appears indicating that no audit information is available for the selected object.
236
2.
Under Filter Results, select from the following filter options: User To narrow the resulting audit information that displays by user, select a user to filter on from the User drop-down menu. The default is All users. Domain To narrow the resulting audit information that displays by domains, select a domain to filter on from the Domain drop-down menu. The default is All domains. Start date To narrow the resulting audit information that displays by date, select a start date for which the audit information should display from the Start date drop-down menu. The default is one week prior to the current date. For example, if today is the 23rd, the start date would default to the 16th. End date To narrow the resulting audit information that displays by date, select an end date for which the audit information should display from the End date drop-down menu. The default is the current date. Action To narrow the resulting audit information that displays by the action, such as Set Disklocator, select the action from the Action drop-down menu. The default is to display all actions. Type To narrow the resulting audit information that displays by the type of action, such as Disklocator, select the type from the Type drop-down menu. The default is to display all types.
3.
Click Search. The resulting audit information displays in the audit table, which displays the following information:
Note Columns in the audit table can be sorted in ascending and descending order by clicking on the column heading.
Action list number
Chapter 17
Auditing
237
Based on the filter criteria selected, the order the actions took place. Date/Time Lists all audit actions that occurred within the Start date and End date filter criteria. Action Identifies the name of the Provisioning Services action taken. Type Identifies the type of action taken, which is based on the type of managed object for which the action was taken. Name Identifies the name of the object within that objects type, for which the action was taken. User Identifies the users name that performed the action. Domain Identifies the domain in which this user is a member. Path Identifies the parent(s) or the managed object. For example, a Device will have a Site and Collection as parents. 4. To view additional details for a particular action, highlight that actions row within the results table, then click one of the option buttons that follow:
Note If an option displays disabled, that option is not valid for the currently selected action.
Secondary... Click to view information on any secondary objects that this action affected. This opens the Secondary dialog, which includes the Type, Name, and Path information. This dialog allows you to drill down to view secondary object actions such as Parameters, Sub Actions, and Changes as described below. Parameters...
238
Click to view any other information used to process the action. This opens the Parameters dialog, which includes Name (parameter name) and Value (object name) information. Sub Actions... Click it to view additional actions that were performed to complete this action. This opens the Sub Actions dialog, which includes Action, Type, Name, and Path information. Changes... Click to view any new or changed values (such as Description) associated with the object (such as a target device). This opens the Changes dialog, which includes Name, Old, and New information.
1. 2.
In the Console tree, right-click on the Farm, then select Archive Audit Trail.... The Archive Audit Trail dialog appears. Browse for the location where audit trail information will be save (XML file). The Select File to Archive Audit Trail To dialog opens. Select the location, then type the name of the new file in the File name textbox. Open the calendar from the End date drop-down menu, then select the date that the audit trail information should be archived. The default is automatically set to the current date. Check the Remove information archived from the Audit Trail checkbox to remove all audit information. Once the information is removed, it can no longer be accessed directly from Provisioning Services. It will only exist in the XML file. Click OK.
3.
4.
5.
C HAPTER 18
Using the Provisioning Services components described in this chapter, it is possible to create Windows XP Embedded operating system images that can boot from a vDisk.
Note This feature is for Windows XP Embedded developers. This document assumes that you are familiar with the Microsoft Windows Embedded Studio tools including Target Designer and the Component Database Manager.
For more information on the Microsoft Windows Embedded tools, please refer to the documentation provided with the Microsoft Windows Embedded Studio. Embedded Target Device consists of the following components: ProvisioningservicesTargetDeviceSupport.sld The Server Level Definition (SLD) file defines the components that will be incorporated into the Windows XP Embedded database for use in the XP Embedded operating systems. ProvisioningservicesRepository contains all of the files used in the ProvisioningservicesTargetDeviceSupport.sld, including Provisioning Services drivers and installation utilities. These files are included in an XP Embedded build containing Provisioning Services components.
240
System Requirements
Windows XP Embedded with the latest service pack. In order to build Windows XP Embedded operating systems, Microsoft Windows Embedded Studio must first be installed. The target device must meet the Windows XP Embedded system requirements. It is recommended that a Windows XP Embedded operating system be built first on the desired embedded target device to ensure OS compatibility and to resolve any OS specific issues (such as driver requirements). Each embedded target device must also meet the target device requirements outlined in the Provisioning Services Installation Guide. A local drive must exist on a target system during the initial XP Embedded operating system build process. This is necessary to allow Microsofts First Boot Agent to run and finish your XP Embedded image setup. Once the image is complete and the XP Embedded disk image has been copied to the vDisk on the Provision Server or on shared network storage, the local disk can be removed (if desired). The maximum size of the vDisk is 2 terabytes.
1. 2.
Close all Windows and Embedded Studio tools that may be open (Target Designer and/or Component Designer). When the Provisioning Services Installation Wizard is run, components used to build Provisioning Services into an XP Embedded operating system are installed by default. Run the Component Database Manager from the Microsoft Start menu. Select Programs/Microsoft Windows Embedded Studio. Select the Database tab, and then click the Import button. On the Import SLD screen, point the SLD file field to the ProvisioningservicesTargetDeviceSupport.sld in the destination directory created by the Provisioning Services installation. Select the
3. 4. 5.
Chapter 18
241
desired root destination (typically there is only one choice), and then click the Import button to start the importing process. 6. Exit the Component Database Manager. The Embedded Target Device support components will now be available in Target Designer under the Software: System: Network & Communication component group. The Embedded Target Device support macro component causes all necessary Provisioning Services components to be included during dependency checking.
1. 2. 3. 4.
Select Start/Programs/Microsoft Windows Embedded Studio. Select the Package tab. Under Available Packages, select the Provisioning Services Embedded Target Device package, then click the Delete Package button. A Confirmation Delete Package dialog appears, displaying all Provisioning Services components. Check the Delete all Provisioning Services Database files option, and click Yes. Select the Group tab. Under Available Dependency Groups, select Provisioning Services Component Group, then click the Delete Dependency Group button. Go to Control Panel/Add/Remove Programs, select Provisioning Services, and click Change/Remove to uninstall the program.
5. 6. 7.
Note For more information on building an XP Embedded operating systems, refer to the Windows XP Embedded Platform documentation provided with the Windows Embedded Studio tools.
242
Provisioning Services installation occurs in two phases. Phase one occurs when the operating system is built with Target Designer. All necessary files and nondevice-specific components are installed in the target operating system.
Chapter 18
243
Phase two occurs the first time the Windows XP Embedded operating system boots. At this time, all device-specific installation steps are performed. This second phase cannot occur until after the First Boot Agent has completed and the full operating system is up and running.
Note If automatic installation was turned off to remove the dependence on the Explorer shell component, it will be necessary to manually run the second phase of the installation process.
Once the XP Embedded Image with Provisioning Services support is fully up and running, it can be imaged onto the embedded target devices vDisk, after which the embedded target device can be booted virtually.
Note Provisioning Services require that at least one of the target systems have a physical disk for the creation of the initial XP Embedded operating system. After the operating system is built and transferred to a vDisk, the target systems physical disk can be removed (if desired)
244
Chapter 18
245
1.
Transfer the built XP Embedded Image to the XP Embedded partition on the embedded target device.
Note The embedded target device must be configured to be bootable by XP Embedded. To do this, run the BootPrep utility provided by Microsoft. For more information on preparing target media to boot Windows XP Embedded, refer to Building a Run-Time Image in the Microsoft Windows XP Embedded Help.
2. 3. Change your embedded target devices BIOS setting to boot Network first, then boot the embedded target device. The XP Embedded Image will run through the Microsofts First Boot Agent (FBA), and complete the setup of the XP Embedded Operating system.
Note By including the "Network Command Shell" component, the embedded target device can be configured to use a static IP address from the command line (using netsh.exe). For more information on the Network Command Shell, refer to the following web page: http://www.microsoft.com/ technet/prodtechnol/winxppro/proddocs/netsh.asp
If the XP Embedded Image was created with Automatic installation turned off, or with a shell other than the Explorer Shell, Provisioning Services installation will have to be completed manually. This can be done by running bnSetup.bat located in the C:\Program Files\Citrix\Provisioning Services directory. If the command prompt component (CMD - Windows Command Processor) was not included in the build, you may have to run the commands in the batch file manually.
246
1. 2.
On the XP Embedded target device go to C:\Program Files\Citrix\Provisioning Services, then run BNImage.exe. In XenConvert, enter the Destination Path; this will be the root directory of your vDisk as it shows up on the embedded target device. The vDisk appears as a local hard drive on your embedded target device.
Note The operating system and all files on the Source Image partition are copied on a file-by-file basis. Active files (such as registry hives) are programmatically unloaded and recreated on the target system. The file system of the destination drive does not need to be formatted with the same file system as the source, so an NTFS target can be built from a Fat32 source Image.
3. 4. 5. 6. 7. The vDisk is now configured to boot Windows XP Embedded. From the Provisioning Server, start the Console. Right click on the embedded target device, then select Properties. Select the vDisk tab, and set your disk boot order to boot Virtual Disk First. Optionally, remove the local hard drive from the target device. Reboot the embedded target device. The embedded target device will now boot from the vDisk.
G LOSSARY
Glossary
AutoUpdate. A command-line utility that is used to create a delta file when incrementally updating a vDisk. Boot Device Manager (BDM). A utility used to create boot devices that have the bootstrap and IP information pre-installed; enabling a target device to boot securely over the network without the use of PXE or DHCP. Boot Services. A set of network boot services that can be used to get the boot information necessary when booting a target device from a vDisk. BOOTP. An IP/UDP bootstrap protocol (BOOTP), which allows a target device to discover its IP address and other IP configuration parameters. BOOTPTAB. BOOTP Service and the Provisioning Servicess PXE service management utility. Common Image Feature. A feature that allows a single vDisk image to work for target devices using network interface cards that vary. Device Administrator. Device Administrators manage device collections within a site. Device Collection. A logical grouping of devices. For example, a device collection could represent a physical location, a subnet range and a logical grouping of target devices. A target device can only belong to one device collection. Device Operator. Device Operators can view the properties of vDisks and target devices, boot or shut down target devices within a device collection. Disk Store (Store). A logical name given to a physical storage location for vDisks. The store is used by all Provisioning Servers within a farm to refer to a shared storage location. vDisk Pool. The collection of all vDisks available to a site. There is one vDisk pool per site. Domain. An Active Directory domain as defined by Microsoft. Dynamic Host Configuration Protocol (DHCP). A protocol used for assigning IP addresses and other IP parameters to devices on a network. EULA. End-User License Agreement. Farm Administrator. A farm administrator can view and manage all objects within a farm. Farm administrators can also create new sites and manage role memberships throughout the entire farm.
248
High Availability Feature (HA). A Provisioning Services environment in which at least one Provisioning Server is configured as a backup should the primary Provisioning Server fail for any reason. If the connection between a target device and a Provisioning Server is lost and HA is enabled, the connection will failover to the secondary Provisioning Server. XenConvert Utility. A utility that can copy the contents of a hard disk to a vDisk, or from a vDisk to a hard disk. IPSEC. Internet Protocol Security. Master Target Device. A target device that has Provisioning Services device software installed, and from which a hard disk image is built and stored on a vDisk. Provisioning Services then streams the contents of the vDisk created from the Master Target Device to other target devices on demand. MMC. The acronym for Microsoft Management Console. Optimization Utility. A command-line utility used to apply several settings to your hard drive or vDisk, that configures Windows to perform at optimal performance when running from a vDisk. Preboot Execution Environment (PXE) Service. An optional software service that can deliver the boot file name and location to target devices. Provisioning Services Console (Console). A management console utility used to manage configuration settings for target devices, Provisioning Servers, and vDisks. Provisioning Services database (database). Repository of configuration settings for Provisioning Servers, target devices, and vDisks. Provisioning Services Farm. A group of Provisioning Servers that share the same database. Role. A set of defined permissions that can be assigned to a farm, site, and collection.
Role Based Administration. The method of administration that limits the administers management permissions to those defined in the assigned role. Site. Store. A container that groups a vDisk Pool, Provisioning Servers and Device Collections. A site can represent a physical or logical location. A store is the logical name for the physical location of the vDisk folder that can exist on a local server or on shared storage.
Stream Service. The software service that transfers software between a target device, its vDisk, and write cache. Target Device. A device, such as a desktop computer or server, that boots and gets software from a vDisk on the network, by communicating with a Provisioning Server. Target Device Optimization Utility. A command-line utility used to apply several settings to your hard drive or vDisk that, when used, configures Windows to perform at optimal performance when running from a vDisk. User Datagram Protocol (UDP). The primary protocol used by Provisioning Servers.
Chapter 19
Glossary
249
User Groups . User groups provide Farm and Site Administrators with the ability to create and manage groups of users based on existing Active Directory or Windows groups. View. A logical grouping of target devices within a farm or site, for the purpose of simplify device administration. A view can represent target devices spread across multiple sites and device collections. A target device can belong to any number of views.
Virtual Disk (vDisk). A file that is accessible to a Provisioning Server and is used to emulate a hard drive for a target device. Write Cache Mode. The cache option selected to store a target devices disk writes when using a write-protected vDisk. The write cache can reside on the Provisioning Server, on shared storage, in the target devices RAM, or on the target devices local hard drive.
250