vSphere Essentials Plus Limitations and Caveats

A customer recently was asking what limitations VMware vSphere Essentials Plus had compared to traditional licensing. This was to be for a Disaster Recovery location. Obviously some of the licensing comparison matrices show what features are not included, but some of the other limitations are a little more subtle. This was my list of the things to consider:

  • Maximum of 3 Hosts
  • Maximum of 2 sockets per host
  • No DRS or storage vmotion, or any other features not explicitly listed in the datasheet.
  • vCenter Server Essentials/Foundation  does not support linked mode for single point of management
  • The big one for them – Site Recovery Manager (SRM) is supported!
  • Support is per number of incidents (1/3/5) per year rather than unlimited

Check out the product Matrix and vSphere Essentials datasheets for more info:

http://www.vmware.com/files/pdf/vsphere/VMware-vSphere-Essentials-Editions-Datasheet.pdf

http://www.vmware.com/ca/en/products/vsphere/compare

One option would be potentially leveraging the ROBO licensing instead of Essentials Plus for increased feature sets and more flexibility for future growth.

 

 

 

Certified!

This year has been a busy one, with the arrival of my second son. I also found time to complete the following certifications:

VMware Certified Advanced Professional – Datacenter Design (VCAP-DCD)

Citrix Certified Expert – Virtualization (CCE-V)

The common thread was that these exams both address aligning the technical solution with the needs of the business. This is critical to the success of any project. There can be no success without defining what success is first! All in all it’s been a great year.

Citrix AntiVirus Exceptions – Fantastic List

Found this great list of A/V exceptions from Citrix. Useful for a one stop shop reference.

http://blogs.citrix.com/2013/09/22/citrix-consolidated-list-of-antivirus-exclusions/

The following antivirus exclusions should be applied to all Citrix infrastructure servers:

Set real-time scanning to scan on write operations only and not on read/access

Set real-time scanning to scan local drives only and not network drives

Disable scan on boot

Remove any unnecessary antivirus related entries from the Run key

Exclude the pagefile(s) from being scanned

Exclude IIS log files from being scanned

Exclude Windows event logs from being scanned

Below are the recommended antivirus exclusions, by Citrix product:

Citrix Profile Manager Agent:
Do not scan on open or status-check operations

UserProfileManager.exe

EdgeSight Agent:
\Application Data\Citrix\System Monitoring\Data

\ProgramFiles\Citrix\System Monitoring\Agent\Core\rscorsvc.exe

\ProgramFiles\Citrix\System Monitoring\Agent\Core\Firebird\bin\fbserver.exe

Edgesight Server:

\CommonProgramFiles\\Citrix\System Monitoring\Server\RSSH

\ProgramFiles\Citrix\System Monitoring\Server\EdgeSight\scripts\rssh

\ProgramFiles\Citrix\System Monitoring\Server\EdgeSight\Pages

\ProgramFiles\Microsoft SQL Server\MSSQL\Reporting Services

\ProgramFiles\Microsoft SQL Server\MSSQL\Data

\SystemRoot\SYSTEM32\Logfiles

Provisioning Services Server:
Exclude scanning of Local vDisk Store

\Windows\System32\drivers\CvhdBusP6.sys

\Windows\System32\drivers\CfsDep2.sys

\Program Files\Citrix\Provisioning Services\BNTFTP.EXE

\ProgramData\Citrix\Provisioning Services\Tftpboot\ARDBP32.BIN

\Program Files\Citrix\Provisioning Services\StreamService.exe

\Program Files\Citrix\Provisioning Services\StreamProcess.exe

\Program Files\Citrix\Provisioning Services\soapserver.exe

Provisioning Services Target:

Exclude scanning of Write Cache

\Program Files\Citrix\Provisioning Services\BNDevice.exe

\Windows\System32\Drivers Directory\bnistack6.sys

\Program Files\Citrix\Provisioning Services\TargetOSOptimizer.exe

\Windows\System32\drivers\CfsDep2.sys

\Windows\System32\drivers\CVhdBusP6.sys

Provisioning Services Target – Personal vDisk:

CTXPVD.exe

CTXPVDSVC.exe

\Program Files\Citrix\Personal vDisk\BIN\WIN7\

XenApp Controller:
\Windows\system32\csrss.exe

\Windows\system32\winlogon.exe

\Windows\system32\userinit.exe

\Windows\system32\smss.exe

\Program Files\Citrix\Group Policy\Client-Side Extension\CitrixCseEngine.exe

\Program Files (x86)\Citrix\System32\wfshell.exe

\Program Files (x86)\Citrix\system32\ctxxmlss.exe

\Program Files (x86)\Citrix\System32\CtxSvcHost.exe

\Program Files (x86)\Citrix\system32\mfcom.exe

\Program Files (x86)\Citrix\System32\Citrix\Ima\ImaSvc.exe

\Program Files (x86)\Citrix\System32\Citrix\Ima\IMAAdvanceSrv.exe

\Program Files (x86)\Citrix\HealthMon\HCAService.exe

\Program Files (x86)\Citrix\Streaming Client\RadeSvc.exe

\Program Files (x86)\Citrix\Streaming Client\RadeHlprSvc.exe

\Program Files\Citrix\Independent Management Architecture\RadeOffline.mdb

\Program Files\Citrix\Independent Management Architecture\imalhc.mdb

Session Host:

\Windows\system32\spoolsv.exe

\Windows\system32\csrss.exe

\Windows\system32\winlogon.exe

\Windows\system32\userinit.exe

\Windows\system32\smss.exe

\Program Files\Citrix\Group Policy\Client-Side Extension\CitrixCseEngine.exe

\Program Files (x86)\Citrix\System32\wfshell.exe

\Program Files (x86)\Citrix\system32\CpSvc.exe

\Program Files (x86)\Citrix\System32\CtxSvcHost.exe

\Program Files (x86)\Citrix\system32\mfcom.exe

\Program Files (x86)\Citrix\System32\Citrix\Ima\ImaSvc.exe

\Program Files (x86)\Citrix\System32\Citrix\Ima\IMAAdvanceSrv.exe

\Program Files (x86)\Citrix\HealthMon\HCAService.exe

\Program Files (x86)\Citrix\Streaming Client\RadeSvc.exe

\Program Files (x86)\Citrix\Streaming Client\RadeHlprSvc.exe

\Program Files (x86)\Citrix\XTE\bin\XTE.exe

\Program Files\Citrix\Independent Management Architecture\RadeOffline.mdb

XenDesktop Controller:
\Windows\system32\csrss.exe

\Windows\system32\winlogon.exe

\Windows\system32\userinit.exe

\Windows\system32\smss.exe

\Program Files\Citrix\Group Policy\Client-Side Extension\CitrixCseEngine.exe

\Program Files (x86)\Citrix\System32\wfshell.exe

\Program Files (x86)\Citrix\system32\ctxxmlss.exe

\Program Files (x86)\Citrix\System32\CtxSvcHost.exe

\Program Files (x86)\Citrix\system32\mfcom.exe

For additional information on antivirus exclusions, please reference the following articles:

Citrix Profile Management – Profile Management 5.x – eDocs

EdgeSight – CTX111062, CTX114906

Provisioning Services – CTX124185

XenApp – CTX127030

Great article summarizing benefits of IP hash based load balancing in vSphere

Here’s a great article highlighting how IP hash based load balancing works as well as some of the limitations.

IP hash based load balancing can improve overall link utilization by dynamically calculating based on IP of the source and destination which NIC to use. Compared to standard port based load balancing which generally sees a VM tied to a single NIC for traffic this can really improve throughput and load distribution. Keep in mind that the physical switches need to be configured appropriately!

It also identifies some common limitations that need to be kept in mind:

ESX/ESXi supports IP hash teaming on a single physical switch only: This one can be a real deal-breaker for some. Because etherchannel bonding is usually only supported on a single switch, it may not be possible to distribute the uplinks across multiple physical switches for redundancy. There are some exceptions to this rule as some ‘stacked’ switches, or modular switches with a common backplane support etherchannel across physical switches or modules. Cisco’s VPC (virtual port channel) technology can also address this on supported switches. Consult with your hardware vendor for your options.

ESX/ESXi supports only 802.3ad link aggregation in ‘Static’ mode: This is also referred to as ‘Mode On’ in the Cisco world. This means that LACP (link aggregation control protocol) cannot be used. The only exception is with a vNetwork Distributed Switch in vSphere 5.1, and with the Cisco Nexus 1000V. If you are using vNetwork Standard Switches, you must use a static etherchannel.

Beacon Probing is not supported with IP hash: Only link status can be used as a failure detection method with an IP hash team. This may not be desirable in some situations.

IP Hash based load balancing

XenClient 2.1 Performance Testing – How it stacks up versus native installs

Currently I am evaluating XenClient for users in an organization. Part of this project involved providing XenClient systems running Windows 7 Enterprise x64 to very demanding users. We had some feedback that was mixed. In order to get quantitative results I put the XenClient through some performance metric testing.

The testing was done on the following system:

  • HP 8460P (Intel® Core™ i5-2520M (2.50 GHz, 3 MB L3 cache)
  • 4GB RAM
  • SATAII 250GB HD 7200RPM
  • AMD Radeon HD 6470M with 1 GB dedicated DDR3 video memory

**Note that this is the first model which includes VTd which is required to allow direct access to the Video Card to allow HDX 3d enabled VMs. While this sounds like it would not be required for all users – the fact that extending the display to multiple monitors requires this could be a huge show stopper! We got caught by this – so check carefully as the Citrix HCL does not indicate this clearly.

The benchmark I used was Performance Test 7.0 (1025) Win64 by PassMark software.

Conclusion:

When the second vCPU was enabled the performance dramatically improved to the following (Percent performance of XenClient VM with 2vcpus and 3d enabled compared to Native bare metal install).

  • CPU Mark – 75%
  • 2D Graphics – 124%
  • Memory Mark – 68%
  • Disk Mark – 107%
  • CD Mark – 94%
  • 3D Graphics Mark – 96%
  • Passmark Rating – 91%

I did not run extensive iterations of all tests but these results are a good indication of how well a XenClient VM can perform. The CPU and memory results indicate there is an overhead associted with virtualizing the workload, while its not huge, its not irrelevant either.

The fact that multiple CPUs are required to achieve near native performance combined with the warning from Citrix that it may cause instability for mutliple VMs should be noted for users requiring all of their hardwares raw performance.

Also there is an identified instability when allocating over 3GB of RAM to VM’s using HDX 3D access which forces users to leverage less memory resources than are potentially available to the VM.

Results:

Native Install (no XenClient – Win 7 Enterprise x64 Bare Metal install)

*note this system would have an edge as it would leverage all 4GB of RAM compared to the 3GB VMs

  • CPU Mark – 3961
  • 2D Graphics – 385
  • Memory Mark – 1261
  • Disk Mark – 676
  • CD Mark – 482
  • 3D Graphics Mark – 420
  • Passmark Rating – 1442
Native BareMetal Win7 install HP 8460p

Native BareMetal Win7 install HP 8460p

XenClient 2.1 Installed VM (Win7 Ent x64 – No 3D enabled, single vCPU, 3GB RAM)

  • CPU Mark – 1379
  • 2D Graphics – 563
  • Memory Mark – 873
  • Disk Mark – 712
  • CD Mark – 545
  • 3D Graphics Mark – N/A
  • Passmark Rating – 1005
XenClient HP 8460p No 3D enabled, Single vCPU

XenClient HP 8460p No 3D enabled, Single vCPU

XenClient 2.1 Installed VM (Win7 Ent x64 – 3D enabled, single vCPU, 3GB RAM)

  • CPU Mark – 1511
  • 2D Graphics – 524
  • Memory Mark – 789
  • Disk Mark – 692
  • CD Mark – 439
  • 3D Graphics Mark – 152
  • Passmark Rating – 849
XenClient HP 8460p 3D enabled, Single vCPU

XenClient HP 8460p 3D enabled, Single vCPU

XenClient 2.1 Installed VM (Win7 Ent x64 – 3D enabled, two vCPUs, 3GB RAM)

**Note at this time multiple vCPUs are not configurable in the GUI and must be done via command line. See the XenClient 2.1 release notes

XenClient_2_1_Release_Notes.pdf

I have detailed the better results of the two runs I did. Both results are listed below.

  • CPU Mark – 2951
  • 2D Graphics – 480
  • Memory Mark – 852
  • Disk Mark – 722
  • CD Mark – 453
  • 3D Graphics Mark – 402
  • Passmark Rating – 1311
XenClient HP 8460p 3D enabled, Two vCPUs (Second Run)

XenClient HP 8460p 3D enabled, Two vCPUs (Second Run)

 

XenClient HP 8460p 3D enabled, Two vCPUs (First Run)

XenClient HP 8460p 3D enabled, Two vCPUs (First Run)

Sizing storage and hosts for Citrix Xendesktop and VMWare View

I’m currently working on comparing the costs associated with doing 100 users in a shared desktop model. I was looking for resources around sizing storage and stumbled across these fantastic calculators by Andre Leibovici. He’s created one for both Xendesktop and VMWare view. Both leverage ESX as the hypervisor currently.

Here are the links:

VMWare View VDI Sizing Calculator

Citrix XenDesktop Sizing Calculator

Calculator Instructions and Parameters

 

Simplicity through Complexity

The rate of change in the technology field is relentless. Constantly there are new solutions and products changing the status quo. This is especially true in the area of virtualization. We now have:

  • virtual servers
  • virtual desktops
  • virtual applications
  • virtual appliances
  • virtual fabrics
  • virtual switches
  • and so on, and so on…

So where does this get us, apart from learning a bunch of new solutions that all seem more complicated than the way things were one before. The answer is simplicity, these technical solutions are all leading to one thing: abstraction. What this means is that they are removing dependencies in the stack from one another. Less dependencies, less complexity, more agility and freedom.

They’ve talked about this model in many capacities in different areas of virtualization; a common one is the layers of cake, or simply the layers model in VDI. Where the OS is decoupled from the applications and user profile. All the components come together to achieve the end result of a functional user workspace, yet none of the components are dependent on the others.

This facilitates simplified rollouts, migrations and upgrades. Admins no longer need to be concerned of adverse interactions with the upgrade of any one particular component, instead each component can be dealt with independently. This vastly simplifies change management and regression testing. It also enhances portability, users can bring their profile or applications to any OS with minimal headaches.

I have been doing research into Microsoft SCVMM 2012 and that was when I saw this model being taken and applied to server virtualization. Let me tell you- it was impressive. Microsoft has a product called Server App-V which like its MDOP counterpart, which virtualizes desktop applications, it allows for the virtualization of server workloads. Things like IIS, SQL Reporting Services or XenApp for example can be virtualized.

 

server app-v application compatibility

Application Compatibility

The ability to virtualize server workloads really starts to shine when you look at the rest of the capability of SCVMM 2012. SCVMM is moving towards the goal of providing resources regardless of location or hosting platform. Resources are no longer merely virtual machines, storage and networking but are tied together as services including the application layer. These services can be templated and basically act as a “recipe” for fully functional services such as a online purchasing system or XenApp host. This facilitates simplified user self service for deployment of services on demand. The fact that all the components of the “recipe” are virtualized and abstracted means extreme portability (think moving to the cloud!). Components can be upgraded independently and without concern of the other components. Think of how much this will simplify deployment.

Server App-V can take an application that has a 200 page installation guide and contain it so that every deployment is identical after the first succesful one. It can be ported from development to production and back again without ever changing. Any application changes and config is captured as “state”. Server App-V can monitor and port this state data so it can be migrated simply as well. Server App-V is a feature of SCVMM 2012. This means that all this can be automated in SCVMM’s console. It lets you visually define the components of a service and save it as a service template.

It is really exciting to think that one day incompatability type issues will no longer be a major headache. Everything will just work, as it is no longer some huge infrastructure stack with hooks running between all the layers, but rather a series of clean, known good, abstracted layers. Layers that can be moved between the datacenter and the cloud. The vision is starting to shine, and the clouds are starting to clear ;)

Server App-V Summary
http://blogs.technet.com/b/serverappv/archive/2011/04/07/so-what-is-server-app-v-anyway.aspx

How to video : Sequencing an application with Server App-V

http://blogs.technet.com/b/adhall/archive/2011/11/01/video-sequencing-an-application-using-server-app-v.aspx

Video: Server App-V TechEd Presentation

http://channel9.msdn.com/Events/TechEd/NorthAmerica/2011/VIR314

 

Citrix moving away from Web Interface to Cloud Gateway

Citrix will be renaming its Web Interface to Storefront and altering its functionality soon. This comes as Citrix is changing to a different reciever infrastructure based on the Cloud Gateway and Storefront. It will eventually allow users to maintain their application lists across devices typical with the trend in cloud hosted settings. Thomas Koetzing lists some of the details around the functionality differences in this article:

http://www.thomaskoetzing.de/index.php?option=com_content&task=view&id=346&Itemid=254

While I agree with the direction this is going – it sounds like there is a bit of work to be done before this is ready for the enterprise.