SlideShare a Scribd company logo
1 of 43
Citrix Support Secrets
Webinar Series
Implementing and Troubleshooting EdgeSight


Vincent Papoz, Snr Escalation Engineer, Citrix Support

March 21, 2013
Agenda

      • Architecture overview

      • Use case: Troubleshooting slow logon

      • Troubleshooting and resolving Edgesight Performance issues

      • Custom Reporting (SQL objects and where to find data)

      • Question




    © 2012 Citrix | Confidential – Do Not Distribute
2        © 2012 Citrix | Confidential – Do Not Distribute
Architecture Overview




© 2012 Citrix | Confidential – Do Not Distribute
Architecture
                                                            Edgesight
                                        XenApp
                                                            Server
                                        servers
                                        with
                                                                        SQL
                                        Edgesight
                                                                        Server
                                        Agent Endpoi
                                                      nts               Edgesig
                                                                        ht and
                                                                        Report
                                                                        Server
                                                                        Databas
                                                                        es
                                                                        RS
                                                                        Server
© 2012 Citrix | Confidential – Do Not Distribute                                  4
   © 2012 Citrix | Confidential – Do Not Distribute
What does the agent monitor?
     • Event-driven data
          •   Process starts/stops, errors and faults
          •   User logon
          •   WinSock connection and HTTP transactions
          •   Windows Event Log
          •   System reboot

     • Polled data
          • System and Process performance metrics

     • ICA session data
          • Session connects/disconnects
          • Detailed logon and session metrics, virtual channel statistics

     • Scheduled data
            • Drive space calculation
            • | Confidential – Do Not Distribute
    © 2012 Citrix Asset history
5      © 2012 Citrix | Confidential – Do Not Distribute
End User Experience Monitoring

      • Metrics
          ᵒClient Start-up
          ᵒServer Start-up


      • Service running on
          XenApp Servers




    © 2012 Citrix | Confidential – Do Not Distribute
6        © 2012 Citrix | Confidential – Do Not Distribute
Use case: Troubleshooting
                                     slow logon




© 2012 Citrix | Confidential – Do Not Distribute
Edgesight Console




    © 2012 Citrix | Confidential – Do Not Distribute
8      © 2012 Citrix | Confidential – Do Not Distribute
User Sessions




    © 2012 Citrix | Confidential – Do Not Distribute
9      © 2012 Citrix | Confidential – Do Not Distribute
System Summary




     © 2012 Citrix | Confidential – Do Not Distribute
10      © 2012 Citrix | Confidential – Do Not Distribute
Process Detail




     © 2012 Citrix | Confidential – Do Not Distribute
11      © 2012 Citrix | Confidential – Do Not Distribute
Session Start Detail




     © 2012 Citrix | Confidential – Do Not Distribute
12      © 2012 Citrix | Confidential – Do Not Distribute
Troubleshooting and resolving
                                     Edgesight Performance issues




© 2012 Citrix | Confidential – Do Not Distribute
Symptoms

       • Report Rendering takes a long time

       • Payloads queuing up in webload directory and imported very slowly

       • Servers not updating Database

       • Nightly maintenance takes a very long time - and possibly eventually fails

       • Grooming error messages are showing up in the console

       • Database data files very large


     © 2012 Citrix | Confidential – Do Not Distribute
14        © 2012 Citrix | Confidential – Do Not Distribute
Cause

       • Usually a problem with the SQL database

       • SQL server out of disk space or too much data to process

       • Data processing cannot complete because the Tlog cannot grow

       • Data processing is resource intensive and is delayed




     © 2012 Citrix | Confidential – Do Not Distribute
15        © 2012 Citrix | Confidential – Do Not Distribute
Action plan

       • Assess your reporting requirements

       • Analyze the content of the database

       • Remove the unwanted data

       • Reclaim disk space

       • Adjust the collection/grooming configuration




     © 2012 Citrix | Confidential – Do Not Distribute
16        © 2012 Citrix | Confidential – Do Not Distribute
Analyzing the content of the database
      Size of Edgesight Database data files


     SELECT Name AS Logical_Name,                                          Logical_Name               Physical_Name   SizeMB

     Physical_Name, (size*8)/1024 SizeMB                   Edgesight                      E:DBEdgesight.mdf                  2500


     FROM sys.master_files                                 Edgesight_log                  E:DBEdgesight_log.LDF          45052

                                                           Edgesight_FG1_Data             E:DBEdgesight_FG1.ndf          12820
     WHERE DB_NAME(database_id) =                          Edgesight_FG2_Data             E:DBEdgesight_FG2.ndf          25350
     'EdgesightDBname‘                                     Edgesight_FG3_Data             E:DBEdgesight_FG3.ndf              7322

     GO                                                    Edgesight_FG4_Data             E:DBEdgesight_FG4.ndf          46623

                                                           Edgesight_FG5_Data             E:DBEdgesight_FG5.ndf              8250

                                                           Edgesight_FG6_Data             E:DBEdgesight_FG6.ndf          245020

                                                           Edgesight_FG7_Data             E:DBEdgesight_FG7.ndf          12500




     © 2012 Citrix | Confidential – Do Not Distribute
17      © 2012 Citrix | Confidential – Do Not Distribute
Analyzing the content of the database

        SELECT DISTINCT object_name(i.id) as
        TableName,
                                                        f.name as Filegroup
                                                        FROM sys.sysindexes i,
                                                        sys.filegroups f
        WHERE objectproperty(i.id,'IsUserTable') = 1
        AND f.data_space_id = i.groupid
        ORDER BY f.name

18
        GO Citrix | Confidential – Do Not Distribute
     © 2012 Citrix | Confidential – Do Not Distribute
        © 2012
Analyzing the content of the database

        SELECT
            sysobjects.Name,
            sysindexes.Rows                                      Name    Rows
        FROM                                            core_net_trans          260585114
                                                        core_net_stat            15265822
            sysobjects
            INNER JOIN sysindexes
            ON sysobjects.id = sysindexes.id
        WHERE
            sysindexes.IndId < 2
            AND sysobjects.Name IN('CORE_NET_STAT',
     © 2012 Citrix | Confidential – Do Not Distribute
19      'CORE_NET_TRANS')Do Not Distribute
         © 2012 Citrix | Confidential –
Analyzing the content of the database
      Grooming Schedule



       SELECT f.table_name, m.default_days,
       m.groom_days

       FROM maint_table_config m

       JOIN table_def f on f.tableid=m.tableid

       WHERE table_name in ('CORE_NET_STAT',
       'CORE_NET_TRANS')


     © 2012 Citrix | Confidential – Do Not Distribute
20      © 2012 Citrix | Confidential – Do Not Distribute
Analyzing the content of the database
       Grooming failing?



       SELECT COUNT(*) FROM CORE_NET_TRANS

       WHERE dtperiod < GETUTCDATE() - 11




     © 2012 Citrix | Confidential – Do Not Distribute
21      © 2012 Citrix | Confidential – Do Not Distribute
Removing Data Manually
      Grooming failing – Delete data in increments
       declare @row int;
       declare @date datetime;
       set @date = GETUTCDATE() - 10

       set @row = (select COUNT(*) from core_net_trans where dtperiod < @date);

       while @row <> 0
                                                                                  DBCC SHRINKFILE
       begin
                                                                                  (N'Edgesight_FG6_Data'
       delete top(100000) from core_net_trans where dtperiod < @date
                                                                                  , 0, TRUNCATEONLY)
       set @row = (select COUNT(*) from core_net_trans where dtperiod < @date);   GO
       end;

       Go




     © 2012 Citrix | Confidential – Do Not Distribute
22      © 2012 Citrix | Confidential – Do Not Distribute
Removing Data manually
      Grooming is not failing - Analyze the content of the table
                                                           Imid             filename     cnt
       SELECT c.imid, i.[filename], count(c.imid) as cnt    507   SomeApp.exe          220659855
                                                            380   ntpd.exe               1252884
       from core_net_trans c                                460   iexplore.exe           1244863
                                                            377   ctxxmlss.exe            989565
        JOIN [image] i ON i.imid=c.imid                     202   cscript.exe             977522
                                                            201   Requestticket.exe       645777
        GROUP BY c.imid, i.[filename]                       402   Svchost.exe             412354
                                                            220   Svchost.exe             322526
        ORDER BY cnt DESC                                   506   Mcscript_inuse.exe      145235
                                                            414   Jusched.exe              22589
                                                            519   Javaw.exe                22459


 => Delete the process instance records from the table

     © 2012 Citrix | Confidential – Do Not Distribute
23      © 2012 Citrix | Confidential – Do Not Distribute
Reclaiming disk space

       • Using SQL Studio (SSMS)




       • Using the following query


                             DBCC SHRINKFILE (N'Edgesight_FG6_Data'
                             , 0, TRUNCATEONLY)
                             GO

     © 2012 Citrix | Confidential – Do Not Distribute
24        © 2012 Citrix | Confidential – Do Not Distribute
Adjust collection configuration

       • Adjust the grooming schedule




       • Review the upload configuration




       • Ignore processes if applicable

     © 2012 Citrix | Confidential – Do Not Distribute
25        © 2012 Citrix | Confidential – Do Not Distribute
Ignoring a process (Excluding a process)


       • Agent Properties Advanced configuration
           ᵒDisable interception (rsintcor.dll and esint.dll)



       • Registry setting
           ᵒDisable Injection (csma_ldr.dll)




     © 2012 Citrix | Confidential – Do Not Distribute
26        © 2012 Citrix | Confidential – Do Not Distribute
Ignoring a process (registry configuration)

       • Disable injection of csma_ldr.dll

       • Per device registry setting

       • Requires a reboot of the monitored device




     © 2012 Citrix | Confidential – Do Not Distribute
27        © 2012 Citrix | Confidential – Do Not Distribute
Ignoring a process
                                                        Imid             filename     cnt
                                                         507   SomeApp.exe          220659855
                                                         380   ntpd.exe               1252884
                                                         460   iexplore.exe           1244863
                                                         377   ctxxmlss.exe            989565
                                                         202   cscript.exe             977522
                                                         201   Requestticket.exe       645777
                                                         402   Svchost.exe             412354
                                                         220   Svchost.exe             322526
                                                         506   Mcscript_inuse.exe      145235
                                                         414   Jusched.exe              22589
                                                         519   Javaw.exe                22459
     © 2012 Citrix | Confidential – Do Not Distribute
28        © 2012 Citrix | Confidential – Do Not Distribute
Ignoring a process – Finding affected servers
                                                                name           cnt
        SELECT m.name, COUNT(m.name) AS cnt FROM
                                                             XAServer112   196231548
        core_net_trans c                                     XAServer115    18230540
                                                             XAServer233     12887
        INNER JOIN instance i ON i.instid=c.instid
                                                             XAServer225      1997
        INNER JOIN machine m ON m.machid=i.machid            XAServer227      1520
        INNER JOIN [image] im ON im.imid=c.imid              XAServer320      1519
                                                             XAServer196      1512
        WHERE im.[filename] = ‘SomeApp.exe‘                  XAServer302      1496
        GROUP BY m.name                                      XAServer112        12
                                                             XAServer112        9
        ORDER BY cnt DESC
     © 2012 Citrix | Confidential – Do Not Distribute
29        © 2012 Citrix | Confidential – Do Not Distribute
Ignoring a process – Verifying process
      exclusion
      Sysinternals Process Explorer




     © 2012 Citrix | Confidential – Do Not Distribute
30      © 2012 Citrix | Confidential – Do Not Distribute
Process Explorer




     © 2012 Citrix | Confidential – Do Not Distribute
31      © 2012 Citrix | Confidential – Do Not Distribute
Design consideration – SQL server

       • Split the data files on different hard drives
           http://msdn.microsoft.com/en-us/library/ms187087(v=sql.105).aspx

       • Set the recovery model to simple for the Edgesight database
           http://msdn.microsoft.com/en-us/library/ms189275(v=sql.105).aspx

       • Implement Data warehousing




     © 2012 Citrix | Confidential – Do Not Distribute
32        © 2012 Citrix | Confidential – Do Not Distribute
A word on Custom Reporting




© 2012 Citrix | Confidential – Do Not Distribute
Custom Reports
                                                            XenApp
                                                            servers
                                                            with
                                                            Edgesigh
                                                            t Agent
                                                        Endpoi
                                                        nts




     © 2012 Citrix | Confidential – Do Not Distribute
34        © 2012 Citrix | Confidential – Do Not Distribute
Where to find data
       Tables                                              Views
      • 283 user defined tables                            • 96 SQL views
         ᵒSchema is not documented                          ᵒFully documented
         ᵒDesign is complex                                 ᵒUsed by the built in reports
                                                            ᵒRecommended when creating custom
                                                             reports




     © 2012 Citrix | Confidential – Do Not Distribute
35      © 2012 Citrix | Confidential – Do Not Distribute
What you need to know…

       • Limited to historical reports

       • Built in report files located under <Program Files (x86)CitrixSystem
           MonitoringServerEdgeSightPagesappextreporting9>

       • Uses Reporting services RDL format (XML)

       • Queries are written in T-SQL

       • Localization built in Edgesight


     © 2012 Citrix | Confidential – Do Not Distribute
36        © 2012 Citrix | Confidential – Do Not Distribute
Tools

       • An XML editor

       • Report Builder

       • Report Designer (Business Intelligence Development Studio)

       • SQL Studio (SSMS)




     © 2012 Citrix | Confidential – Do Not Distribute
37        © 2012 Citrix | Confidential – Do Not Distribute
Custom Reporting Resources
       • Custom Report Blog
           http://blogs.citrix.com/2009/12/09/edgesight-custom-reporting/

       • Anatomy of an Edgesight Report - http://support.citrix.com/article/CTX116452

       • Custom reports: http://community.citrix.com/display/edgesight/Custom+Reports

       • Report Definition Language
           http://msdn.microsoft.com/en-us/library/ms155062.aspx

       • Microsoft Report Builder
           http://www.microsoft.com/sqlserver/en/us/solutions-technologies/business-
           intelligence/SQL-Server-2012-reporting-services.aspx
     © 2012 Citrix | Confidential – Do Not Distribute
38        © 2012 Citrix | Confidential – Do Not Distribute
About                                                                  Educate | Guide | Support | Succeed

Citrix Services
Citrix Services make sure                            How we can help
you succeed with your
virtualization programs.                             Citrix Education – The fastest, most efficient way to
                                                     get your team the virtualization skills they need. Online,
                                                     on-site or in class.
                                                     citrix.com/training

                                                     Citrix Consulting – Intensive engagements for
                                                     complex, critical or just plain massive projects.
                                                     citrix.com/consulting

                                                     Citrix Support – Always-on support services that
                                                     leverage everything we know about best-practice
                                                     deployment and maintenance.
                                                     citrix.com/support
  © 2012 Citrix | Confidential – Do Not Distribute
The Nine Principles of Self-Support




                                                    Get it now!




 © 2012 Citrix | Confidential – Do Not Distribute
Secrets of the Citrix Support Ninjas


• 40 insider troubleshooting tips
• Covering XenDesktop, XenServer, XenApp and NetScaler
• Citrix Support top engineers
• FREE eBook
• Citrix Auto Support
• Now available!
  © 2012 Citrix | Confidential – Do Not Distribute
Premier Support Calculator

                                                    Check it out




 © 2012 Citrix | Confidential – Do Not Distribute
Work better. Live better.

More Related Content

What's hot

London + Dublin Cassandra 2.0
London + Dublin Cassandra 2.0London + Dublin Cassandra 2.0
London + Dublin Cassandra 2.0jbellis
 
Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (2. část)
Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (2. část)Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (2. část)
Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (2. část)MarketingArrowECS_CZ
 
Oracle Cloud PaaS & IaaS:2019年12月度サービス情報アップデート
Oracle Cloud PaaS & IaaS:2019年12月度サービス情報アップデートOracle Cloud PaaS & IaaS:2019年12月度サービス情報アップデート
Oracle Cloud PaaS & IaaS:2019年12月度サービス情報アップデートオラクルエンジニア通信
 
CirrusDB Offerings
CirrusDB OfferingsCirrusDB Offerings
CirrusDB OfferingsAshok Sami
 
CWIN 17 / sessions data vault modeling - f2-f - nishat gupta
CWIN 17 / sessions data vault modeling -  f2-f - nishat guptaCWIN 17 / sessions data vault modeling -  f2-f - nishat gupta
CWIN 17 / sessions data vault modeling - f2-f - nishat guptaCapgemini
 
From Nice to Have to Mission Critical: MySQL Enterprise Edition
From Nice to Have to Mission Critical: MySQL Enterprise EditionFrom Nice to Have to Mission Critical: MySQL Enterprise Edition
From Nice to Have to Mission Critical: MySQL Enterprise Edition郁萍 王
 
Oak Table Collaborate Snapclone Talk
Oak Table Collaborate Snapclone TalkOak Table Collaborate Snapclone Talk
Oak Table Collaborate Snapclone TalkKellyn Pot'Vin-Gorman
 
Oetker Daten und Informationsverarbeitung s
Oetker Daten und Informationsverarbeitung sOetker Daten und Informationsverarbeitung s
Oetker Daten und Informationsverarbeitung sCisco Case Studies
 
IOUG Collaborate 2014 DBaaS in a DBAs World
IOUG Collaborate 2014 DBaaS in a DBAs WorldIOUG Collaborate 2014 DBaaS in a DBAs World
IOUG Collaborate 2014 DBaaS in a DBAs WorldKellyn Pot'Vin-Gorman
 
MySQL Cluster 8.0 tutorial
MySQL Cluster 8.0 tutorialMySQL Cluster 8.0 tutorial
MySQL Cluster 8.0 tutorialFrazer Clement
 
Nationwide_Ensures_Basel_II_Compliance
Nationwide_Ensures_Basel_II_ComplianceNationwide_Ensures_Basel_II_Compliance
Nationwide_Ensures_Basel_II_ComplianceAndrew Painter
 
David mootrey july 2018 resume
David mootrey july 2018 resumeDavid mootrey july 2018 resume
David mootrey july 2018 resumeDavid Mootrey
 
Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)webhostingguy
 
SNIA white paper-sw defined storage
SNIA white paper-sw defined storageSNIA white paper-sw defined storage
SNIA white paper-sw defined storagelingathoti
 
Oracle Cloud PaaS & IaaS:2020年2月度サービス情報アップデート
Oracle Cloud PaaS & IaaS:2020年2月度サービス情報アップデートOracle Cloud PaaS & IaaS:2020年2月度サービス情報アップデート
Oracle Cloud PaaS & IaaS:2020年2月度サービス情報アップデートオラクルエンジニア通信
 
MySQL enterprise backup overview
MySQL enterprise backup overviewMySQL enterprise backup overview
MySQL enterprise backup overview郁萍 王
 
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]オラクルエンジニア通信
 
MySQL 5.7 GIS-Norvald H. Ryeng
MySQL 5.7 GIS-Norvald H. RyengMySQL 5.7 GIS-Norvald H. Ryeng
MySQL 5.7 GIS-Norvald H. Ryeng郁萍 王
 
KoprowskiT_SQLRelay2014#9_London_FromPlanToBackupToCloud
KoprowskiT_SQLRelay2014#9_London_FromPlanToBackupToCloudKoprowskiT_SQLRelay2014#9_London_FromPlanToBackupToCloud
KoprowskiT_SQLRelay2014#9_London_FromPlanToBackupToCloudTobias Koprowski
 
The top five questions to ask about NoSQL. JONATHAN ELLIS at Big Data Spain 2012
The top five questions to ask about NoSQL. JONATHAN ELLIS at Big Data Spain 2012The top five questions to ask about NoSQL. JONATHAN ELLIS at Big Data Spain 2012
The top five questions to ask about NoSQL. JONATHAN ELLIS at Big Data Spain 2012Big Data Spain
 

What's hot (20)

London + Dublin Cassandra 2.0
London + Dublin Cassandra 2.0London + Dublin Cassandra 2.0
London + Dublin Cassandra 2.0
 
Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (2. část)
Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (2. část)Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (2. část)
Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (2. část)
 
Oracle Cloud PaaS & IaaS:2019年12月度サービス情報アップデート
Oracle Cloud PaaS & IaaS:2019年12月度サービス情報アップデートOracle Cloud PaaS & IaaS:2019年12月度サービス情報アップデート
Oracle Cloud PaaS & IaaS:2019年12月度サービス情報アップデート
 
CirrusDB Offerings
CirrusDB OfferingsCirrusDB Offerings
CirrusDB Offerings
 
CWIN 17 / sessions data vault modeling - f2-f - nishat gupta
CWIN 17 / sessions data vault modeling -  f2-f - nishat guptaCWIN 17 / sessions data vault modeling -  f2-f - nishat gupta
CWIN 17 / sessions data vault modeling - f2-f - nishat gupta
 
From Nice to Have to Mission Critical: MySQL Enterprise Edition
From Nice to Have to Mission Critical: MySQL Enterprise EditionFrom Nice to Have to Mission Critical: MySQL Enterprise Edition
From Nice to Have to Mission Critical: MySQL Enterprise Edition
 
Oak Table Collaborate Snapclone Talk
Oak Table Collaborate Snapclone TalkOak Table Collaborate Snapclone Talk
Oak Table Collaborate Snapclone Talk
 
Oetker Daten und Informationsverarbeitung s
Oetker Daten und Informationsverarbeitung sOetker Daten und Informationsverarbeitung s
Oetker Daten und Informationsverarbeitung s
 
IOUG Collaborate 2014 DBaaS in a DBAs World
IOUG Collaborate 2014 DBaaS in a DBAs WorldIOUG Collaborate 2014 DBaaS in a DBAs World
IOUG Collaborate 2014 DBaaS in a DBAs World
 
MySQL Cluster 8.0 tutorial
MySQL Cluster 8.0 tutorialMySQL Cluster 8.0 tutorial
MySQL Cluster 8.0 tutorial
 
Nationwide_Ensures_Basel_II_Compliance
Nationwide_Ensures_Basel_II_ComplianceNationwide_Ensures_Basel_II_Compliance
Nationwide_Ensures_Basel_II_Compliance
 
David mootrey july 2018 resume
David mootrey july 2018 resumeDavid mootrey july 2018 resume
David mootrey july 2018 resume
 
Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)
 
SNIA white paper-sw defined storage
SNIA white paper-sw defined storageSNIA white paper-sw defined storage
SNIA white paper-sw defined storage
 
Oracle Cloud PaaS & IaaS:2020年2月度サービス情報アップデート
Oracle Cloud PaaS & IaaS:2020年2月度サービス情報アップデートOracle Cloud PaaS & IaaS:2020年2月度サービス情報アップデート
Oracle Cloud PaaS & IaaS:2020年2月度サービス情報アップデート
 
MySQL enterprise backup overview
MySQL enterprise backup overviewMySQL enterprise backup overview
MySQL enterprise backup overview
 
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]
 
MySQL 5.7 GIS-Norvald H. Ryeng
MySQL 5.7 GIS-Norvald H. RyengMySQL 5.7 GIS-Norvald H. Ryeng
MySQL 5.7 GIS-Norvald H. Ryeng
 
KoprowskiT_SQLRelay2014#9_London_FromPlanToBackupToCloud
KoprowskiT_SQLRelay2014#9_London_FromPlanToBackupToCloudKoprowskiT_SQLRelay2014#9_London_FromPlanToBackupToCloud
KoprowskiT_SQLRelay2014#9_London_FromPlanToBackupToCloud
 
The top five questions to ask about NoSQL. JONATHAN ELLIS at Big Data Spain 2012
The top five questions to ask about NoSQL. JONATHAN ELLIS at Big Data Spain 2012The top five questions to ask about NoSQL. JONATHAN ELLIS at Big Data Spain 2012
The top five questions to ask about NoSQL. JONATHAN ELLIS at Big Data Spain 2012
 

Similar to Implementing and Troubleshooting EdgeSight

Configuring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop SitesConfiguring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop SitesDavid McGeough
 
Implementing and Troubleshooting PVS
Implementing and Troubleshooting PVSImplementing and Troubleshooting PVS
Implementing and Troubleshooting PVSDavid McGeough
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Skytap Cloud
 
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...David McGeough
 
CloudExpo NYC - Citrix Cloud Platforms Best Practices for Architecting Your C...
CloudExpo NYC - Citrix Cloud Platforms Best Practices for Architecting Your C...CloudExpo NYC - Citrix Cloud Platforms Best Practices for Architecting Your C...
CloudExpo NYC - Citrix Cloud Platforms Best Practices for Architecting Your C...mormullins
 
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesUsing NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesDavid McGeough
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Apache Ignite - Distributed SQL Database Capabilities
Apache Ignite - Distributed SQL Database CapabilitiesApache Ignite - Distributed SQL Database Capabilities
Apache Ignite - Distributed SQL Database CapabilitiesDenis Magda
 
Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...
Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...
Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...Denodo
 
OpenStack Summit Portland April 2013 talk - Quantum and EC2
OpenStack Summit Portland April 2013 talk - Quantum and EC2OpenStack Summit Portland April 2013 talk - Quantum and EC2
OpenStack Summit Portland April 2013 talk - Quantum and EC2Naveen Joy
 
Demystifying Data Warehousing as a Service - DFW
Demystifying Data Warehousing as a Service - DFWDemystifying Data Warehousing as a Service - DFW
Demystifying Data Warehousing as a Service - DFWKent Graziano
 
Apache Ignite: In-Memory Hammer for Your Data Science Toolkit
Apache Ignite: In-Memory Hammer for Your Data Science ToolkitApache Ignite: In-Memory Hammer for Your Data Science Toolkit
Apache Ignite: In-Memory Hammer for Your Data Science ToolkitDenis Magda
 
Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)Denodo
 
Common Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First TimeCommon Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First TimeDavid McGeough
 
10 Tips Every XenDesktop Admin Should Know
10 Tips Every XenDesktop Admin Should Know10 Tips Every XenDesktop Admin Should Know
10 Tips Every XenDesktop Admin Should KnowDavid McGeough
 
Transitioning a Full Enterprise to Cloud in 10 Months - Cloud Expo
Transitioning a Full Enterprise to Cloud in 10 Months - Cloud ExpoTransitioning a Full Enterprise to Cloud in 10 Months - Cloud Expo
Transitioning a Full Enterprise to Cloud in 10 Months - Cloud Exposjdeluca
 

Similar to Implementing and Troubleshooting EdgeSight (20)

Configuring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop SitesConfiguring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop Sites
 
Implementing and Troubleshooting PVS
Implementing and Troubleshooting PVSImplementing and Troubleshooting PVS
Implementing and Troubleshooting PVS
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...
 
CloudExpo NYC - Citrix Cloud Platforms Best Practices for Architecting Your C...
CloudExpo NYC - Citrix Cloud Platforms Best Practices for Architecting Your C...CloudExpo NYC - Citrix Cloud Platforms Best Practices for Architecting Your C...
CloudExpo NYC - Citrix Cloud Platforms Best Practices for Architecting Your C...
 
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesUsing NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Santhosh sybase dba
Santhosh sybase dbaSanthosh sybase dba
Santhosh sybase dba
 
Apache Ignite - Distributed SQL Database Capabilities
Apache Ignite - Distributed SQL Database CapabilitiesApache Ignite - Distributed SQL Database Capabilities
Apache Ignite - Distributed SQL Database Capabilities
 
Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...
Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...
Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...
 
Mohammed qurramresumeapril2017
Mohammed qurramresumeapril2017Mohammed qurramresumeapril2017
Mohammed qurramresumeapril2017
 
Mohammed qurram resume april 2017
Mohammed qurram resume april 2017Mohammed qurram resume april 2017
Mohammed qurram resume april 2017
 
Vue d'ensemble Dremio
Vue d'ensemble DremioVue d'ensemble Dremio
Vue d'ensemble Dremio
 
OpenStack Summit Portland April 2013 talk - Quantum and EC2
OpenStack Summit Portland April 2013 talk - Quantum and EC2OpenStack Summit Portland April 2013 talk - Quantum and EC2
OpenStack Summit Portland April 2013 talk - Quantum and EC2
 
Demystifying Data Warehousing as a Service - DFW
Demystifying Data Warehousing as a Service - DFWDemystifying Data Warehousing as a Service - DFW
Demystifying Data Warehousing as a Service - DFW
 
Apache Ignite: In-Memory Hammer for Your Data Science Toolkit
Apache Ignite: In-Memory Hammer for Your Data Science ToolkitApache Ignite: In-Memory Hammer for Your Data Science Toolkit
Apache Ignite: In-Memory Hammer for Your Data Science Toolkit
 
Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)
 
Common Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First TimeCommon Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First Time
 
10 Tips Every XenDesktop Admin Should Know
10 Tips Every XenDesktop Admin Should Know10 Tips Every XenDesktop Admin Should Know
10 Tips Every XenDesktop Admin Should Know
 
Transitioning a Full Enterprise to Cloud in 10 Months - Cloud Expo
Transitioning a Full Enterprise to Cloud in 10 Months - Cloud ExpoTransitioning a Full Enterprise to Cloud in 10 Months - Cloud Expo
Transitioning a Full Enterprise to Cloud in 10 Months - Cloud Expo
 

More from David McGeough

Citrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktopCitrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktopDavid McGeough
 
Manage and Diagnose your Environment using Citrix Insight Services
Manage and Diagnose your Environment using Citrix Insight ServicesManage and Diagnose your Environment using Citrix Insight Services
Manage and Diagnose your Environment using Citrix Insight ServicesDavid McGeough
 
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesAdvanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesDavid McGeough
 
PVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep DivePVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep DiveDavid McGeough
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerDavid McGeough
 
Best practices for implementing, administering, and troubleshooting XenDeskto...
Best practices for implementing, administering, and troubleshooting XenDeskto...Best practices for implementing, administering, and troubleshooting XenDeskto...
Best practices for implementing, administering, and troubleshooting XenDeskto...David McGeough
 
Maintaining and Troubleshooting your XenDesktop 7.5 Environment
Maintaining and Troubleshooting your XenDesktop 7.5 EnvironmentMaintaining and Troubleshooting your XenDesktop 7.5 Environment
Maintaining and Troubleshooting your XenDesktop 7.5 EnvironmentDavid McGeough
 
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...David McGeough
 
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...David McGeough
 
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...David McGeough
 
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...David McGeough
 
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...David McGeough
 
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...David McGeough
 
Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetS...
Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetS...Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetS...
Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetS...David McGeough
 
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktopCitrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktopDavid McGeough
 
Maintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentMaintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentDavid McGeough
 
Jump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 DeploymentJump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 DeploymentDavid McGeough
 
Troubleshooting Common Network Related Issues with NetScaler
Troubleshooting Common Network Related Issues with NetScalerTroubleshooting Common Network Related Issues with NetScaler
Troubleshooting Common Network Related Issues with NetScalerDavid McGeough
 
Jump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentJump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentDavid McGeough
 
Designing your XenApp 7.5 Environment
Designing your XenApp 7.5 EnvironmentDesigning your XenApp 7.5 Environment
Designing your XenApp 7.5 EnvironmentDavid McGeough
 

More from David McGeough (20)

Citrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktopCitrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktop
 
Manage and Diagnose your Environment using Citrix Insight Services
Manage and Diagnose your Environment using Citrix Insight ServicesManage and Diagnose your Environment using Citrix Insight Services
Manage and Diagnose your Environment using Citrix Insight Services
 
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesAdvanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
 
PVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep DivePVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep Dive
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScaler
 
Best practices for implementing, administering, and troubleshooting XenDeskto...
Best practices for implementing, administering, and troubleshooting XenDeskto...Best practices for implementing, administering, and troubleshooting XenDeskto...
Best practices for implementing, administering, and troubleshooting XenDeskto...
 
Maintaining and Troubleshooting your XenDesktop 7.5 Environment
Maintaining and Troubleshooting your XenDesktop 7.5 EnvironmentMaintaining and Troubleshooting your XenDesktop 7.5 Environment
Maintaining and Troubleshooting your XenDesktop 7.5 Environment
 
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
 
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
 
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
 
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
 
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
 
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
 
Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetS...
Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetS...Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetS...
Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetS...
 
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktopCitrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
 
Maintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentMaintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 Environment
 
Jump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 DeploymentJump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 Deployment
 
Troubleshooting Common Network Related Issues with NetScaler
Troubleshooting Common Network Related Issues with NetScalerTroubleshooting Common Network Related Issues with NetScaler
Troubleshooting Common Network Related Issues with NetScaler
 
Jump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentJump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 Deployment
 
Designing your XenApp 7.5 Environment
Designing your XenApp 7.5 EnvironmentDesigning your XenApp 7.5 Environment
Designing your XenApp 7.5 Environment
 

Recently uploaded

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Implementing and Troubleshooting EdgeSight

  • 1. Citrix Support Secrets Webinar Series Implementing and Troubleshooting EdgeSight Vincent Papoz, Snr Escalation Engineer, Citrix Support March 21, 2013
  • 2. Agenda • Architecture overview • Use case: Troubleshooting slow logon • Troubleshooting and resolving Edgesight Performance issues • Custom Reporting (SQL objects and where to find data) • Question © 2012 Citrix | Confidential – Do Not Distribute 2 © 2012 Citrix | Confidential – Do Not Distribute
  • 3. Architecture Overview © 2012 Citrix | Confidential – Do Not Distribute
  • 4. Architecture Edgesight XenApp Server servers with SQL Edgesight Server Agent Endpoi nts Edgesig ht and Report Server Databas es RS Server © 2012 Citrix | Confidential – Do Not Distribute 4 © 2012 Citrix | Confidential – Do Not Distribute
  • 5. What does the agent monitor? • Event-driven data • Process starts/stops, errors and faults • User logon • WinSock connection and HTTP transactions • Windows Event Log • System reboot • Polled data • System and Process performance metrics • ICA session data • Session connects/disconnects • Detailed logon and session metrics, virtual channel statistics • Scheduled data • Drive space calculation • | Confidential – Do Not Distribute © 2012 Citrix Asset history 5 © 2012 Citrix | Confidential – Do Not Distribute
  • 6. End User Experience Monitoring • Metrics ᵒClient Start-up ᵒServer Start-up • Service running on XenApp Servers © 2012 Citrix | Confidential – Do Not Distribute 6 © 2012 Citrix | Confidential – Do Not Distribute
  • 7. Use case: Troubleshooting slow logon © 2012 Citrix | Confidential – Do Not Distribute
  • 8. Edgesight Console © 2012 Citrix | Confidential – Do Not Distribute 8 © 2012 Citrix | Confidential – Do Not Distribute
  • 9. User Sessions © 2012 Citrix | Confidential – Do Not Distribute 9 © 2012 Citrix | Confidential – Do Not Distribute
  • 10. System Summary © 2012 Citrix | Confidential – Do Not Distribute 10 © 2012 Citrix | Confidential – Do Not Distribute
  • 11. Process Detail © 2012 Citrix | Confidential – Do Not Distribute 11 © 2012 Citrix | Confidential – Do Not Distribute
  • 12. Session Start Detail © 2012 Citrix | Confidential – Do Not Distribute 12 © 2012 Citrix | Confidential – Do Not Distribute
  • 13. Troubleshooting and resolving Edgesight Performance issues © 2012 Citrix | Confidential – Do Not Distribute
  • 14. Symptoms • Report Rendering takes a long time • Payloads queuing up in webload directory and imported very slowly • Servers not updating Database • Nightly maintenance takes a very long time - and possibly eventually fails • Grooming error messages are showing up in the console • Database data files very large © 2012 Citrix | Confidential – Do Not Distribute 14 © 2012 Citrix | Confidential – Do Not Distribute
  • 15. Cause • Usually a problem with the SQL database • SQL server out of disk space or too much data to process • Data processing cannot complete because the Tlog cannot grow • Data processing is resource intensive and is delayed © 2012 Citrix | Confidential – Do Not Distribute 15 © 2012 Citrix | Confidential – Do Not Distribute
  • 16. Action plan • Assess your reporting requirements • Analyze the content of the database • Remove the unwanted data • Reclaim disk space • Adjust the collection/grooming configuration © 2012 Citrix | Confidential – Do Not Distribute 16 © 2012 Citrix | Confidential – Do Not Distribute
  • 17. Analyzing the content of the database Size of Edgesight Database data files SELECT Name AS Logical_Name, Logical_Name Physical_Name SizeMB Physical_Name, (size*8)/1024 SizeMB Edgesight E:DBEdgesight.mdf 2500 FROM sys.master_files Edgesight_log E:DBEdgesight_log.LDF 45052 Edgesight_FG1_Data E:DBEdgesight_FG1.ndf 12820 WHERE DB_NAME(database_id) = Edgesight_FG2_Data E:DBEdgesight_FG2.ndf 25350 'EdgesightDBname‘ Edgesight_FG3_Data E:DBEdgesight_FG3.ndf 7322 GO Edgesight_FG4_Data E:DBEdgesight_FG4.ndf 46623 Edgesight_FG5_Data E:DBEdgesight_FG5.ndf 8250 Edgesight_FG6_Data E:DBEdgesight_FG6.ndf 245020 Edgesight_FG7_Data E:DBEdgesight_FG7.ndf 12500 © 2012 Citrix | Confidential – Do Not Distribute 17 © 2012 Citrix | Confidential – Do Not Distribute
  • 18. Analyzing the content of the database SELECT DISTINCT object_name(i.id) as TableName, f.name as Filegroup FROM sys.sysindexes i, sys.filegroups f WHERE objectproperty(i.id,'IsUserTable') = 1 AND f.data_space_id = i.groupid ORDER BY f.name 18 GO Citrix | Confidential – Do Not Distribute © 2012 Citrix | Confidential – Do Not Distribute © 2012
  • 19. Analyzing the content of the database SELECT sysobjects.Name, sysindexes.Rows Name Rows FROM core_net_trans 260585114 core_net_stat 15265822 sysobjects INNER JOIN sysindexes ON sysobjects.id = sysindexes.id WHERE sysindexes.IndId < 2 AND sysobjects.Name IN('CORE_NET_STAT', © 2012 Citrix | Confidential – Do Not Distribute 19 'CORE_NET_TRANS')Do Not Distribute © 2012 Citrix | Confidential –
  • 20. Analyzing the content of the database Grooming Schedule SELECT f.table_name, m.default_days, m.groom_days FROM maint_table_config m JOIN table_def f on f.tableid=m.tableid WHERE table_name in ('CORE_NET_STAT', 'CORE_NET_TRANS') © 2012 Citrix | Confidential – Do Not Distribute 20 © 2012 Citrix | Confidential – Do Not Distribute
  • 21. Analyzing the content of the database Grooming failing? SELECT COUNT(*) FROM CORE_NET_TRANS WHERE dtperiod < GETUTCDATE() - 11 © 2012 Citrix | Confidential – Do Not Distribute 21 © 2012 Citrix | Confidential – Do Not Distribute
  • 22. Removing Data Manually Grooming failing – Delete data in increments declare @row int; declare @date datetime; set @date = GETUTCDATE() - 10 set @row = (select COUNT(*) from core_net_trans where dtperiod < @date); while @row <> 0 DBCC SHRINKFILE begin (N'Edgesight_FG6_Data' delete top(100000) from core_net_trans where dtperiod < @date , 0, TRUNCATEONLY) set @row = (select COUNT(*) from core_net_trans where dtperiod < @date); GO end; Go © 2012 Citrix | Confidential – Do Not Distribute 22 © 2012 Citrix | Confidential – Do Not Distribute
  • 23. Removing Data manually Grooming is not failing - Analyze the content of the table Imid filename cnt SELECT c.imid, i.[filename], count(c.imid) as cnt 507 SomeApp.exe 220659855 380 ntpd.exe 1252884 from core_net_trans c 460 iexplore.exe 1244863 377 ctxxmlss.exe 989565 JOIN [image] i ON i.imid=c.imid 202 cscript.exe 977522 201 Requestticket.exe 645777 GROUP BY c.imid, i.[filename] 402 Svchost.exe 412354 220 Svchost.exe 322526 ORDER BY cnt DESC 506 Mcscript_inuse.exe 145235 414 Jusched.exe 22589 519 Javaw.exe 22459 => Delete the process instance records from the table © 2012 Citrix | Confidential – Do Not Distribute 23 © 2012 Citrix | Confidential – Do Not Distribute
  • 24. Reclaiming disk space • Using SQL Studio (SSMS) • Using the following query DBCC SHRINKFILE (N'Edgesight_FG6_Data' , 0, TRUNCATEONLY) GO © 2012 Citrix | Confidential – Do Not Distribute 24 © 2012 Citrix | Confidential – Do Not Distribute
  • 25. Adjust collection configuration • Adjust the grooming schedule • Review the upload configuration • Ignore processes if applicable © 2012 Citrix | Confidential – Do Not Distribute 25 © 2012 Citrix | Confidential – Do Not Distribute
  • 26. Ignoring a process (Excluding a process) • Agent Properties Advanced configuration ᵒDisable interception (rsintcor.dll and esint.dll) • Registry setting ᵒDisable Injection (csma_ldr.dll) © 2012 Citrix | Confidential – Do Not Distribute 26 © 2012 Citrix | Confidential – Do Not Distribute
  • 27. Ignoring a process (registry configuration) • Disable injection of csma_ldr.dll • Per device registry setting • Requires a reboot of the monitored device © 2012 Citrix | Confidential – Do Not Distribute 27 © 2012 Citrix | Confidential – Do Not Distribute
  • 28. Ignoring a process Imid filename cnt 507 SomeApp.exe 220659855 380 ntpd.exe 1252884 460 iexplore.exe 1244863 377 ctxxmlss.exe 989565 202 cscript.exe 977522 201 Requestticket.exe 645777 402 Svchost.exe 412354 220 Svchost.exe 322526 506 Mcscript_inuse.exe 145235 414 Jusched.exe 22589 519 Javaw.exe 22459 © 2012 Citrix | Confidential – Do Not Distribute 28 © 2012 Citrix | Confidential – Do Not Distribute
  • 29. Ignoring a process – Finding affected servers name cnt SELECT m.name, COUNT(m.name) AS cnt FROM XAServer112 196231548 core_net_trans c XAServer115 18230540 XAServer233 12887 INNER JOIN instance i ON i.instid=c.instid XAServer225 1997 INNER JOIN machine m ON m.machid=i.machid XAServer227 1520 INNER JOIN [image] im ON im.imid=c.imid XAServer320 1519 XAServer196 1512 WHERE im.[filename] = ‘SomeApp.exe‘ XAServer302 1496 GROUP BY m.name XAServer112 12 XAServer112 9 ORDER BY cnt DESC © 2012 Citrix | Confidential – Do Not Distribute 29 © 2012 Citrix | Confidential – Do Not Distribute
  • 30. Ignoring a process – Verifying process exclusion Sysinternals Process Explorer © 2012 Citrix | Confidential – Do Not Distribute 30 © 2012 Citrix | Confidential – Do Not Distribute
  • 31. Process Explorer © 2012 Citrix | Confidential – Do Not Distribute 31 © 2012 Citrix | Confidential – Do Not Distribute
  • 32. Design consideration – SQL server • Split the data files on different hard drives http://msdn.microsoft.com/en-us/library/ms187087(v=sql.105).aspx • Set the recovery model to simple for the Edgesight database http://msdn.microsoft.com/en-us/library/ms189275(v=sql.105).aspx • Implement Data warehousing © 2012 Citrix | Confidential – Do Not Distribute 32 © 2012 Citrix | Confidential – Do Not Distribute
  • 33. A word on Custom Reporting © 2012 Citrix | Confidential – Do Not Distribute
  • 34. Custom Reports XenApp servers with Edgesigh t Agent Endpoi nts © 2012 Citrix | Confidential – Do Not Distribute 34 © 2012 Citrix | Confidential – Do Not Distribute
  • 35. Where to find data Tables Views • 283 user defined tables • 96 SQL views ᵒSchema is not documented ᵒFully documented ᵒDesign is complex ᵒUsed by the built in reports ᵒRecommended when creating custom reports © 2012 Citrix | Confidential – Do Not Distribute 35 © 2012 Citrix | Confidential – Do Not Distribute
  • 36. What you need to know… • Limited to historical reports • Built in report files located under <Program Files (x86)CitrixSystem MonitoringServerEdgeSightPagesappextreporting9> • Uses Reporting services RDL format (XML) • Queries are written in T-SQL • Localization built in Edgesight © 2012 Citrix | Confidential – Do Not Distribute 36 © 2012 Citrix | Confidential – Do Not Distribute
  • 37. Tools • An XML editor • Report Builder • Report Designer (Business Intelligence Development Studio) • SQL Studio (SSMS) © 2012 Citrix | Confidential – Do Not Distribute 37 © 2012 Citrix | Confidential – Do Not Distribute
  • 38. Custom Reporting Resources • Custom Report Blog http://blogs.citrix.com/2009/12/09/edgesight-custom-reporting/ • Anatomy of an Edgesight Report - http://support.citrix.com/article/CTX116452 • Custom reports: http://community.citrix.com/display/edgesight/Custom+Reports • Report Definition Language http://msdn.microsoft.com/en-us/library/ms155062.aspx • Microsoft Report Builder http://www.microsoft.com/sqlserver/en/us/solutions-technologies/business- intelligence/SQL-Server-2012-reporting-services.aspx © 2012 Citrix | Confidential – Do Not Distribute 38 © 2012 Citrix | Confidential – Do Not Distribute
  • 39. About Educate | Guide | Support | Succeed Citrix Services Citrix Services make sure How we can help you succeed with your virtualization programs. Citrix Education – The fastest, most efficient way to get your team the virtualization skills they need. Online, on-site or in class. citrix.com/training Citrix Consulting – Intensive engagements for complex, critical or just plain massive projects. citrix.com/consulting Citrix Support – Always-on support services that leverage everything we know about best-practice deployment and maintenance. citrix.com/support © 2012 Citrix | Confidential – Do Not Distribute
  • 40. The Nine Principles of Self-Support Get it now! © 2012 Citrix | Confidential – Do Not Distribute
  • 41. Secrets of the Citrix Support Ninjas • 40 insider troubleshooting tips • Covering XenDesktop, XenServer, XenApp and NetScaler • Citrix Support top engineers • FREE eBook • Citrix Auto Support • Now available! © 2012 Citrix | Confidential – Do Not Distribute
  • 42. Premier Support Calculator Check it out © 2012 Citrix | Confidential – Do Not Distribute
  • 43. Work better. Live better.

Editor's Notes

  1. In our Agenda for today: I’ll give a short overview of the architecture. Description of a typical use case dealing with how to obtain more information when troubleshooting slow user logon.Many Administrators are running into performance issues with their Edgesight deployment. So we&apos;re going to talk about this as well. Our last part will provide an insight into custom reporting,tools and where to find data.- Open the room for question?
  2. In this first part:Overview of the major componentsEdgesight replaces Resource manager for all XenApp versions installed on top of windows 2008 R1 and R2.- In concept, Edgesight works the same way as Resource manager in the sense that each XenApp server is responsible for gathering data for themselves. They will then send this data to a central location to make farmwide historical reporting possible. At the same time, an administrator can connect directly to the XA server local database to obtain real time information.RM uses rmmonitor IMA subsystem to collect the data locally on the XA servers Edgesight: Agent which runs as a service and use different ways of collecting data.
  3. The first components to be installed are the SQL server database engine along with the reporting Service server. The reporting service component is a part of the SQL server installation but it can be installed on a separate machine.When this is up and running, you can install the Edgesight web server. During the install process, the Database server is specified and the Edgesight database is created. At the end of the installation, we will also connect to the Report Server and upload the build in reports.When server side component installation is complete, we can go ahead and deploy the Edgesight agents on the devices we want to monitor. This includes XA servers, Endpoints – such as windows7, Windows Vista and Windows XP workstations - and VDIs. During agent installation, we will point to the Edgesight web server to tell the devices where to send their data.On monitored devices, the agents will collect data (We’re talking about performance data, usage data, configuration data, etc) and aggregate the data into their local database. The local database is a firebird database.Twice a day by default, each monitored device will create a payload containing the information and send it over to the Edgesight web server. In turn, the Edgesight Web server will bulk insert this information into the database.The Citrix Administrator has the possibility to run historical reports against the Edgesight database. There are approx 150 built-in reports provided for this.The administrator will also be able to connect directly to a device where the agent is installed to obtain real time information.
  4. So what type of data are we actually collecting?- agent collects event driven data =&gt; Process starts/stops, errors and faults. User logon and logoff. This is done using a DLL injection and interception method.- agent obtains winsock connection and http transaction information by hooking API calls.- It also uses the call back notification method to obtain Windows event log information as well as system reboot information.- Regarding performance metrics, by default, ES polls for standard registry based performance counters from the operating system. But any custom counters are configurable and can be added for 3rd party products.- XA and ICA specific: Agent collects session connection and disconnection events as well as session metrics and virtual channel statistics. This type of data is obtained from the EUEM service running on the XA servers where the agent is installed.- Scheduled Data: Information such as Drive space calculation or asset history is obtained by running wmi queries on a regular basis.
  5. installed when installing the Edgesight agent on XA servers component is collecting client start-up and server start-up metricsprovides information about the user experience.- Client start-up metricsWhich are concerned with timing the operations that occur from the point when the user requests an application, e.g., by clicking an icon, to the point at which an instance of the ICA client has finished opening a connection to the XA Server. - Server Start-up metricsdeals with session creation on a XAServer wherethe user must first be authenticated. After authentication, the session creation process will perform client device mapping tasks (printers, drives), load the user’s profile, execute any login scripts, and then start the user’s application.
  6. Slow logons… When a user clicks on an icon to launch a published application, the first change that they see on the screen is a dialog box and a description of the processes that are taking place to launch the requested application. Any problem experienced during the launch process — XA infrastructure or the supporting infrastructure components — can result in a poor user experience. Diagnosing login problems has traditionally been a difficult, time-consuming, manual process due to the large number of steps involved, many of which are external to the XenApp Server infrastructure. EdgeSightfor XA enables visibility into thesteps involved in the login process and the time required for each step to complete.
  7. As I mentioned earlier, an administrator can connect directly to the server hosting the affected session to obtain real time data. So when a user complains about a very long logon, the admin can login to the Edgesight console and select the user troubleshooter section to find out more about the active user session.
  8. What we need to do is enter the user name and optionally the name of the server hosting the session and click on find session.In this case, you can see 2 sessions for the user
  9. - select the topmost session, you have a number of tabs available in the lower pane that will provide details about the session. - the system summary tab will provide System performance counters for the server, including CPU, memory, and network.
  10. - process detail tab will display Process performance counters which show resource usage by the various applications running while the session is active. You can also select the Show All Processes checkbox to display a list of all processes running on the server.
  11. The Session start detail tab is the one we want to look in that specific case.Tab provides a break down of the logon process both on the server side and on the client side. We get details such as,The time it takes to authenticate the user,The time it takes to load the user profile,The time it takes to create the printers in the user session or to map drives.On the client side, the time it took to enumerate the applications, the time it took to download the ICA file … and so on.All of these categories are explained in details in the online help.In this example, we can see that the overall time to create the session was approximately 57 seconds and at the same time, loading the profile took 55 seconds. file server hosting the user profile is under stress, network latency issue, profile size is massive… but you know that this is where you need to start your investigation.
  12. Comes up quite a lot in supportEdgesight has been running for a while and the Citrix admin has been adding new devices, maybe a little bit too many…Symptoms includes…
  13. - Report rendering… when running a report, you might have to wait for a long time to get the result.errors in the console saying that the queue in the webload directory is growing…Servers will not update the Database, possibly because their payloads are not being processed.nightly maintenance job, whose task is to groom data, run some reindexing, and update statistics might take hours to completeAs a result of this grooming error will occur and will show up in the console- typical SQL database symptoms such as gigantic database files filling up the hard drive, a transaction log refusing to shrink and growing out of control, database locks and so on…
  14. usually a problem due to too much data in the database. In the case of SQL, you need some temp space to be able to perform operations such as deleting, inserting, reindexing and so on. All those operations are recorded in the Transaction log, and if the transaction log cannot grow, then no operation can be performed.- even if there is a sufficient amount of disk space left to perform those operations, the SQL engine might still struggle because there is so much data that every single operation is taking longer to complete, and this will have a knock on effect where everything is delayed.
  15. So what can we do when we run into this situation?What we want to do right now is to have your deployment back and running again in the shortest amount time. After this situation is resolved, we will have time to review the configuration so that we don’t run into this issue anymore. This will include adjusting the grooming schedule and maybe ignoring specific data.But at the moment, we need to get rid of some existing data and for this, we need to assess what data we need and what data we don’t need. This is directly related to our reporting requirements. Sometimes there is data we never need to report on and that we can afford to ignore.As a second step, we need to analyze the content of the database. In other words, we want to find out where the bulk of the data is and what it is. This will also help us adjust the collection configuration after we’ve resolved the issue.The third step deals with removing this data. There are different ways to do that, but we need to do it manually since the application is struggling to do it on its own.After that we might want to reclaim disk space because the data files will not reduce in size straight away. We only need to do this if we’re out of disk space. Otherwise, the SQL engine will take care of it automatically at a later stage.Lastly, we want to adjust the collection configuration for a long term solution. If we don’t do that we will run into the same issue again sometime in the future.
  16. Analyzing the content of the database; how do we do that?We can have a look at the size of the data files and look for the largest ones. A data file is the physical database file on the hard drive. By default, when creating a db, only one .mdf file is created, which is the primary datafile along with an .ldf file, the transaction log.When installing the Edgesight server, the database objects are divided into 8 different data files. This was designed primarily for performance reasons because you can host these data files on different physical hard drives.To find out the size of the datafiles, you can run this query inside SQL studio.Now let’s say you get the following output - While you can see that most of the files seem to have a manageable size, one of them, data file 6, stands out with a size in excess of 240 GB. This is the one we want to investigate.
  17. Now we want to find out which tables are hosted by the data file. We can run this query in SQL studio. We will get the following result.There are 2 tables in Filegroup 6. Core_net_stat and core_net_trans.
  18. How many records are held by those tables… maybe only one of those 2 tables is affected.In this output, we can see that the Core_net_trans table is very large and actually much bigger than the Core_net_stat table.
  19. Question 1 – Has the grooming been failing?To find out, we need to know what the grooming schedule is for those tables. This setting is found in the Edgesight console, but we can also run this query.The output will display the current settings as well as the default setting. We can see here that the settings were not modified.
  20. We’re just going to have a look at the core_net_trans table since it is the largest.We know that the grooming schedule for the core_net_trans table is 10 days since the last maintenance. So if we find records older than 11 days, it means that grooming failed.This query will tell you how many records failed to be deleted.If there is no record older than the cut-off date, we need to have a look at the data inside the table and investigate further
  21. If the grooming has been failing and there is not enough temporary disk space for it to complete successfully, we can use a query similar to this one to delete data by increments of – for example – 100,000. If 100,000 also fails because of the lack of disk space, you would need to first set the increment to a lower value for a start – Something like 1,000 or 10,000.Every now and again you can reclaim free disk space by shrinking the relevant data file. In that case, FG6.You can do that using SQL studio, or you can use this query. You can also integrate this piece into the main block so that it is done automatically after deleting the increment.
  22. - grooming is not failing - and in other words if all this data is inside the 10 day retention period, we need to look at the data inside the table and attempt to understand why so much data is being recorded.- We can run queries against the affected table to find out if a specific process is responsible.- It very much depends on the table of course, but in the case of Core_net_Trans, which records the Application Network transaction performance, what we can do is check whether 1 or several applications are generating a large amount of data.This query will group the process names and sort them by number of occurrence in the Core_net_trans table. It will give you this type of result, where straight away you can see that one application, the first one in the list has been very busy. So I have just put a dummy application name there, but I have seen instances where third party monitoring applications were responsible because they can be starting processes to gather data. There are other examples like scripts being run very often on an environment to check for some specific condition.What you can do as a first step and if this is necessary is to delete the records for this application.
  23. If you happen to be out of disk space, you will want to manually reclaim disk space after you have removed the unwanted records.We can use SQL studio for this. We need to right click the database, select tasks &gt; shrink &gt; Files.&gt;&gt; FG6You can also use the dbccshrinkfile command with the required parameters.
  24. In our action plan, the last step was to find a durable solution so that we don’t run into this issue again. Obviously this solution very much depends on our analysis but it will mainly include the following:Adjusting the grooming schedule. This is done in the console under data maintenanceAdjusting the upload configurationIgnore a process – 2 ways of doing this
  25. You can either choose to add the process in the agent properties advanced configuration.In that case we will disable interception for this process and collect minimal information for this processOr… you can disable injection altogether using a registry setting and we will collect pretty much nothing related to this process.You would mainly use this method if the application has a compatibility issue with the ES agent.This is the method I am going to describe now.
  26. When we ignore a process, we disable injection of a Citrix dll – csma_ldr.dll – for this process.This a per device registry setting and since we’re dealing with injection, we also need to restart the XA server for the setting to take effect.
  27. Ignoring a process means that the Edgesight agent will collect minimal information about a process. It will still collect information about the process startup and shutdown events, but it will discard other information such as Application Network transaction performance, which is precisely what we are concerned about in our scenario.Remember about the output we obtained earlier saying that there were too many instances of the someapp.exe process?This is the process we would exclude from monitoring…Using either the agent property exclusion, or the registry setting in case of a compatibility issue.
  28. Since we might not want to do that on every single XA servers, maybe we can find out if our process is generating data on all servers, or just on a few of them.Because it might be better if we can avoid to set the registry key on every single server if this is not necessary.This query will show you the number of instances of the process per server.Let’s say we get the following result. You can see that the numbers look ok on most servers except the 2 first ones in the list. Those are the one we want to set the exclusion for.
  29. When the exclusion has been set and the server (or the servers) have been rebooted, it is a good practice to check that the exclusion was effective.You can do that by using tools such as Process explorer.Process explorer will display all the DLLs a process has loaded.When there is no exclusion in place, you will find those 3 DLLs listed.Csma_ldr.dll, rsintcor.dll and esint.dll.Csma_ldr.dll is injected into a process by our kernel driver (rskcore.sys). It is responsible for loading the interception modules RSINTCOR.dll and ESINT.dll
  30. This is what you’d see for an excluded process…Well basically all the dlls I mentioned are not listed anymore.
  31. On the SQL side, there are a few optimizations we can think off.You can split the Data files to different hard drives. That will greatly improve performance for IO operations.You can also have a look at the recovery model and maybe set it to simple if possible so that the transaction log is shrunk automatically.A Third suggestion would be to consider Data warehousing – See ETL (extract, transform and load).Data warehousing is a process where you extract, transform and move data to a different SQL server that will act as a data repository for reporting
  32. Although there are quite a few build in reports provided with Edgesight, there will always be a need to format reports in a different way, or combine different type of information, or it could be as simple as adding or removing columns from existing reports.The good news is that the data is there. It was collected on the monitored devices, aggregated and imported into an SQL database… and now, it is available in this SQL database for any type of reporting your industry may require.
  33. So I just want to go back to the architecture overview slide that we looked at at the beginning of this presentation.On the left hand side we have the monitored devices where data is collected by the Edgesight agent. All this data is sent on a regular basis to those components on the right hand side for historical reporting.Since custom reporting is only for historical reporting, we will just get rid of those components on the left hand side. We’re left with those 3 major components:The SQL server where the actual data is storedThe Reporting Server The Edgesight ServerNow there are 3 different approaches we can take when considering custom reporting.First approach: we can leverage the existing 3 components and design our custom reports by sticking to the rules imposed by the Edgesight namespace. This means that we will use Edgesight to manage and run our custom reports.Second approach: we can bypass the Edgesight server and use our own application to connect to the Reporting service and Database components.Third approach: we can connect directly to the database and run ad-hoc queries. You will find quite a few very good resources on the web for this so I am not going to cover this in this presentation.
  34. Whatever approach you decide to go for, it is a good idea to find your way around and know where the data is located.An Edgesight 5.4 Database contains 283 tables hosting the actual data and the schema is not documented. The main reason for this is that the schema can be modified from a version to the next.So when creating your own queries, you can of course query the user tables directly, but then you need to spend some time understanding the schema, and your query might not work anymore when you upgrade your Edgesight server to a newer version.So instead, we provide views to expose the data A view is a virtual table based on the result-set of an SQL statement. 96 of them in Edgesight 5.4. The Edgesight views are fully documented and most of the built in reports are making use of them. This is what we recommend to use for custom reporting.
  35. Here’s a few facts about custom reporting…Custom reporting is for historical reports only. There is no mechanism to customize reports for real time information.On the Edgesight web server, all the built in report definition files can be found at this location.They can be copied, modified and uploaded as custom reports in the Edgesight console.Since Edgesight integrates with Microsoft Reporting services, the reports are written in a form of XML called RDL (stands for report definition language). And the queries to extract data from the DB are written in Transact SQL.Additionally, since reporting services does not support different languages, we have added localization to the Edgesight feature. This is important to know when creating custom reports because if you choose to use the built in parameters you will actually need to map the labels to your custom reports in the database.
  36. Regarding the tools available to us, There is no proprietary framework available to create Edgesight Reports. So you have to use what’s out there already.If you wish to use an existing report that you want to modify, you can open the RDL file in any XML editor and edit the file accordingly. You will need to be comfortable with RDL specification and T-SQL for this.Another tool you can use if you are not too confident with RDL and TSQL is Report builder. You can load existing reports in Report builder and modify it to your convenience.Business Intelligence Development Studio. It’s a little bit more sophisticated than Report Builder but it’s also more powerful.SQL Server Management studio can be used to verify the queries you create.
  37. To conclude this chapter, I wanted to give you a short list of resources you can use to know more about custom reporting. First off, we have a very good introduction to cust reporting by a Citrix consultant.Also by the same author, the description of the anatomy of an ES reportThen you will find a collection of custom reports created by ctx engineers on this pageYou can consult the RDL specification on MSFT websiteAnd also learn more about report builderYou will also find some very good resources on the web. Knowledgeable people have blogged about it quite a bit.At the end of the day Custom reporting can be very complex so if you’re new to it, you can use those resources to get you started.
  38. At Citrix Services - we’re Citrix consultants, teachers and support engineers and we’re all about one thing: making sure you succeed.With our help, you’ll deploy high-performance, robust virtualization and networking projects, faster – with dramatically lower risk and higher return.The best Citrix architects and administrators are the ones who never stop learning – and Citrix Education is here to help you learn those skills.Citrix Consulting gives you direct access to our most experienced virtualization and networking experts.When it’s complex; when it’s mission-critical; when it’s big; That’s when Citrix consultants can really help.On your virtualization journey, you’ll want always-on support from people who really care about your success.There’s no better insurance for your Citrix investment than with Citrix Support.
  39. Secrets of the Citrix Support Ninjas is a FREE eBook available next week.The eBook contains 40 insider troubleshooting tips for administrators.So the purpose of the eBook is to help administrators like you keep your Citrix deployments on track.We’ve collected some of their best tips and tricks for running robust Citrix environments and packaged them up into a free eBook.In it, you’ll discover some of the little-known tricks that our own support people use every day to tune, tweak, troubleshoot and test Citrix solutions. You may know a few of these tips. But you probably don’t know them all.And – you never know – you might discover just one that will change your life as an administrator.Let me give you a sneak peak now.