SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
I can only help if the customer is willing to follow Citrix best practices. Citrix is “top-of-stack” and
therefore agnostic of the underlying hypervisor. Most projects miss a key component regarding the
primary purpose of using Citrix. This one mistake does result in failure if not immediately but 3-6
months after implementation.
First is the “Define” phase. Here it is important to understand that Citrix is merely a “conduit” for the
business application. Meaning no hardware can or should be ordered prior to creating an application
lifecycle management framework. A preferred hardware vendor can [will] provide some hardware “on
loan” to create the application testing and remediation environment. This eliminates “putting the cart
before the horses”.
Citrix at best is a conduit for the business application. At worse it is a disaster that causes more help
tickets due to lack of planning and poor architecture. Citrix exists to deliver the business application so it
is more closely aligned with the “business” than IT.
The customer needs to understand that each application itself can take 2-4 weeks for initial packaging to
MSI (Microsoft Best Practice) (Terminal Server Best Practice) for deployment to XenApp 6.5 or 7.1. With
that said, Citrix AppDNA can streamline these processes down but final phase is the business application
owner must provide a power user to perform user acceptance testing on the application.
Assuming it pass all these tests, the application must undergo performance testing to make sure it does
not peg the XenApp server processor at 100% with 5 instances (happens every day). Any application
earmarked for Citrix must undergo this process. Citrix does not exist without the business application, I
cannot reiterate this enough.
During this phase, after application testing and remediation – then, and only then, can we create a BOM.
Never before. How do you create a BOM before you know whether or not the business applications will
work or how they will perform?
Most Citrix solutions tank in the first 6 months due to lack of focus on the "business application" side
and all IT centric. Not having an application remediation or approaching Citrix from a business value
add, not IT value add - is #1 issue IMO.
Define Phase
Define all applications earmarked for Citrix
- Define applications by Business Unit
- Define applications by COTS, Web, or Internal Development, Third Party Development
- Define list of application dependencies (Java Run Time and version, Flash, .NET Framework,
Oracle, SQL Client, ODBC, INI, ActiveX, Adobe Reader, Office Suite and Version, and so forth)
Define a small test environment of proposed hardware based on list of applications and number of users
- Complete list of applications required but does not determine final count for Citrix
- Define phase the total # of users refers to power users to test each application
- Business unit responsible for allocating users to UAT the applications pass all the Application
Lifecycle Management Framework tests to work in Citrix XenApp
Define solutions development framework for web and compiled applications that follow 2014 standards
and future requirements to develop software for 64 Bit Operating Systems and recent browser versions
Define initial hardware requirements for Citrix application testing and remediation
- Environment does not need to be exact match for proposed production
-

Work with vendor to obtain “loaner” hardware post “Design Phase”
Hardware should closely match proposed design for performance analysis reporting during
“Assess Phase”
Define initial storage requirements for physical hosts
- SAN requiring HBA’s, dual HBA’s for HA
- NAS Storage for MSI files or virtual applications
Define networking requirements
- Netscaler internal VIPs’
- Netscaler external (internet) VIPs’
- # of routable IPs’
- # of private IPs’
- Static IPs’ or DHCP IP’s, Subnets, Gateways
- Use of ICA proxy
Define priority of application migrations (low hanging fruit first)
- Lease remediation steps
- Smallest # of users
- Quickest to package and deploy
- Best performance results on 2008R2 64 Bit
Define monitoring requirements
- Prepare the monitoring team for future state
- Define a list of monitoring requirements for proactive versus reactive monitoring
- Most monitoring solutions are designed to provide a holistic monitoring of server uptime,
processor, memory, network, and storage but not necessarily ability to interface with the Citrix
native API to monitor Citrix Services, collect IMA specific data, Citrix user data, proactively
monitor the ICA/HDX stack and services specific to each component
o XenApp, XenDesktop, Provisioning Services, Netscaler
Define Help Desk impact
- To prevent Level 1 tickets from bypassing help desk straight to Tier 2 or 3 it is recommended to
work with the Help Desk manager and provide information in the form of a Help Desk
troubleshooting Guide that uses the Desktop Director or CMC tool provided to Help Desk for
resetting sessions, logging off users, gathering data before transferring to Tier 2.
- Offer to create a troubleshooting guide of problems that take 3-5 minutes or less to remediate.
- Offer to train the help desk team per the schedule that the Help Desk Manager can arrange
o The more you document and train, the quicker the end user obtains a “First hit ticket
closure” versus information gathering session then ticket transfer to another queue
o The more you document and train, the less tickets referred to Tier 2 and 3 therefore
allowing Tier 2 to focus more on Administration and Tier 3 on Engineering responsibility
Define application lifecycle and remediation framework
- MSI packaging with DLL Conflict remediation or Virtual Application utilizing AppV or other
Define application compatibility and UAT test environment
- Define and build temporary environment utilizing proposed hardware solution
- Define and build temporary infrastructure servers to allow for application performance testing
o Post packaging or virtual application creation
o Critical to determining application compliance and # of instances per XenApp is not an
issue relative to the planned horizontal expansion (expand out not up)
- Define requirements for each application and User Acceptance Testing
o Obtain power user from each BU for each application to perform Application
Functionality Testing and create a runbook with screen shots for every function tested
o Obtain signature for power user that tested per application
Define Hypervisor Requirements
- XenServer, free, supports XenDesktop VHD format native
- Microsoft Hyper-v, free, supports XenDesktop VHD format native
- Vmware ESX, requires VCenter, requires conversion from VHD to VMDK format
o Other benefits relative to management tools such as VCenter, VCloud Suite
Define Active Directory Requirements
- Citrix Administrators Domain Local Group
- Citrix Service Accounts if applicable
- Adding subnets to Active Directory Sites and Services
- Providing local domain controllers for every domain requiring authentication
- Dedicated Citrix Organizational Unit Structure
- Block inheritance at top of initial Citrix OU structure
o Best practice, eliminates desktop logon scripts and other non-relevant policies
- Creation of Group Policy Objects associated with XenApp, XenDesktop, Provisioning Server
o Define required policies
o Link GPOs’ to appropriate OUs’ under primary OU
Define Site Checklist for remote sites
- Document bandwidth of each remote site accessing Citrix new production
- Define PC or Thin Client requirements
- Define Citrix Receiver Versioning Requirements
- Define minimum WAN requirements based on # of users per site with 20% growth rate factor
- Define necessity for WAAS device at site
o Define vendor; Cisco WAAS or Citrix Cloudbridge (examples)
- Define minimum requirement of 100MB Full Switches at the site with devices hardcoded for 100
Full – again, this is minimum requirement
- Define maximum latency allowance per WAN segment
o Take baseline measurements of latency prior to adding ICA Traffic
- Define holistic checklist comprised of input from Citrix team, Networking Team, and Desktop
Engineering (See Example Spreadsheet provided)
Assess Phase
Assess application testing results
- Assess timelines for applications that failed that can be remediated
- Assess list of applications that are not candidates for Citrix, advise BU and recommend
alternatives
Assess application performance testing of applications meeting Citrix requirements
- Provides the baseline for all functional applications meeting Citrix requirements
o Utilized later to ascertain performance issues relative to baseline
Assess use case scenarios and gather project requirements per BU
- Assess XenApp published application to XenDesktop ratio and license requirement
- Assess XenApp shared desktop ratio and license requirement
- Assess leveraging Provisioning Server and total # of VDISKs for XenApp and VDI
o Goal is least # of images (VDISKs) for XenApp or XenDesktop
Assess XenApp and XenDesktop Policy Requirements
- Printing policies (Universal Printing Driver)
- Special policies by AD Group or Servers
Assess user profile requirements based on # of users and preferred technology
-

Roaming profiles
Appsense for Roaming profiles
Liquidware Profile Unity for Roaming Profiles
Citrix Profile Manager
Redirected folders

Design Phase
Design phase 100% dependent on Define and Assess Phase being completed
Design the architecture: Scalability, local redundancy, high availability, disaster recovery
Design physical hardware initial scale based on actual # of applications defined to be compatible with
Design required number of Provisioning Servers required to host XenApp Virtual Servers
Design required number of Provisioning Servers required to host XenDesktop sessions utilizing
XenDesktop DDCs’ to manage images and Desktop Groups
Design required # of dedicated XenDesktop Desktop Controllers required to host X number of required
concurrent XenDesktops
Design required # of dedicated XenApp Controllers for the farm versus Session Hosting Servers required
to manage X number of maximum # of provisioned XenApp servers
Citrix including performance testing analysis of each application
Design operational processes required to implement architecture
Design sustain processes required to maintain operational success
Design monitoring infrastructure components for proactive versus reactive
Design the hypervisor architecture for scalability, agility, local redundancy, high availability, disaster
recovery, capacity management
Design high availability for Citrix XML XenApp processes such as virtual or physical Netscaler VIPs’ with
multiple servers defined in the XenApp XML VIP
Design high availability for Citrix XML XenDesktop processes such as virtual or physical Netscaler VIPs’
with multiple servers defined in the XenDesktop (DDCs’) XML VIP
Deploy Phase
Deploy hardware, storage, and software infrastructure components
Deploy Citrix ready applications per Define Phase
Monitor Phase
Monitoring the environment is critical.
Utilizing existing monitoring tools or deploying Citrix specific monitoring tools
Every component should be monitored for processor, memory, storage IO (LUNS or local), and service
specific monitoring to each role: XenApp Controllers, XenApp hosting servers, XenDesktop Controllers,
Hypervisor, WANS, core switches, top of rack or end of rack switches back to core (if used), VCenter,
network cards (particularly on PVS), Netscalers, MPLS connections, dependency routers/switches/VPN
equipment.
Monitoring is generally handled by Tier-1 resources, generally referred to as Citrix Administrators with
minimum CCA certification and 1-4 years’ experience.
Brian Murphy
GuideIT High Level Consulting Framework

Mais conteúdo relacionado

Mais procurados

VDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and TestingVDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and TestingeG Innovations
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellenceveehikle
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionLumension
 
RTC/CLM 5.0 Adoption Paths: Deploying in 16 Steps
 RTC/CLM 5.0 Adoption Paths: Deploying in 16 Steps RTC/CLM 5.0 Adoption Paths: Deploying in 16 Steps
RTC/CLM 5.0 Adoption Paths: Deploying in 16 StepsStéphane Leroy
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware Academy
 
Learn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From OlympusLearn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From OlympusCA Technologies
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training Yuvaraj1986
 
A Better Solution Limited Corporate Presentation
A Better Solution Limited Corporate PresentationA Better Solution Limited Corporate Presentation
A Better Solution Limited Corporate PresentationRobert Atkins
 
Building maintenance documentation
Building maintenance documentation Building maintenance documentation
Building maintenance documentation gaitkeeper
 
TechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDITechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDILai Yoong Seng
 
Zaptz Legacy App to Cloud
Zaptz Legacy App to CloudZaptz Legacy App to Cloud
Zaptz Legacy App to CloudStephen Burke
 
Hands-On Lab: From Zero to Compliance Using CA Software Asset Management
Hands-On Lab: From Zero to Compliance Using CA Software Asset ManagementHands-On Lab: From Zero to Compliance Using CA Software Asset Management
Hands-On Lab: From Zero to Compliance Using CA Software Asset ManagementCA Technologies
 
Windows Server 2003 EOS : l'opportunité de repenser votre IT et mettre en pla...
Windows Server 2003 EOS : l'opportunité de repenser votre IT et mettre en pla...Windows Server 2003 EOS : l'opportunité de repenser votre IT et mettre en pla...
Windows Server 2003 EOS : l'opportunité de repenser votre IT et mettre en pla...Microsoft Décideurs IT
 
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedWes Moskal-Fitzpatrick
 
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...CA Technologies
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparisonlneut03
 
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...David McGeough
 

Mais procurados (20)

VDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and TestingVDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and Testing
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellence
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
Job Postings
Job PostingsJob Postings
Job Postings
 
RTC/CLM 5.0 Adoption Paths: Deploying in 16 Steps
 RTC/CLM 5.0 Adoption Paths: Deploying in 16 Steps RTC/CLM 5.0 Adoption Paths: Deploying in 16 Steps
RTC/CLM 5.0 Adoption Paths: Deploying in 16 Steps
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices Poster
 
Learn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From OlympusLearn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From Olympus
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training
 
A Better Solution Limited Corporate Presentation
A Better Solution Limited Corporate PresentationA Better Solution Limited Corporate Presentation
A Better Solution Limited Corporate Presentation
 
Building maintenance documentation
Building maintenance documentation Building maintenance documentation
Building maintenance documentation
 
VMware Horizon - news
VMware Horizon - newsVMware Horizon - news
VMware Horizon - news
 
TechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDITechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDI
 
Zaptz Legacy App to Cloud
Zaptz Legacy App to CloudZaptz Legacy App to Cloud
Zaptz Legacy App to Cloud
 
Hands-On Lab: From Zero to Compliance Using CA Software Asset Management
Hands-On Lab: From Zero to Compliance Using CA Software Asset ManagementHands-On Lab: From Zero to Compliance Using CA Software Asset Management
Hands-On Lab: From Zero to Compliance Using CA Software Asset Management
 
Windows Server 2003 EOS : l'opportunité de repenser votre IT et mettre en pla...
Windows Server 2003 EOS : l'opportunité de repenser votre IT et mettre en pla...Windows Server 2003 EOS : l'opportunité de repenser votre IT et mettre en pla...
Windows Server 2003 EOS : l'opportunité de repenser votre IT et mettre en pla...
 
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
 
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparison
 
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...
Troubleshooting Tools – How to isolate and resolve issues in your XenApp & Xe...
 

Destaque (7)

Build Your 2008R2 2-Node Cluster
Build Your 2008R2 2-Node ClusterBuild Your 2008R2 2-Node Cluster
Build Your 2008R2 2-Node Cluster
 
GuideIT - Virtual Economies of Scale
GuideIT - Virtual Economies of Scale GuideIT - Virtual Economies of Scale
GuideIT - Virtual Economies of Scale
 
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
 
Security Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-CodeSecurity Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-Code
 
GuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria GuideGuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria Guide
 
Using Concurrent Multipath Transmission for Transport Virtualization
Using Concurrent Multipath Transmission for Transport VirtualizationUsing Concurrent Multipath Transmission for Transport Virtualization
Using Concurrent Multipath Transmission for Transport Virtualization
 
NetApp To Offer Integrated Storage Array And Virtualization Software
NetApp To Offer Integrated Storage Array And Virtualization SoftwareNetApp To Offer Integrated Storage Array And Virtualization Software
NetApp To Offer Integrated Storage Array And Virtualization Software
 

Semelhante a GuideIT High Level Consulting Framework

Best Way to Prepare for Citrix CCA-V (1Y0-204) Certification Exam
Best Way to Prepare for Citrix CCA-V (1Y0-204) Certification ExamBest Way to Prepare for Citrix CCA-V (1Y0-204) Certification Exam
Best Way to Prepare for Citrix CCA-V (1Y0-204) Certification ExamAmaaira Johns
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendorsapprize360
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Flexera
 
Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...CA Technologies
 
Monitoring IAAS & PAAS Solutions
Monitoring IAAS & PAAS SolutionsMonitoring IAAS & PAAS Solutions
Monitoring IAAS & PAAS SolutionsColloquium
 
Xendesktop 7-on-windows-azure-design-guide
Xendesktop 7-on-windows-azure-design-guideXendesktop 7-on-windows-azure-design-guide
Xendesktop 7-on-windows-azure-design-guideNuno Alves
 
VMWorld 2004 - Justifying the transition from Physical to Virtual
VMWorld 2004 - Justifying the transition from Physical to VirtualVMWorld 2004 - Justifying the transition from Physical to Virtual
VMWorld 2004 - Justifying the transition from Physical to VirtualDavid Kent
 
Tech Talk Oct 2008 Upgrade Migrate
Tech Talk Oct 2008 Upgrade MigrateTech Talk Oct 2008 Upgrade Migrate
Tech Talk Oct 2008 Upgrade Migratecrmachado
 
Open stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshareOpen stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshareSumit Naiksatam
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 

Semelhante a GuideIT High Level Consulting Framework (20)

Shafeek
ShafeekShafeek
Shafeek
 
Best Way to Prepare for Citrix CCA-V (1Y0-204) Certification Exam
Best Way to Prepare for Citrix CCA-V (1Y0-204) Certification ExamBest Way to Prepare for Citrix CCA-V (1Y0-204) Certification Exam
Best Way to Prepare for Citrix CCA-V (1Y0-204) Certification Exam
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services
 
A.S.Sivaprakash
A.S.SivaprakashA.S.Sivaprakash
A.S.Sivaprakash
 
Chike-Amazu
Chike-AmazuChike-Amazu
Chike-Amazu
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
 
Dssc Intro
Dssc IntroDssc Intro
Dssc Intro
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
 
XenDesktop 7 on Windows Azure
XenDesktop 7 on Windows Azure XenDesktop 7 on Windows Azure
XenDesktop 7 on Windows Azure
 
Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...
 
Monitoring IAAS & PAAS Solutions
Monitoring IAAS & PAAS SolutionsMonitoring IAAS & PAAS Solutions
Monitoring IAAS & PAAS Solutions
 
Xendesktop 7-on-windows-azure-design-guide
Xendesktop 7-on-windows-azure-design-guideXendesktop 7-on-windows-azure-design-guide
Xendesktop 7-on-windows-azure-design-guide
 
Arunprakash Alagesan
Arunprakash AlagesanArunprakash Alagesan
Arunprakash Alagesan
 
mohan ctx
mohan ctx mohan ctx
mohan ctx
 
VMWorld 2004 - Justifying the transition from Physical to Virtual
VMWorld 2004 - Justifying the transition from Physical to VirtualVMWorld 2004 - Justifying the transition from Physical to Virtual
VMWorld 2004 - Justifying the transition from Physical to Virtual
 
Yongsan presentation 3
Yongsan presentation 3Yongsan presentation 3
Yongsan presentation 3
 
Tech Talk Oct 2008 Upgrade Migrate
Tech Talk Oct 2008 Upgrade MigrateTech Talk Oct 2008 Upgrade Migrate
Tech Talk Oct 2008 Upgrade Migrate
 
Open stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshareOpen stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshare
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
VAS - VMware CMP
VAS - VMware CMPVAS - VMware CMP
VAS - VMware CMP
 

Mais de Vision Concepts Infrastructure Services Solution

Mais de Vision Concepts Infrastructure Services Solution (20)

Palo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Palo Alto Networks VM-Series firewall now available on NetScaler SDX PlatformPalo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Palo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
 
Citrix Application Lifecycle Management
Citrix Application Lifecycle ManagementCitrix Application Lifecycle Management
Citrix Application Lifecycle Management
 
Using Windows Azure as a SharePoint Disaster Recovery Environment
Using Windows Azure as a SharePoint Disaster Recovery EnvironmentUsing Windows Azure as a SharePoint Disaster Recovery Environment
Using Windows Azure as a SharePoint Disaster Recovery Environment
 
Delivery-on-Demand Company Raises $16 Million, Questions About Safety and Out...
Delivery-on-Demand Company Raises $16 Million, Questions About Safety and Out...Delivery-on-Demand Company Raises $16 Million, Questions About Safety and Out...
Delivery-on-Demand Company Raises $16 Million, Questions About Safety and Out...
 
Could Google end sweatshop labor?
Could Google end sweatshop labor?Could Google end sweatshop labor?
Could Google end sweatshop labor?
 
How to Change the IT Architect Hiring Practice
How to Change the IT Architect Hiring PracticeHow to Change the IT Architect Hiring Practice
How to Change the IT Architect Hiring Practice
 
Big Data - Security Concerns
Big Data - Security ConcernsBig Data - Security Concerns
Big Data - Security Concerns
 
Apple adding hundreds of new engineers and operations staff in China to speed...
Apple adding hundreds of new engineers and operations staff in China to speed...Apple adding hundreds of new engineers and operations staff in China to speed...
Apple adding hundreds of new engineers and operations staff in China to speed...
 
Data Analytics and the Ubiquitous Internet of Things
Data Analytics and the Ubiquitous Internet of ThingsData Analytics and the Ubiquitous Internet of Things
Data Analytics and the Ubiquitous Internet of Things
 
Citrix UniPrint NetGain Case Study
Citrix UniPrint NetGain Case StudyCitrix UniPrint NetGain Case Study
Citrix UniPrint NetGain Case Study
 
Uniprint Infinity Citrix Printing Solution
Uniprint Infinity Citrix Printing SolutionUniprint Infinity Citrix Printing Solution
Uniprint Infinity Citrix Printing Solution
 
The CIO Pocket MBA
The CIO Pocket MBAThe CIO Pocket MBA
The CIO Pocket MBA
 
Citrix Top 10 Trends
Citrix Top 10 Trends Citrix Top 10 Trends
Citrix Top 10 Trends
 
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
 
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
 
VDI - Zero Client Printing Solution
VDI - Zero Client Printing SolutionVDI - Zero Client Printing Solution
VDI - Zero Client Printing Solution
 
GuideIT Storage Requirements Template
GuideIT Storage Requirements TemplateGuideIT Storage Requirements Template
GuideIT Storage Requirements Template
 
GuideIT Delivery Design - Netscaler
GuideIT Delivery Design - NetscalerGuideIT Delivery Design - Netscaler
GuideIT Delivery Design - Netscaler
 
GuideIT Delivery Design - File Shares
GuideIT Delivery Design - File SharesGuideIT Delivery Design - File Shares
GuideIT Delivery Design - File Shares
 
Guide IT Delivery Design - Security
Guide IT Delivery Design - SecurityGuide IT Delivery Design - Security
Guide IT Delivery Design - Security
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

GuideIT High Level Consulting Framework

  • 1. I can only help if the customer is willing to follow Citrix best practices. Citrix is “top-of-stack” and therefore agnostic of the underlying hypervisor. Most projects miss a key component regarding the primary purpose of using Citrix. This one mistake does result in failure if not immediately but 3-6 months after implementation. First is the “Define” phase. Here it is important to understand that Citrix is merely a “conduit” for the business application. Meaning no hardware can or should be ordered prior to creating an application lifecycle management framework. A preferred hardware vendor can [will] provide some hardware “on loan” to create the application testing and remediation environment. This eliminates “putting the cart before the horses”. Citrix at best is a conduit for the business application. At worse it is a disaster that causes more help tickets due to lack of planning and poor architecture. Citrix exists to deliver the business application so it is more closely aligned with the “business” than IT. The customer needs to understand that each application itself can take 2-4 weeks for initial packaging to MSI (Microsoft Best Practice) (Terminal Server Best Practice) for deployment to XenApp 6.5 or 7.1. With that said, Citrix AppDNA can streamline these processes down but final phase is the business application owner must provide a power user to perform user acceptance testing on the application. Assuming it pass all these tests, the application must undergo performance testing to make sure it does not peg the XenApp server processor at 100% with 5 instances (happens every day). Any application earmarked for Citrix must undergo this process. Citrix does not exist without the business application, I cannot reiterate this enough. During this phase, after application testing and remediation – then, and only then, can we create a BOM. Never before. How do you create a BOM before you know whether or not the business applications will work or how they will perform? Most Citrix solutions tank in the first 6 months due to lack of focus on the "business application" side and all IT centric. Not having an application remediation or approaching Citrix from a business value add, not IT value add - is #1 issue IMO. Define Phase Define all applications earmarked for Citrix - Define applications by Business Unit - Define applications by COTS, Web, or Internal Development, Third Party Development - Define list of application dependencies (Java Run Time and version, Flash, .NET Framework, Oracle, SQL Client, ODBC, INI, ActiveX, Adobe Reader, Office Suite and Version, and so forth) Define a small test environment of proposed hardware based on list of applications and number of users - Complete list of applications required but does not determine final count for Citrix - Define phase the total # of users refers to power users to test each application - Business unit responsible for allocating users to UAT the applications pass all the Application Lifecycle Management Framework tests to work in Citrix XenApp Define solutions development framework for web and compiled applications that follow 2014 standards and future requirements to develop software for 64 Bit Operating Systems and recent browser versions Define initial hardware requirements for Citrix application testing and remediation - Environment does not need to be exact match for proposed production
  • 2. - Work with vendor to obtain “loaner” hardware post “Design Phase” Hardware should closely match proposed design for performance analysis reporting during “Assess Phase” Define initial storage requirements for physical hosts - SAN requiring HBA’s, dual HBA’s for HA - NAS Storage for MSI files or virtual applications Define networking requirements - Netscaler internal VIPs’ - Netscaler external (internet) VIPs’ - # of routable IPs’ - # of private IPs’ - Static IPs’ or DHCP IP’s, Subnets, Gateways - Use of ICA proxy Define priority of application migrations (low hanging fruit first) - Lease remediation steps - Smallest # of users - Quickest to package and deploy - Best performance results on 2008R2 64 Bit Define monitoring requirements - Prepare the monitoring team for future state - Define a list of monitoring requirements for proactive versus reactive monitoring - Most monitoring solutions are designed to provide a holistic monitoring of server uptime, processor, memory, network, and storage but not necessarily ability to interface with the Citrix native API to monitor Citrix Services, collect IMA specific data, Citrix user data, proactively monitor the ICA/HDX stack and services specific to each component o XenApp, XenDesktop, Provisioning Services, Netscaler Define Help Desk impact - To prevent Level 1 tickets from bypassing help desk straight to Tier 2 or 3 it is recommended to work with the Help Desk manager and provide information in the form of a Help Desk troubleshooting Guide that uses the Desktop Director or CMC tool provided to Help Desk for resetting sessions, logging off users, gathering data before transferring to Tier 2. - Offer to create a troubleshooting guide of problems that take 3-5 minutes or less to remediate. - Offer to train the help desk team per the schedule that the Help Desk Manager can arrange o The more you document and train, the quicker the end user obtains a “First hit ticket closure” versus information gathering session then ticket transfer to another queue o The more you document and train, the less tickets referred to Tier 2 and 3 therefore allowing Tier 2 to focus more on Administration and Tier 3 on Engineering responsibility Define application lifecycle and remediation framework - MSI packaging with DLL Conflict remediation or Virtual Application utilizing AppV or other Define application compatibility and UAT test environment - Define and build temporary environment utilizing proposed hardware solution - Define and build temporary infrastructure servers to allow for application performance testing o Post packaging or virtual application creation o Critical to determining application compliance and # of instances per XenApp is not an issue relative to the planned horizontal expansion (expand out not up) - Define requirements for each application and User Acceptance Testing o Obtain power user from each BU for each application to perform Application Functionality Testing and create a runbook with screen shots for every function tested
  • 3. o Obtain signature for power user that tested per application Define Hypervisor Requirements - XenServer, free, supports XenDesktop VHD format native - Microsoft Hyper-v, free, supports XenDesktop VHD format native - Vmware ESX, requires VCenter, requires conversion from VHD to VMDK format o Other benefits relative to management tools such as VCenter, VCloud Suite Define Active Directory Requirements - Citrix Administrators Domain Local Group - Citrix Service Accounts if applicable - Adding subnets to Active Directory Sites and Services - Providing local domain controllers for every domain requiring authentication - Dedicated Citrix Organizational Unit Structure - Block inheritance at top of initial Citrix OU structure o Best practice, eliminates desktop logon scripts and other non-relevant policies - Creation of Group Policy Objects associated with XenApp, XenDesktop, Provisioning Server o Define required policies o Link GPOs’ to appropriate OUs’ under primary OU Define Site Checklist for remote sites - Document bandwidth of each remote site accessing Citrix new production - Define PC or Thin Client requirements - Define Citrix Receiver Versioning Requirements - Define minimum WAN requirements based on # of users per site with 20% growth rate factor - Define necessity for WAAS device at site o Define vendor; Cisco WAAS or Citrix Cloudbridge (examples) - Define minimum requirement of 100MB Full Switches at the site with devices hardcoded for 100 Full – again, this is minimum requirement - Define maximum latency allowance per WAN segment o Take baseline measurements of latency prior to adding ICA Traffic - Define holistic checklist comprised of input from Citrix team, Networking Team, and Desktop Engineering (See Example Spreadsheet provided) Assess Phase Assess application testing results - Assess timelines for applications that failed that can be remediated - Assess list of applications that are not candidates for Citrix, advise BU and recommend alternatives Assess application performance testing of applications meeting Citrix requirements - Provides the baseline for all functional applications meeting Citrix requirements o Utilized later to ascertain performance issues relative to baseline Assess use case scenarios and gather project requirements per BU - Assess XenApp published application to XenDesktop ratio and license requirement - Assess XenApp shared desktop ratio and license requirement - Assess leveraging Provisioning Server and total # of VDISKs for XenApp and VDI o Goal is least # of images (VDISKs) for XenApp or XenDesktop Assess XenApp and XenDesktop Policy Requirements - Printing policies (Universal Printing Driver) - Special policies by AD Group or Servers Assess user profile requirements based on # of users and preferred technology
  • 4. - Roaming profiles Appsense for Roaming profiles Liquidware Profile Unity for Roaming Profiles Citrix Profile Manager Redirected folders Design Phase Design phase 100% dependent on Define and Assess Phase being completed Design the architecture: Scalability, local redundancy, high availability, disaster recovery Design physical hardware initial scale based on actual # of applications defined to be compatible with Design required number of Provisioning Servers required to host XenApp Virtual Servers Design required number of Provisioning Servers required to host XenDesktop sessions utilizing XenDesktop DDCs’ to manage images and Desktop Groups Design required # of dedicated XenDesktop Desktop Controllers required to host X number of required concurrent XenDesktops Design required # of dedicated XenApp Controllers for the farm versus Session Hosting Servers required to manage X number of maximum # of provisioned XenApp servers Citrix including performance testing analysis of each application Design operational processes required to implement architecture Design sustain processes required to maintain operational success Design monitoring infrastructure components for proactive versus reactive Design the hypervisor architecture for scalability, agility, local redundancy, high availability, disaster recovery, capacity management Design high availability for Citrix XML XenApp processes such as virtual or physical Netscaler VIPs’ with multiple servers defined in the XenApp XML VIP Design high availability for Citrix XML XenDesktop processes such as virtual or physical Netscaler VIPs’ with multiple servers defined in the XenDesktop (DDCs’) XML VIP Deploy Phase Deploy hardware, storage, and software infrastructure components Deploy Citrix ready applications per Define Phase Monitor Phase Monitoring the environment is critical. Utilizing existing monitoring tools or deploying Citrix specific monitoring tools Every component should be monitored for processor, memory, storage IO (LUNS or local), and service specific monitoring to each role: XenApp Controllers, XenApp hosting servers, XenDesktop Controllers, Hypervisor, WANS, core switches, top of rack or end of rack switches back to core (if used), VCenter, network cards (particularly on PVS), Netscalers, MPLS connections, dependency routers/switches/VPN equipment. Monitoring is generally handled by Tier-1 resources, generally referred to as Citrix Administrators with minimum CCA certification and 1-4 years’ experience. Brian Murphy