SlideShare uma empresa Scribd logo
1 de 55
Citrix Internals: Tracing, Debugging &
Troubleshooting
(The Shaman’s guide to troubleshooting)
Denis Gundarev
Senior Consultant
Entisys Solutions
About me
C:>whoami /all
USER INFORMATION
----------------
User Name Twitter E-Mail
============== ============ ==================
ENTISYSdenisg @fdwl DenisG@entisys.com
GROUP INFORMATION
-----------------
Group Name Type SID
======================================== ================ =================
BUILTINGeeks Mandatory group S-1-5-32-540
Mandatory LabelCrazy Russian Label S-1-16-8192
COMMUNITYBay Area Citrix User Group Well-known group S-1-5-32-544
COMMUNITYCitrix Technology Professional Well-known group S-1-5-32-545
What’s the topic?
• Not a basic “Restart the computer” stuff
• Do not restart the computer if you going to troubleshoot the issue
• Not a CDF tracing tutorial
• Search for TechEdge presentations on citrix.com
• Not a crash dump analysis workshop
• Check Dmitry Vostokov’s http://www.dumpanalysis.org/
Shaman’s Guide to Troubleshooting
Phase 1 Phase 2 Phase 3
Identify
the Issue
Profit
StoreFront Troubleshooting
support.citrix.com
• 250+ articles about Web Interface
• 2000+ articles about XenApp
• 240 articles about XenDesktop 7
• 8 articles about StoreFront 2.0
Generic Errors in StoreFront
Step 1: Check event logs
Storefront Internals
• StoreFront (as well as most of the XenDesktop components) is based
on Windows Communication Foundation (WCF)
• WCF services communicate with each other using endpoints
• Endpoint configuration and listening address defined in the .config file
Step 2: Search files for text
PS C:>Get-ChildItem -Recurse *.config|Select-String "net.pipe://localhost/Citrix/Authentication/Win32"
Select-Object -Property Path, LineNumber
|
|Out-GridView -OutputMode Multiple |%{notepad $_.Path}
Some service is causing this issue. Which one?
Step 3: Search for service by executable path
PS C:>Get-WmiObject -Class Win32_Service -Filter "pathname like '%defaultdomainservices%'"
Select-Object -Property Displayname, PathName, Started
|
|Out-GridView
Generic Errors in StoreFront
Step 1: Check event logs
Step 2: Search files for text
PS C:>Get-ChildItem -Recurse *.config|Select-String "loadbalancer.corp.itbubble.ru"
Select-Object -Property Path, LineNumber
|
|Out-GridView -OutputMode Multiple |%{notepad $_.Path}
Step 2: Search files for text
PS C:>Get-ChildItem -Recurse *.config|Select-String "loadbalancer.corp.itbubble.ru"
Select-Object -Property Path, LineNumber
|
|Out-GridView -OutputMode Multiple |%{notepad $_.Path}
Fiddler
Generic Errors in StoreFront
Fiddler
Fiddler
• Set-Cookie:
NSC_ttmx=ffffffffc3a01fa645525d5f4f58455e445a4a423660;expires=Sun, 14-
Jul-2013 13:46:47 GMT;path=/;secure;httponly
• Set-Cookie:
NSC_ttmx=ffffffffc3a01fa245525d5f4f58455e445a4a423660;expires=Sun, 14-
Jul-2013 13:47:15 GMT;path=/;secure;httponly
• Set-Cookie:
NSC_ttmx=ffffffffc3a01fa645525d5f4f58455e445a4a423660;expires=Sun, 14-
Jul-2013 13:47:15 GMT;path=/;secure;httponly
• Set-Cookie:
NSC_ttmx=ffffffffc3a01fa245525d5f4f58455e445a4a423660;expires=Sun, 14-
Jul-2013 13:47:15 GMT;path=/;secure;httponly
StoreFront tracing
• http://support.citrix.com/proddocs/topic/dws-storefront-10/dws-
troubleshoot.html
• To enable tracing
• Using an account with local administrator permissions on the Receiver
Storefront server, start Windows PowerShell and, at a command prompt, type
the following commands.
• > Add-PSSnapin Citrix.DeliveryServices.Framework.Commands
• > Set-DSTraceLevel -All -TraceLevel Verbose
• To disable tracing, type the following commands.
• > Add-PSSnapin Citrix.DeliveryServices.Framework.Commands
• > Set-DSTraceLevel -All -TraceLevel Off
StoreFront tracing
Service Configuration Editor
• Available with Windows
SDK
• Allows administrators to
modify configuration
settings for WCF services
using a graphical user
interface
Search Files for Text
PS C:>Get-ChildItem -Recurse *.config -ErrorAction SilentlyContinue |
|Select-Object -Property Path,LineNumber |Select-String "Program FilesCitrixReceiver StoreFrontAdminTrace"
Out-GridView -OutputMode Multiple |%{c:SvcConfigEditor.exe $_.Path}
Set up XML tracing
• Diagnostics -> Listeners -> SetDSTraceLevelCmdletListener
Set up XML tracing
• InitData -> c:temp<ServiceName>.svclog
• TypeOutputOptions ->
-> Check all fields
• TypeName ->
System.Diagnostics.XmlWriterTraceListener
Service Trace Viewer Tool (SvcTraceViewer.exe)
Service Trace Viewer Tool (SvcTraceViewer.exe)
Receiver for Web
Receiver for Web
35
36
37
38
39
Reverse Engineering
41
ILSpy
• Assembly browsing
• IL Disassembly
• Decompilation to C#
• Decompilation to VB
• Find usage of field/method
• Available at http://ILSpy.net
• Free
42
• Unhandled exception error when browsing for an application in
Delivery Services Console or AppCenter
43
• System.IO.DirectoryNotFoundException: The system cannot find the path specified. (Exception from HRESULT:
0x80070003)
• at IWshRuntimeLibrary.IWshShortcut.Save()
• at Citrix.CMI.PSE.Utils.FileBrowsing.CreateServerLinks(FileDialog dialog, ServerSet serverSet, ModifyShareNameCallback
modifyShareNameCallback)
• at Citrix.CMI.PSE.Cmo.App.PropertyPages.InstalledICALocationPage.u_browseCommandLineButton_Click(Object sender,
EventArgs e)
• at System.Windows.Forms.Control.OnClick(EventArgs e)
• at System.Windows.Forms.Button.OnClick(EventArgs e)
• at System.Windows.Forms.Button.OnMouseUp(MouseEventArgs mevent)
• at System.Windows.Forms.Control.WmMouseUp(Message& m, MouseButtons button, Int32 clicks)
• at System.Windows.Forms.Control.WndProc(Message&#38; m)
• at System.Windows.Forms.ButtonBase.WndProc(Message& m)
• at System.Windows.Forms.Button.WndProc(Message8; m)
• at System.Windows.Forms.Control.ControlNativeWindow.OnMessage(Message&; m)
• at System.Windows.Forms.Control.ControlNativeWindow.WndProc(Message& m)
• at System.Windows.Forms.NativeWindow.Callback(IntPtr hWnd, Int32 msg, IntPtr wparam, IntPtr lparam)
44
• Cause:
• Customer have Folder redirection implemented via GPO and
"Links" special folder is redirected.
• Citrix Management console doesn't handle folder redirection and
assume that %USERPROFILE%Links folder exists.
•
private static readonly string FavoriteLink =
Path.Combine(Path.Combine(Environment.GetEnvironmentVa
riable("USERPROFILE"), "Links"),
Services.ResString.GetGlobal("$Profile_Links_Shortcut_Nam
e") + ".lnk");
45
46
Search Files for Text
PS C:>Get-ChildItem -Recurse *.* -ErrorAction SilentlyContinue |Select-String "XenDesktop is not installed"
Select-Object -Property Path
|
C:WindowsassemblyNativeImages_v2.0.50727_32Citrix.GroupPolicy.#
a4a323e135cabd1324a46585b70ee461Citrix.GroupPolicy.Filters.ni.dll
47
48
49
50
Is it Legal?
In any event, you may not modify, translate, reverse engineer, decompile,
disassemble, create derivative works based on, or copy the SOFTWARE,
except as specifically licensed herein or to the extent such foregoing restriction
is expressly prohibited by applicable law.“ Citrix XenDesktop 7 EULA
Are there things I’m not allowed to do with the software? Yes. Because the
software is licensed, not sold, Microsoft reserves all rights ..... not expressly
granted in this agreement. In particular, this license does not give you any right
to, and you may not: ..... reverse engineer, decompile, or disassemble the
software, except if the laws where you live permit this even when our
agreement does not. In that case, you may do only what your law allows. .....
Microsoft Windows 8 EULA
In any event, you may not modify, translate, reverse engineer, decompile,
disassemble, create derivative works based on, or copy the SOFTWARE,
except as specifically licensed herein or to the extent such foregoing restriction
is expressly prohibited by applicable law.
Are there things I’m not allowed to do with the software? Yes. Because the
software is licensed, not sold, Microsoft reserves all rights ..... not expressly
granted in this agreement. In particular, this license does not give you any right
to, and you may not: ..... reverse engineer, decompile, or disassemble the
software, except if the laws where you live permit this even when our
agreement does not. In that case, you may do only what your law allows. .....
In any event, you may not modify, translate, reverse engineer, decompile,
disassemble, create derivative works based on, or copy the SOFTWARE,
except as specifically licensed herein or to the extent such foregoing restriction
is expressly prohibited by applicable law.
Are there things I’m not allowed to do with the software? Yes. Because the
software is licensed, not sold, Microsoft reserves all rights ..... not expressly
granted in this agreement. In particular, this license does not give you any right
to, and you may not: ..... reverse engineer, decompile, or disassemble the
software, except if the laws where you live permit this even when our
agreement does not. In that case, you may do only what your law allows. .....
Is it Legal?
Sec. 103(f) of the DMCA (17 U.S.C. § 1201 (f)):
• (f) Reverse Engineering.—
(1) Notwithstanding the provisions of subsection (a)(1)(A), a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure that effectively controls
access to a particular portion of that program for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer
program with other programs, and that have not previously been readily available to the person engaging in the circumvention, to the extent any such acts of identification and analysis do not constitute
infringement under this title.
(2) Notwithstanding the provisions of subsections (a)(2) and (b), a person may develop and employ technological means to circumvent a technological measure, or to circumvent protection afforded by a
technological measure, in order to enable the identification and analysis under paragraph (1), or for the purpose of enabling interoperability of an independently created computer program with other programs,
if such means are necessary to achieve such interoperability, to the extent that doing so does not constitute infringement under this title.
(3) The information acquired through the acts permitted under paragraph (1), and the means permitted under paragraph (2), may be made available to others if the person referred to in paragraph (1) or (2), as
the case may be, provides such information or means solely for the purpose of enabling interoperability of an independently created computer program with other programs, and to the extent that doing so does
not constitute infringement under this title or violate applicable law other than this section.
(4) For purposes of this subsection, the term 「interoperability」 means the ability of computer programs to exchange information, and of such programs mutually to use the information which has been
exchanged.
Article 6 of the 1991 EU Computer Programs Directive
• (15) The unauthorised reproduction, translation, adaptation or transformation of the form of the code in which a copy of a computer program has been made available constitutes an infringement of the
exclusive rights of the author. Nevertheless, circumstances may exist when such a reproduction of the code and translation of its form are indispensable to obtain the necessary infor-mation to achieve the
interoperability of an indepen-dently created program with other programs. It has therefore to be considered that, in these limited circum-stances only, performance of the acts of reproduction and translation by
or on behalf of a person having a right to use a copy of the program is legitimate and compatible with fair practice and must therefore be deemed not to require the authorisation of the right-holder. An objective
of this exception is to make it possible to connect all components of a computer system, including those of different manufacturers, so that they can work together. Such an exception to the author's exclusive
rights may not be used in a way which prejudices the legitimate interests of the rightholder or which conflicts with a normal exploitation of the program.
“ …for the sole purpose of identifying and analyzing
those elements of the program that are necessary to
achieve interoperability of an independently created
computer program with other programs…
…to obtain the necessary infor-mation to achieve
the interoperability of an indepen-dently created
program with other programs….
Conclusion
• Use PowerShell for searching
• Analyze config files
• Use Fiddler to sniff StoreFront traffic
• Use ILSpy
Q&A
• @fdwl
• denisg@entisys.com
• http://meetup.com/BayCUG
• http://blog.itbubble.ru

Mais conteúdo relacionado

Destaque

Briforum 2011 Chicago
Briforum 2011 ChicagoBriforum 2011 Chicago
Briforum 2011 ChicagoDan Brinkmann
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5Denis Gundarev
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDenis Gundarev
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDenis Gundarev
 
ID Next 2013 Keynote Slides by Mike Schwartz
ID Next 2013 Keynote Slides by Mike SchwartzID Next 2013 Keynote Slides by Mike Schwartz
ID Next 2013 Keynote Slides by Mike SchwartzMike Schwartz
 
RSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud IdentityRSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud IdentityMike Schwartz
 
Mule security - saml
Mule  security - samlMule  security - saml
Mule security - samlcharan teja R
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDenis Gundarev
 
Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014Mike Schwartz
 
Cloud Identity: A Recipe for Higher Education
Cloud Identity: A Recipe for Higher EducationCloud Identity: A Recipe for Higher Education
Cloud Identity: A Recipe for Higher EducationMike Schwartz
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VDenis Gundarev
 
Clickjacking DevCon2011
Clickjacking DevCon2011Clickjacking DevCon2011
Clickjacking DevCon2011Krishna T
 
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Mike Schwartz
 
WebRTC Identity in SAML Federations
WebRTC Identity in SAML FederationsWebRTC Identity in SAML Federations
WebRTC Identity in SAML FederationsMihály Mészáros
 
Token, token... From SAML to OIDC
Token, token... From SAML to OIDCToken, token... From SAML to OIDC
Token, token... From SAML to OIDCShiu-Fun Poon
 
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!Mike Schwartz
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDenis Gundarev
 

Destaque (20)

The Tools I Use
The Tools I UseThe Tools I Use
The Tools I Use
 
Briforum 2011 Chicago
Briforum 2011 ChicagoBriforum 2011 Chicago
Briforum 2011 Chicago
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo Murris
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
 
ID Next 2013 Keynote Slides by Mike Schwartz
ID Next 2013 Keynote Slides by Mike SchwartzID Next 2013 Keynote Slides by Mike Schwartz
ID Next 2013 Keynote Slides by Mike Schwartz
 
RSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud IdentityRSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud Identity
 
Mule security - saml
Mule  security - samlMule  security - saml
Mule security - saml
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris Rogers
 
Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014
 
Cloud Identity: A Recipe for Higher Education
Cloud Identity: A Recipe for Higher EducationCloud Identity: A Recipe for Higher Education
Cloud Identity: A Recipe for Higher Education
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
 
Kantara OTTO slides
Kantara OTTO slidesKantara OTTO slides
Kantara OTTO slides
 
Clickjacking DevCon2011
Clickjacking DevCon2011Clickjacking DevCon2011
Clickjacking DevCon2011
 
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
 
How to Fail at VDI
How to Fail at VDIHow to Fail at VDI
How to Fail at VDI
 
WebRTC Identity in SAML Federations
WebRTC Identity in SAML FederationsWebRTC Identity in SAML Federations
WebRTC Identity in SAML Federations
 
Token, token... From SAML to OIDC
Token, token... From SAML to OIDCToken, token... From SAML to OIDC
Token, token... From SAML to OIDC
 
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick Dehlinger
 

Semelhante a BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev

How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....Denis Gundarev
 
Deform 3 d_v61_unix_installation_notes
Deform 3 d_v61_unix_installation_notesDeform 3 d_v61_unix_installation_notes
Deform 3 d_v61_unix_installation_notessundar sivam
 
Deploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionDeploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionNuno Alves
 
XPDDS18: Xenwatch Multithreading - Dongli Zhang, Oracle
XPDDS18: Xenwatch Multithreading - Dongli Zhang, OracleXPDDS18: Xenwatch Multithreading - Dongli Zhang, Oracle
XPDDS18: Xenwatch Multithreading - Dongli Zhang, OracleThe Linux Foundation
 
Tizen Studio Installation&amp;Setup
Tizen Studio Installation&amp;SetupTizen Studio Installation&amp;Setup
Tizen Studio Installation&amp;SetupManoj Behera
 
TechEd NZ 2014: Extending Microsoft System Center 2012 Operations Manager to ...
TechEd NZ 2014: Extending Microsoft System Center 2012 Operations Manager to ...TechEd NZ 2014: Extending Microsoft System Center 2012 Operations Manager to ...
TechEd NZ 2014: Extending Microsoft System Center 2012 Operations Manager to ...Intergen
 
Maintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentMaintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentDavid McGeough
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedfangjiafu
 
How do I uninstall Driver Support for Windows?
How do I uninstall Driver Support for Windows?How do I uninstall Driver Support for Windows?
How do I uninstall Driver Support for Windows?howtoguides
 
How to create your own Linux distribution (embedded-gothenburg)
How to create your own Linux distribution (embedded-gothenburg)How to create your own Linux distribution (embedded-gothenburg)
How to create your own Linux distribution (embedded-gothenburg)Dimitrios Platis
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administrationConcentrated Technology
 
Safeconsole admin guide
Safeconsole admin guideSafeconsole admin guide
Safeconsole admin guideMariusEnescu3
 
Ubuntu And Parental Controls
Ubuntu And Parental ControlsUbuntu And Parental Controls
Ubuntu And Parental Controlsjasonholtzapple
 
IDRAC 7 with ad whitepaper_v1.1
IDRAC 7 with ad whitepaper_v1.1IDRAC 7 with ad whitepaper_v1.1
IDRAC 7 with ad whitepaper_v1.1Matti Hyppönen
 
How to Clear VRChat Cache
How to Clear VRChat CacheHow to Clear VRChat Cache
How to Clear VRChat Cachessuser1eca7d
 
Monitoring Windows Server Systems Demo Script
Monitoring Windows Server Systems Demo ScriptMonitoring Windows Server Systems Demo Script
Monitoring Windows Server Systems Demo ScriptMicrosoft TechNet
 
All ivanti is a secure workspace - Bsides Delft 2018
All ivanti is a secure workspace - Bsides Delft 2018All ivanti is a secure workspace - Bsides Delft 2018
All ivanti is a secure workspace - Bsides Delft 2018Johanna Curiel
 

Semelhante a BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev (20)

How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
 
Readme (us)
Readme (us)Readme (us)
Readme (us)
 
Deform 3 d_v61_unix_installation_notes
Deform 3 d_v61_unix_installation_notesDeform 3 d_v61_unix_installation_notes
Deform 3 d_v61_unix_installation_notes
 
Deploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionDeploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 Solution
 
XPDDS18: Xenwatch Multithreading - Dongli Zhang, Oracle
XPDDS18: Xenwatch Multithreading - Dongli Zhang, OracleXPDDS18: Xenwatch Multithreading - Dongli Zhang, Oracle
XPDDS18: Xenwatch Multithreading - Dongli Zhang, Oracle
 
Tizen Studio Installation&amp;Setup
Tizen Studio Installation&amp;SetupTizen Studio Installation&amp;Setup
Tizen Studio Installation&amp;Setup
 
TechEd NZ 2014: Extending Microsoft System Center 2012 Operations Manager to ...
TechEd NZ 2014: Extending Microsoft System Center 2012 Operations Manager to ...TechEd NZ 2014: Extending Microsoft System Center 2012 Operations Manager to ...
TechEd NZ 2014: Extending Microsoft System Center 2012 Operations Manager to ...
 
Maintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentMaintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 Environment
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
 
How do I uninstall Driver Support for Windows?
How do I uninstall Driver Support for Windows?How do I uninstall Driver Support for Windows?
How do I uninstall Driver Support for Windows?
 
How to create your own Linux distribution (embedded-gothenburg)
How to create your own Linux distribution (embedded-gothenburg)How to create your own Linux distribution (embedded-gothenburg)
How to create your own Linux distribution (embedded-gothenburg)
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
 
Safeconsole admin guide
Safeconsole admin guideSafeconsole admin guide
Safeconsole admin guide
 
Azure from scratch part 4
Azure from scratch part 4Azure from scratch part 4
Azure from scratch part 4
 
Ubuntu And Parental Controls
Ubuntu And Parental ControlsUbuntu And Parental Controls
Ubuntu And Parental Controls
 
IDRAC 7 with ad whitepaper_v1.1
IDRAC 7 with ad whitepaper_v1.1IDRAC 7 with ad whitepaper_v1.1
IDRAC 7 with ad whitepaper_v1.1
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
How to Clear VRChat Cache
How to Clear VRChat CacheHow to Clear VRChat Cache
How to Clear VRChat Cache
 
Monitoring Windows Server Systems Demo Script
Monitoring Windows Server Systems Demo ScriptMonitoring Windows Server Systems Demo Script
Monitoring Windows Server Systems Demo Script
 
All ivanti is a secure workspace - Bsides Delft 2018
All ivanti is a secure workspace - Bsides Delft 2018All ivanti is a secure workspace - Bsides Delft 2018
All ivanti is a secure workspace - Bsides Delft 2018
 

Mais de Denis Gundarev

VMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingVMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingDenis Gundarev
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeDenis Gundarev
 
Citrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityCitrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityDenis Gundarev
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseDenis Gundarev
 
How to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSHow to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSDenis Gundarev
 
How to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityHow to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityDenis Gundarev
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUGDenis Gundarev
 
Deep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDeep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDenis Gundarev
 
Anton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudAnton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudDenis Gundarev
 
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...Denis Gundarev
 
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterRUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterDenis Gundarev
 
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войныRUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войныDenis Gundarev
 
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDXAlexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDXDenis Gundarev
 
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностейRUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностейDenis Gundarev
 
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоRUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоDenis Gundarev
 
Citrix XenApp — будущее и настоящее
Citrix XenApp — будущее и настоящееCitrix XenApp — будущее и настоящее
Citrix XenApp — будущее и настоящееDenis Gundarev
 
Citrix и мобильность
Citrix и мобильностьCitrix и мобильность
Citrix и мобильностьDenis Gundarev
 
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergy
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergyтехники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergy
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix SynergyDenis Gundarev
 
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущееxen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущееDenis Gundarev
 

Mais de Denis Gundarev (19)

VMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingVMware App Volumes Troubleshooting
VMware App Volumes Troubleshooting
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternative
 
Citrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityCitrix Internals: ICA Connectivity
Citrix Internals: ICA Connectivity
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your Enterprise
 
How to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSHow to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWS
 
How to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityHow to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobility
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
 
Deep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDeep dive in Citrix Troubleshooting
Deep dive in Citrix Troubleshooting
 
Anton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudAnton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloud
 
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
 
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterRUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
 
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войныRUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
 
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDXAlexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
 
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностейRUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
 
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоRUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
 
Citrix XenApp — будущее и настоящее
Citrix XenApp — будущее и настоящееCitrix XenApp — будущее и настоящее
Citrix XenApp — будущее и настоящее
 
Citrix и мобильность
Citrix и мобильностьCitrix и мобильность
Citrix и мобильность
 
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergy
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergyтехники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergy
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergy
 
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущееxen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev

  • 1. Citrix Internals: Tracing, Debugging & Troubleshooting (The Shaman’s guide to troubleshooting) Denis Gundarev Senior Consultant Entisys Solutions
  • 2. About me C:>whoami /all USER INFORMATION ---------------- User Name Twitter E-Mail ============== ============ ================== ENTISYSdenisg @fdwl DenisG@entisys.com GROUP INFORMATION ----------------- Group Name Type SID ======================================== ================ ================= BUILTINGeeks Mandatory group S-1-5-32-540 Mandatory LabelCrazy Russian Label S-1-16-8192 COMMUNITYBay Area Citrix User Group Well-known group S-1-5-32-544 COMMUNITYCitrix Technology Professional Well-known group S-1-5-32-545
  • 3. What’s the topic? • Not a basic “Restart the computer” stuff • Do not restart the computer if you going to troubleshoot the issue • Not a CDF tracing tutorial • Search for TechEdge presentations on citrix.com • Not a crash dump analysis workshop • Check Dmitry Vostokov’s http://www.dumpanalysis.org/
  • 4.
  • 5. Shaman’s Guide to Troubleshooting Phase 1 Phase 2 Phase 3 Identify the Issue Profit
  • 6.
  • 8. support.citrix.com • 250+ articles about Web Interface • 2000+ articles about XenApp • 240 articles about XenDesktop 7 • 8 articles about StoreFront 2.0
  • 9. Generic Errors in StoreFront
  • 10.
  • 11. Step 1: Check event logs
  • 12. Storefront Internals • StoreFront (as well as most of the XenDesktop components) is based on Windows Communication Foundation (WCF) • WCF services communicate with each other using endpoints • Endpoint configuration and listening address defined in the .config file
  • 13. Step 2: Search files for text PS C:>Get-ChildItem -Recurse *.config|Select-String "net.pipe://localhost/Citrix/Authentication/Win32" Select-Object -Property Path, LineNumber | |Out-GridView -OutputMode Multiple |%{notepad $_.Path}
  • 14. Some service is causing this issue. Which one?
  • 15. Step 3: Search for service by executable path PS C:>Get-WmiObject -Class Win32_Service -Filter "pathname like '%defaultdomainservices%'" Select-Object -Property Displayname, PathName, Started | |Out-GridView
  • 16. Generic Errors in StoreFront
  • 17. Step 1: Check event logs
  • 18. Step 2: Search files for text PS C:>Get-ChildItem -Recurse *.config|Select-String "loadbalancer.corp.itbubble.ru" Select-Object -Property Path, LineNumber | |Out-GridView -OutputMode Multiple |%{notepad $_.Path}
  • 19. Step 2: Search files for text PS C:>Get-ChildItem -Recurse *.config|Select-String "loadbalancer.corp.itbubble.ru" Select-Object -Property Path, LineNumber | |Out-GridView -OutputMode Multiple |%{notepad $_.Path}
  • 21. Generic Errors in StoreFront
  • 23. Fiddler • Set-Cookie: NSC_ttmx=ffffffffc3a01fa645525d5f4f58455e445a4a423660;expires=Sun, 14- Jul-2013 13:46:47 GMT;path=/;secure;httponly • Set-Cookie: NSC_ttmx=ffffffffc3a01fa245525d5f4f58455e445a4a423660;expires=Sun, 14- Jul-2013 13:47:15 GMT;path=/;secure;httponly • Set-Cookie: NSC_ttmx=ffffffffc3a01fa645525d5f4f58455e445a4a423660;expires=Sun, 14- Jul-2013 13:47:15 GMT;path=/;secure;httponly • Set-Cookie: NSC_ttmx=ffffffffc3a01fa245525d5f4f58455e445a4a423660;expires=Sun, 14- Jul-2013 13:47:15 GMT;path=/;secure;httponly
  • 24.
  • 25. StoreFront tracing • http://support.citrix.com/proddocs/topic/dws-storefront-10/dws- troubleshoot.html • To enable tracing • Using an account with local administrator permissions on the Receiver Storefront server, start Windows PowerShell and, at a command prompt, type the following commands. • > Add-PSSnapin Citrix.DeliveryServices.Framework.Commands • > Set-DSTraceLevel -All -TraceLevel Verbose • To disable tracing, type the following commands. • > Add-PSSnapin Citrix.DeliveryServices.Framework.Commands • > Set-DSTraceLevel -All -TraceLevel Off
  • 27. Service Configuration Editor • Available with Windows SDK • Allows administrators to modify configuration settings for WCF services using a graphical user interface
  • 28. Search Files for Text PS C:>Get-ChildItem -Recurse *.config -ErrorAction SilentlyContinue | |Select-Object -Property Path,LineNumber |Select-String "Program FilesCitrixReceiver StoreFrontAdminTrace" Out-GridView -OutputMode Multiple |%{c:SvcConfigEditor.exe $_.Path}
  • 29. Set up XML tracing • Diagnostics -> Listeners -> SetDSTraceLevelCmdletListener
  • 30. Set up XML tracing • InitData -> c:temp<ServiceName>.svclog • TypeOutputOptions -> -> Check all fields • TypeName -> System.Diagnostics.XmlWriterTraceListener
  • 31. Service Trace Viewer Tool (SvcTraceViewer.exe)
  • 32. Service Trace Viewer Tool (SvcTraceViewer.exe)
  • 35. 35
  • 36. 36
  • 37. 37
  • 38. 38
  • 39. 39
  • 41. 41 ILSpy • Assembly browsing • IL Disassembly • Decompilation to C# • Decompilation to VB • Find usage of field/method • Available at http://ILSpy.net • Free
  • 42. 42 • Unhandled exception error when browsing for an application in Delivery Services Console or AppCenter
  • 43. 43 • System.IO.DirectoryNotFoundException: The system cannot find the path specified. (Exception from HRESULT: 0x80070003) • at IWshRuntimeLibrary.IWshShortcut.Save() • at Citrix.CMI.PSE.Utils.FileBrowsing.CreateServerLinks(FileDialog dialog, ServerSet serverSet, ModifyShareNameCallback modifyShareNameCallback) • at Citrix.CMI.PSE.Cmo.App.PropertyPages.InstalledICALocationPage.u_browseCommandLineButton_Click(Object sender, EventArgs e) • at System.Windows.Forms.Control.OnClick(EventArgs e) • at System.Windows.Forms.Button.OnClick(EventArgs e) • at System.Windows.Forms.Button.OnMouseUp(MouseEventArgs mevent) • at System.Windows.Forms.Control.WmMouseUp(Message& m, MouseButtons button, Int32 clicks) • at System.Windows.Forms.Control.WndProc(Message&#38; m) • at System.Windows.Forms.ButtonBase.WndProc(Message& m) • at System.Windows.Forms.Button.WndProc(Message8; m) • at System.Windows.Forms.Control.ControlNativeWindow.OnMessage(Message&; m) • at System.Windows.Forms.Control.ControlNativeWindow.WndProc(Message& m) • at System.Windows.Forms.NativeWindow.Callback(IntPtr hWnd, Int32 msg, IntPtr wparam, IntPtr lparam)
  • 44. 44 • Cause: • Customer have Folder redirection implemented via GPO and "Links" special folder is redirected. • Citrix Management console doesn't handle folder redirection and assume that %USERPROFILE%Links folder exists. • private static readonly string FavoriteLink = Path.Combine(Path.Combine(Environment.GetEnvironmentVa riable("USERPROFILE"), "Links"), Services.ResString.GetGlobal("$Profile_Links_Shortcut_Nam e") + ".lnk");
  • 45. 45
  • 46. 46 Search Files for Text PS C:>Get-ChildItem -Recurse *.* -ErrorAction SilentlyContinue |Select-String "XenDesktop is not installed" Select-Object -Property Path | C:WindowsassemblyNativeImages_v2.0.50727_32Citrix.GroupPolicy.# a4a323e135cabd1324a46585b70ee461Citrix.GroupPolicy.Filters.ni.dll
  • 47. 47
  • 48. 48
  • 49. 49
  • 50. 50
  • 51.
  • 52. Is it Legal? In any event, you may not modify, translate, reverse engineer, decompile, disassemble, create derivative works based on, or copy the SOFTWARE, except as specifically licensed herein or to the extent such foregoing restriction is expressly prohibited by applicable law.“ Citrix XenDesktop 7 EULA Are there things I’m not allowed to do with the software? Yes. Because the software is licensed, not sold, Microsoft reserves all rights ..... not expressly granted in this agreement. In particular, this license does not give you any right to, and you may not: ..... reverse engineer, decompile, or disassemble the software, except if the laws where you live permit this even when our agreement does not. In that case, you may do only what your law allows. ..... Microsoft Windows 8 EULA In any event, you may not modify, translate, reverse engineer, decompile, disassemble, create derivative works based on, or copy the SOFTWARE, except as specifically licensed herein or to the extent such foregoing restriction is expressly prohibited by applicable law. Are there things I’m not allowed to do with the software? Yes. Because the software is licensed, not sold, Microsoft reserves all rights ..... not expressly granted in this agreement. In particular, this license does not give you any right to, and you may not: ..... reverse engineer, decompile, or disassemble the software, except if the laws where you live permit this even when our agreement does not. In that case, you may do only what your law allows. ..... In any event, you may not modify, translate, reverse engineer, decompile, disassemble, create derivative works based on, or copy the SOFTWARE, except as specifically licensed herein or to the extent such foregoing restriction is expressly prohibited by applicable law. Are there things I’m not allowed to do with the software? Yes. Because the software is licensed, not sold, Microsoft reserves all rights ..... not expressly granted in this agreement. In particular, this license does not give you any right to, and you may not: ..... reverse engineer, decompile, or disassemble the software, except if the laws where you live permit this even when our agreement does not. In that case, you may do only what your law allows. .....
  • 53. Is it Legal? Sec. 103(f) of the DMCA (17 U.S.C. § 1201 (f)): • (f) Reverse Engineering.— (1) Notwithstanding the provisions of subsection (a)(1)(A), a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure that effectively controls access to a particular portion of that program for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs, and that have not previously been readily available to the person engaging in the circumvention, to the extent any such acts of identification and analysis do not constitute infringement under this title. (2) Notwithstanding the provisions of subsections (a)(2) and (b), a person may develop and employ technological means to circumvent a technological measure, or to circumvent protection afforded by a technological measure, in order to enable the identification and analysis under paragraph (1), or for the purpose of enabling interoperability of an independently created computer program with other programs, if such means are necessary to achieve such interoperability, to the extent that doing so does not constitute infringement under this title. (3) The information acquired through the acts permitted under paragraph (1), and the means permitted under paragraph (2), may be made available to others if the person referred to in paragraph (1) or (2), as the case may be, provides such information or means solely for the purpose of enabling interoperability of an independently created computer program with other programs, and to the extent that doing so does not constitute infringement under this title or violate applicable law other than this section. (4) For purposes of this subsection, the term 「interoperability」 means the ability of computer programs to exchange information, and of such programs mutually to use the information which has been exchanged. Article 6 of the 1991 EU Computer Programs Directive • (15) The unauthorised reproduction, translation, adaptation or transformation of the form of the code in which a copy of a computer program has been made available constitutes an infringement of the exclusive rights of the author. Nevertheless, circumstances may exist when such a reproduction of the code and translation of its form are indispensable to obtain the necessary infor-mation to achieve the interoperability of an indepen-dently created program with other programs. It has therefore to be considered that, in these limited circum-stances only, performance of the acts of reproduction and translation by or on behalf of a person having a right to use a copy of the program is legitimate and compatible with fair practice and must therefore be deemed not to require the authorisation of the right-holder. An objective of this exception is to make it possible to connect all components of a computer system, including those of different manufacturers, so that they can work together. Such an exception to the author's exclusive rights may not be used in a way which prejudices the legitimate interests of the rightholder or which conflicts with a normal exploitation of the program. “ …for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs… …to obtain the necessary infor-mation to achieve the interoperability of an indepen-dently created program with other programs….
  • 54. Conclusion • Use PowerShell for searching • Analyze config files • Use Fiddler to sniff StoreFront traffic • Use ILSpy
  • 55. Q&A • @fdwl • denisg@entisys.com • http://meetup.com/BayCUG • http://blog.itbubble.ru

Notas do Editor

  1. PS C:\&gt; Get-ChildItem -Recurse *.config |Select-String &quot;net.pipe://localhost/Citrix/Authentication/Win32&quot; |Select-Object -Property Path,LineNumber|Out-GridView -OutputMode Multiple|%{notepad $_.Path}
  2. PS C:\&gt; Get-WmiObject -Class Win32_Service -Filter &quot;pathname like &apos;%defaultdomainservices%&apos;&quot;|Select-Object -Property Displayname, PathName, Started|Out-GridView
  3. PS C:\&gt; Get-ChildItem -Recurse *.config |Select-String &quot;net.pipe://localhost/Citrix/Authentication/Win32&quot; |Select-Object -Property Path,LineNumber|Out-GridView -OutputMode Multiple|%{notepad $_.Path}
  4. PS C:\&gt; Get-ChildItem -Recurse *.config |Select-String &quot;net.pipe://localhost/Citrix/Authentication/Win32&quot; |Select-Object -Property Path,LineNumber|Out-GridView -OutputMode Multiple|%{notepad $_.Path}
  5. Get-ChildItem -Recurse *.config -ErrorActionSilentlyContinue|Select-String &quot;Program Files\\Citrix\\Receiver StoreFront\\Admin\\Trace&quot; |Select-Object -Property Path,LineNumber|Out-GridView -OutputMode Multiple|%{c:\SvcConfigEditor.exe $_.Path}
  6. Get-ChildItem -Recurse *.* -ErrorActionSilentlyContinue|Select-String &quot;XenDesktop is not installed&quot; |Select-Object -Property Path