2. What is Datastore?
Answer
:- This is the place where all
the static information are stored. The data store
provides a repository of persistent information about the farm (Farm
configuration information, Published Application configurations, Server configurations,
Static policy configuration, XenApp administrator accounts, and Printer
configurations) that all servers can refer.
The data store is the central repository where almost the entire Citrix implementation is invested. The Administrators of the farm, the license server to point to, the whole farm configuration, the published applications, all their properties, the security of who gets access to what, the custom load evaluators, custom policies, configured printers and print drivers, all this is stored in the central repository called the data store.
The data store is the central repository where almost the entire Citrix implementation is invested. The Administrators of the farm, the license server to point to, the whole farm configuration, the published applications, all their properties, the security of who gets access to what, the custom load evaluators, custom policies, configured printers and print drivers, all this is stored in the central repository called the data store.
3. What is Data Collector?
Answer:- Data Collector stores all the dynamic
information like session, load and published applications in the
servers in their zones and communicates the zone information to the Data
Collectors in other zones in the farm
Data collector is a Citrix Presentation Server whose IMA service takes on the additional role of tracking all of the dynamic information of other Presentation Servers. This information is stored in memory and called the “dynamic store”. The data store is a database on disk. The dynamic store is information stored in memory.
To look the contents of the in-memory dynamic store on the data collector, use “queryds” command. QueryDS can be found in the “support\debug” folder of your Presentation Server installation source files.
To determine which server is acting as the data collector in the zone run “query farm /zone” from the command line
Data collector is a Citrix Presentation Server whose IMA service takes on the additional role of tracking all of the dynamic information of other Presentation Servers. This information is stored in memory and called the “dynamic store”. The data store is a database on disk. The dynamic store is information stored in memory.
To look the contents of the in-memory dynamic store on the data collector, use “queryds” command. QueryDS can be found in the “support\debug” folder of your Presentation Server installation source files.
To determine which server is acting as the data collector in the zone run “query farm /zone” from the command line
4. What is LHC?
Answer
:- The IMA service running on
each Presentation Server downloads the information it needs from the central
data store into a local MDB database called the local host cache, or “LHC.”
(The location of the local host cache is specified via a DSN referenced in the
registry of the Presentation Server, at HKLM\SOFTWARE\Citrix\IMA\LHCDatasource\DataSourceName.
By default this is a file called “Imalhc.dsn” and is stored in the same
place as MF20.dsn.)
Each Presentation Server is smart enough to only download information from the data store that is relevant to it, meaning that the local host cache is unique for every server. Citrix created the local host cache for two reasons:
1. Permits a server to function in the absence of datastore connectivity.
2. Improves performance by caching information used by ICA Clients for enumeration and application resolution.
Each Presentation Server is smart enough to only download information from the data store that is relevant to it, meaning that the local host cache is unique for every server. Citrix created the local host cache for two reasons:
1. Permits a server to function in the absence of datastore connectivity.
2. Improves performance by caching information used by ICA Clients for enumeration and application resolution.
The LHC is an Access
database (Imalhc.mdb) stored default in the path “\Citrix\Independent
Management Architecture ” folder.
LHC contained the following information:
1. All servers in the farm, and their basic information.
2. All applications published within the farm and their properties.
3. All Windows network domain trust relationships within the farm.
4. All information specific to itself. (product code, SNMP settings, licensing information)
LHC contained the following information:
1. All servers in the farm, and their basic information.
2. All applications published within the farm and their properties.
3. All Windows network domain trust relationships within the farm.
4. All information specific to itself. (product code, SNMP settings, licensing information)
The LHC is critical in a
CPS environment. In fact, it’s the exclusive interface of the data store to the
local server. The local server’s IMA service only interacts with the LHC.
It never contacts the central data store except when it’s updating the
LHC. If the server loses its connection to the central data store, there’s
no limit to how long it will continue to function. (In MetaFrame XP, this
is limited to 48 or 96 hours, but that was because the data store also
store license information.) But today, the server can run forever from the LHC
and won’t even skip a beat if the central connection is lost. In fact now you
can even reboot the server when the central data store is down, and the IMA
service will start from the LHC with out any problem. (Older versions of
MetaFrame required a registry modification to start the IMA service from the
LHC.)
The LHC file is always in use when IMA is running, so it’s not possible to delete it or anything. In theory it’s possible that this file could become corrupted, and if this happens I guess all sorts of weird things could happen to your server. If you think this is the case in your environment, you can stop the IMA service and run the command “dsmaint recreatelhc” to recreate the local host cache file, although honestly I don’t think this fixes anything very often. Local Host Cache is synchronised with the Data Store by the Zone Data Collector for every 30 minutes and it can also be configured through registry
The LHC file is always in use when IMA is running, so it’s not possible to delete it or anything. In theory it’s possible that this file could become corrupted, and if this happens I guess all sorts of weird things could happen to your server. If you think this is the case in your environment, you can stop the IMA service and run the command “dsmaint recreatelhc” to recreate the local host cache file, although honestly I don’t think this fixes anything very often. Local Host Cache is synchronised with the Data Store by the Zone Data Collector for every 30 minutes and it can also be configured through registry
5. What is Client Lock
Down?
Answer
:- Typically ‘client lockdown’
is the process of securing an endpoint so that the user can only access
authorised features. An example of this would be turning the device into a
‘Thin Client’ by locking it down so that an end user can only connect to
published apps or desktops and can not use other features.
6. What is Printer
terminology in Citrix?
Answer:- Citrix Printing can be configured 3 ways (types)
1.Local Printing.
2.Network Printing
3.Client Printing
1.Local Printing.
2.Network Printing
3.Client Printing
Client Printer: The printer connecyted to
the Worksation & the drivers are installed on the
citrix server for printing.
Network Printer: The Printer connected to
the print server & the drivers should be available on the citrix server.
Local Printer: The prinetr connected to
locally to the citrix server & the driers are installed for the print
operation.
7. How to use datastore for
database?
8. What is the difference
between all citrix versions?
Answer:- Citrix Meta frame Presentation server and Xenapp
are the different name of the same product updates, Meta frame and Presentation
Servers are older versions and Xenapp are the Newer Versions. Both are uses for
Virtualization of Applications, Contents & Server desktop. Some features in
Xenapp are not available in Presentation servers like V-Disk in Xenapp6.5,
9. What are different load
evaluators are available in Citrix
Answer:- Different Types of Citrix Load Evaluators
1)CPU Utilization
2)Memory Utilization
3)Page Swap
4)Application User Load
5)Context Switches
6)Disk Data I/O
7)Disk Operations
8)IP Range
9)Page Faults
10)Scheduling
11)Server User Load
2)Memory Utilization
3)Page Swap
4)Application User Load
5)Context Switches
6)Disk Data I/O
7)Disk Operations
8)IP Range
9)Page Faults
10)Scheduling
11)Server User Load
10. How to implement
Policies in Citrix?
Answer:- The Citrix
policy can be applied through Console Managment in 3 levels
1. Farm Level
2. Citrix Server Level
3. Policy.
2. Citrix Server Level
3. Policy.
11. What you will check
when any user is not able to launch citrix application?
Answer:- Verify that latest Citrix client software installed
at desktop
Verify that user is having
correct proxy settings to connect to your Citrix network (for remote users)
try to launch same
application from Citrix server(on which you installed and published)
Try to add same application
to your ID and try to launch
Check user permissions for
that Applications
12. What is IMA?
Answer:- Its a
collection of subsystems (dll) that communicate each other and provides
services/functions to the presentation server. It works on the port 2512 and
2513. The port 2512 is used for communication between servers and the port 2513
is used for communication with CMC.
13. What is ICAand what is
the advantage of ICA?
Answer:- ICA –
Independent Computing Architechture
It provides better compression
Transmits High-level windows display information
It provides better compression
Transmits High-level windows display information
14. What is Speed Screen?
Answer:-
The term SpeedScreen is
confusing with regards to Citrix because it actually includes five different
technologies that have been created over the last several years. It is
easy to get things mixed up, especially since some of the technologies do
similar things.
This list of five variants
is:
§ SpeedScreen Latency
Reduction
§ SpeedScreen Browser
Acceleration
§ SpeedScreen Multimedia
Acceleration
§ SpeedScreen Flash
Acceleration
§ SpeedScreen Image
Acceleration
15. What is the query
command in Citrix?
Answer:-
1)qfarm
2)querydc
3)queryds
4)queryhr
2)querydc
3)queryds
4)queryhr
16. What are the different
ports used in Citrix?
17. How the licensing works
in Citrix and difference in Citrix Licensing version wise?
Answer:-
1) First there would be
product licences such as Standard/Advanced/Enterprise/Platinum edition.
2) Then you have to
purchase the concurrent licences depending on the no of users this can be
downloaded from the website .LIC file depending on the hostname of
the server which is case sensitive
Standard License – For
single Server
Advanced – Supports Network Load Balancing
Enterprise – For large Infrastructure provides WMI, Load Manager or Resource Manager
Platinum – Features like Access Gateway and password manager is enabled, edge site server, etc
Advanced – Supports Network Load Balancing
Enterprise – For large Infrastructure provides WMI, Load Manager or Resource Manager
Platinum – Features like Access Gateway and password manager is enabled, edge site server, etc
For citrix you would
require :
1. Microsoft OS license for the server.
2. Terminal Server License (cals)
3. Citrix Server License.
1. Microsoft OS license for the server.
2. Terminal Server License (cals)
3. Citrix Server License.
18. What are the consoles
available to manage Citrix server?
Answer:-
Citrix Management Console
Access Suite
Access Suite
19. What is Web Interface
or Nfuse?
Answer:- Citrix Web
Interface software (previously known as NFuse) provides Web access to Java,
UNIX, and Windows applications that are hosted via Citrix application
server software. While Citrixoffers server-side control of hosted applications, Citrix Web
Interface makes applications accessible through a Web browser interface
20. What is citrix secure /
access gateway and how its work?
Answer:-
Citrix Access Gateway is a
secure application access solution that provides administrators granular
application-level policy and action controls to secure access to applications
and data while allowing users to work from anywhere. It gives IT administrators
a single point of control and tools to help ensure compliance with regulations
and the highest levels of information security across and outside the
enterprise. At the same time, it empowers users with a single point of
access—optimized for roles, devices, and networks—to the enterprise
applications and data they need. This unique combination of capabilities helps
maximize the productivity of today’s mobile workforce.
21. What are the
differences between Win2K and 2K3 Terminal server?
Answer:- Windows
2000 Terminal Services can be installed in 2 mode, as you
say:
1) Remote Administration mode
Not really a terminal server. You can connect with a maximum of 2
sessions simultaneously, by default only for Administrators. This
mode is very handy for accessing a server (any server!) remotely. So
this mode is very often installed on SQL servers, Exchange Servers,
etc. Every server that is more than 2 steps away from you, like in a
dedicated server room. This mode does not require additional
licensing, and does not support multiple users running applications
on the server.
2) Application Server mode
This is the “real” terminal server mode, i.e. your terminal server is
now configured to handle multiple users, which run applications in a
session on the terminal server. This mode requires a Terminal
Services Licensing Server and additional licensing for all connecting
users (TS CALs).
say:
1) Remote Administration mode
Not really a terminal server. You can connect with a maximum of 2
sessions simultaneously, by default only for Administrators. This
mode is very handy for accessing a server (any server!) remotely. So
this mode is very often installed on SQL servers, Exchange Servers,
etc. Every server that is more than 2 steps away from you, like in a
dedicated server room. This mode does not require additional
licensing, and does not support multiple users running applications
on the server.
2) Application Server mode
This is the “real” terminal server mode, i.e. your terminal server is
now configured to handle multiple users, which run applications in a
session on the terminal server. This mode requires a Terminal
Services Licensing Server and additional licensing for all connecting
users (TS CALs).
Note that the terminology
has changed a bit in Windows 2003:
Remote Administration mode is now called “Remote Desktop for
Administration”. It doesn’t have to be installed anymore, it comes
pre-installed and only has to be enabled, just like on XP.
Installing the “Terminal Services” component of the OS in 2003
implies “Application Server mode”. This mode is now simply called
“Terminal Services”
Remote Administration mode is now called “Remote Desktop for
Administration”. It doesn’t have to be installed anymore, it comes
pre-installed and only has to be enabled, just like on XP.
Installing the “Terminal Services” component of the OS in 2003
implies “Application Server mode”. This mode is now simply called
“Terminal Services”
22. What is the difference
between 2k & 2k3 terminal server licensing?
Windows 2000
|
Windows 2003
|
|
TS CAL License Types
|
per-device
|
per-device or per-user
|
alternate per-server external user license option
|
“Internet Connector License,” $10k, 200 users
max, anonymous only
|
“External Connector License,” $8k, “normal” users
|
Is license server required?
|
Yes
|
Yes
|
License server version required
|
Windows 2000 or 2003
|
Must be 2003
|
Grace period before license server is required
|
90 days
|
120 days
|
Temp license lifespan
|
90 days
|
90 days
|
Permanent license lifespan
|
forever (before SP3), 52-89 days (SP3 and later)
|
52-89 days
|
License Server installation location
|
Domain controller only
|
Member server or domain controller
|
Must TS and Lic Serv be in same domain (or
trust)?
|
No
|
Yes
|
Reg hack for hard-coding lic server
|
One license server only
|
As many license servers as you want
|
License Server security groups
|
No
|
Yes
|
Must license server be activated to distribute
temp licenses?
|
No
|
No
|
Must license server be activated to distribute
permanent licenses?
|
Yes
|
Yes
|
Free TS CALs for Win 2000 clients?
|
Yes
|
No
|
Free TS CALs for Win XP clients?
|
Yes
|
Only if Win XP bought before April 25, 2003
|
23. What is Printer driver
replication and mapping?
Printer driver replication
means if you have a network printer and if you want to share it among
other Citrix servers, then we can replicate that driver to be used by all the
Citrix servers or for few selected Citrix servers, however that driver should
be installed in the Citrix server from which we are replicating the driver.
Printer mapping relates to
mapping the driver software for specific domain users only, these can be dont
by right clicking on the driver or by the printer option on the left plane of
Citrix presentation server console.
Citrix
Xenapp 6.0, 6.5 Common questions
1. What is windows print server?
Ans – A print server, or printer server, is a device that connects printers to client computers over a network. It accepts print jobs from the computers and sends the jobs to the appropriate printers.
Ans – A print server, or printer server, is a device that connects printers to client computers over a network. It accepts print jobs from the computers and sends the jobs to the appropriate printers.
2.How does a window print server work?
Ans – Normally, a server operating system is installed on the print server computer and then the office’s various printers can be added to the system with the appropriate drivers. The new printers are then set up to be shared from the print server, so that employees can access them from their individual workstations.
Ans – Normally, a server operating system is installed on the print server computer and then the office’s various printers can be added to the system with the appropriate drivers. The new printers are then set up to be shared from the print server, so that employees can access them from their individual workstations.
3.What is print spooling?
Ans – In print spooling, documents are loaded into a buffer (usually an area on a disk), and then the printer pulls them off the buffer at its own rate. Because the documents are in a buffer where they can be accessed by the printer, you can perform other operations on the computer while the printing takes place in the background. Spooling also lets you place a number of print jobs on a queue instead of waiting for each one to finish before specifying the next one.
Ans – In print spooling, documents are loaded into a buffer (usually an area on a disk), and then the printer pulls them off the buffer at its own rate. Because the documents are in a buffer where they can be accessed by the printer, you can perform other operations on the computer while the printing takes place in the background. Spooling also lets you place a number of print jobs on a queue instead of waiting for each one to finish before specifying the next one.
4.What is windows universal print driver?
Ans – (Universal Printer Driver or Unidriver) is a GDI-based Microsoft Windows universal printer driver and architecture for non-PostScript printers. It is used to simplify driver development of non-PostScript printers (also called Winprinters) for printer manufacturers. Unidrv allows the creation of a printer-specific minidriver in the form of a GPD (Generic Printer Description) file, similar to a PPD file, which is much simpler than kernel mode driver development.
Ans – (Universal Printer Driver or Unidriver) is a GDI-based Microsoft Windows universal printer driver and architecture for non-PostScript printers. It is used to simplify driver development of non-PostScript printers (also called Winprinters) for printer manufacturers. Unidrv allows the creation of a printer-specific minidriver in the form of a GPD (Generic Printer Description) file, similar to a PPD file, which is much simpler than kernel mode driver development.
5.What is a XPS and EMF print drivers?
Ans – Universal XPS Printer driver –
This driver is based on the Windows XML Paper Specification (XPS) printing technology introduced in Windows Server 2008. Windows XPS printing technology uses XML to create a platform-independent “electronic paper” similar to Adobe’s PDF format. The XPS format is a device-independent XML-based spool file format that provides a compressed XML description of a page’s graphic elements. Printing devices can use XPS-formatted print jobs directly without translation.
Ans – Universal XPS Printer driver –
This driver is based on the Windows XML Paper Specification (XPS) printing technology introduced in Windows Server 2008. Windows XPS printing technology uses XML to create a platform-independent “electronic paper” similar to Adobe’s PDF format. The XPS format is a device-independent XML-based spool file format that provides a compressed XML description of a page’s graphic elements. Printing devices can use XPS-formatted print jobs directly without translation.
The Citrix Universal XPS Printer driver creates the XPS print job using
the Microsoft XPS printer driver on the client device. The Citrix Universal XPS
Printer driver obtains printing device-specific information from the client
device. Provided your farm servers are running XenApp 5.0 and your client
devices have .NET 3.0 installed on them, which comes with Windows
Vista, you can use the Citrix Universal XPS Printer driver.
Citrix Universal Printer driver -
This driver uses Windows’ Enhanced Metafile Format (EMF) technology.EMF is a device-independent format for capturing the graphical elements printed on each page of a print job. A client-side renderer uses EMF and provides a substantial reduction in the processing time of Citrix Universal print jobs on the client.
This driver uses Windows’ Enhanced Metafile Format (EMF) technology.EMF is a device-independent format for capturing the graphical elements printed on each page of a print job. A client-side renderer uses EMF and provides a substantial reduction in the processing time of Citrix Universal print jobs on the client.
6.RDP v/s Xenapp?
Ans – Maine diffrence – RDP: transfer complete frame and bandwidth depends on screen resolution,
ICA: create virtual channels(video,audio,print,keyboard& mouse updates) and transfers only screen updates and bandwidth will less as keyboard and mouse click will be 10-15% of frame
Ans – Maine diffrence – RDP: transfer complete frame and bandwidth depends on screen resolution,
ICA: create virtual channels(video,audio,print,keyboard& mouse updates) and transfers only screen updates and bandwidth will less as keyboard and mouse click will be 10-15% of frame
1. RDP works only under TCP/IP, while ICA works on many protocols.
2. RDP doesn’t permit applications to run in a browser, while works for ICA
3. Session Reliability will be there in ICA,it is not in the RDP
4. Encryption is possible in ICA,it is not present in RDP
5. ICA also supports non windows like DOS, UNIX, MACOS, mobiles
2. RDP doesn’t permit applications to run in a browser, while works for ICA
3. Session Reliability will be there in ICA,it is not in the RDP
4. Encryption is possible in ICA,it is not present in RDP
5. ICA also supports non windows like DOS, UNIX, MACOS, mobiles
7.What is the difference b/w data store and DC?
Ans – Datastore – Is the database which contain the static information related Xenapp farm which includes – published applications, users, printers, and servers, citrix GPO.
Ans – Datastore – Is the database which contain the static information related Xenapp farm which includes – published applications, users, printers, and servers, citrix GPO.
Datacollector – maintains dynamic information about the servers in the
zone, such as server loads, session status, published applications, users
connected, and license usage. Data collectors receive incremental data updates
and queries from servers within the zone. Data collectors relay information to
all other data collectors in the farm. By default, the data collector is
configured on the first server when you create the farm, and all other servers
configured with the controller server mode have equal rights to become the data
collector if the data collector fails. When the zone’s data collector fails, a
data collector election occurs and another server takes over the data collector
functionality. Farms determine the data collector based on the election
preferences set for a server. Applications are typically not published on the
data collector.
8.What is XML broker?
Ans –
Ans –
– It functions as an intermediary between the farm and Web Interface.
– XML Broker receives the credentials of user from the Web Interface.
– XML Broker retrieves the applications which have user permissions to access.
– This is done by Independent Management Architecture and returns to the Web Interface.
– Once the user is authenticated, the XML broker locates the server in the farm.
– XML Broker returns the address of the service rendering server to the Web Interface.
– XMS Service functions between Web Interface and IMA service.
– XML Broker receives the credentials of user from the Web Interface.
– XML Broker retrieves the applications which have user permissions to access.
– This is done by Independent Management Architecture and returns to the Web Interface.
– Once the user is authenticated, the XML broker locates the server in the farm.
– XML Broker returns the address of the service rendering server to the Web Interface.
– XMS Service functions between Web Interface and IMA service.
9.What is citrix xenapp farm?
Ans – XenApp server farm is a logical collection or group of XenApp servers that can be managed as a single entity and they talk to single datastore server.
Ans – XenApp server farm is a logical collection or group of XenApp servers that can be managed as a single entity and they talk to single datastore server.
10.What is zone?
Ans – A zone is a grouping of XenApp servers that communicate with a common data collector. In large farms with multiple zones, each zone has a server designated as its data collector. Data collectors in farms with more than one zone function as communication gateways with the other zone data collectors. The data collector maintains all load and session information for the servers in its zone. All farms have at least one zone, even small ones. The fewest number of zones should be implemented, with one being optimal. Multiple zones are necessary only in large farms that span WANs.
Ans – A zone is a grouping of XenApp servers that communicate with a common data collector. In large farms with multiple zones, each zone has a server designated as its data collector. Data collectors in farms with more than one zone function as communication gateways with the other zone data collectors. The data collector maintains all load and session information for the servers in its zone. All farms have at least one zone, even small ones. The fewest number of zones should be implemented, with one being optimal. Multiple zones are necessary only in large farms that span WANs.
11.What are the different ports and their numbers?
Ans.
ICA port – 1494.
XML port – 80 & 443.
Session reliability – 2598/2599.
License – 27000.
Vendor daemon – 7279.
License management console – 8082.
Database port – 1433.
IMA – 2512 & 2513
Ans.
ICA port – 1494.
XML port – 80 & 443.
Session reliability – 2598/2599.
License – 27000.
Vendor daemon – 7279.
License management console – 8082.
Database port – 1433.
IMA – 2512 & 2513
12.What is application enumeration process?
Ans -The application listing and displaying process is as follows:
Ans -The application listing and displaying process is as follows:
1. A user launches the Web Interface URL, it returns the logon page.
2. Users types their credentials, it is forwarded from XML then to IMA service in HTTP (or HTTPS) form.
2. Users types their credentials, it is forwarded from XML then to IMA service in HTTP (or HTTPS) form.
3. The IMA then forwards thecredential data to local Lsass.exe
(lsass.exe” is the Local Security Authentication Server. It verifies the
validity of user logons to your PC or server).
4. The Lsass.exe encrypts the credentials then passes them to the domain
controller.5. The DC returns the SIDs (user’s SID and the list of group SIDs)
to Lsass.exe and to IMA.
6.IMA used the SIDs to search the Local Host Cache (LHC) for a list of
applications and the Worker Group Preference policy for that authenticated
user.
7. The list of the applications together with the user’s worker group
preference policy are returned to the Web Interface.
8. The Web Interface returns the web page to the web browser with the
list of applications
2. Web Interface passes the application information together with the
user’s Worker Group Preference policy back to IMA on the XML broker server.
3. It then forwards to the IMA service on the Zone Data Collector.
4. The Zone Data Collector tries to find out a least loaded server according to the Worker Group preference list.
5. When it finds the least loaded server, it sends a query to the Citrix Service Manager of that server to verify whether the server has the required application installed, if the answer is yes, it then provides this server’s host ID to the XML broker.
6. The XML broker translates this host ID into it’s IP address by searching the LHC.
7. The IP address is then provided to Web Interface and it creates the ICA file.
8. The ICA file is then returned to Web browser on the client machine.
9. Citrix online Web plug-in uses the ICA file to launch an ICA connection to the least loaded XenApp server.
10. The XenApp server launches the application for the user.
3. It then forwards to the IMA service on the Zone Data Collector.
4. The Zone Data Collector tries to find out a least loaded server according to the Worker Group preference list.
5. When it finds the least loaded server, it sends a query to the Citrix Service Manager of that server to verify whether the server has the required application installed, if the answer is yes, it then provides this server’s host ID to the XML broker.
6. The XML broker translates this host ID into it’s IP address by searching the LHC.
7. The IP address is then provided to Web Interface and it creates the ICA file.
8. The ICA file is then returned to Web browser on the client machine.
9. Citrix online Web plug-in uses the ICA file to launch an ICA connection to the least loaded XenApp server.
10. The XenApp server launches the application for the user.
13.What if datastore goes down?
Ans – Data store Server goes down (And you have a backup from the Data store available, If you don’t you would have to recreate all the farm settings) dsmaint backup takes a backup of the data store.
Ans – Data store Server goes down (And you have a backup from the Data store available, If you don’t you would have to recreate all the farm settings) dsmaint backup takes a backup of the data store.
2. Run a dsmaint migrate to migrate the settings to a new data store.
Even if a Data store is unavailable the LHC contains enough information about
the farm to allow normal operations for an indefinite period of time. However,
no new information can be published, or added to the farm, until the farm data
store is online. If you need to start from scratch with a new data store,
prepare a new data store the way you did before configuring XenApp and run the
Server Configuration Tool from any farm server. After running the Server
Configuration Tool, manually reenter the lost settings. If you use the same
name as he previous data store, you do not need to reconfigure the farm
servers.
14.What if license server goes down?
Ans – The Citrix servers can function without contacting the license server and it is 30-days fault tolerant, and in Enterprise version an alert can be set with Resource Manager to send an email in case of License Server Connection Failure. If the license server reconnects at any time in the thirty days the problem resolves itself. If the server is not going to come back up, then the license file, digitally signed with the case-sensitive hostname of the old license server, is the critical component. The license file, a *.lic file, can be backed up to a thumb drive separately, and restored to a new server with the same name of the old license server, and the Citrix License server software installed.
Ans – The Citrix servers can function without contacting the license server and it is 30-days fault tolerant, and in Enterprise version an alert can be set with Resource Manager to send an email in case of License Server Connection Failure. If the license server reconnects at any time in the thirty days the problem resolves itself. If the server is not going to come back up, then the license file, digitally signed with the case-sensitive hostname of the old license server, is the critical component. The license file, a *.lic file, can be backed up to a thumb drive separately, and restored to a new server with the same name of the old license server, and the Citrix License server software installed.
15.What if data collector goes down?
Ans – Data collector server goes down.
2. The servers in the zone recognize that the data collector has gone down and start the election process. In this example the back up data collector is elected as the new data collector for the zone.
3. The member servers in the zone then send all of their information to the new data collector for the zone. This is a function of the number each server has of sessions, disconnected session, and applications.
4. In turn, the new data collector replicates this information to all other data collectors in the farm. Even if a Data collector is unavailable the servers will continue to function. The users that are already logged in will not be affected.
Ans – Data collector server goes down.
2. The servers in the zone recognize that the data collector has gone down and start the election process. In this example the back up data collector is elected as the new data collector for the zone.
3. The member servers in the zone then send all of their information to the new data collector for the zone. This is a function of the number each server has of sessions, disconnected session, and applications.
4. In turn, the new data collector replicates this information to all other data collectors in the farm. Even if a Data collector is unavailable the servers will continue to function. The users that are already logged in will not be affected.
16.What happens in ZDC election process?
Ans –
Incase ZDC is not be available, another server in the zone can take over
that role. The process of taking the role is called ZDC election. Server
Administrators should choose the Zone Data Collector strategy carefully during
the farm design itself. When an election needs to occur in a zone, the winner
of the election is determined by
1. Highest version of Presentation Server first
2. Highest rank (as configured in the Management Console)
3. Highest Host ID number (Every server has a unique ID called Host ID).
When the existing data collector for Zone failed unexpectedly or the
communication between a member server and the Zone Data Collector for its zone
failed or the communication between data collectors failed, then the election
process begins in the Zone. If the server is shutdown properly, it triggers the
election process before it goes down. The servers in the zone recognize the
data collector has gone down and starts the election process. Then the ZDC is
elected and the member servers send all of their information to the new ZDC for
the zone. In turn the new data collector replicates this information to all
other data collectors in the farm.
Note: The data collector election process is not dependent on the data store. If the data collector goes down, sessions connected to other servers in the farm are unaffected .The data collector election process is triggered automatically without administrative interference. Existing as well as incoming users are not affected by the election process, as a new data collector is elected almost instantaneously.
C:\ QueryHR.exe
Note: The data collector election process is not dependent on the data store. If the data collector goes down, sessions connected to other servers in the farm are unaffected .The data collector election process is triggered automatically without administrative interference. Existing as well as incoming users are not affected by the election process, as a new data collector is elected almost instantaneously.
C:\ QueryHR.exe
—— Showing Hosts for “10.22.44.0” ——
Host 1:
Host 1:
—————————–
Zone Name: 10.22.44.0
Host Name: TEDDYCTX02
Admin Port: 2513
IMA Port: 2512
Host ID: 4022
Master Ranking: 1
Master Version: 1
———————————
—— Show Host Records Completed ——-
Admin Port: 2513
IMA Port: 2512
Host ID: 4022
Master Ranking: 1
Master Version: 1
———————————
—— Show Host Records Completed ——-
To see the Host ID number and its version, run queryhr.exe utility (with
no parameters).
Each server in the zone has a rank assigned to it. The administrator can
configure such that the servers in a zone can be ranked to make the server as
the most desired to serve as the zone master or ZDC. The ties between servers
with the same administrative ranking are broken by using the HOST IDs assigned
to the servers. When a Presentation Server starts or when the IMA service
starts, the IMA service starts trying to contact other servers via the IMA
protocol on port 2512 until it finds one that’s online. When it finds, it
queries it to find out which server is acting as the data collector. The winner
of this Zone Data Collector election is determined by the newest version
of the IMA service. We can control which server will act as data collector by
keeping that server the most up-to-date.
Data Collection Election Priority
Whichever server has the most recent version of the IMA Service running.
(This may include hotfixes) and the server with the highest preference set in
the data store.
Basically data collectors and data store are not really related. The data store holds permanent farm configuration information in a database, and the data collector tracks dynamic session information in its RAM.
Basically data collectors and data store are not really related. The data store holds permanent farm configuration information in a database, and the data collector tracks dynamic session information in its RAM.
In addition to their primary role to provide dynamic farm information
for admin consoles or for incoming connection requests, data collectors also
take part in the distribution of configuration changes to Presentation Servers
in the farm. When we make a changes in a presentation server that change is
written to the local host cache of whichever server we connected to, and then
immediately replicated to the data store. Presentation Server only looks for
changes in the central data store every 30 minutes. Whenever a change is made
to the data store, that change is sent to the data collector for the zone.
The data collector then distributes that change (via IMA port 2512) to
all of the servers in its zone, allowing each server to update its own local
host cache accordingly. Furthermore, if we have more than one zone, the initial
data collector contacts the data collectors in the other zones. It sends its
change to them, and in turn those data collectors forward the change to all of
the servers in their zones.
Coolest part is if the change is larger than 64k, the data collectors
don’t send the actual change out to its zone. Instead they send out a
notification which causes the servers in the zone to perform an “on demand”
sync with the central data store. However it’s rare for a single change to be
more than 64k in size. The data collector election priority settings in
the management console
Presentation Server Java Management Console > Right-click on farm
Presentation Server Java Management Console > Right-click on farm
name >Properties > Zones > highlight server > “Set Election
Preference”
We can totally control which server is our data collector by manually setting the preferences in the Java console. We can manually configure four levels of Zone’s Data Collector election preferenceoptions
Most Preferred
Preferred
Default Preferred
Not Preferred
The important thing to remember is that these preferences will beignored if a newer server is up for election.
We can totally control which server is our data collector by manually setting the preferences in the Java console. We can manually configure four levels of Zone’s Data Collector election preferenceoptions
Most Preferred
Preferred
Default Preferred
Not Preferred
The important thing to remember is that these preferences will beignored if a newer server is up for election.
17. What happens if the webinterface is down?
Ans – New user will not be able to access the application hosted in citrix and it will not affect the existing connected user.
Ans – New user will not be able to access the application hosted in citrix and it will not affect the existing connected user.
18. What are the types of websites in Web Interface?
Ans Website and service site.
Ans Website and service site.
19. How can we add the backup XML service?
Ans – We can specify the back xml service on the webinterface management console.
Ans – We can specify the back xml service on the webinterface management console.
20. What is LHC?
Ans – A local cache of the data store, which allows a server to function in the absence of data store.
Ans – A local cache of the data store, which allows a server to function in the absence of data store.
21. What is session reliability?
Ans – This setting allows or prevents sessions to remain open during a loss of network connectivity. By default, session reliability is allowed.
Session Reliability keeps sessions active when network connectivity is interrupted. Users continue to see the application they are using until network connectivity resumes. When connectivity is momentarily lost, the session remains active on the server. The user’s display freezes and the cursor changes to a spinning hourglass until connectivity resumes. The user continues to access the display during the interruption and can resume interacting with the application when the network connection is restored. Session Reliability reconnects users without reauthentication prompts.
Ans – This setting allows or prevents sessions to remain open during a loss of network connectivity. By default, session reliability is allowed.
Session Reliability keeps sessions active when network connectivity is interrupted. Users continue to see the application they are using until network connectivity resumes. When connectivity is momentarily lost, the session remains active on the server. The user’s display freezes and the cursor changes to a spinning hourglass until connectivity resumes. The user continues to access the display during the interruption and can resume interacting with the application when the network connection is restored. Session Reliability reconnects users without reauthentication prompts.
22. What is meant by keep alive?
Ans – Keep Alive Policy Settings The Keep Alive section contains policy settings for managing ICA keep-alive messages. ICA keep alive timeout This setting specifies the number of seconds between successive ICAkeep-alive messages. By default, the interval between keep-alive messages is 60 seconds. Specify an interval between 1-3600 seconds in which to send ICA keep-alive messages. Do not configure this setting if your network monitoring software is responsible for closing inactive connections. If using Citrix Access Gateway, set keep-alive intervals on the
Ans – Keep Alive Policy Settings The Keep Alive section contains policy settings for managing ICA keep-alive messages. ICA keep alive timeout This setting specifies the number of seconds between successive ICAkeep-alive messages. By default, the interval between keep-alive messages is 60 seconds. Specify an interval between 1-3600 seconds in which to send ICA keep-alive messages. Do not configure this setting if your network monitoring software is responsible for closing inactive connections. If using Citrix Access Gateway, set keep-alive intervals on the
Access Gateway to match the keep-alive intervals on XenApp.
ICA keep alives
This setting enables or disables sending ICA keep-alive messages periodically. By default, keep-alive messages are not sent.
Enabling this setting prevents broken connections from being disconnected. If XenApp detects no activity, this setting prevents Remote Desktop Services from disconnecting the session. XenApp sends keep-alive messages every few seconds to detect if the session is active. If the session is no longer active, XenApp marks the session as disconnected.
ICA Keep-Alive does not work if you are using Session Reliability.Configure ICA Keep-Alive only for connections that are not using
ICA keep alives
This setting enables or disables sending ICA keep-alive messages periodically. By default, keep-alive messages are not sent.
Enabling this setting prevents broken connections from being disconnected. If XenApp detects no activity, this setting prevents Remote Desktop Services from disconnecting the session. XenApp sends keep-alive messages every few seconds to detect if the session is active. If the session is no longer active, XenApp marks the session as disconnected.
ICA Keep-Alive does not work if you are using Session Reliability.Configure ICA Keep-Alive only for connections that are not using
Session Reliability.
Related Policy Settings
Session reliability connections.
Related Policy Settings
Session reliability connections.
23. New featires in 6.5?
Ans –
Ans –
Session Lingering
Session Pre-Launch
App Center
Load Evaluators assigned to Worker Groups or OUs instead of individual servers
Datastore and Zone information configured via GPO
Sesssion Only and Controller roles
Desktop Director web console can manage XenApp sessions
MultiStream ICA – ica traffic can be split into four separate TCP streams if required
Log On control feauture to drain users.
Session Pre-Launch
App Center
Load Evaluators assigned to Worker Groups or OUs instead of individual servers
Datastore and Zone information configured via GPO
Sesssion Only and Controller roles
Desktop Director web console can manage XenApp sessions
MultiStream ICA – ica traffic can be split into four separate TCP streams if required
Log On control feauture to drain users.
24.What are the policies you have worked?
Ans – Clipboard policy, drive mapping policy, printer policy, universal printer policy, Universal profile management 4.0.
Ans – Clipboard policy, drive mapping policy, printer policy, universal printer policy, Universal profile management 4.0.
25.Which has high priority citrix policy or AD policy?
Ans – Local -> Citrix > site > domain > OU.
Ans – Local -> Citrix > site > domain > OU.
26.what is universal printer in citrix?
Ans –
Universal Print Server
Ans –
Universal Print Server
The Citrix Universal Print Server extends XenApp and XenDesktop
Universal printing support to network printing. This feature eliminates the
need to install numerous network printer drivers on XenApp and XenDesktop
hosts, and enables more efficient network utilization. The new Citrix Universal
printer driver supports direct network printing on Windows and non-Windows
clients. After you install the Universal Print Server components and configure
the new policy settings, a user can add and enumerate network printers through
the Windows Provider and Citrix Provider interfaces.
The Universal Print Server feature comprises:
•A client component, UPClient, that you install on each XenApp and XenDesktop host that provisions session network printers and that uses the Universal Printer Driver.
•A server component, UPServer, that you install on each print server that provisions session network printers and that uses the Universal Printer Driver for the session printers (regardless of whether or not the session printers are centrally provisioned).
•A client component, UPClient, that you install on each XenApp and XenDesktop host that provisions session network printers and that uses the Universal Printer Driver.
•A server component, UPServer, that you install on each print server that provisions session network printers and that uses the Universal Printer Driver for the session printers (regardless of whether or not the session printers are centrally provisioned).
27.What are commands often used in citrix?
Ans – Qfarm /load, /zone, /app, lboff and enablelb /servername
dsmaint, /clean, / recreatelhc after stoping IMA.
Ans – Qfarm /load, /zone, /app, lboff and enablelb /servername
dsmaint, /clean, / recreatelhc after stoping IMA.
28.How to know which is your Data Store machine?
Ans – By opening the MF20.dsn file in notepad.
Ans – By opening the MF20.dsn file in notepad.
29. What are troubleshooting steps if IMA service is not gettingstarted?
Ans –
The following could be some reasons, in addition to others, for the
Ans –
The following could be some reasons, in addition to others, for the
IMA Service to fail to start:
• IMA Service load time
• IMA Service subsystem
• Missing Temp directory
• Print spooler service
• ODBC configuration
• Roaming Profile
• Another server with an identical NetBIOS name on the same network
IMA Service Load Time
If the Service Control Manager reports that the IMA Service could not be
started, but the service eventually starts, ignore the error message. The
Service Control Manager has a timeout of six minutes. The IMA Service can take
longer than six minutes to start if the load on the database exceeds the
capabilities of the database hardware or if the network has high-latency. If
you feel that the service is merely hung(stuck in a “starting” state) you can
terminate the ImaSrv.exe process in Task Manager and restart the Citrix
Independent Management Architecture service as a test.
IMA Service Subsystem
Examine the following Windows Registry setting:
• x32-bit: HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\IMA\Runtime
\CurrentlyLoadingPlugin
• x64-bit: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Citrix\IMA
\Runtime\CurrentlyLoadingPlugin
If there is no value specified in the CurrentlyLoadingPlugin portion of
the preceding Windows Registry entry, then either the IMA Service could not
connect to the data store or the local host cache is missing or corrupt.
If a CurrentlyLoadingPlugin value is specified, the IMA Service made a
connection to the data store and the value displayed is the name of the IMA
Service subsystem that failed to load.
Missing Temp Directory
If administrators see an “IMA Service Failed” error message with an
error code of 2147483649 when starting the server, the local system account
might be missing a Temp directory which is required for the
IMA Service to run.
To gain further insight into the situation, change the IMA Service
startup account to the local administrator and restart the server. If the IMA
Service is successful in starting under the local administrator’s account,
then it is likely that a missing Temp directory for the local system account is
causing the situation.
If the Temp directory is not present, then manually create one as
\Temp. For example:
C:\Windows\Temp
C:\Windows\Temp
Also, verify that the TMP and TEMP system environment variables point to
the temporary directory. Restart the server to restart the IMA Service.
Print Spooler Service
When the server attempts to start the IMA Service, the “Setup Could Not
Start the IMA Service” error message appears. This error shows that the IMA
Service is not starting, possibly because the print spooler service is not
running or was configured incorrectly. In addition, the following error
messages appear in the Event Viewer:
• Failed to load plugin MfPrintSs.dll with error 80000001h
• Failed to load initial plugins with error 80000001h
• The Independent Management Architecture service terminated with
service-specific error
The error occurs because the print spooler service:
• Has stopped
• Is disabled
• Is not configured to run under the Local System Account
To resolve this issue, verify that the print spooler service was started
in the context of system rather than in the context of a user. A print spooler
service that is not running or has been configured incorrectly might cause the
printing subsystem to fail to load.
To resolve the situation, stop and start the print spooler service,
ensure that it is configured to run under the Local System Account.
Then, try to start the IMA Service.
ODBC Configuration
1. Verify that the Microsoft SQL Server or Oracle server is online.
2. Verify the name of the DSN file that the IMA Service is using the
following key in the Windows Registry:
• x32-bit: HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\IMA\DataSourceName
• x64-bit:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Citrix\IMA\DataSourceName
3. Attempt to connect to the database using the DSN file with an ODBC
test utility such as Oracle ODBC Test or SQL Server ODBC Test.
4. Verify that the correct user name and password are being used for
database connectivity.
5. Change the user name and password using the DSMAINT CONFIG command,
if needed using dsmaint config /user:username /pwd:password/dsn:dsnfilename.
6. Enable ODBC Tracing for further troubleshooting.
Roaming Profile
When the server attempts to start the IMA Service, the “Setup Could Not
Start the IMA Service” error message appears. In the event viewer the error
IMA_RESULT_INVALID_MESSAGE is displayed or other events related to the IMA
Service not being able to start. Verify the size of the roaming profile,
especially if it is crossing a WAN. Also watch for error messages related to
not being able to load the profile. Test with a local user profile or one that
is smaller in size.
Another server with an identical NetBIOS name on the same network Verify
that there is not another server on the network with the same NetBIOS name on
the network. If the CurrentlyLoadingPlugin has the ImaLicSs.dll listed, this
might be an indication of this condition.Another symptom of ImaLicSs.dll “106.
The IMA Service failed to start because of license group corruption in the data
store. “CTX124406 – DSCHECK – XenApp Data Store Checker Tool Commands
30.What is proximity printing?
Ans – Proximity printing basically detects a user’s current IP address and then maps the user to a printer in the user’s subnet. Granted, one would hope that maybe every floor has its own scope or some kind of an identifier that would make it unique so that you can map a printer accordingly. Assuming that is the case, you can configure Citrix print policies to map network printers for users based on the IP address of their device.
Ans – Proximity printing basically detects a user’s current IP address and then maps the user to a printer in the user’s subnet. Granted, one would hope that maybe every floor has its own scope or some kind of an identifier that would make it unique so that you can map a printer accordingly. Assuming that is the case, you can configure Citrix print policies to map network printers for users based on the IP address of their device.
To configure proximity printing, follow these steps:
1. Create a separate Citrix Policy for each subnet or each geographic location
2. Enable proximity printing through the session printing policy rule in Citrix Policies
3. Add the printers for that subnet or geographic location in the policy
4. Set the Default printer policy to use the Do not adjust the user’s default printer setting
5. Filter the policy bt Client IP address
1. Create a separate Citrix Policy for each subnet or each geographic location
2. Enable proximity printing through the session printing policy rule in Citrix Policies
3. Add the printers for that subnet or geographic location in the policy
4. Set the Default printer policy to use the Do not adjust the user’s default printer setting
5. Filter the policy bt Client IP address
Now there is another method which you should be aware, called Workspace
Control. This feature is useful when users disconnect from their existing
session, move to a different location and a different device and connect back
to that same session. Typically, without Workspace Control, if they resume the
same session the printers will not change. With Workspace Control, when they
connect again, it automatically detects that they are connecting from a
different location and a different device and maps their printers. Cool, no?
31.What are troubleshooting steps if delivery service console is not
getting connected to xenapp?
Ans – Check the IMA port and check the MFCOM services if they are runing or not.
Ans – Check the IMA port and check the MFCOM services if they are runing or not.
32.How to enable configuration log in DB?
Ans – to create the configuration log in DB for citrix we need a seprate database and once the DB is created right on the farm and then go to properties and follow th wizard.
Ans – to create the configuration log in DB for citrix we need a seprate database and once the DB is created right on the farm and then go to properties and follow th wizard.
33.What is the purpose of CTX key Tool?
Ans – CTXKEYTOOL – Use ctxkeytool to enable and disable the IMA encryption feature and generate, load, replace, enable, disable, or back up farm key files.
Ans – CTXKEYTOOL – Use ctxkeytool to enable and disable the IMA encryption feature and generate, load, replace, enable, disable, or back up farm key files.
34.How to upgrade/migrate your xenapp?
Ans – We cannot upgrade to xenapp 6.5 due to architure defrence so, if we want to move to upper version there is a option of migration.
Ans – We cannot upgrade to xenapp 6.5 due to architure defrence so, if we want to move to upper version there is a option of migration.
Steps –
1. Create a new farm with the xenapp 6.5 and use the migration tool and
specify the source farm to new farm and then migration utility will check for
the compatibility of apps with new farm and after that it will migrate the old
farm to new farm.
35.What is workspace control?
Ans – Use workspace control to allow users to disconnect quickly from all resources (applications, content, and desktops), reconnect to disconnected resources, and log off from all resources. This allows users to move between devices and gain access to all of their resources (disconnected only or disconnected and active) either when they log on or manually at any time. For example, clinicians in hospitals may need to move between workstations and access the same set of resources each time they log on.
Ans – Use workspace control to allow users to disconnect quickly from all resources (applications, content, and desktops), reconnect to disconnected resources, and log off from all resources. This allows users to move between devices and gain access to all of their resources (disconnected only or disconnected and active) either when they log on or manually at any time. For example, clinicians in hospitals may need to move between workstations and access the same set of resources each time they log on.
36.What are the windows editions available? And which are supported?
And – Windows sever 2008 R2 is supported for xenapp 6 and xenapp 6.5.
And – Windows sever 2008 R2 is supported for xenapp 6 and xenapp 6.5.
37.Which databases are used in the environment?
Ans – MS SQL 2008
Ans – MS SQL 2008
38.What are the license server ports? And what is license vendor daemon?
Ans 27000 and vendor daemon is the thing that will provide the license to DATA collector for the users.
Ans 27000 and vendor daemon is the thing that will provide the license to DATA collector for the users.
39.What is the purpose of DSCheck?
Ans – This utility performs validation checks on a server farm’s datastore. Results are displayed on the console and written to the Event Log. The /clean option deletes inconsistent records.
Ans – This utility performs validation checks on a server farm’s datastore. Results are displayed on the console and written to the Event Log. The /clean option deletes inconsistent records.
40.What is the purpose of DSmaint command?
Ans – Run the dsmaint on farm servers to perform XenApp data store maintenance tasks, including backing up the data store, migrating the data store to a new server, and compacting the XenApp data store or the Streaming Offline database. Not all dsmaint commands apply to all database types.
Ans – Run the dsmaint on farm servers to perform XenApp data store maintenance tasks, including backing up the data store, migrating the data store to a new server, and compacting the XenApp data store or the Streaming Offline database. Not all dsmaint commands apply to all database types.
When using this command, user names and passwords may be case-sensitive,
depending on the database and the operating system you are using.
41.How to take back up and restore of xenapp and data store?
Ans – DSmaint backup Path.
Ans – DSmaint backup Path.
42.How to bring xenapp server into maintenance mode?
Ans – change logon
Ans – change logon
/EXECUTE Enable execute mode (default).
/INSTALL Enable install mode.
/QUERY Display current settings.
/disable disable user login from session
/INSTALL Enable install mode.
/QUERY Display current settings.
/disable disable user login from session
43.What do you mean by load throttling?
Ans – Limits the number of concurrent connection attempts that a server handles. This prevents the server from failing when many users try to connect to it simultaneously. The default setting (High impact) assumes that logons affect server load significantly. This rule affects only the initial logon period, not the main part of a session. The Load Throttling rule can be applied only to a server, not to an individual application.
Ans – Limits the number of concurrent connection attempts that a server handles. This prevents the server from failing when many users try to connect to it simultaneously. The default setting (High impact) assumes that logons affect server load significantly. This rule affects only the initial logon period, not the main part of a session. The Load Throttling rule can be applied only to a server, not to an individual application.
44.What do you mean by workergroup and what are its advantages?
Ans – Worker Groups are new in Citrix XenApp 6. They’re collections of XenApp servers that reside in the same farm and are managed as a single unit. Worker Groups let you collect servers into groups for publishing applications, load balancing, and policy filtering. They’re particularly useful for larger installations where many XenApp servers must be managed as a single unit. Worker Groups can be created based on each server’s Active Directory Organizational Unit (OU) membership, or a Worker Group membership can be specifically assigned to each server in the Citrix Delivery Services Console.
Ans – Worker Groups are new in Citrix XenApp 6. They’re collections of XenApp servers that reside in the same farm and are managed as a single unit. Worker Groups let you collect servers into groups for publishing applications, load balancing, and policy filtering. They’re particularly useful for larger installations where many XenApp servers must be managed as a single unit. Worker Groups can be created based on each server’s Active Directory Organizational Unit (OU) membership, or a Worker Group membership can be specifically assigned to each server in the Citrix Delivery Services Console.
45.What are Worker group priorities?
Ans – Whenever we add the worker group to load balancing. Each worker group you add is automatically assigned a priority, from highest (1) to lowest.
Ans – Whenever we add the worker group to load balancing. Each worker group you add is automatically assigned a priority, from highest (1) to lowest.
46. What if the server is not accepting the connection -
Ans –
Ans –
steps – qfarm; qfarm /load;
qfarm /offline;
qfarm /lboff – all ok.
Connected to server desktop – ok
and ima working.
dsmaint verifylhc – ok.
dscheck /full apps;
dscheck /full servers. all OK.
So servers were actually fine,
issue somewhere with either sta or data collector
qfarm /offline;
qfarm /lboff – all ok.
Connected to server desktop – ok
and ima working.
dsmaint verifylhc – ok.
dscheck /full apps;
dscheck /full servers. all OK.
So servers were actually fine,
issue somewhere with either sta or data collector
No comments:
Post a Comment