Better together: #vSphere 7 and #Horizon 7.12 with #Nvidia vGPUs in high end #vdi environments

Current situations accelerate the demand for virtual desktops and a proper virtual desktop infrastructure. I am working for years in the field of the software-defined datacenter and virtual desktops delivered via VMware Horizon. While standard office virtual desktops have become something like a commodity, the usage of hardware graphics accelerated workload and high-end demand is still kind of ‘newer’ and not as mature as the non-gpu workload.

I am involved in a large scale product that creates a virtual desktop landscape for engineers doing a lot computer aided engineering (CAE). This is a very interesting environment that comes with a lot of difficult user requirements and how it can be solved.

  • 3D Acceleration required during normal “working” operations when modelling / analyzing components. (NVIDA vGPU for the win)
  • Huge amount of local persistent storage to cache models loaded/checked out from a network location. (vSAN is everywhere in the cluster, included in Horizon Advanced & brutal fast if you do it right).
  • High throughput between the virtual desktops and the network location (The big benefit of a VDI setup).
  • Secure access from everywhere & sharing of the session (Another big benefit of VDI).
  • Windows & Linux Desktops must be supported (Horizon can do that)
  • Huge amount of memory per virtual desktop since sometimes models can have 100/200GB of size and needs to resist in the memory of the virtual machine. (vSphere scales indefinelty [almost :P]).
  • Most engineers will require a dedicated linux desktop where he can individually use modules/kernels/packages based on his needs (an IT managements nightmare). (dedicated user assignment with persistent VDIs).
  • Different working behaviours (more than 500 different user-interaction scenarios) that cannot easily be matched to a single use-case.
  • Store certain states of the virtual desktop. Loading / pre-processing might take 1-XX hours and needs to be repeated several times (VM snapshots with memory ftw).
  • Certain Desktops should be shared among team-members (working in parallel or sequential).
  • …..
Read more

#VMware #Horizon App Volumes: Hints (for Performance and Packaging)

Two weeks ago I had the pleasure to spent 4 days on problematic Applications within an App Volumes environment of a customer. The best thing that can happen to me as an infrastructure guy is to work on building AppStack with guys who know how to package and therefore troubleshoot those applications. Bringing together the knowledge from multiple domains helped us to fix the problems that we had so far with App Volumes.

Common issues we have been faced with:

  1. During the AppStack provisioning process an Application was not able to get installed
  2. (Crappy) Applications put user-data-files into C:\Windows
  3. Start-Up Performance of applications was really really slow (factor 20x slower)
  4. A mounted AppStack leads to a repair of Office-components

One of the common problems I have seen with App Volumes in the past. The infrastructure can be designed and delivered by an Infrastructure guy -> As soon as we talk about applications. We or more correct the organization that is planning to create AppStacks needs application packaging expertise.

So let’s make it quick. I will give you some hints how some of your problems might get solved.

Read more

Using #VMware’s Unified Access Gateway (UAG) for internal #Horizon 7 connections – Design Discussion

Over the last months I gathered more and more experience about VMware’s secure Linux appliance  that allows secure access to a virtual Desktop (and more) over an unsecure network (e.g.) the Internet: Unified Access Gateway (UAG).

Keep in mind the UAG is not just a replacement for the old Windows based Security Sever, it is also  offering much more functionality (Edge Services for Airwatch / Workspace One, reverse proxy, 2nd-factor authentication integration, etc.).

There might be use cases where we want to design our horizon environment in a way that we use the UAGs not just for external unsecure access, but internally as well.

Examples:

  • Offering access to internal users coming from a not so trust-worthy site/location (including a second-factor authentication for those users). // Access restricted via Firewalls/ACLs
  • Constraints to always use tunneled connections (because of network-simplicity or security constraints).

Read more

Migration of the #Horizon View Composer to another machine (including a database migration from Oracle / Microsoft)

Within the vSphere world we have currently one goal regarding our vCenter. Migrate it from a Windows based installation to the vCenter Server Appliance (vCSA).

The doing of this migration is pretty straight forward and works pretty well (e.g. here). But since we will shutdown the original vCenter VM based on Windows afterwards we need to make sure how to deal with applications that were running besides the vCenter.

We need to migrate them as well. Especially in case of the Horizon View Composer we need to do some proper planning, otherwise our linked-clones (which require the composer) cannot be created and maintained anymore (refresh, rebalance, recompose (R-R-R) operations).

Doing that migration is quite straight-forward. But we need to do some specific and not very well known tasks before we can do all of the steps.

Goal: Migrate the vCenter to the vCSA and get rid of all currently used Oracle Databases within the VMware vSphere & Horizon environment.

  1. Define a Maintenance windows and make sure no further Horizon View maintenance operations takes place (R-R-R).
  2. Backup the Horizon Composer Database with the included View backup mechanism.
  3. Create Windows Server for the Composer (compvm)
  4. Create a Database for the Composer and the corresponding ODBC connection.
  5. Restore the Backup on the compvm
  6. Repoint Horizon within the View Admin to the new Composer
  7. Test Maintenance Operations
  8. Clean up old databases.

Read more

Lenzker’s #VMware #Horizon Guide (Implementation): Restrict Internet Access To Specific Users

Sometimes I really love the #vCommunity – Just kidding: I love them all of the time. I was confronted with a scenario where only certain users of a Horizon environment should be allowed to access their own Desktop via the Internet.

In general you have certain options to do some kind of restrictions:

  • Using Tags on the Connection Server and Create Desktop Pools that only allow the usage by Users coming from a tagged Connection Server
  • Using VMware vIDM (Identity Manager) and create conditonal access rules. This will work, but will also create some new overhead to implement vIDM in a high-available fashion.

Fortuneatly the EUC-Champion Slack Community came up with another idea I haven’t really heard about before (The feature was introduced with Horizon 7). Thx Sven and Joe for your help here.

Read more

Lenzker’s #VMware #Horizon Guide (Implementation): Access Layer #NSX Load Balanced Unified Access Gateway

The following section shows you how to make use of VMware’s Unified Access Gateway (UAG) Appliance to give the enduser access into our virtual Desktop / Remote hosted Applications over an unsecure network like the Internet.

When we are creating this access we have multiple options.

  • Using a VPN to ‘tunnel’ into the secure cooperate network environment and connect further to the Horizon View environment.
  • Placing a Windows Server in the DMZ and installing/configuring the Horizon View Security Server and make it public accessible.
  • Placing the virtual Unified Access Gateway in the DMZ and installing/configuring the Horizon View Security Server and make it public accessible.

What is the / my recommendation nowadays? Go with the Unified Access Gateway. Why?

  1. It is a general opinion within Security experts that a Windows, even if it’s hardened, offers more attack potentials than a hardened minimal linux.
  2. Using the Windows based security server creates a 1:1 relationship between the Security Server and the Connection Server, therefore it takes away some access flexibility.
  3. The UAG is getting more and more features to integrate other solutions like specific Airwatch functionality
  4. You can make use of the UDP based Blast Extreme Protocol Adaptive Transport protocol that gives you a better remote/user experience even if you are connecting over a lossy network
  5. It is much easier to operate than the first Access Point versions VMware has made GA a few years ago ;-)

One important aspect of the UAG is that you need to know about the packet-flow between the Horizon Client and the Desktop. You will be dependant on the networking and security guys. Make sure you are able to clearly articulate the requirements and what is going to happen. If you can tell the flow, the other people will be able to help you much better.

Read more

Lenzker’s #VMware #Horizon Guide (Implementation): Access Layer – Load Balanced Connection Server

In the following article I am going to tell you how easy it is to set up a load balanced Horizon View environment. But remember: Just because something is easy to install it is not necessarily easy to design. There are multiple design affecting factors I am going to discuss in my #design guide. There are many Installation Guidelines out there, so I will keep it quick and simple and try to give you some hints what to do or not to do.

What do I want to achieve or show to you in this blog post?

  • Creation Redundant Connection Server to access virtual Desktops
  • A redundant Load Balancer in front of it (#NSX ftw)
  • Internal Access only – I spent a lot of time with the Unified Access Gateway and show you in the second blog post about how to enable access over the Internet into your Horizon Homelab

Connection Server

The Connection Server is a core component within our Horizon View environment. It gives us the opportunity to create Desktop Pools out of Windows / Linux machines or Application Pools (based on Microsoft RDSH-Hosts) and entitle them to any Active Directory User in our environment. It offers us the following key functionality

  • Brokering between Endpoints (that have the Horizon Client installed) and a virtual Desktop / Remote Desktop Session Host (Application)
  • Authentication Handler (AD only or 2nd factor)
  • View Administration via web-based (Flash :-/ ) user interface
  • HTML5-Client to access the Desktops/Applications without the need of a client
  • Connection to the vCenter Server to create new VMs / Desktops

*taken from the Horizon Reference Architecture

Read more

Lenzker’s #VMware #Horizon Guide (Design): Management & Virtualization Layer

This section within my VDI series is not just relevant for VDI environments. In the following I will cover many things that are relevant for regular vSphere (cloud-a-like) environments.

The Management & Virtualization Layer plays quite an important role within a VDI environment. Within EUC solutions we typically should focus on the User and the User experience. But before we can deliver a performant, reliable and available working environment we need to make sure the layer on the bottom is rock solid as well.

What is the purpose of this layer?

  • Hosting Instances of Virtual Desktops
  • Hosting Instances of Remote Desktop Session Hosts (RDSH)
  • Hosting Management components
    • Components for brokering between Endpoints (Desktop User) and the Virtual Desktops  Horizon View)
    • Components for Integrating with Virtualization Management (Horizon View & vCenter Server)
    • Delivering Applications into the Virtual Desktops (App Volumes)
    • Monitoring of the Environment (e.g. Icinga)
    • Operations Management (vRealize Operations Manager and Log Insight)
    • Management of the Virtual Machines (aka Desktops / RDSH Hosts) and the Hypervisor (vCenter Server)
    • Component for managing Security relevant components (NSX-Manager)

In my design guide I will write about general design decisions regarding the management & virtualization layer. In my implementation guide I will give you hints about the setup of the environment.

The goal of this post is to describe / discuss design implications, design decisions and characteristics for the following relevant Products within the core Layer in their most current release:

  • vSphere Layer
  • vCenter Server
  • NSX Manager
  • Horizon View Connection Server

Implementation Details can be found in the corresponding Implementation post I have created.

Read more

Lenzker’s #VMware #Horizon Guide (Lab Implementation): Management & Virtualization Layer

Before we can start with the implementation guide I want to give a brief description what key functionalities must exist.

The following components has been installed and configured:

  • vSphere ESXi host (physical or nested)*
  • vCenter Server (Appliance)*
  • HA/DRS Cluster
  • vSAN Cluster
  • Active Directory Domain Controller (including DNS)*
  • Microsoft Certificate Authority Role*
  • NSX Manager*
  • FTP Service (for backing up NSX Manager)
  • CIFS-Share for UEM User Profile Archive and Config files

*Required.

This will be the first post in my Horizon Guide implementation section. Since my focus is on Horizon I will not go through each of the steps that are involved in setting up the foundation. If you want to get a feeling of the purpose of my blog series: Check it out here.

In my design guide I will write a little bit about general design decisions regarding the management & virtualization topic. In my implementation guide I will quickly go through the setup I have chosen.  As a side note I want to remember you to always use English Language and Keyboard Layout :-). Going into native US-Mode for all kind of setup will keep a lot of pain away from you.

Read more

Lenzker’s #VMware #Horizon Guide: Overview

Before being selected as an EUC champion I was already planning a bigger guide on how to design and implement a feature rich and enterprise ready VMware Horizon environment (Check out my opinion about the evolvement of VDI solutions over the years).

In 2017 VMware is putting more and more effort into transforming the enterprises into digital workspaces with their Workspace One solution / initiative. Within Workspace One VMware combines Horizon with Airwatch technology (for device management and application delivery).

Since my homelab has been a little bit underutilized over the last months I decided to built up an Horizon environment , including most of the Software pieces of Horizon Enterprise. Lucky me: VMware has just announced Horizon 7.2 which finally includes a new help desk tool to deliver faster 1/2nd level support to our (beloved) users.

My goal of this series is not just to have a simple implementation guide. I want to give a guideline about important things from an architectural point of view as well.

Read more