We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byDorian Sale
Modified about 1 year ago
Sum304: Deploying and Troubleshooting Edgesight Vincent Papoz Escalation Engineer October 16, 2012
© 2012 Citrix | Confidential – Do Not Distribute Agenda 2 Architecture overview Use case: Troubleshooting slow logon Troubleshooting and resolving Edgesight Performance issues Custom Reporting (SQL objects and where to find data) Question
SQL Server RS Server Edgesight and Report Server Databases Edgesight Server XenApp servers with Edgesight Agent Endpoints
© 2012 Citrix | Confidential – Do Not Distribute What does the agent monitor? Event-driven data Process starts/stops, errors and faults User logon WinSock connection and HTTP transactions Windows Event Log System reboot Polled data System and Process performance metrics ICA session data Session connects/disconnects Detailed logon and session metrics, virtual channel statistics Scheduled data Drive space calculation Asset history
© 2012 Citrix | Confidential – Do Not Distribute End User Experience monitoring 6 Collects both client Start-up and Server Start-up metrics Service running on the XenApp Servers
Use case: Troubleshooting slow logon
© 2012 Citrix | Confidential – Do Not Distribute
Troubleshooting and resolving Edgesight Performance issues
© 2012 Citrix | Confidential – Do Not Distribute Symptoms 14 Report Rendering takes forever, Payloads are queuing up in the webload directory and are imported very slowly, Servers will not update the Database, Nightly maintenance takes a very long time - and possibly eventually fails, Grooming error messages are showing up in the console, Database data files very large
© 2012 Citrix | Confidential – Do Not Distribute Cause 15 Usually a problem with the SQL database SQL server out of disk space or too much data to process Data processing cannot complete because the Tlog cannot grow Data processing is resource intensive and is delayed
© 2012 Citrix | Confidential – Do Not Distribute Action plan 16 Assess your reporting requirements Analyze the content of the database Remove the unwanted data Reclaim disk space Adjust the collection configuration
© 2012 Citrix | Confidential – Do Not Distribute Analyzing the content of the database – Step1 17 Find out the Size of the Edgesight Database data files SELECT Name AS Logical_Name, Physical_Name, (size*8)/1024 SizeMB FROM sys.master_files WHERE DB_NAME(database_id) = 'EdgesightDBname‘ GO Logical_NamePhysical_NameSizeMB EdgesightE:\DB\Edgesight.mdf2500 Edgesight_logE:\DB\Edgesight_log.LDF45052 Edgesight_FG1_DataE:\DB\Edgesight_FG1.ndf12820 Edgesight_FG2_DataE:\DB\Edgesight_FG2.ndf25350 Edgesight_FG3_DataE:\DB\Edgesight_FG3.ndf7322 Edgesight_FG4_DataE:\DB\Edgesight_FG4.ndf46623 Edgesight_FG5_DataE:\DB\Edgesight_FG5.ndf8250 Edgesight_FG6_DataE:\DB\Edgesight_FG6.ndf Edgesight_FG7_DataE:\DB\Edgesight_FG7.ndf12500
© 2012 Citrix | Confidential – Do Not Distribute Analyzing the content of the database – Step2 18 SELECT DISTINCT object_name(i.id) as TableName, f.name as Filegroup FROM sys.sysindexes i, sys.filegroups f WHERE objectproperty(i.id,'IsUserTable') = 1 AND f.data_space_id = i.groupid ORDER BY f.name GO
© 2012 Citrix | Confidential – Do Not Distribute Analyzing the content of the database – Step3 19 SELECT sysobjects.Name, sysindexes.Rows FROM sysobjects INNER JOIN sysindexes ON sysobjects.id = sysindexes.id WHERE sysindexes.IndId < 2 AND sysobjects.Name IN('CORE_NET_STAT', 'CORE_NET_TRANS')
© 2012 Citrix | Confidential – Do Not Distribute Analyzing the content of the database – Step Finding out about the grooming schedule: SELECT f.table_name, m.default_days, m.groom_days FROM maint_table_config m JOIN table_def f on f.tableid=m.tableid WHERE table_name in ('CORE_NET_STAT', 'CORE_NET_TRANS')
© 2012 Citrix | Confidential – Do Not Distribute Analyzing the content of the database – Step Has the grooming been failing? SELECT COUNT(*) FROM CORE_NET_TRANS WHERE dtperiod < GETUTCDATE() - 11
© 2012 Citrix | Confidential – Do Not Distribute Removing Data manually 22 -Grooming is failing – Delete data in increments int; datetime; = GETUTCDATE() - 10 = (select COUNT(*) from core_net_trans where dtperiod <> 0 begin delete top(100000) from core_net_trans where dtperiod = (select COUNT(*) from core_net_trans where dtperiod end; go DBCC SHRINKFILE (N'Edgesight_FG6_Data', 0, TRUNCATEONLY) GO
© 2012 Citrix | Confidential – Do Not Distribute Removing Data manually 23 Grooming is not failing - Analyze the content of the table SELECT c.imid, i.[filename], count(c.imid) as cnt from core_net_trans c JOIN [image] i ON i.imid=c.imid GROUP BY c.imid, i.[filename] ORDER BY cnt DESC => Delete the process instance records from the table
© 2012 Citrix | Confidential – Do Not Distribute Reclaiming disk space 24 Using SQL Studio (SSMS) Using the following query DBCC SHRINKFILE (N'Edgesight_FG6_Data', 0, TRUNCATEONLY) GO
© 2012 Citrix | Confidential – Do Not Distribute Adjust collection configuration 25 Adjust the grooming schedule Review the upload configuration Ignore processes if applicable
© 2012 Citrix | Confidential – Do Not Distribute Ignoring a process 26
© 2012 Citrix | Confidential – Do Not Distribute Ignoring a process (Excluding a process) 27 Disable injection of csma_ldr.dll Per device registry setting Requires a reboot of the monitored device
© 2012 Citrix | Confidential – Do Not Distribute Ignoring a process – Finding affected servers 28 SELECT m.name, COUNT(m.name) AS cnt FROM core_net_trans c INNER JOIN instance i ON i.instid=c.instid INNER JOIN machine m ON m.machid=i.machid INNER JOIN [image] im ON im.imid=c.imid WHERE im.[filename] = ‘SomeApp.exe‘ GROUP BY m.name ORDER BY cnt DESC
© 2012 Citrix | Confidential – Do Not Distribute Use Sysinternals Process Explorer Ignoring a process – Verifying process exclusion 29
© 2012 Citrix | Confidential – Do Not Distribute 30
© 2012 Citrix | Confidential – Do Not Distribute Design consideration – SQL server 31 Split the filegroups on different hard drives Set the recovery model to simple for the Edgesight database Implement Data warehousing
A word on Custom Reporting
© 2012 Citrix | Confidential – Do Not Distribute XenApp servers with Edgesight Agent Endpoints
© 2012 Citrix | Confidential – Do Not Distribute Where to find data… Tables vs Views user defined tables Schema is not documented Design is complex 96 SQL views Fully documented Used by the built in reports Recommended when creating custom reports
© 2012 Citrix | Confidential – Do Not Distribute What you need to know… 35 Limited to historical reports Built in report files located under Uses Reporting services RDL format (XML) Queries are written in T-SQL Localization built in Edgesight
© 2012 Citrix | Confidential – Do Not Distribute Tools 36 An XML editor Report Builder Report Designer (Business Intelligence Development Studio) SQL Studio (SSMS)
© 2012 Citrix | Confidential – Do Not Distribute 37
© 2012 Citrix | Confidential – Do Not Distribute 38
© 2012 Citrix | Confidential – Do Not Distribute
Resources 40 Custom Report Blog Report Definition Language Microsoft Report Builder Server-2012-reporting-services.aspx Server-2012-reporting-services.aspx Anatomy of an Edgesight Report
Longhorn Academy Server Management Dave & Sebastian.
Windows 2008 Active Directory Configuration – Week 4 of 6 Microsoft Test: Mark McCoy MCSE, CNE, CISSP.
Ramon Scott – Lead Escalation Engineer Configuring & Troubleshooting XenDesktop Sites August 29, 2013 Citrix Support Secrets Webinar Series.
Microsoft Confidential What's New in Configuration Manager 2012 Since Beta 2.
A load testing solution for web applications This presentation should be viewed as a Slide Show. Choose “Slide Show” from the PowerPoint menu and click.
1 A Cloud Reference Framework … for discussion only … Please send comments and suggestions to Bhumip Khasnabish Friday,
1 HARDENING WINDOWS XP: YOUR DEFINITIVE LOCKDOWN GUIDE.
The Client/Server Database Environment CS263 Lecture 12.
WIN.MIT.EDU Tips and Tricks Joining machines Roaming Profiles Folder Redirection Desktop Sync Previous Versions Group Policy Management Tools Single Sign-on.
Upgrade And Migration From Windows Sharepoint Services V2 And Sharepoint Portal Server 2003 Allan Schweighardt Sr. Technology Specialist Microsoft Corporation.
Upgrading Oracle Database 9i to 10g for Siebel using SQL Performance Analyzer (SPA) Sameer Marwa – Infogig Consulting Khaled Yagoub – Oracle Development.
© 2012 House of Brick Technologies, LLC Database Health and Performance (AKA I can prove it’s not my system’s fault!) August 4, 2012 David Klee – Solutions.
1 Advanced Database Application Development Performance Tuning Performance Benchmarks Standardization E-Commerce Legacy Systems.
IP-guard IP-guard Contents Brief Introduction 1 14 Modules of IP-guard 2 Solutions 3 Components and Basic System Architecture 4.
More Pass-Through Queries! Evaluation Code 245 Dan DeBower Technical Consultant SCT Tuesday, March 26 th, :00am – 9:30am.
Database Management. Module 6 Objectives Next Discuss the functions common to most DBMSs Identify the qualities of valuable information Explain why data.
What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware. Operating system goals: Execute.
User-Defined Functions in SQL Server 2005 Andrew Novick 2007.
2 Welcome To Defect Management Training Objective: The objective of this course is to learn about standards that emphasize a best practice approach for.
From Info to Enterprise Implementation Case Study: SBC Corporation Presented to the Crystal Decisions Regional Users Group for the Bay Area on July 24,
DBA programming component. SQL*Plus Scripting 1 Plus points: Same SQL language as in interactive mode Can test programs interactively first Includes predefined.
Oracle Service Bus. Oracle Service Bus Core Features By fusing the concepts of the ESB, message brokering, and operational services management into a.
Microsoft SQL Server 2005 Express Edition & SQL Server Management Studio Express Installation and Configuration Guides.
Exchange 2003 Best Practices Day-to-Day Jim McBee ITCS Hawaii
IBM Tivoli JVM Monitoring – Best Practices Steve Klopfer Technical Specialist, IBM
András Belokosztolszki Managing change in the database world.
XenClient Enterprise 4.5 Snapback and OS Profiles.
VMware vCenter Server High Availability Product Support Engineering VMware Confidential.
SQL Server 2000 Notification Services Bart De Smet [MVP]
Software Quality Management CIS 376 Bruce R. Maxim UM-Dearborn.
© 2016 SlidePlayer.com Inc. All rights reserved.