Skip to main content

Citrix on VMware, Oil and Water?

Citrix at a high load can be a demanding application due to high kernel-resource utilization and a high level of context switches associated with its underlying Terminal Server architecture. But in many environments this high utilization often doesn't occur. Many times, application conflicts -- or the need for security isolation among applications or users -- force a horizontal scaling of Citrix servers. These kinds of applications or users that can't cohabitate on a single server can result in an organization buying new Presentation Servers even though existing server utilization is low.

In a virtualized environment, multiple server instances are enabled to run on the same physical server chassis. When application conflicts or security requirements force additional servers to be brought online, virtualization can enable it to be done with relative ease. You can copy and paste new servers to your heart's content until the hardware resources of your physical chassis max out.

VMware recently completed scalability tests that involved initiating a series of increasing user log-ons to a virtualized Citrix server, followed by a pre-recorded series of actions using Microsoft Word. The test simulated users logging in, opening a Word document and typing for up to 15 minutes. CPU resources were measured so as to identify the number of users capable of being supported by the hardware chassis when running at up to 80 percent of CPU utilization.


Greg Shields is a renowned writer and trainer. Read the rest here...

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op