Transcript VDI
Sébastien Pittet & Lionel Zufferey Desktop Location Independence Hot-desking between Desktop PCs Flexibly work from home and offsite contractor locations Data Security & Compliance Keeps data safe in the datacenter Centralized tracking helps simplify the burden of regulatory compliance 10 Business Continuity Centralized Management Microsoft Confidential Quicker recovery from device malfunctions Centralized data storage and backup reduces losses from stolen devices Small and large scale deployments: Microsoft + 3rd Party Connection Broker (CITRIX XenDesktop) Remote App 3rd Party Connection Broker Centralized Desktop (VECD) XenDesktop Citrix XenDesktop Administrator’s Console Interface XenDesktop Setup Tool Citrix License Server Web Citrix Desktop Delivery Controller Windows PowerShell ™ Citrix Provisioning Server Citrix XenDesktop Agent Virtual Machine Citrix XenDesktop Agent Virtual Machine Citrix XenDesktop Agent Virtual Machine Vista Enterprise Centralized Desktop (VECD) Thin clients, client PCs without Software Assurance, & 3rd party owned devices Client PCs with Software Assurance Annual subscription in addition to Windows Software Assurance Annual subscription which includes Windows Software Assurance Option to purchase MDOP Option to purchase MDOP Re-assignment rights after 90 days to any SA covered PC Re-assignment after 90 days Listed at $23/year/ device (Retail ERP) Listed at $110/year/device (Retail ERP) Count Total Number of Devices Establish rich and Thin client Numbers for VECD User Licensing Calculator for other licensing components Should I be using TS? Image management & Storage Roaming Profiles Patching Application Deployment Network Sysprep Provide unique environment for each and every user ? Customize every environment with different apps and settings ? Grant users more control to allow them install and modify applciations ? Run apps that are not multi-user friendly? Terminal Services (Sessions) VDI (VMs) Technology Maturity Proven Emerging Scalability Higher ratio of users/server Lower ratio users/server Isolation/Security Session-based isolation Shared OS across users Must run as standard user VM-based isolation Dedicated OS per user Can run as admin Remote User Experience Protocol-dependent Protocol-dependent User Flexibility User is running as a user User can have full rights Application Compatibility Windows Server OS Windows Client desktop Availability of Skilled IT Staff High (TS experts) Low (VM experts) 2 Primary Models: Personal VM’s – 1 VHD per user, VHD state full Temporary Pooled VMs – VHDs shared between users, state reset at logoff Personal VMs: Day 1 Day 2 Day n • How Important are these 2 scenarios? User 1 Day 2 Day n • What % of your VDI user population will use each scenario? User n Day 2 Golden Image Clone Temporary Pooled VMs: Pool 1 Golden Image Day 1 User 1 Day n Day 2 Day 3 • In the pooled VMs how do you plan to handle user state? • In pooled VMs how often do you hope to ‘refresh’ the pool with new images? User 1 Clone n • What type of users will use each scenario? User 1 • What features do you need to help place and mange these VMs? • What type of load management? • Support for VM libraries? User state can bloat VHD DO: Use roaming or mandatory profiles. Use folder redirection Place profile servers close to VDI hosts Don’t: allow folder synchronization if using pooled vm Place OSTs / PSTs in redirected folders or profile User pro-quota to stop users abusing their desktop DO: Have planned patching cycles Understand how pathing will affect re-creation of master images Understand how patching will affect VHD size over time Use automated patching services Use App-V to reduce patching of apps in image DON’T: Allow patching to dictate use of pooled vs personal More apps in image = more disk More apps in image = hard to patch More apps in image = more ‘golden images’ Consider deploying ubiquitous applications in image Consider using App-V ability to redirect user state to network location (not into profile) Suite applications that need to run together Network bandwidth planning is key: Plan for use of profiles and redirection Plan for per user bandwidth required for RDP / ICA etc Ensure the host VM server has adequate NIC bandwidth to other server infrastructure (applications, file, print etc) Make sure the user of SAN to host the VHDs is factored if SAN will run over an IP network Microsoft Confidential VDI with Windows Server 2008 R2 and Windows 7 Large scale, complex deployments: Microsoft + CITRIX technology Small scale, simpler deployments: Microsoft only technology Remote App R2 VECD for Connection Broker Options Large scale XenDesktop OR R2 Small scale R2 28 Connection Brokering Architecture Active Directory 3. Query Personal Desktop for User Connection Broker 2.Get Target Machine 4.Query/ Start VM 5.Return Target Machine RD Redirector 1.Connect to MyPersonalDesktop Client 6.Redirect To Machine RDV Host Agent Hyper-V VM TSV TSV TSV VM Consolidation Rate Client devices : 5-7 VMs by Hosts’Core Some Pros Best of both world Virtualization benefits A PC for each user Data Security Instant provisioning of new desktops Mobility Multiple Desktops Some Cons Network dependency Availability Latency impacts Can be complex VDI Make Sense! (download link) Desktop Virtualization Strategy (link) BLOG (Deployment Guys), article VDI (link) Step by step guide (link) Formations LANexpert Workshop VDI Microsoft Citrix http://www.lanexpert.ch/training Programme détaillé disponible Sécurisation par GPO Portail Web DataCenter LAN Users External Users 27 Janvier 2009 C Beaugrand - LANExpert 14 – 15 avril 2010, CICG Premium Sponsoring Partners Classic Sponsoring Partners