Navigation
Use this procedure to load balance Horizon View Connection Servers or Horizon View Security Servers.
- Overview
- Monitors
- Servers
- Services
- Load Balancing Virtual Servers
- Persistency Group
- Horizon View Configuration
Overview
A typical Horizon View Installation will have at least six connection servers:
- Two Internal View Connection Servers – these need to be load balanced on an internal VIP
- Two DMZ View Security Servers – these need to be load balanced on a DMZ VIP
- The DMZ View Security Servers are paired with two additional internal View Connection Servers. There is no need to load balance the internal Paired Connection Servers. However, we do need to monitor them.
Monitors
Users connect to Horizon View Connection Server and Horizon View Security Server on four ports: TCP 443, TCP 8443, TCP 4172, and UDP 4172. Users will initially connect to port 443 and then be redirected to one of the other ports on the same server initially used for the 443 connection. If one of the ports is down, the entire server should be removed from load balancing. To facilitate this, create a monitor for each of the ports (except UDP 4172).
- On the left, expand Traffic Management, expand Load Balancing, and click Monitors.
- On the right, click Add.
- Name it View-PCOIP or similar.
- Change the Type drop-down to TCP.
- In the Destination Port field, enter 4172.
- Scroll down and click Create.
- On the right, click Add.
- Name it View-Blast or similar.
- Change the Type drop-down to TCP.
- In the Destination Port field, enter 8443.
- Scroll down and click Create.
- On the right, click Add.
- Name it View-SSL or similar.
- Change the Type drop-down to HTTP-ECV.
- In the Destination Port field, enter 443.
- Scroll down and check the box next to Secure.
- On the Special Parameters tab, in the Send String section, enter
GET /broker/xml
- In the Receive String section, enter
clientlaunch-default
- Scroll down and click Create.
- View Security Servers are paired with View Connection Servers. If the paired View Connection Server is down, then we should probably stop sending users to the corresponding View Security Server. Let’s create a monitor that has a specific IP address in it. Right-click the existing View-SSL monitor and click Add.
- Normally a monitor does not have any Destination IP defined, which means it uses the IP address of the service that it is bound to. However, we intend to bind this monitor to the View Security Server but we need it to monitor the paired View Connection Server, which is a different IP address. Type in the IP address of the paired View Connection Server. Then rename the monitor so it includes the View Connection Server name.
- Since we are embedding an IP address into the monitor, you have to create a separate monitor for each paired View Connection Server IP.
Servers
Create Server Objects for the DMZ Security Servers and the internal non-paired Connection Servers. Do not create Server Objects for the Paired Connection Servers.
- On the left, expand Traffic Management, expand Load Balancing, and click Servers.
- On the right, click Add.
- Enter a descriptive server name, usually it matches the actual server name.
- Enter the IP address of the View Connection Server or View Security Server.
- Enter comments to describe the server. Click Create.
- Continue adding View Connection Servers or View Security Servers.
Services
For Internal Connection Servers (not the paired servers), load balancing monitoring is very simple:
- Create services for SSL 443
- To verify server availability, monitor port TCP 443 on the same server.
- If tunneling is disabled then internal users connect directly to View Agents and UDP/TCP 4172 and TCP 8443 are not used on Internal Connection Servers. There’s no need to create services and monitors for these ports.
Security Servers are more complex:
- The PCoIP Secure Gateway and HTML Blast Secure Gateway are typically enabled on Security Servers but they are not typically enabled on internal Connection Servers.
- All traffic initially connects on TCP 443. For Security Servers, the clients then connect to UDP 4172 or TCP 8443 on the same Security Server. If UDP 4172 or TCP 8443 are down, then you probably want to make sure TCP 443 is also brought down.
- Each Security Server is paired with an internal Connection Server. If the internal Connection Server is down then the Security Server should be taken down.
- To accommodate these failure scenarios, bind multiple monitors to the View Security Server. If any of the monitors fails then NetScaler will no longer forward traffic to 443 on that particular server.
If you have two View Security Servers named VSS01 and VSS02, the configuration is summarized as follows (scroll down for detailed configuration):
- Server = VSS01, Protocol = SSL_BRIDGE, Port = 443
- Monitors = PCoIP (TCP 4172), SSL (443), and Blast (8443)
- Monitor = SSL (443) for paired View Connection Server VCS01
- Server = VSS02, Protocol = SSL_BRIDGE, Port = 443
- Monitors = PCoIP (TCP 4172), SSL (443), and Blast (8443)
- Monitor = SSL (443) for paired View Connection Server VCS02
- Server = VSS01, Protocol = TCP, Port = 4172
- Monitor = PCoIP (TCP 4172)
- Server = VSS02, Protocol = TCP, Port = 4172
- Monitor = PCoIP (TCP 4172)
- Server = VSS01, Protocol = UDP, Port = 4172
- Monitor = PCoIP (TCP 4172)
- Server = VSS02, Protocol = UDP, Port = 4172
- Monitor = PCoIP (TCP 4172)
- Server = VSS01, Protocol = SSL_BRIDGE, Port = 8443
- Monitor = Blast (8443)
- Server = VSS02, Protocol = SSL_BRIDGE, Port = 8443
- Monitor = Blast (8443)
If you are not using HTML Blast then you can skip 8443. If you are not using PCoIP Secure Gateway, then you can skip the 4172 ports.
- On the left, expand Traffic Management, expand Load Balancing, and click Services.
- On the right, click Add.
- Give the Service a descriptive name (e.g. svc-VSS01-SSL).
- Change the selection to Existing Server and select the View Security Server or internal (non-paired) View Connection Server you created earlier.
- Change the Protocol to SSL_BRIDGE and click OK.
- On the left, in the Monitors section, click where it says 1 Service to Load Balancing Monitor Binding.
- Ignore the current monitor and click Add Binding.
- Click the arrow next to Click to select.
- Select the View-SSL monitor and click Select.
- Then click Bind.
- If this server will host PCoIP Secure Gateway and/or Blast Secure Gateway, add monitors for them too. If any of those services fails, then 443 needs to be marked DOWN.
- If this is a View Security Server, also add a monitor that has the IP address of the paired View Connection Server. If the paired View Connection Server is down, then stop sending connections to this View Security Server.
- The Last Response should indicate Success. If you bound multiple monitors to the Service, then the member will only be UP if all monitors succeed. There’s a refresh button on the top-right. Click Close when done.
- Then click Done.
- Right-click the first service and click Add.
- Change the name to match the second View Server.
- Select Existing Server and use the Server drop-down to select to the second View Server.
- The remaining configuration is identical to the first server. Click OK.
- You will need to configure the monitors again. They will be identical to the first server except for the monitoring of the paired View Connection Server. Click Done when done.
- Add another Service for PCoIP on TCP 4172.
- Name = svc-VSS01-PCoIPTCP or similar.
- Server = Existing Server, select the first View Server.
- Protocol = TCP
- Port = 4172.
- Monitors = View-PCoIP. You can add the other monitors if desired.
- Repeat for the 2nd View Security Server.
- Add another Service for PCoIP on UDP 4172.
- Name = svc-VSS01-PCoIPUDP or similar.
- Existing Server = first View Server
- Protocol = UDP
- Port = 4172.
- Monitors = View-PCoIP. You can add the other monitors if desired.
- Repeat for the 2nd View Server.
- Add another Service for HTML Blast on SSL_BRIDGE 8443.
- Name = svc-VSS01-HTMLBlast or similar.
- Existing Server = the first View Server
- Protocol = SSL_BRIDGE
- Port = 8443.
- Monitors = View-Blast. You can add the other monitors if desired.
- Repeat for the 2nd View Server.
- The eight services should look something like this:
- Repeat these instructions to add the internal (non-paired) View Connection Servers except that you only need to add services for SSL_BRIDGE 443 and only need monitoring for 443.
Load Balancing Virtual Servers
Create separate load balancers for internal and DMZ.
- Internal load balances the two non-paired Internal View Connections Servers.
- DMZ load balances the two View Security Servers.
The paired View Connection Servers do not need to be load balanced.
For the internal View Connection Servers you only need a load balancer for SSL_BRIDGE 443. If tunneling is disabled then you don’t need load balancers for the other ports (UDP/TCP 4172 and SSL_BRIDGE 8443).
However, tunneling is enabled on the View Security Servers so you will need separate load balancers for each port number. Here is a summary of the Virtual Servers:
- Virtual Server on SSL_BRIDGE 443 – bind both View SSL Services.
- Virtual Server on UDP 4172 – bind both View PCoIPUDP Services.
- Virtual Server on TCP 4172 – bind both View PCoIPTCP Services.
- Virtual Server on SSL_BRIDGE 8443 – bind both View Blast Services.
Do the following to create the Virtual Servers:
- On the left, under Traffic Management > Load Balancing, click Virtual Servers.
- On the right click Add.
- Name it View-SSL-LB or similar.
- Change the Protocol to SSL_BRIDGE.
- Specify a new internal VIP. This one VIP will be used for all of the Virtual Servers.
- Enter 443 as the Port.
- Click OK.
- On the left, in the Services and Service Groups section, click where it says No Load Balancing Virtual Server Service Binding.
- Click the arrow next to Click to select.
- Select the two View-SSL Services and click Select.
- Click Bind.
- Click Continue.
- Then click Done. Persistency will be configured later.
- If this is a View Security Server or if tunneling is enabled then create another Load Balancing Virtual Server for PCoIP UDP 4172:
- Same VIP as the 443 Load Balancer.
- Protocol = UDP, Port = 4172
- Services = the PCoIP UDP Services.
- If this is a View Security Server or if tunneling is enabled then create another Load Balancing Virtual Server for PCoIP TCP 4172:
- Same VIP as the 443 Load Balancer.
- Protocol = TCP, Port = 4172
- Services = the PCoIP TCP Services.
- If this is a View Security Server or if tunneling is enabled then create another Load Balancing Virtual Server for HTML Blast SSL_BRIDGE 8443:
- Same VIP as the 443 Load Balancer.
- Protocol = SSL_BRIDGE, Port = 8443
- Services = the HTML Blast SSL_BRIDGE Services.
- This gives you four Virtual Servers on the same VIP but different protocols and port numbers.
Persistency Group
For Security Servers, users will first connect to SSL_BRIDGE 443 and be load balanced. Subsequent connections to the other port numbers must go to the same load balanced server. Create a Persistency Group to facilitate this.
If tunneling is disabled on the internal View Connection Servers then you probably only have one load balancer for those servers and thus you could configure persistence directly on that one load balancer instead of creating a Persistency Group. However, since the View Security Servers have multiple load balancers then you need to bind them together into a Persistency Group.
- On the left, under Traffic Management, expand Load Balancing and click Persistency Groups.
- On the right, click Add.
- Give the Persistency Group a name (e.g. View).
- Change the Persistence to SOURCEIP.
- Enter a timeout that is equal to or greater than the timeout in View Administrator, which defaults to 10 hours (600 minutes).
- In the Virtual Server Name section, click Add.
- Move all four View Security Server / View Connection Server Load Balancing Virtual Servers to the right. Click Create.
Horizon View Configuration
- On the View Security Servers (or View Connection Servers), request a certificate that matches the FQDN that resolves to the Load Balancing VIP.
- Make sure the private key is exportable.
- Set the Friendly Name to vdm and restart the View Security Server services.
- In View Administrator, go to View Configuration > Servers.
- On the right, switch to the Security Servers tab.
- Highlight a server and click Edit.
- Change the URLs to the FQDN that resolves to the load balancing VIP.
- Change the PCoIP URL to the VIP. For View Security Servers, this is typically a public IP that is NAT’d to the DMZ Load Balancing VIP.