Professional Documents
Culture Documents
Client_Name
Project_Name
Citrix® XenServer™ 5 Design
Prepared by:
Project_Lead
[Title]
PartnerABC
[Name]
[Title]
PartnerABC
Revision History
Revision Change Description Updated By Date
-i-
How to use the Citrix XenServer 5 Design Template
This is just a template and should be modified as you see fit. That
includes adding and/or removing sections and subsections to fit
the needs of the client and project.
All text written in blue should be replaced with applicable verbiage. Blue is
used to provide sample verbiage and should not be used as is.
- ii -
Deliverable Signoff
The signatures below indicate Client_Name’s and PartnerABC’s agreement to the contents of the Citrix®
XenServer™ 5 Design.
Client_Name PartnerABC
Name: Name:
Signature: Signature:
Title: Title:
Date: Date:
- iii -
Table of Contents
1.Executive Summary......................................................................................................1
1.1Project Overview..............................................................................................................................1
1.2Deliverable Overview........................................................................................................................1
1.3Deliverable References....................................................................................................................3
1.4PartnerABC Resources....................................................................................................................3
1.5Next Steps........................................................................................................................................3
2.Architectural Design.....................................................................................................4
2.1Overview..........................................................................................................................................4
2.2Design Summary..............................................................................................................................4
2.3Design Concerns..............................................................................................................................4
XENSERVER...............................................................................................5
3.Host Configuration.......................................................................................................6
3.1Description.......................................................................................................................................6
3.2Key Decisions...................................................................................................................................6
3.3Design..............................................................................................................................................7
3.4XenServer Host Parameters.............................................................................................................7
4.Resource Pools ............................................................................................................8
4.1Description.......................................................................................................................................8
4.2Key Decisions...................................................................................................................................8
4.3Design..............................................................................................................................................9
4.4Resource Pool Design......................................................................................................................9
5.XenMotion & High Availability...................................................................................11
5.1Description.....................................................................................................................................11
5.2Key Decisions.................................................................................................................................11
5.3Design............................................................................................................................................12
5.4XenMotion Configuration................................................................................................................12
5.5High Availability Configuration........................................................................................................12
6.Storage Infrastructure................................................................................................14
6.1Description.....................................................................................................................................14
6.2Terminology....................................................................................................................................14
6.3Key Decisions.................................................................................................................................16
6.4Design............................................................................................................................................17
6.5Boot Storage Configuration............................................................................................................17
6.6Virtual Disk Storage Configuration .................................................................................................18
6.7ISO Library Configuration...............................................................................................................20
7.Network Infrastructure...............................................................................................21
7.1Description.....................................................................................................................................21
7.2Terminology....................................................................................................................................21
7.3Key Decisions.................................................................................................................................22
7.4Design............................................................................................................................................22
7.5Physical NIC Configuration.............................................................................................................23
7.6Management Interface Configuration.............................................................................................23
7.7Host Networks................................................................................................................................23
7.8XenServer IP Address Table..........................................................................................................24
7.9Network Communications...............................................................................................................24
8.Server Hardware Environment..................................................................................25
8.1Description ....................................................................................................................................25
8.2Key Decisions.................................................................................................................................25
8.3Design ...........................................................................................................................................26
- iv -
8.4Server Hardware Configuration .....................................................................................................26
8.5Aggregated Capacity......................................................................................................................27
SYSTEMS MANAGEMENT.......................................................................28
9.Systems Management................................................................................................29
9.1Description.....................................................................................................................................29
9.2Key Decisions.................................................................................................................................29
9.3Design............................................................................................................................................29
10.XenCenter Configuration.........................................................................................30
10.1Description...................................................................................................................................30
10.2Key Decisions...............................................................................................................................30
10.3Design..........................................................................................................................................31
10.4XenCenter Hardware Requirements.............................................................................................31
10.5XenCenter Configuration..............................................................................................................32
10.6Email Notification Settings............................................................................................................32
10.7XenServer System Alert Configuration.........................................................................................32
10.8Custom Fields, Searching and Tagging........................................................................................33
10.9Software Updates.........................................................................................................................33
11.Backup and Recovery..............................................................................................34
11.1Description...................................................................................................................................34
11.2Key Decisions...............................................................................................................................34
11.3XenServer Host Backup ..............................................................................................................35
11.4Virtual Machine Metadata Backup ...............................................................................................35
11.5Virtual Machine Backup................................................................................................................36
11.6Virtual Machine Snapshots...........................................................................................................36
11.7Disaster Recovery........................................................................................................................37
VIRTUAL MACHINES................................................................................38
12.Virtual Machine Design............................................................................................39
12.1Description...................................................................................................................................39
12.2Key Decisions...............................................................................................................................39
12.3Design..........................................................................................................................................40
12.4Virtual Machine Configuration......................................................................................................41
12.5Virtual Machine Templates...........................................................................................................41
12.6Virtual Machine HA Configuration.................................................................................................42
12.7Workload Migration Process.........................................................................................................42
13.Workload Matrix........................................................................................................45
13.1Description...................................................................................................................................45
13.2Key Decisions...............................................................................................................................45
13.3Citrix Server Virtualization Assessment (SVA).............................................................................45
13.4Desktop Workload........................................................................................................................46
SECURITY.................................................................................................47
14.Security......................................................................................................................48
14.1Description...................................................................................................................................48
14.2Key Decisions...............................................................................................................................48
14.3Design..........................................................................................................................................49
-v-
APPENDICES............................................................................................50
15.Appendix A: XenServer Networking Explained.....................................................51
15.1Internal Networks..........................................................................................................................51
15.2External Networks........................................................................................................................51
15.3Bonded Interfaces........................................................................................................................52
15.4VLAN’s.........................................................................................................................................52
15.5Virtual Network Combinations......................................................................................................53
- vi -
1. Executive Summary
1.1 Project Overview
Client_Name . . .
Currently,
The business drivers for this effort revolve around . . .
Section Approach
Each design topic is organized into three subsections:
• Overview. This subsection provides an overview of the key concepts within the Key
Decisions and Design Sections.
• Key Decisions. This subsection provides a decision matrix for Client_Name based on line
items. Client_Name can use the decision matrices as quick reference guides to identify
settings and configuration decisions to be implemented in the environment.
• Design. This subsection provides justification and additional information related to the Key
Decisions and discusses their relevance to Client_Name’s virtual desktop environment.
-2-
1.3 Deliverable References
The deliverable provides guidelines for the implementation. However, it does not provide step-by-
step instructions on how to install the components discussed. Therefore, PartnerABC recommends
that administrators involved in the implementation review the following documents, articles, and
guides prior to building and implementing the production environment. All of these documents are
available from the Document Center or online Citrix Knowledge Base.
• Citrix XenServer Administrators guide
• Citrix XenServer Installation Guide
• Citrix XenServer Virtual Machine Installation Guide
The following icons will be used throughout the document in order to highlight important
information:
Symbol Description
This icon indicates that a decision is required based on the environment specific
information.
This icon indicates important notes that need to be considered as part of the
further planning process.
-3-
2. Architectural Design
This section provides a high-level description of the proposed implementation based on requirements and
risks identified as part of the Server Virtualization Assessment, as well as the information gathered during
the course of the design discussions.
2.1 Overview
The architecture for the Citrix XenServer environment that has been designed . . .
This design takes into account . . .
The following diagram depicts the planned environment for . . .
[Include Visio diagram detailing the XenServer architecture]
-4-
XenServer
-5-
3. Host Configuration
This section defines the general configuration and installation parameters for the XenServer deployment.
The XenServer host consists of a Xen-enabled Linux operating system, a management agent, VM
templates, and a local storage repository reserved for VMs.
3.1 Description
• Citrix XenServer. XenServer is the platform virtualization solution which enables the
creation of virtual x86 guest computers running on Xen, the open-source paravirtualizing
hypervisor with near-native performance.
• VM Support. Windows Virtual Machines (VMs) can be created only on XenServer hosts
equipped with 64-bit Intel VT-enabled or AMD-V CPUs. Linux VMs do not require
XenServer hosts that are equipped with Intel VT-enabled or AMD-V CPUs.
Type of New
Deployment Upgrade
Deployment CD
Scenario HTTP….etc
Deployment
Location
Naming Server naming
Convention convention
Server Overview of server
Hardware specs…
Specifications
Storage Type of storage
Configuration used locally, SAN,
iSCSI, NFS…etc
Networking Management
Configuration Virtual machine
networking
NIC Bonding
Number of
XenServer
Hosts
-6-
3.3 Design
The configuration settings of XenServer are detailed below. These settings…..
Within this section, you should explain any details that require additional verbiage; it is not
necessary to simply restate any items that are contained within the Design Decisions table unless it
is a lead-in to a more detailed explanation.
Where possible, include screen shots, diagrams, tables, or graphical depictions to explain the
design. A picture is worth 1,000 words (and reads a lot easier)! There are some tables included for
your convenience, but these should be modified, appended, or deleted as necessary.
Remember that blue text is sample text only!
-7-
4. Resource Pools
This section defines the planned architecture of the XenServer Resource Pool. Within this section
Resource Pools, number of XenServer hosts, number of pools, networking, shared storage, XenMotion
and High Availability (HA) options are defined.
4.1 Description
A resource pool comprises multiple XenServer host installations, bound together into a single
managed entity which can host VMs. Features which provide guest availability and resiliency such
as XenMotion and HA are only available through a XenServer Resource Pool. A resource pool is
an aggregate of one or more homogeneous XenServer hosts, up to a maximum of 16. The
definition of homogeneous is:
• each CPU is from the same vendor (in particular AMD-V and Intel VT CPUs cannot be
mixed)
• each CPU is the same model (except for stepping)
• each CPU has the same feature flags
• all hosts are running the same version of XenServer software
In addition to being homogeneous, an individual XenServer host can only join a resource pool if:
• an Enterprise license is installed on the host
• it has a static IP address (either manually assigned or via DHCP);
• it is not a member of an existing resource pool
• its clock is synchronized to the same time source as the pool master (for example, via
NTP)
• it has no shared storage configured
• there are no running or suspended VMs on the XenServer host which is joining
• there are no active operations on the VMs in progress, such as one shutting down
• the management NIC of the XenServer host which is joining is not part of a NIC bond
-8-
Decision Point Design Decision Justification
Number of
Guest Virtual
Machines
Resource Pool
Storage
4.3 Design
The configuration settings of XenServer Resource Pools are detailed below. These settings…..
Multiple Resource Pools are required because…..
-9-
Configuration Option Value
Guest OS types Windows XP
Windows 2003 Server
Assigned Storage Repositories
Assigned Pool Networks
XenMotion Enabled Yes
HA Enabled Yes
- 10 -
5. XenMotion & High Availability
This section defines how the Resource Pool and respective XenServer hosts will be configured to
accommodate XenMotion and High Availability (HA) features to provide availability and protection to the
guest virtual machines. It includes information regarding XenMotion requirements, as well as HA
protection levels.
5.1 Description
• XenMotion. XenMotion is the live migration of guest VMs across different XenServer hosts
without any noticeable downtime. A Resource Pool combined with shared storage enables
VMs to be dynamically migrated on any host.
• High Availability (HA). XenServer adds automated high availability (HA) with resource-
based placement of VMs in the event of host server failures. HA includes dynamic fail-over
planning based on available resources to help ensure that VMs are restarted on the
appropriate physical server.
• HA Heartbeat. XenServer HA utilizes a storage and network heartbeat mechanism to
check and absolutely guarantee that a host is unreachable.
- 11 -
Decision Point Design Decision Justification
HA Capacity The planned HA
capacity will
provide up to 2
XenServer host
failures as per the
server hardware
design
5.3 Design
XenMotion has been configured……
- 12 -
Configuration Option Value
HA Enabled Yes
No
Heartbeat Storage Repository
Heartbeat SR Type Shared storage limited to iSCSI
LUN or FC LUN
Heartbeat SR Size 400MB
(Minimum size is 356MB)
HA Protection Levels Protected
Priority 1: Server 1 to 3
Priority 2: VM 11 to VM20.etc
Priority 3:
- 13 -
6. Storage Infrastructure
This section defines the planned architecture for the storage infrastructure for individual XenServer hosts
and the shared storage required for hosts configured in Resource Pools. Within this section, storage
hardware, the underlying disk sub-system, RAID types, dynamic multipathing, ISO library settings, virtual
disk images (VDI) types and virtual machine storage are defined.
6.1 Description
• Storage Repository (SR). Storage Repositories are storage targets containing
homogeneous virtual disks. A XenServer host defines a container called a Storage
Repository to describe a particular storage target, in which Virtual Disk Images (VDIs) are
stored.
• Virtual Disk Images (VDIs). A VDI is an on-disk representation of a virtual disk provided to
a VM and is the fundamental unit of virtualized storage in XenServer.
• Shared Storage. A shared SR is required for Resource Pool creation and XenMotion
functionality. Shared SR includes the following storage types: iSCSI, Fibre Channel and
NFS storage.
• ISO Library. CD and DVD image files represented as ISO files can be stored on CIFS or
NFS based storage repositories. The ISO files can them be mounted o the guest virtual
machines and used during the operating installation.
6.2 Terminology
Citrix XenServer uses specific terminology to define various aspects of the storage architecture, the
following table explains this terminology, which is used throughout the remainder of the document.
XenServer Explanation Description
Acronym
SR Storage Repository A container where VDIs are stored. The SR types
supported are IDE, SAS, SCSI, SATA on Local disks,
and FC, NFS and iSCSI on shared storage. A XenServer
host can have access to multiple SR types.
PBD Physical Block The interface between the Storage Repository and the
Device physical host. A PBD is basically a connector that
attaches an SR to a XenServer host. PBDs store device
configuration information used to connect to a storage
system. For example, for NFS it contains the IP address
of FQDN of the NFS server and the export path that gets
mounted by the XenServer host.
VBD Virtual Block The interface between the VDI and the virtual machines.
Device VBDs map VDIs to VMs. They also provide for QoS for a
given VDI.
- 14 -
XenServer Explanation Description
Acronym
VDI Virtual Disk A VDI is a disk abstraction where the contents of virtual
disks are stored. There are 4 VDI types: VHD, Logical
Volume Manager, NetApp and EqualLogic Managed
LUNs. The difference between Logical Volume Manager
and NetApp/EqualLogic Managed LUNs is that LUNs are
put under Linux LVM control whereas NetApp and
EqualLogic Managed LUNs are not.
The following diagram shows a graphical overview of storage repositories and related objects.
- 15 -
6.3 Key Decisions
Decision Point Design Decision Justification
XenServer Boot Local
Storage Boot from SAN
Local Storage IDE
SCSI
SATA
SAS
USB
Local Storage RAID-1 across 2 x
Configuration 72GB disks @
15,000 rpm
Virtual Machine Local
Storage Shared
Shared Storage
Configuration
VDI Type VHD
LVM
NetApp
EqualLogic
SAN Storage EMC CX300
Details
HBA Type Hardware
Software
Dynamic Enabled across
Multipathing QLogic HBAs
Heartbeat SR iSCSI LUN
FC LUN
Virtual Machine
Metadata
- 16 -
Decision Point Design Decision Justification
ISO Library CIFS share on
Settings Windows 2003
server FNP01
Virtual Disk Enabled for….
QoS
Data Enabled
Deduplicaton
Thin Enabled
Provisioning
6.4 Design
The XenServer OS will be installed on….
The shared storage configured for the XenServer Resource Pools will leverage…..
The Storage Repository…..
The virtual machines disk images…..
Server virtual machines will reside on SR X which is backed on RAID-10 FC LUNs……
Desktop virtual machines will reside on SRY which is backed on RAID-5 FC LUNs….
[Insert Visio diagram detailing the overall storage configuration, logical and/or physical connections]
- 17 -
6.6 Virtual Disk Storage Configuration
The guest virtual machine disk files represented as VDIs will be stored using ….
[Insert Visio diagram detailing the SR and VDI configuration]
Configuration Option Value
Storage Repository Type Local Storage
Storage Repository Size
Storage Repository Name
VDI Type EXT
VHD
Local Storage Configuration 5 x 72GB 15,000 rpm SCSI
disks, RAID-5
- 18 -
Configuration Option Value
SR Name
NetApp Filer IP Address
Username
Password
CHAP Enabled Yes/No
CHAP User
CHAP Secret
Number of FlexVols in SR 8 (default)
Aggregate
FAS Thin Provisioning Enabled
Disabled
FAS Deduplicaton Enabled
Disabled
Dynamic Multipathing Enabled
Disabled
Number of Paths
FAS Model NetApp FAS3020c
Ontap Version 7.2.2
FAS Storage Capacity
- 19 -
Configuration Option Value
Storage Repository Size
Hosts Attached
SR Name
Dell EqualLogic Filer IP Address
Username
Password
CHAP Enabled Yes/No
CHAP User
CHAP Secret
Storage Pool Name
Thin Provisioning Enabled
Disabled
Dynamic Multipathing Enabled
Disabled
Number of Paths
Dell Storage Model
Dell Storage Capacity
- 20 -
7. Network Infrastructure
This section defines the physical network interface cards (NICs), virtual switches and associated virtual
machine networks, VLAN information, and NIC bonding configuration used on XenServer hosts and
virtual machines to enable networking.
7.1 Description
• Physical Interface (PIF). A PIF represents a physical network interface on a XenServer
host. PIF objects have a name and description, a globally unique UUID, the parameters of
the NIC that they represent, and the network and server they are connected to.
• Virtual Interface (VIF). A VIF represents a virtual interface on a Virtual Machine. VIF
objects have a name and description, a globally unique UUID, and the network and VM
they are connected to.
• Host Network. A host network is a virtual Ethernet switch on a XenServer host. Network
objects have a name and description, a globally unique UUID, and the collection of VIFs
and PIFs connected to them. Host networks can include the network switch allocated for
management or guest virtual machine traffic.
• NIC bonds. NIC bonds can improve XenServer host resiliency by using two PIFs as if they
were one. If one NIC within the bond fails the host's network traffic will automatically be
routed over the second NIC. NIC bonds work in an active/active mode, with traffic balanced
between the bonded NICs.
7.2 Terminology
Citrix XenServer uses specific terminology to define various aspects of the network architecture.
The following table explains this terminology, which is used throughout the remainder of the
document.
XenServer Explanation Description
Acronym
PIF Physical Interface A PIF represents a physical network interface on a
XenServer host. PIF objects have a name and
description, a globally unique UUID, the parameters of
the NIC that they represent, and the network and server
they are connected to.
VIF Virtual Interface A VIF represents a virtual interface on a Virtual
Machine. VIF objects have a name and description, a
globally unique UUID, and the network and VM they are
connected to.
Network The term network is used to describe a virtual Ethernet
switch (vSwitch) on a XenServer host. Network objects
have a name and description, a globally unique UUID,
and the collection of VIFs and PIFs connected to them.
Further details are described in Appendix A: XenServer Networking Explained.
- 21 -
7.3 Key Decisions
Decision Point Design Decision Justification
Number of XS supports up to
Physical NICS 6 physical NICs or
per Host 6 pairs of bonds
NIC Broadcom
Configuration 1Gbit Full-Duplex
NIC Bonding Active/Active
Configuration Bonds
External Production
Networks DMZ
Test/Dev
Internal NA
Networks
VLAN Production
Configuration (VLAN1)
…..etc
Management Bonded
Interface Management NIC
Configuration for redundancy
Storage NA
Network
Interface
Promiscuous Enabled on DMZ
Mode network
Virtual Switch Enabled for….
QoS
Physical Switch Dual Cisco 24-port
Details managed switch
with hardcoded
speeds
IP Address Refer to IP
Settings address table….
DNS
Configuration
DMZ
Configuration
7.4 Design
Each of the XenServer hosts will be configured with ….
The Management Interface used for XenCenter and XenMotion traffic will be …..
A dedicated Storage Interface will be used for …….
The Virtual Machine network include…..
NIC bonding will be configured to provide network redundancy ……
VLAN tagging at the virtual switch is used ….
- 22 -
[Insert Visio diagram detailing XenServer physical and logical network connections]
[Insert Visio diagram detailing physical network connections and actual physical ports on the
XenServer server hardware]
- 23 -
7.8 XenServer IP Address Table
This section details the IP address settings for each f the XenServer hosts configured for the
Resource Pools.
Resource Hostname IP Subnet Mask Gateway DNS1 Location
Pool Address DNS2
Pool 1 XEN01 10.0.0.1 255.255.255.0 10.0.0.254 10.0.0.10 Sydney
Pool 2 XEN99 Melbourne
The following table describes the TCP port configurations for the Citrix XenServer environment.
Purpose Default port Port Number to be
number Used
SSH – XenCenter to XenServer TCP 22 Default
HTTPS – XenCenter to XenServer TCP 443 Default
RDP – XenCenter to VM (Windows) TCP 3389 Default
VNC – XenCenter to VM (Linux) TCP 5900 Default
- 24 -
8. Server Hardware Environment
This section defines the underlying server hardware platform for the XenServer host. Within this section,
hardware configuration such as CPU, memory, NICs, disk, host bus adapters (HBAs) and the aggregate
server capacity within the XenServer Resource Pool are defined.
8.1 Description
The XenServer host is a 64-bit x86 server-class machine devoted to hosting multiple VMs. This
machine runs a stripped-down Linux operating system with a Xen-enabled kernel which controls
the interaction between the virtualized devices seen by VMs and the physical hardware. The
following are the system requirements for the XenServer host:
• CPU. One or more 64-bit x86 CPUs at 1.5 GHz minimum; 2 GHz or a faster multi-core
CPU is recommended. Windows VMs can be created only on XenServer hosts equipped
with Intel VT-enabled or AMD-V CPUs
• Memory. A minimum of 1GB memory; 2 GB or more is recommended
• Storage. Locally attached storage including IDE, PATA, SATA or SCSI, with at least 16GB
of disk space; 60GB of disk space is recommended.
• Network. At least two 100 Mbit/seconds or faster network interface card (NIC) for
redundancy; however a Gigabit NIC is recommended for faster P2V migrations and
export/import data transfers and for live relocation of VMs.
- 25 -
Decision Point Design Decision Justification
Aggregated 16 x XenServer
Capacity Hosts thereby a
total of ….
Server Build Manual installation
Process from CD
8.3 Design
The server hardware platform that will be used for the XenServer……
CPU…..
The physical memory configured ….
Shared storage will be configured using ….
Redundant components will be configured to provide….
[Insert Visio diagrams displaying the front and back views of the server hardware platform detailing
the disks, NIC ports, FC cabling to FC switches…etc – more detail the better or use multiple
diagrams to depict different hardware components]
- 26 -
Hardware Value
Onboard/PCI Slot NIC0 - onboard
NIC1 - onboard
NIC2 – PCI slot 1
NIC2 – PCI slot 2
Resource Pool Number of Total CPU Total Memory Total Storage Total Network
XenServer (MHz) (GB) (TB) (Gbps)
Hosts
Pool 1 10 10GHz 640GB 2TB of SAN
Storage
available
- 27 -
Systems Management
- 28 -
9. Systems Management
The Systems Management section discusses design decisions related to managing the XenServer
environment. The selection of appropriate management tools, delegation of tasks based upon user and
group assignment and security of available management tools are all discussed.
9.1 Description
Designing and implementing a structured systems management solution for Citrix XenServer will
help to maintain the consistency and reliability of the XenServer infrastructure. As each XenServer
host will typically run several concurrent virtual workloads, the impact of an administrative error
which results in a systems outage will be magnified. The design should provide an overview of the
common management tasks which need to be undertaken in a typical XenServer environment,
discuss the most appropriate toolset for each task and make recommendations regarding how
administrative tasks should be delegated.
• Management Tool Selection. Selecting the most appropriate tool for each management
process will ensure that common tasks are carried out in a consistent manner. This should
help to ensure that each administrative task results in a predictable outcome, optimizing
the stability of the XenServer environment.
• Management Tool Access. The use of XenCenter where firewall traversal is necessary
requires specific thought. Port 443 needs to be open to allow general console access while
3389 and 5900 are required for RDP and VNC access to virtual machines.
• Management Tool Security. Selected tools should only be made available to relevant
personnel. The ability to download, launch and connect to servers using unauthorized
copies of support tools should be minimized wherever possible.
• Delegation of Administrative Processes. The design will need to focus on the proposed
management and support structure for the XenServer environment in order to recommend
an effective administrative model. Ensuring that each administrative tier is available only to
authorized personnel will ensure that unauthorized changes, intentional or otherwise,
which could affect the stability of both physical and virtual hosts and the associated cost of
resulting systems outage, can be avoided.
9.3 Design
- 29 -
10. XenCenter Configuration
This section defines the configuration settings for the XenCenter management console, client
requirements, software updates, searching and tagging, email notifications, alerts and monitoring
requirements.
10.1 Description
Apart from being the management console for a single stand-alone XenServer host to multiple
Resource Pools, XenCenter also includes some powerful tools for searching, sorting and grouping
your resources.
• Tags. Tags can be added to your managed resources to help you organize them. Tags are
like keywords or labels, and they allow you to rearrange your view of resources within
XenCenter depending on criteria such as purpose or geographic location.
• Custom Fields. Custom fields can be added to any of the resources within XenCenter
which can then be used in building search queries.
• Searching. The built-in Search box within XenCenter enables the administrator to search
and locate resources quickly.
• Monitoring server performance. Performance data from the XenServer hosts and
individual guest virtual machines such as CPU, memory and network I/O usage is
monitored by XenCenter.
• System Alerts. Alerts may be generated to keep you informed of system events including
performance alerts, HA (high availability) status alerts and software update alerts. Email
notification is sent to the administrator when a preconfigured system event is triggered.
- 30 -
Decision Point Design Decision Justification
SMTP Server mail1.domain.com
Custom Fields NA
Automatic Enabled
Software
Updates
10.3 Design
XenCenter will be installed on ….
Access to the XenCenter management computer located at the datacentre s limited to …..
XenCenter will be configured with ……
Default XenCenter alerts and event notifications will be delivered via SMTP using….
[Insert Visio diagram detailing the location of the XenServer hosts, XenCenter with respect to data
center locations and connections]
Configuration Value
Computer Name (FQDN) ManagementPC.domain.com
Hardware Type HP Desktop
Function Dedicated management
terminal
IP Address Details 192.168.2.100
255.255.255.0
192.168.2.254
Management Network A separate VLAN for
management traffic exists on
VLAN1
CPU Single Intel
Memory 2GB
NIC 1 x Gigabit NIC
Operating System Windows XP Pro
Software Installed .NET Framework Version 3.5
- 31 -
10.5 XenCenter Configuration
The following section defines the configuration parameters for the XenCenter client.
Configuration Value
XenCenter Version
Build Number
Management Computer
Authorized Users/Groups
Proxy Server Connection Don’t use proxy server
Use proxy settings from IE
Use specific proxy server
Graphic Console Type Windows VMs – VNC or RDP
Linux – vncterm (text) or VNC
Connection Timeout 20 seconds (Default)
Performance Graphs Area
Line
Log Destination Local
Remote
SSH Enabled
Console Auto-Logout Timeout 5 minutes (default)
- 32 -
Configuration Value Monitored
XenServers
CPU Threshold 50% (default)
Sustained Usage 1 minute (default)
Network Usage Alerts
Network Threshold 100 Bytes/second (default)
Sustained Usage 1 minute (default)
- 33 -
11. Backup and Recovery
This section describes the backup and recovery requirements for the XenServer environment including
XenServer host backup, Resource Pool requirements, snapshotting, and guest virtual machine metadata.
Backup and recovery procedures and technologies implemented are also defined to ensure the
XenServer environment is protected.
11.1 Description
• XenServer Host Backup. The XenServer host configuration data specific to the host is
required for a stand-alone server recovery process.
• Resource Pool Backup. A backup of pool meta-data using command line tools is
possible; however this is a manual process. Individual storage repositories can be restored
to new pools if portable SR’s are used, this process can be automated.
• Exporting/Importing Virtual Machines. A complete copy of a virtual machine including
disk images can be stored in a single file for backup or for migration purposes, with a .xva
file extension
• Portable Storage Repository. A Portable SR is a Local, NFS, FC or ISCSI based storage
repository which contains all of the information necessary to recreate all the guest virtual
machines with Virtual Disk Image (VDIs) in the XenServer environment.
• Virtual Machine Backup. Although Virtual Machine virtual disk (VDI) data and
configuration meta-data can be backed up as part of a XenServer backup process, the
application data on each guest also needs to be backed up. Traditional backup practices
can be followed for each virtual workload but the impact of backing up multiple workloads
on a single standalone host needs to be quantified.
- 34 -
Decision Point Design Decision Justification
SAN Replication FC backed LUNS
are replicated
using EMC SRM
VM Cloning or Crash consistent
Snapshotting backups of VMs
using SAN level
cloning is
performed
Frequency of Every 3 months
Data
Restorations
Disaster No DR plan at this
Recovery Plan stage
Hardware HP 24/7 Support
Support Agreement
Configuration Value
Backup Schedule Daily
Weekly
Monthly
Never
Backup Storage Repository Location Local Storage
Shared Storage
- 35 -
Configuration Value
Portable Storage Repository Local
NFS
iSCSI
FC
VDI_Backup_SR
Portable Storage Repository Type iSCSI LUN at 100GB replicated
to DR site
Protected Virtual Machines All VMs
- 36 -
Configuration Value
Storage Repository Type NFS
NetApp
EqualLogic
Citrix Tools for VMs Installed on all guest VMs
VM Operating System Types Windows Exchange 2003
Microsoft VSS Supported by guest application
Number of snapshot to maintain 7 daily rotating snapshots with 1
weekly snapshot
- 37 -
Virtual Machines
- 38 -
12. Virtual Machine Design
The Virtual Machine section defines the guest virtual machines which will be hosted in the XenServer
infrastructure. Within this section, characteristics of the virtual machines, including virtual hardware
configuration, template configuration, home server settings, high availability protection levels and P2V
methodology are discussed.
12.1 Description
Guest virtual machine configuration from a CPU, memory, disk and network perspective should be
correctly sized in line with the existing standard operating environment, intended machine usage,
and operating system requirements. Virtual machine templates can facilitate rapid deployment of
new guests by leveraging predefined and optimized settings.
Windows 2003 R2
No Linux VMs
installed
VM Deployment Installed using
Strategy ISO then
converted to a
template
VM Guest Microsoft SysPrep
Operating
System
Initialization
Virtual CPU All VMs will have
Configuration default vCPU
priority settings
Virtual Memory 512MB for
Configuration Desktops
1024MB for
Servers
VM All VMs will have
Optimization general Use
Setting optimization
settings. No
XenApp servers
deployed.
- 39 -
Decision Point Design Decision Justification
Boot Order All VMs will default
boot from
DVDROM.
The following
desktop VMs will
be streamed with
PVS and will
default boot from
Network….
Virtual NIC
Configuration
Virtual Disk
Image
Configuration
Home Server
Setting
HA Protection
Configuration
Configured Virtual
Machine
Templates
Default NTP Sync all VM time
Server with
DC1.domain.local
Alert Desktop VMs will
Configuration be configured with
CPU….
Network….
Disk…..
APP01
APP02
12.3 Design
The XenServer infrastructure will support up to…..
All VMs will be based on Windows…..
The default VM configuration is based on …..
- 40 -
HA protection levels for desktops and servers …..
Alerts settings will be……
- 41 -
Hardware Template 1 Template 2 Template n
Virtual Memory and CPU
Settings
Virtual Memory 512MB
Number of Virtual CPUs 1
Virtual CPU Priority NA
Startup Options
Boot Order Network
DVD-Drive
Hard Disk
Auto-start VM on server boot No
Alerts Configuration
CPU Usage Alerts
Network Usage Alerts
Disk Usage Alerts
Optimization
Optimization Type General Use
Shadow Memory Multiplier NA
High Availability
HA Protection Level Protected
Priority 1, 2 or 3
Best Effort
Do No Restart
Additional Configuration
Customizations
- 42 -
There are many methods which can be employed to perform a workload migration; these are
detailed as follows:
• Manual Migration. This migration type would typically be used if there were very few
migrations to be performed, making the purchase or use of an automated migration tool
unnecessary. This option might also be taken for advanced migrations of physical
workloads with complex requirements such as bespoke option cards, peripherals or
extremely complex storage requirements.
Advantages:
o Optimization. Workloads are ‘refreshed’. All unnecessary application data
(temporary files and log files etc) is removed, workload is optimized.
o Rationalization. This can be taken as an opportunity to rationalize and simplify the
workload configuration, such as disk structure and storage requirements.
Disadvantages:
o Speed. A manual process is very time consuming and best suited to small or
complex migrations.
o Consistency. For a large number of migrations, maintaining consistency can be
challenging when migration tasks are managed manually.
o Reliability. Inconsistent or badly managed migrations can cause application
inconsistency and reliability issues following the migration.
• Physical to Virtual (P2V). Physical to Virtual migrations are typically undertaken using
bespoke migration tools which integrate closely with the virtualization platform to deliver
fast and consistent results.
Advantages:
o Speed. Once the parameters for the migration are supplied it proceeds
automatically. Many P2V migrations can be performed in the time it would take to
complete a single manual migration. For large scale migrations, a P2V process is
the only rational option.
o Integration. Most P2V tools integrate closely with the virtualization platform being
used ensuring that virtual workload optimizations, such as the installation of
relevant paravirtualization tools, forms part of the migration process.
o Consistency. As P2V migrations are parameter based, similar servers will always
be built consistently.
Disadvantages:
o Toolset. A P2V tool must be identified, tested and selected. The tool must support
the virtualization platform being used and be capable of handling the majority of
the physical workloads to be migrated. All relevant staff must be trained in the use
of the new toolset.
o Consistency. Unless closely managed, subtle problems can be quickly introduced
into large numbers of newly migrated workload. Application owners must be
involved in the migration process to be sure that such changes are identified
before each workload is released into production.
• Physical to Physical (P2P). Where P2V tools do not exist or do not work for the current
virtualization platform, a Physical to Physical, or P2P migration can be ‘emulated’ to
achieve a similar result. For example, a virtual server is created which is used to emulate
- 43 -
the destination physical server, the migration is then performed as though both source and
destination hosts are physical.
Advantages:
o Speed/Consistency/Repeatability. Most of the advantages are similar to a P2V
migration.
Disadvantages:
o Integration. As the destination host is perceived to be a physical server, none of
the optimizations are performed which would normally be done on a destination
host which is a virtual machine.
The key to a successful migration strategy is in understanding in fine detail the physical estate
which needs to be migrated, as detailed above. Once the requirements of the workloads are
understood it is easier to identify the best toolset and process to use migrating each environment.
If a third party toolset is to be used, time should be invested in analyzing and understanding that it
meets a large percentage of the migration requirements of the physical infrastructure.
[Describe the P2V process and how each of the VMs targeted for P2V will be migrated using the
P2V tool specified ….]
- 44 -
13. Workload Matrix
This section details the planned desktop and server workloads that will be hosted as guest virtual
machine on the XenServer infrastructure. Information gathered as a result of the Citrix Server
Virtualization Assessment, if it was conducted, will also be discussed.
13.1 Description
Individual server capacity and aggregated Resource Pool capacity with respect to virtual machine
utilisation should be considered as part of the hosting infrastructure design to ensure the
environment and servers are not overcommitted. This is critical in maintaining an acceptable level
of end user experience and virtual machine performance. In any cases, additional server resource
should be deployed as best practice to provide as buffer for unexpected utilisation peaks or server
failures.
- 45 -
13.4 Desktop Workload
The following table is the expected virtual desktop and virtual server workload that will be hosted
on the XenServer Resource Pool consisting of XenServers based on SERVER HARDWARE
MODEL servers.
Resource XenServer Resource Type of # Guest Guest VMs Comments
Pool Host Pool Role Guest VMs
Name VMs
- 46 -
Security
- 47 -
14. Security
This section discusses the security related aspects of the XenServer design. Physical server security,
along with encryption and enclave networking are analyzed.
14.1 Description
Corporate security policy should already provide guidelines which dictate how each tier of the
XenServer architecture is secured. The design process should follow these corporate guidelines
and make recommendations regarding how the XenServer design can meet these security
requirements.
The following topics are considered during the design process:
• Physical Server Security. Citrix XenServers should be deployed in a secure location
where only controlled access is permitted. As each XenServer will typically host several
virtual workloads, compromise of a single system can result in outage for many business
systems.
• Hypervisor Security. The XenServer hypervisor is not generally prone to attack. If the
servers are deployed on internal networks, there is very little likelihood of compromise at
this level.
• Dom0 Password. Dom0 is the first VM created on every XenServer and enables
management of all other VM’s. Dom0 passwords should be secured at the highest level, as
the root account and password, or equivalent root level accounts, must be used for both
console and XenServer access
• XenCenter. XenCenter is used to manage most aspects of a XenServer deployment.
Restricting access to the Dom0 password will reduce the risk of unauthorized personnel
from running and connecting via the XenCenter console. By default XenCenter uses SSL
to encrypt all communications with each resource pool.
• Virtual Machine Security. Security of virtual workloads can be implemented using
traditional methods such as leveraging the security features of Active Directory and using
standard anti-virus, anti-spyware and firewall software.
• Storage Security. Security for storage should be given serious thought as compromise of
a storage repository could result in the corruption or deletion of its contents and the
subsequent failure of all virtual workloads which share the SR.
- 48 -
Decision Point Design Decision Justification
Storage Security CompanyABC will
use FC-SAN
shared storage
and will use
standard zoning
and masking to
provide basic
security.
Virtual Machine All virtual
Security workloads are
Windows servers
which are AD
domain members.
XenCenter No restrictions will
be placed on
access to
XenCenter
14.3 Design
- 49 -
Appendices
- 50 -
15. Appendix A: XenServer Networking Explained
This section details the XenServer Networking and provides insights into each network type that can be
used in a XenServer implementation.
Here multiple physical network interfaces are present, more complex virtual networking is possible.
In this example, two physical network cards are available. One VM makes use of a single virtual
network, whilst the other is logically connected to two separate network segments.
- 51 -
15.3 Bonded Interfaces
The next example shows the introduction of a network bond. Two physical network cards which are
connected to the same network segment are used to create a bond for resilience and additional
throughput. In the example, two VM’s are connected to the same network segment via this bond.
15.4 VLAN’s
Finally, VLAN’s are introduced which subsume the network bond. Separate vSwitches are created
for each VLAN and in the following example; three VM’s are logically connected to separate
VLAN’s via the same physical network card.
- 52 -
15.5 Virtual Network Combinations
Many combinations of the above examples are possible in order to achieve a configuration which
meets with the requirements of the design.
This example shows a XenServer with 3 NIC’s, eth0 and eth1 are bonded for resilience and this
bonded network is used by 5 virtual machines, three of them attach to different VLAN’s which
leverage the bond for resilience and a further two attach directly to the bond itself.
A third NIC, seen by XenServer as eth2 provides a non-resilient network which is used by a fifth,
single virtual machine.
- 53 -