SlideShare ist ein Scribd-Unternehmen logo
1 von 90
Andrew Sandford
Senior Readiness Specialist, Worldwide Support Readiness EMEA
Citrix Support Secrets Webinar
Series
In-depth Troubleshooting on NetScaler using Command
Line Tools
27 March 2014
© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
netscaler.descr: NetScaler Virtual Appliance 3G
netscaler.num_pe_running: 1
netscaler.version: NetScaler NS10.1: Build
124.13.nc, Date: Feb 20 2014, 18:53:27
netscaler.model: 3000
netscaler.vmpe_max_cpus: 2
netscaler.nCore: 1
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
50185 root 1 44 -52 814M 815M CPU1 1 20.2H 100.00% NSPPE-00
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
LB_RGB (192.168.47.3:80) - HTTP Type: ADDRESS
State: UP
Client Idle Timeout: 180 sec
Down state flush: ENABLED
Disable Primary Vserver On Down : DISABLED
Appflow logging: ENABLED
Port Rewrite : DISABLED
No. of Bound Services : 1 (Total) 1 (Active)
Configured Method: ROUNDROBIN
Mode: IP
Persistence: NONE
Vserver IP and Port insertion: OFFWarning: Feature(s) not enabled [LB]
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
1) svc_blue (192.168.196.62: 80) - HTTP State: UP Weight: 1
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
1) Monitor Name: mon-http-ecv
State: UP Weight: 1 Passive: 0
Probes: 14887 Failed [Total: 124 Current: 0]
Last response: Success - Pattern found in response.
Response Time: 10.220 millisec
State: UP
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute
Show commands
System show node
show info
show license
Vserver/Service show lb vserver
show cs vserver
show service
show persistencesession
show connectiontable
IP related show route
show ip
show dns addrec -type proxy
Diagnostic show techsupport
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
2) Node ID: 1
IP: 192.168.1.45
Node State: STAYSECONDARY
Master State: Secondary
Fail-Safe Mode: OFF
INC State: DISABLED
Sync State: ENABLED
Propagation: ENABLED
Enabled Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1
Disabled Interfaces : None
HA MON ON Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1
Interfaces on which heartbeats are not seen : 1/8 1/6 1/5 1/4
1/3 1/2 1/1
Interfaces causing Partial Failure: 1/8 1/6 1/5 1/4 1/3 1/2
1/1
SSL Card Status: UP
Local node information:
Critical Interfaces: 1/8 1/6 1/5 1/4 1/3 1/2 1/1
>
Node State: NOT UP
Master State: Secondary
Master Enabled Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1
Disabled Interfaces : None
HA MON ON Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1
Interfaces on which heartbeats are not seen : 1/8 1/6 1/5 1/4 1/3
1/2 1/1
Interfaces causing Partial Failure: 1/8 1/6 1/5 1/4 1/3 1/2 1/1
Node State: STAYSECONDARY
Master State: Secondary
© 2014 Citrix | Confidential – Do Not Distribute
NetScaler Processes
Process Description Process Description
nsppe NetScaler Packet Engine nsfsyncd
Sync bookmarks and SSL
certificates
nsaaad
RBA and SSL VPN External
Auth nsnetsvc
Used by the GUI for config
changes
nsconf Writes the ns.conf file nsumond Runs the scriptable monitors
nslog.sh Controls Logging for newnslog nsconmsg Controls writing of newnslog
nssync HA sync nscollect
Statistics gathering for
historical reporting
nsreadfile Used to read SSL Cert Files
imi/ripd/
ospfd/bgpd
Routing processes
nscrlrefresh SSL CRL list update
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
System
Entities
Protocols
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
> stat interface 1/1
Interface [1/1]:
Interface StateUP
Link uptime 00:40:21
Link downtime00:00:00
Throughput Statistics
Rate (/s) Total
Bytes received42393 54497294
Bytes transmitted 2584 20222135
Packets received 629 710246
Packets transmitted 47 69066
Packet Statistics
Rate (/s) Total
Multicast packets 18 41219
NetScaler packets 85 98954
LACP Statistics
Rate (/s) Total
LACPDUs received 0 0
LACPDUs transmitted 0 0
Error Statistics
Rate (/s) Total
Error packets received (hw) 0 0
Error packets transmitted (hw) 0 0
Inbound packets discarded (hw) 0 0
Outbound packets discarded (hw)0 0
Packets dropped in Rx (sw) 539 599904
Packets dropped in Tx (sw) 0 0
NIC hangs -- 0
Status stalls -- 0
Transmit stalls -- 0
Receive stalls -- 0
Error-disables -- 0
Duplex mismatches -- 0
Link re-initializations -- 0
MAC moves registered 0 0
Times NIC became muted -- 0
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
Non-authoritative entries 0
Authoritative entries 98
Error Statistics
Nonexistent domain 102359
Response class unsupported 0
Invalid query format 0
Stray answers 0
Incorrect RD length 0
Requests refused 0
Response type unsupported 0
Query class unsupported 0
Invalid response format 0
No answer responses 102334
Multi queries disabled 0
Other errors 0
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
Vserver hits 0 0
Requests 0 0
Responses 0 0
Request bytes 0 65
Response bytes 0 188
Total Packets rcvd 0 5
Total Packets sent 0 4
Current client connections -- 0
Current Client Est connections -- 0
Current server connections -- 0
Requests in surge queue -- 0
Requests in vserver's surgeQ -- 0
Requests in service's surgeQs -- 0
Spill Over Threshold -- 0
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
NetScaler File System
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
View events
View console messages
View statistics
Debug system counters
Debug load balancing issues
Debug CPU/Memory utilization
Use
cases
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
nsconmsg Common Syntax
Make sure to use –K, NOT -k
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
Live CPU related stats
Archived events
HA Failover cause
LB stats
CS related counters
Real-time policy hits
SSL related counters
Compression related counters
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
1906 3910 PPE-0 'interface(1/1)' has been disabled Wed Aug 14 12:27:16 2013
1907 0 PPE-0 'interface(1/1)' DOWN Wed Aug 14 12:27:16 2013
1912 0 PPE-0 'server_svc_cfg_NSSVC_DNS_192.168.204.50:53(SVC_CTXANG_DNS1)'
DOWN Wed Aug 14 12:27:25 2013
1913 0 PPE-0 'server_svc_cfg_NSSVC_DNS_192.168.204.51:53(SVC_CTXANG_DNS2)'
DOWN Wed Aug 14 12:27:25 2013
1910 0 PPE-0 MonServiceBinding_192.168.204.51:53_(ping-
default)(SVC_CTXANG_DNS2): DOWN; Last response: Failure - Probe timed out. Wed Aug
14 12:27:25 2013
1911 0 PPE-0 MonServiceBinding_192.168.204.50:53_(ping-
default)(SVC_CTXANG_DNS1): DOWN; Last response: Failure - Probe timed out. Wed Aug
14 12:27:25 2013
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
VIP(127.0.0.2:53:DOWN:WEIGHTEDRR): Hits(0, 0/sec)
Mbps(0.00) Pers(OFF) Err(0) SO(0) LConn_BestIdx: 1024
Pkt(0/sec, 0 bytes) actSvc(0) DefPol(NONE)
override(0) newlyUP(0)
Conn: Clt(0, 0/sec, OE[0]) Svr(0) SQ(Total: 0
OnVserver: 0 OnServices: 0)
slimit_SO: (Sothreshhold: 0 [Ex: 0] Consumed: [Ex:
0 Borrowed: 0 TotActiveConn: 0] Available: 0-
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
ipConflictAddr = 192.168.47.1
last
message repeated 169 times
© 2014 Citrix | Confidential – Do Not Distribute
Troubleshooting Techniques
Common NetScaler issues/resolutions
HDD Issues Logging fails
/var missing
Flash Issues Config fails to save
Config saves partially
Sync fails
Device fails to boot
Memory starvation Dropped sessions
CPU starvation All services failing
All VIPS down
Degraded performance
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute
nstrace & nstcpdump
nstrace
Common syntax:
Nstrace.sh –sz 0
Nstrace.sh –sz 0 –filter “SOURCEIP =
10.198.4.10” –link enabled
Filter qualifiers and operators:
SOURCEIP, SOURCEPORT, DESTIP,
DESTPORT, SVCNAME, VSVRNAME, STATE
==, eq, !=, neq, >, gt, <, lt, >=, ge, <=, le,
BETWEEN
Compound filters using || and &&
nstcpdump
Common syntax:
Nstcpdump.sh –X tcp port 80
Nstcpdump.sh –w testcapture.cap –X src
host 10.198.4.10 tcp port 80
Filter qualifiers and operators:
tcpdump standard
© 2014 Citrix | Confidential – Do Not Distribute
Packet Tracing
Differences between nstrace.sh & nstcpdump.sh
Nstcpdump.sh Nstrace.sh
Useful if traces are to be viewed on standard output
nstcpdump.sh –w <filename> option helps
writing output to file
Useful for offline collection
nstrace.sh –sz 0
Saves traces in /var/nstrace in cap format
can be used with expressions so that you get to see
filtered traffic
nstcpdump.sh host <IP>
nstcpdump.sh port 21
useful for collection of traces in separate log files based
on NICs
nstrace.sh –tcpdump1 –nic 1
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
-h - prints this message - exclusive option
-nf - number of files to be generated in cycle (def. 24)
-time - seconds per file (def. 3600) (could be an expression)
-sz - size of the captured data (bytes from 60 to 1514)
-tcpdump - 0=nstrace-format (default) or 1=tcpdump-format
-nic - use separate trace files for each interface (only works if -tcpdump
option is set)
-name - name of the trace file
-filter - Filter expression for nstrace. The maximum length of filter
expression is 255 and it can of following format: <expression> [<relop>
<expression>]
-link - Log filtered connection's peer's (linked connection's) traffic. Works
only with -filter option
© 2014 Citrix | Confidential – Do Not Distribute
Packet Tracing
nstrace.sh nstcpdump.sh
Proprietary capture format TCPdump PCAP capture format
Native format captures more information Useful for live capture from CLI
Files are stored in /var/nstrace Option to write to a file
Needs custom dissector in Wireshark (1.6+) Most TCPdump options supported
Works in standard Wireshark
© 2014 Citrix | Confidential – Do Not Distribute
Trace analysis
nstrace.sh
By Default if nstrace.sh is executed from shell prompt
Trace files are stored in NetScaler proprietary (.cap) format
The trace capture runs for 1 hr. (3600 sec) if not interrupted
Files are cyclically numbered from 1-24. Trace mode is 6 (that is the TXB and RX packets
are captured)
The size of the captured data for each packet is 164
© 2014 Citrix | Confidential – Do Not Distribute
Trace Analysis
nstrace syntax examples
Command Purpose
# nstrace.sh Stores the traces in default (proprietary) format
# nstrace.sh -tcpdump 1 Begins to save the traces in the TCPDUMP format for a default 3600 seconds
# nstrace.sh -tcpdump 1 -nic 1 Logs the traces (in TCPDUMP format) into separate log files based on the NIC IDs
# nstrace.sh –nf <value> No of files to be generated in cycle by default is 24
# nstrace.sh –time <value> Seconds per file by default 3600 seconds
# nstrace.sh -sz 0 Size of the captured data( by default it is 164), -sz 0 is the entire packet length
# nstrace.sh –m Capturing mode: sum of the values (def. 6):
1-Transmitted packets (TX)
2 - Packets buffered for transmission (TXB)
4 - Received packets (RX)
# nstrace.sh -stop Can be used to disable tracing (when 'nstrace.sh' is run in the background
© 2014 Citrix | Confidential – Do Not Distribute
Trace Analysis
nstcpdump.sh example syntax
Command Purpose
# nstcpdump.sh <type> Possible types are host, net and port .If there is no type qualifier host
assumed
# nstcpdump.sh <dir> Qualifiers specify a particular transfer direction to and/or
from id. Possible directions are src, dst, src or dst and
src and dst. If there is no dir qualifier, src or dst is
assumed. src foo', `dst net 128.3', `src or dst port ftp-
data'
# nstcpdump.sh <proto> ether, fddi, ip, arp, rarp, decnet, tcp and udp.
# nstcpdump.sh –c <value> Exit after receiving ‘value’ number of packets
# nstcpdump.sh –F –I –r Not supported and not to give them as options to the script
# nstcpdump.sh –w <file
name>
Write the raw packets to file rather than parsing and printing them out.
Read by typing tcpdump –r test
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
CTX109304 Data Collection Procedure to Troubleshoot NetScaler Related Issues
http://www.slideshare.net/davidmcg/common-pitfalls-when-setting-up-a-net-scaler-for-
the-first-time
http://support.citrix.com/search/basic?searchQuery=counters&refinement=Content+Ty
pe,Technotes&refinement=Product+Family,NetScaler
CTX114999 How to Troubleshoot Authentication with Aaad.debug
https://taas.citrix.com/
© 2014 Citrix | Confidential – Do Not Distribute
Maximize your knowledge.
Continue your journey with Citrix Education.
Recommended next step for hands-on technical training:
CNS-205 Citrix NetScaler 10 Essentials and Networking
Identify the capabilities and functionality of the NetScaler
Explain basic NetScaler network architecture
Obtain, install, and manage NetScaler licenses
Explain how SSL is used to secure the NetScaler
Implement NetScaler TriScale Technology, including Clustering
Visit bit.ly/NSCOURSE to save 10% now through April 30.*
*Not valid with any other promotions, packages or discounts. Applies only to new purchases. Regional limitations may apply.
© 2014 Citrix | Confidential – Do Not Distribute
About
Citrix Services
Citrix Services make sure
you succeed with your
virtualization programs.
How we can help
Citrix Education – The fastest, most efficient way to
get your team the virtualization skills they need.
Online,
on-site or in class.
citrix.com/training
Citrix Consulting – Intensive engagements for
complex, critical or just plain massive projects.
citrix.com/consulting
Citrix Support – Always-on support services that
leverage everything we know about best-practice
deployment and maintenance.
citrix.com/support
Educate | Guide | Support | Succeed
© 2014 Citrix | Confidential – Do Not Distribute
• 40 insider troubleshooting tips
• Covering XenDesktop, XenServer, XenApp and NetScaler
• Citrix Support top engineers
• FREE eBook
• Citrix Auto Support
• Now available!
Secrets of the Citrix Support Ninjas
© 2014 Citrix | Confidential – Do Not Distribute
Premier Support Calculator
Check it out
Work better. Live better. Use NetScaler

Weitere ähnliche Inhalte

Was ist angesagt?

What's Coming in CloudStack 4.19
What's Coming in CloudStack 4.19What's Coming in CloudStack 4.19
What's Coming in CloudStack 4.19ShapeBlue
 
Introduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVIntroduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVKingston Smiler
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
 
Service Function Chaining in Openstack Neutron
Service Function Chaining in Openstack NeutronService Function Chaining in Openstack Neutron
Service Function Chaining in Openstack NeutronMichelle Holley
 
Pushing Packets - How do the ML2 Mechanism Drivers Stack Up
Pushing Packets - How do the ML2 Mechanism Drivers Stack UpPushing Packets - How do the ML2 Mechanism Drivers Stack Up
Pushing Packets - How do the ML2 Mechanism Drivers Stack UpJames Denton
 
OpenStack Networking
OpenStack NetworkingOpenStack Networking
OpenStack NetworkingIlya Shakhat
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
 
Citrix adc technical overview
Citrix adc   technical overviewCitrix adc   technical overview
Citrix adc technical overviewRoshan Dias
 
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueShapeBlue
 
SDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesSDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesJustyna Bak
 
SDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingSDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingThomas Graf
 
VMware vSphere Networking deep dive
VMware vSphere Networking deep diveVMware vSphere Networking deep dive
VMware vSphere Networking deep diveSanjeev Kumar
 
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...Vietnam Open Infrastructure User Group
 
Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Novell
 
OpenStack vs VMware vCloud
OpenStack vs VMware vCloudOpenStack vs VMware vCloud
OpenStack vs VMware vCloudRoozbeh Shafiee
 
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...The Linux Foundation
 
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...ShapeBlue
 
NSX-T Architecture and Components.pptx
NSX-T Architecture and Components.pptxNSX-T Architecture and Components.pptx
NSX-T Architecture and Components.pptxAtif Raees
 

Was ist angesagt? (20)

RSS++
RSS++RSS++
RSS++
 
What's Coming in CloudStack 4.19
What's Coming in CloudStack 4.19What's Coming in CloudStack 4.19
What's Coming in CloudStack 4.19
 
Introduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFVIntroduction to OpenFlow, SDN and NFV
Introduction to OpenFlow, SDN and NFV
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Service Function Chaining in Openstack Neutron
Service Function Chaining in Openstack NeutronService Function Chaining in Openstack Neutron
Service Function Chaining in Openstack Neutron
 
Pushing Packets - How do the ML2 Mechanism Drivers Stack Up
Pushing Packets - How do the ML2 Mechanism Drivers Stack UpPushing Packets - How do the ML2 Mechanism Drivers Stack Up
Pushing Packets - How do the ML2 Mechanism Drivers Stack Up
 
OpenStack Networking
OpenStack NetworkingOpenStack Networking
OpenStack Networking
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
Citrix adc technical overview
Citrix adc   technical overviewCitrix adc   technical overview
Citrix adc technical overview
 
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
 
SDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesSDN and NFV: Friends or Enemies
SDN and NFV: Friends or Enemies
 
SDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingSDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center Networking
 
Rancher Labs - Your own PaaS in action
Rancher Labs - Your own PaaS in actionRancher Labs - Your own PaaS in action
Rancher Labs - Your own PaaS in action
 
VMware vSphere Networking deep dive
VMware vSphere Networking deep diveVMware vSphere Networking deep dive
VMware vSphere Networking deep dive
 
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
 
Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)
 
OpenStack vs VMware vCloud
OpenStack vs VMware vCloudOpenStack vs VMware vCloud
OpenStack vs VMware vCloud
 
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...
 
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
 
NSX-T Architecture and Components.pptx
NSX-T Architecture and Components.pptxNSX-T Architecture and Components.pptx
NSX-T Architecture and Components.pptx
 

Ähnlich wie In-depth Troubleshooting on NetScaler using Command Line Tools

DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190	Targeted Threat (APT) Defense for Hosted ApplicationsDEVNET-1190	Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted ApplicationsCisco DevNet
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guidesolarisyougood
 
Common Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First TimeCommon Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First TimeDavid McGeough
 
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, CitrixXPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, CitrixThe Linux Foundation
 
Designing your XenApp 7.5 Environment
Designing your XenApp 7.5 EnvironmentDesigning your XenApp 7.5 Environment
Designing your XenApp 7.5 EnvironmentDavid McGeough
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaCisco do Brasil
 
Successfully Interconnecting Data Centers
Successfully Interconnecting Data CentersSuccessfully Interconnecting Data Centers
Successfully Interconnecting Data CentersCisco Canada
 
Maintaining and troubleshooting your xen desktop 7.5 environment
Maintaining and troubleshooting your xen desktop 7.5 environmentMaintaining and troubleshooting your xen desktop 7.5 environment
Maintaining and troubleshooting your xen desktop 7.5 environmentsolarisyougood
 
Designing your xen app 7.5 environment
Designing your xen app 7.5 environmentDesigning your xen app 7.5 environment
Designing your xen app 7.5 environmentsolarisyougood
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security ServicesJad Bejjani
 
VMworld 2013: vCloud Hybrid Service Jump Start Part Four of Five: Identifying...
VMworld 2013: vCloud Hybrid Service Jump Start Part Four of Five: Identifying...VMworld 2013: vCloud Hybrid Service Jump Start Part Four of Five: Identifying...
VMworld 2013: vCloud Hybrid Service Jump Start Part Four of Five: Identifying...VMworld
 
Maintaining and Troubleshooting your XenDesktop 7.5 Environment
Maintaining and Troubleshooting your XenDesktop 7.5 EnvironmentMaintaining and Troubleshooting your XenDesktop 7.5 Environment
Maintaining and Troubleshooting your XenDesktop 7.5 EnvironmentDavid McGeough
 
Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2Cisco Canada
 
Making Meetings Simple: "It's Just A Meeting"
Making Meetings Simple:  "It's Just A Meeting" Making Meetings Simple:  "It's Just A Meeting"
Making Meetings Simple: "It's Just A Meeting" Cisco Canada
 
Implementing and Troubleshooting PVS
Implementing and Troubleshooting PVSImplementing and Troubleshooting PVS
Implementing and Troubleshooting PVSDavid McGeough
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?Primend
 
Citrix Mobility Conference 2015 - Migrating XenApp & XenDesktop
Citrix Mobility Conference 2015 - Migrating XenApp & XenDesktopCitrix Mobility Conference 2015 - Migrating XenApp & XenDesktop
Citrix Mobility Conference 2015 - Migrating XenApp & XenDesktopJonathan Wade
 
Decrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern TrafficDecrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern TrafficShain Singh
 

Ähnlich wie In-depth Troubleshooting on NetScaler using Command Line Tools (20)

DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190	Targeted Threat (APT) Defense for Hosted ApplicationsDEVNET-1190	Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guide
 
Common Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First TimeCommon Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First Time
 
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, CitrixXPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
 
Designing your XenApp 7.5 Environment
Designing your XenApp 7.5 EnvironmentDesigning your XenApp 7.5 Environment
Designing your XenApp 7.5 Environment
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
Successfully Interconnecting Data Centers
Successfully Interconnecting Data CentersSuccessfully Interconnecting Data Centers
Successfully Interconnecting Data Centers
 
Maintaining and troubleshooting your xen desktop 7.5 environment
Maintaining and troubleshooting your xen desktop 7.5 environmentMaintaining and troubleshooting your xen desktop 7.5 environment
Maintaining and troubleshooting your xen desktop 7.5 environment
 
Designing your xen app 7.5 environment
Designing your xen app 7.5 environmentDesigning your xen app 7.5 environment
Designing your xen app 7.5 environment
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security Services
 
VMworld 2013: vCloud Hybrid Service Jump Start Part Four of Five: Identifying...
VMworld 2013: vCloud Hybrid Service Jump Start Part Four of Five: Identifying...VMworld 2013: vCloud Hybrid Service Jump Start Part Four of Five: Identifying...
VMworld 2013: vCloud Hybrid Service Jump Start Part Four of Five: Identifying...
 
Maintaining and Troubleshooting your XenDesktop 7.5 Environment
Maintaining and Troubleshooting your XenDesktop 7.5 EnvironmentMaintaining and Troubleshooting your XenDesktop 7.5 Environment
Maintaining and Troubleshooting your XenDesktop 7.5 Environment
 
Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2
 
Making Meetings Simple: "It's Just A Meeting"
Making Meetings Simple:  "It's Just A Meeting" Making Meetings Simple:  "It's Just A Meeting"
Making Meetings Simple: "It's Just A Meeting"
 
Cisco prime network 4
Cisco prime network 4Cisco prime network 4
Cisco prime network 4
 
Implementing and Troubleshooting PVS
Implementing and Troubleshooting PVSImplementing and Troubleshooting PVS
Implementing and Troubleshooting PVS
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
 
Citrix Mobility Conference 2015 - Migrating XenApp & XenDesktop
Citrix Mobility Conference 2015 - Migrating XenApp & XenDesktopCitrix Mobility Conference 2015 - Migrating XenApp & XenDesktop
Citrix Mobility Conference 2015 - Migrating XenApp & XenDesktop
 
Decrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern TrafficDecrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern Traffic
 

Mehr von David McGeough

Citrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktopCitrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktopDavid McGeough
 
Manage and Diagnose your Environment using Citrix Insight Services
Manage and Diagnose your Environment using Citrix Insight ServicesManage and Diagnose your Environment using Citrix Insight Services
Manage and Diagnose your Environment using Citrix Insight ServicesDavid McGeough
 
PVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep DivePVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep DiveDavid McGeough
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerDavid McGeough
 
Best practices for implementing, administering, and troubleshooting XenDeskto...
Best practices for implementing, administering, and troubleshooting XenDeskto...Best practices for implementing, administering, and troubleshooting XenDeskto...
Best practices for implementing, administering, and troubleshooting XenDeskto...David McGeough
 
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...David McGeough
 
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...David McGeough
 
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...David McGeough
 
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...David McGeough
 
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...David McGeough
 
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...David McGeough
 
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktopCitrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktopDavid McGeough
 
Maintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentMaintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentDavid McGeough
 
Jump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 DeploymentJump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 DeploymentDavid McGeough
 
Jump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentJump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentDavid McGeough
 
10 Tips Every XenDesktop Admin Should Know
10 Tips Every XenDesktop Admin Should Know10 Tips Every XenDesktop Admin Should Know
10 Tips Every XenDesktop Admin Should KnowDavid McGeough
 
Troubleshooting Provisioning Services Target Boot Processes
Troubleshooting Provisioning Services Target Boot ProcessesTroubleshooting Provisioning Services Target Boot Processes
Troubleshooting Provisioning Services Target Boot ProcessesDavid McGeough
 
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesUsing NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesDavid McGeough
 
Troubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDKTroubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDKDavid McGeough
 
Configuring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop SitesConfiguring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop SitesDavid McGeough
 

Mehr von David McGeough (20)

Citrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktopCitrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktop
 
Manage and Diagnose your Environment using Citrix Insight Services
Manage and Diagnose your Environment using Citrix Insight ServicesManage and Diagnose your Environment using Citrix Insight Services
Manage and Diagnose your Environment using Citrix Insight Services
 
PVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep DivePVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep Dive
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScaler
 
Best practices for implementing, administering, and troubleshooting XenDeskto...
Best practices for implementing, administering, and troubleshooting XenDeskto...Best practices for implementing, administering, and troubleshooting XenDeskto...
Best practices for implementing, administering, and troubleshooting XenDeskto...
 
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
 
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
 
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
 
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
 
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
 
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
 
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktopCitrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
 
Maintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentMaintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 Environment
 
Jump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 DeploymentJump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 Deployment
 
Jump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentJump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 Deployment
 
10 Tips Every XenDesktop Admin Should Know
10 Tips Every XenDesktop Admin Should Know10 Tips Every XenDesktop Admin Should Know
10 Tips Every XenDesktop Admin Should Know
 
Troubleshooting Provisioning Services Target Boot Processes
Troubleshooting Provisioning Services Target Boot ProcessesTroubleshooting Provisioning Services Target Boot Processes
Troubleshooting Provisioning Services Target Boot Processes
 
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesUsing NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
 
Troubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDKTroubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDK
 
Configuring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop SitesConfiguring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop Sites
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

In-depth Troubleshooting on NetScaler using Command Line Tools

  • 1. Andrew Sandford Senior Readiness Specialist, Worldwide Support Readiness EMEA Citrix Support Secrets Webinar Series In-depth Troubleshooting on NetScaler using Command Line Tools 27 March 2014
  • 2. © 2014 Citrix | Confidential – Do Not Distribute
  • 3.
  • 4. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 5. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 6. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 7. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 8.
  • 9. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 10. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 11. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 12. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 13. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 14. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute netscaler.descr: NetScaler Virtual Appliance 3G netscaler.num_pe_running: 1 netscaler.version: NetScaler NS10.1: Build 124.13.nc, Date: Feb 20 2014, 18:53:27 netscaler.model: 3000 netscaler.vmpe_max_cpus: 2 netscaler.nCore: 1
  • 15.
  • 16. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 17. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 18. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 19. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 20. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 21. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 22.
  • 23. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 24. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute 50185 root 1 44 -52 814M 815M CPU1 1 20.2H 100.00% NSPPE-00
  • 25. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 26. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 27. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 28. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 29. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute LB_RGB (192.168.47.3:80) - HTTP Type: ADDRESS State: UP Client Idle Timeout: 180 sec Down state flush: ENABLED Disable Primary Vserver On Down : DISABLED Appflow logging: ENABLED Port Rewrite : DISABLED No. of Bound Services : 1 (Total) 1 (Active) Configured Method: ROUNDROBIN Mode: IP Persistence: NONE Vserver IP and Port insertion: OFFWarning: Feature(s) not enabled [LB]
  • 30. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute 1) svc_blue (192.168.196.62: 80) - HTTP State: UP Weight: 1
  • 31. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute 1) Monitor Name: mon-http-ecv State: UP Weight: 1 Passive: 0 Probes: 14887 Failed [Total: 124 Current: 0] Last response: Success - Pattern found in response. Response Time: 10.220 millisec State: UP
  • 32. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 33. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 34.
  • 35.
  • 36. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 37. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 38. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 39. © 2014 Citrix | Confidential – Do Not Distribute Show commands System show node show info show license Vserver/Service show lb vserver show cs vserver show service show persistencesession show connectiontable IP related show route show ip show dns addrec -type proxy Diagnostic show techsupport
  • 40. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute 2) Node ID: 1 IP: 192.168.1.45 Node State: STAYSECONDARY Master State: Secondary Fail-Safe Mode: OFF INC State: DISABLED Sync State: ENABLED Propagation: ENABLED Enabled Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1 Disabled Interfaces : None HA MON ON Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1 Interfaces on which heartbeats are not seen : 1/8 1/6 1/5 1/4 1/3 1/2 1/1 Interfaces causing Partial Failure: 1/8 1/6 1/5 1/4 1/3 1/2 1/1 SSL Card Status: UP Local node information: Critical Interfaces: 1/8 1/6 1/5 1/4 1/3 1/2 1/1 > Node State: NOT UP Master State: Secondary Master Enabled Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1 Disabled Interfaces : None HA MON ON Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1 Interfaces on which heartbeats are not seen : 1/8 1/6 1/5 1/4 1/3 1/2 1/1 Interfaces causing Partial Failure: 1/8 1/6 1/5 1/4 1/3 1/2 1/1 Node State: STAYSECONDARY Master State: Secondary
  • 41. © 2014 Citrix | Confidential – Do Not Distribute NetScaler Processes Process Description Process Description nsppe NetScaler Packet Engine nsfsyncd Sync bookmarks and SSL certificates nsaaad RBA and SSL VPN External Auth nsnetsvc Used by the GUI for config changes nsconf Writes the ns.conf file nsumond Runs the scriptable monitors nslog.sh Controls Logging for newnslog nsconmsg Controls writing of newnslog nssync HA sync nscollect Statistics gathering for historical reporting nsreadfile Used to read SSL Cert Files imi/ripd/ ospfd/bgpd Routing processes nscrlrefresh SSL CRL list update
  • 42. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute System Entities Protocols
  • 43. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 44. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 45. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 46. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute > stat interface 1/1 Interface [1/1]: Interface StateUP Link uptime 00:40:21 Link downtime00:00:00 Throughput Statistics Rate (/s) Total Bytes received42393 54497294 Bytes transmitted 2584 20222135 Packets received 629 710246 Packets transmitted 47 69066 Packet Statistics Rate (/s) Total Multicast packets 18 41219 NetScaler packets 85 98954 LACP Statistics Rate (/s) Total LACPDUs received 0 0 LACPDUs transmitted 0 0 Error Statistics Rate (/s) Total Error packets received (hw) 0 0 Error packets transmitted (hw) 0 0 Inbound packets discarded (hw) 0 0 Outbound packets discarded (hw)0 0 Packets dropped in Rx (sw) 539 599904 Packets dropped in Tx (sw) 0 0 NIC hangs -- 0 Status stalls -- 0 Transmit stalls -- 0 Receive stalls -- 0 Error-disables -- 0 Duplex mismatches -- 0 Link re-initializations -- 0 MAC moves registered 0 0 Times NIC became muted -- 0
  • 47. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute Non-authoritative entries 0 Authoritative entries 98 Error Statistics Nonexistent domain 102359 Response class unsupported 0 Invalid query format 0 Stray answers 0 Incorrect RD length 0 Requests refused 0 Response type unsupported 0 Query class unsupported 0 Invalid response format 0 No answer responses 102334 Multi queries disabled 0 Other errors 0
  • 48. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 49. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute Vserver hits 0 0 Requests 0 0 Responses 0 0 Request bytes 0 65 Response bytes 0 188 Total Packets rcvd 0 5 Total Packets sent 0 4 Current client connections -- 0 Current Client Est connections -- 0 Current server connections -- 0 Requests in surge queue -- 0 Requests in vserver's surgeQ -- 0 Requests in service's surgeQs -- 0 Spill Over Threshold -- 0
  • 50. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 51. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute NetScaler File System
  • 52. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 53. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 54. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 55. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 56. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute View events View console messages View statistics Debug system counters Debug load balancing issues Debug CPU/Memory utilization Use cases
  • 57. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute nsconmsg Common Syntax Make sure to use –K, NOT -k
  • 58. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute Live CPU related stats Archived events HA Failover cause LB stats CS related counters Real-time policy hits SSL related counters Compression related counters
  • 59. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 60. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute 1906 3910 PPE-0 'interface(1/1)' has been disabled Wed Aug 14 12:27:16 2013 1907 0 PPE-0 'interface(1/1)' DOWN Wed Aug 14 12:27:16 2013 1912 0 PPE-0 'server_svc_cfg_NSSVC_DNS_192.168.204.50:53(SVC_CTXANG_DNS1)' DOWN Wed Aug 14 12:27:25 2013 1913 0 PPE-0 'server_svc_cfg_NSSVC_DNS_192.168.204.51:53(SVC_CTXANG_DNS2)' DOWN Wed Aug 14 12:27:25 2013 1910 0 PPE-0 MonServiceBinding_192.168.204.51:53_(ping- default)(SVC_CTXANG_DNS2): DOWN; Last response: Failure - Probe timed out. Wed Aug 14 12:27:25 2013 1911 0 PPE-0 MonServiceBinding_192.168.204.50:53_(ping- default)(SVC_CTXANG_DNS1): DOWN; Last response: Failure - Probe timed out. Wed Aug 14 12:27:25 2013
  • 61. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 62. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 63. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute VIP(127.0.0.2:53:DOWN:WEIGHTEDRR): Hits(0, 0/sec) Mbps(0.00) Pers(OFF) Err(0) SO(0) LConn_BestIdx: 1024 Pkt(0/sec, 0 bytes) actSvc(0) DefPol(NONE) override(0) newlyUP(0) Conn: Clt(0, 0/sec, OE[0]) Svr(0) SQ(Total: 0 OnVserver: 0 OnServices: 0) slimit_SO: (Sothreshhold: 0 [Ex: 0] Consumed: [Ex: 0 Borrowed: 0 TotActiveConn: 0] Available: 0-
  • 64. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute ipConflictAddr = 192.168.47.1 last message repeated 169 times
  • 65. © 2014 Citrix | Confidential – Do Not Distribute Troubleshooting Techniques Common NetScaler issues/resolutions HDD Issues Logging fails /var missing Flash Issues Config fails to save Config saves partially Sync fails Device fails to boot Memory starvation Dropped sessions CPU starvation All services failing All VIPS down Degraded performance
  • 66. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 67. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 68. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 69. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 70. © 2014 Citrix | Confidential – Do Not Distribute nstrace & nstcpdump nstrace Common syntax: Nstrace.sh –sz 0 Nstrace.sh –sz 0 –filter “SOURCEIP = 10.198.4.10” –link enabled Filter qualifiers and operators: SOURCEIP, SOURCEPORT, DESTIP, DESTPORT, SVCNAME, VSVRNAME, STATE ==, eq, !=, neq, >, gt, <, lt, >=, ge, <=, le, BETWEEN Compound filters using || and && nstcpdump Common syntax: Nstcpdump.sh –X tcp port 80 Nstcpdump.sh –w testcapture.cap –X src host 10.198.4.10 tcp port 80 Filter qualifiers and operators: tcpdump standard
  • 71. © 2014 Citrix | Confidential – Do Not Distribute Packet Tracing Differences between nstrace.sh & nstcpdump.sh Nstcpdump.sh Nstrace.sh Useful if traces are to be viewed on standard output nstcpdump.sh –w <filename> option helps writing output to file Useful for offline collection nstrace.sh –sz 0 Saves traces in /var/nstrace in cap format can be used with expressions so that you get to see filtered traffic nstcpdump.sh host <IP> nstcpdump.sh port 21 useful for collection of traces in separate log files based on NICs nstrace.sh –tcpdump1 –nic 1
  • 72. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute -h - prints this message - exclusive option -nf - number of files to be generated in cycle (def. 24) -time - seconds per file (def. 3600) (could be an expression) -sz - size of the captured data (bytes from 60 to 1514) -tcpdump - 0=nstrace-format (default) or 1=tcpdump-format -nic - use separate trace files for each interface (only works if -tcpdump option is set) -name - name of the trace file -filter - Filter expression for nstrace. The maximum length of filter expression is 255 and it can of following format: <expression> [<relop> <expression>] -link - Log filtered connection's peer's (linked connection's) traffic. Works only with -filter option
  • 73. © 2014 Citrix | Confidential – Do Not Distribute Packet Tracing nstrace.sh nstcpdump.sh Proprietary capture format TCPdump PCAP capture format Native format captures more information Useful for live capture from CLI Files are stored in /var/nstrace Option to write to a file Needs custom dissector in Wireshark (1.6+) Most TCPdump options supported Works in standard Wireshark
  • 74. © 2014 Citrix | Confidential – Do Not Distribute Trace analysis nstrace.sh By Default if nstrace.sh is executed from shell prompt Trace files are stored in NetScaler proprietary (.cap) format The trace capture runs for 1 hr. (3600 sec) if not interrupted Files are cyclically numbered from 1-24. Trace mode is 6 (that is the TXB and RX packets are captured) The size of the captured data for each packet is 164
  • 75. © 2014 Citrix | Confidential – Do Not Distribute Trace Analysis nstrace syntax examples Command Purpose # nstrace.sh Stores the traces in default (proprietary) format # nstrace.sh -tcpdump 1 Begins to save the traces in the TCPDUMP format for a default 3600 seconds # nstrace.sh -tcpdump 1 -nic 1 Logs the traces (in TCPDUMP format) into separate log files based on the NIC IDs # nstrace.sh –nf <value> No of files to be generated in cycle by default is 24 # nstrace.sh –time <value> Seconds per file by default 3600 seconds # nstrace.sh -sz 0 Size of the captured data( by default it is 164), -sz 0 is the entire packet length # nstrace.sh –m Capturing mode: sum of the values (def. 6): 1-Transmitted packets (TX) 2 - Packets buffered for transmission (TXB) 4 - Received packets (RX) # nstrace.sh -stop Can be used to disable tracing (when 'nstrace.sh' is run in the background
  • 76. © 2014 Citrix | Confidential – Do Not Distribute Trace Analysis nstcpdump.sh example syntax Command Purpose # nstcpdump.sh <type> Possible types are host, net and port .If there is no type qualifier host assumed # nstcpdump.sh <dir> Qualifiers specify a particular transfer direction to and/or from id. Possible directions are src, dst, src or dst and src and dst. If there is no dir qualifier, src or dst is assumed. src foo', `dst net 128.3', `src or dst port ftp- data' # nstcpdump.sh <proto> ether, fddi, ip, arp, rarp, decnet, tcp and udp. # nstcpdump.sh –c <value> Exit after receiving ‘value’ number of packets # nstcpdump.sh –F –I –r Not supported and not to give them as options to the script # nstcpdump.sh –w <file name> Write the raw packets to file rather than parsing and printing them out. Read by typing tcpdump –r test
  • 77. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 78. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 79.
  • 80. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 81. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 82. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 83. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 84. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 85. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute CTX109304 Data Collection Procedure to Troubleshoot NetScaler Related Issues http://www.slideshare.net/davidmcg/common-pitfalls-when-setting-up-a-net-scaler-for- the-first-time http://support.citrix.com/search/basic?searchQuery=counters&refinement=Content+Ty pe,Technotes&refinement=Product+Family,NetScaler CTX114999 How to Troubleshoot Authentication with Aaad.debug https://taas.citrix.com/
  • 86. © 2014 Citrix | Confidential – Do Not Distribute Maximize your knowledge. Continue your journey with Citrix Education. Recommended next step for hands-on technical training: CNS-205 Citrix NetScaler 10 Essentials and Networking Identify the capabilities and functionality of the NetScaler Explain basic NetScaler network architecture Obtain, install, and manage NetScaler licenses Explain how SSL is used to secure the NetScaler Implement NetScaler TriScale Technology, including Clustering Visit bit.ly/NSCOURSE to save 10% now through April 30.* *Not valid with any other promotions, packages or discounts. Applies only to new purchases. Regional limitations may apply.
  • 87. © 2014 Citrix | Confidential – Do Not Distribute About Citrix Services Citrix Services make sure you succeed with your virtualization programs. How we can help Citrix Education – The fastest, most efficient way to get your team the virtualization skills they need. Online, on-site or in class. citrix.com/training Citrix Consulting – Intensive engagements for complex, critical or just plain massive projects. citrix.com/consulting Citrix Support – Always-on support services that leverage everything we know about best-practice deployment and maintenance. citrix.com/support Educate | Guide | Support | Succeed
  • 88. © 2014 Citrix | Confidential – Do Not Distribute • 40 insider troubleshooting tips • Covering XenDesktop, XenServer, XenApp and NetScaler • Citrix Support top engineers • FREE eBook • Citrix Auto Support • Now available! Secrets of the Citrix Support Ninjas
  • 89. © 2014 Citrix | Confidential – Do Not Distribute Premier Support Calculator Check it out
  • 90. Work better. Live better. Use NetScaler

Hinweis der Redaktion

  1. Access to the appliance CLI is through the serial console, or by connecting with SSH to the NetScaler management IP /SNIP with Management Access enabled.This lands you in the NetScaler CLI – which has custom commands. Some TCSH-like shortcuts can apply.TCSH shortcuts like CTRL-A brings you to the start of the line, and CTRL-E brings you to the end. Most day to day NetScaler commands will begin with the following verbs: show Display information about an entity.add Create an entity.remove Delete an entity.set Change/modify an entity.enable Turn a feature or setting ON.disable Turn a feature or setting OFF.force Used in High Availability to Sync &amp; Failover.bind Create a relationship between two entities.unbind Remove a relationship between two entities.
  2. &gt;set cli prompt %u@%h-%T&gt;set cli mode -color ON&gt;help set cli promptAutocomplete is your best friend… &lt;tab&gt; &amp; ? %! - will be replaced by the history event number %u - will be replaced by the NetScaler user name %h - will be replaced by the NetScaler hostname %t - will be replaced by the current time %T - will be replaced by the current time (24 hr format) %d - will be replaced by the current date %s - will be replaced by the node state
  3. There is another shell (BASH) that is only used for file handling – never to configure the NetScaler. Note the different prompts.&gt; shell to enter BASH shell in BSD#Ctrl+D to exit BASH or type exit
  4. All of the UNIX command goodness in FreeBSD!
  5. Show feature provides an output that allows us to quickly identify which features are enabledNotice these common features are disabledLBICREWRITE This output almost certainly would indicate a misconfiguration2. At a bare minimum most deployments will have at LEAST “load balancing” enabled. If LB is off, you can see issues where a vserver wont come up, or it will only utilize 1 service. If you have any inexplicable errors where features just don’t work at all despite a proper config it is almost ALWAYS that the feature has been disabled. This is a common mistake, I make it frequently.
  6. In this case we specified a vserver name, this is the most desirable way to execute this command as it shows you the most detail, namely the state of your bound services.Key difference between this example and the generic example is the bound service summaryWe now know that this vserver is down because the only service bound to it is down. A vserver will go down when all of its bound services are down.
  7. Two different directories. One for cores and one for crashes
  8. Pitboss controls the processes on a NetScalerIf the pitboss detects a process failing it will try to restart itThe nsppe process is in userland so can be “warm” startedIf a process fails 5 times, on the sixth failure the NetScaler will undergo a full reboot
  9. Show commands primarily provide configuration and status information about the system or specified entityShow commands for SYSTEM infoShow node, talk about various bad states. Essential to troubleshooting HA issuesConsolidate show version, show feature, show mode into “show info”Show license3. Show commands for a vserver and service:Shlbvserver/shcsvserver, generic command vs specific referencing an entitySh service, just like shlbvserver, generic vs specific outputShpersistencesession, helpful for tracking a persistent session without a traceShconnectiontable, large output but also useful for connection tracking4. Other show commandsSh route, ship, shShdnsaddrec –type proxy, useful for debugging cached DNS records
  10. Why is this node down?2. Things to notice here:Node State: NOT UPMaster State: Secondary3. Its down because unused interfaces are enabled and not receiving heartbeats. If we compare which interfaces are enabled to which interfaces are not receiving heartbeats we can determine that 1/7 is the only interface receiving heartbeats.4. We can correct this by disabling all interfaces except for 1/7 (which is the only interface in use).5. Notice the partner node, he is secondary but has only one interface enabled. Its *NOT* failing for the same reason, notice the Node State: STAYSECONDARY setting.6. So we know the node we are on is down because its interfaces are misconfigured, and the partner node is forced to stay secondary.
  11. BSD/NS relationship:BSD controls disk/time slicing, primarily a bootloader for NS kernelLogs are written by BSDLogs are rolled by BSDNetScaler runs inside of FreeBSD, nsppeConsumes majority of user land processer (99%)NetScaler controls NICs/packet processing/etc.Key processes:NsppeNsaaadNsconfigdNsauthdNslog.shKey processes:NsnetsvcNsumondNsconmsgDynamic routing processes
  12. Taken on an MPX 15500
  13. 1. Things to notice here:Various hit countersClient conn vs Server connSpilloverService stats (ttfb, transactions)
  14. A significant portion of the information we care about is already available from “stat lbvserver [name]”TTFBSurge QueueThings to notice:TTFBSurge queue
  15. 1. Discuss an overview of each mount point “/var” contains historical data in the form of logs. This is one of the first places to look when trying to troubleshoot a NetScaler issue./var/log is the “traditional” location for logs in Unix/Linux operating systems/var/nslog contains NetScaler specific logs“/flash” contains configuration and customizationsrc.netscalerAny modified configs from /etcUser monitorsKernel itself“/” contains the OSRam driveAvoid writing anything to it, no reason to2. What happens if the components fail?Device can operate without /var, but will not be able to logDevice cannot boot without /flashDevice cannot boot without /
  16. 1. Discuss an overview of each mount point “/var” contains historical data in the form of logs. This is one of the first places to look when trying to troubleshoot a NetScaler issue./var/log is the “traditional” location for logs in Unix/Linux operating systems/var/nslog contains NetScaler specific logs“/flash” contains configuration and customizationsrc.netscalerAny modified configs from /etcUser monitorsKernel itself“/” contains the OSRam driveAvoid writing anything to it, no reason to2. What happens if the components fail?Device can operate without /var, but will not be able to logDevice cannot boot without /flashDevice cannot boot without /
  17. /var/nslog/dmesg.boot/var/nslog/dmesg.prev/var/nslog/dmesg.last
  18. 1. THIS IS AN INCOMPLETE LIST, THESE ARE THE MOST COMMON FILESNs.log (INCLUDING BUT NOT LIMITED TO):contains NSCLI commandscontains syslog messages useful for reconstructing user input and event timelinesBy far the most informative file containing the most information in one placeMessages contains system events authentication messages system startup messages commands executed under shellconsole messages
  19. 1. THIS IS AN INCOMPLETE LISTNewnslogCurrent live fileNewnslog.*.gzRolled log filesNs.log - contains newnslog related eventsNsumond.log – contains log output for user land monitors using KASNslog.nextfile – next newnslog file to be written
  20. If a problem hasn’t been solved by what we have done so far:Logfile analysisShow commandsStat commandsThen the next step is to get even further debug information from Nsconmsg. 2. Nsconmsg logs all of the statistics we have seen so far, and additionally there are literally thousands of other counters we don’t see in the NSCLI which are logged. All of these counters are recorded every 7 seconds and written to the file in a binary format.Nsconmsg is one of the primary tools support uses to debug issues3. Some things we can get from newnslog are:Events: UP/DOWN messages for entities (vservers, services), HA events, interface events, etc. Most of these events are also logged to syslog.Console messages: Mostly BSD messages, disk write errors, etc
  21. If a problem hasn’t been solved by what we have done so far:Logfile analysisShow commandsStat commandsThen the next step is to get even further debug information from Nsconmsg. 2. Nsconmsg logs all of the statistics we have seen so far, and additionally there are literally thousands of other counters we don’t see in the NSCLI which are logged. All of these counters are recorded every 7 seconds and written to the file in a binary format.Nsconmsg is one of the primary tools support uses to debug issues3. Some things we can get from newnslog are:Events: UP/DOWN messages for entities (vservers, services), HA events, interface events, etc. Most of these events are also logged to syslog.Console messages: Mostly BSD messages, disk write errors, etcSystem statistics: all counters are captured every 7 seconds. We can view lb statistics, system statistics.System counters: mostly for software debugLoad balancing counters: ConLb shows us detailed load balancing statistics
  22. This is a freshly booted device so we see a variety of messages here:Service up/down eventsInternal services coming upBootup messagesCPUCONFIG STARTUbsec_0 UPInterface eventsDisabled interfacesHA eventsVersion mismatch messageRemote node UP
  23. -d consmsg provides output on any BSD console messagesThis console output consists only of bootup output, but you may also see things like: IP conflicts here NIC errors (duplex issues) lack of file handlers OS errors, etc.
  24. –d oldconmsg provides CPU and memory utilization outputI will use this to quickly establish trends in CPU/MEM utilization (just let the output scroll and watch mem/cpu and see if they increase steadily).
  25. 1. –s ConLB=2 provides detailed debug output regarding load balancingSpecific detail on the lbvserver, the types of traffic its handling, Specific detail on services and the traffic THEY are subsequently handling.2. Most interested in the following sections: Hits, particularly Pers (persistence status to explain hits) Pkt (packet stats) Conn (Current server, Maximum server, Open Established, Established, Reuse Pool, Surge queue)
  26. 1. HDD issues – primary failure is that logging fails, /var is missingCheck df, are any drives missing?Check dmesg, are there any drives missing or errors?Run fsck on the drive to check for errorsAttempt to re-mount the drive2. Flash issues – config save issues, sync fails, device fails to bootThe box wont boot without flash, so if the NetScaler is running the device mounted OK.Check df, is the /flash missing or full?Check dmesg, is flash missing or getting any errors?Run fsck on the drive to check for errors3. Memory starvation – dropped session, cant allocate memory for other tasks (CPU profile, etc.)Feature memory allocation, IC, APPFW, TCPBUFFERINGConMEM4. CPU overutilizationSNMP pollingNewnslogs roll USIP? CMP?Anything in userland?
  27. http://support.citrix.com/article/CTX109304
  28. Perl script/netscaler/showtechsupport.plAlso available in the UI: System &gt; Diagnostics &gt; Generate support file
  29. Perl script/netscaler/showtechsupport.plAlso available in the UI: System &gt; Diagnostics &gt; Generate support file
  30. If we haven&apos;t been able to solve the issue with stat and show commands, cant find anything in the logs, the next step might be to get a sniff. Personally I like to get a sniff first and work forward from there, assuming the problem warrants it.2 kinds of traces,Nstrace – preferable, gives extended NetScalerdataNstcpdump – all NIC wrapper for tcpdump. quick, familiar, uses tcpdump syntax. 2. Common syntax -sz 0, or with a filter. Truncated traces are almost always worthless.3. 9.0 adds filter support to nstrace. This is the preferred acquisition method as we write extended data to the capture useful for session tracking, NIC tracking, operation tracking, etc. Requires custom build of Wireshark to view.If you use a filter, use the –link option to capture all of the other related traffic on that session.Operators: ==, !=, etc.4. Nstcpdump good for looking at live traffic, or for when traces need to be viewed with a standard Wireshark build. All we are doing is an all NIC trace when invoking tcpdump via nstcpdump.sh. Since we now have filtering in nstrace, it is much more preferable to use that method to capture instead of nstcpdump. Filtering in tcpdump is expensive in userspace due to the way we provide the data to tcpdump.Common syntax –X to print payload in ASCIICommon syntax –w to write the capture to a fileTcpdump not effective due to the way packets are captured from the kernel
  31. Cover various switches, the most common syntax will be “nstrace.sh –sz 0”-sz specifies size of data to be captured-nf number of files in a cycle-tcpdump, writes file in tcpdump format (doesn’t need special Wireshark build)-filter, specifies the filter to apply-link, link associated traffic from filter
  32. type qualifiers say what kind of thing the id name or number refers to. Possible types are host, net and port. E.g., `host foo&apos;, `net 128.3&apos;, `port 20&apos;. If there is no type qualifier, host is assumed. dir qualifiers specify a particular transfer direction to and/or from id. Possible directions are src, dst, srcordst and srcanddst. E.g., `src foo&apos;, `dst net 128.3&apos;, `src or dst port ftp-data&apos;. If there is no dir qualifier, srcordst is assumed. For `null&apos; link layers (i.e. point to point pro- tocols such as slip) the inbound and out-bound qualifiers can be used to specify a desired direction. proto qualifiers restrict the match to a particular protocol. Possible protos are: ether, fddi, ip, arp, rarp, decnet, lat, moprc, mopdl, tcp and udp. E.g., `ether src foo&apos;, `arp net 128.3&apos;, `tcp port 21&apos;. If there is no proto qualifier, all protocols consistent with the type are assumed. E.g., `src foo&apos; means `(ip or arp or rarp) src foo&apos; (except the latter is not legal syntax), `net bar&apos; means `(ip or arp or rarp) net bar&apos; and `port 53&apos; means `(tcp or udp) port 53&apos;. The –r option must not be given to the script because internally we are supplying ‘-r –‘ option as a default entry, so that TCPDUMP reads the traces from the standard input. So it does look logical, not to supply a ‘-r’ option from the CLI.The –i option must be avoided too. This is because TCPDUMP listens only on 1 interface at a time. In our case we are dumping packets that arrive on all the interfaces on to the standard output. If you want to view per interface packets, ‘nstrace.sh’ can be used with the ‘-tcpdump 1 -nic 1’ option as input.The ‘-F’ option is not encouraged. If this is to be put to full use, use ‘nstrace.sh’ or ‘nstcpdump.sh –w &lt;file&gt;’ and do an offline filtering using TCPDUMP directly. This is because we felt that, since you are using the standard output to dump the traces, it would not be a wise idea to use ‘complex’ filter expressions. So the better idea would be to store in a file the entire trace and view it using Ethereal or graphical packet analyzer and based on the fields you are interested, generate your ‘expression’ file and use TCPDUMP directly on the shell with the ‘-F’ option to filter the trace captured.-sSnarfsnaplen bytes of data from each packet rather than the default of 68 (with SunOS&apos;s NIT, the mini- mum is actually 96). 68 bytes is adequate for IP, ICMP, TCP and UDP but may truncate protocol infor- mation from name server and NFS packets (see below). Packets truncated because of a limited snapshot are indicated in the output with ``[|proto]&apos;&apos;, where proto is the name of the proto- col level at which the truncation has occurred. Note that taking larger snapshots both increases the amount of time it takes to process packets and, effectively, decreases the amount of packet buffering. This may cause packets to be lost. You should limit snaplen to the smallest number that will capture the protocol information you&apos;re interested in. -T Force packets selected by &quot;expression&quot; to be interpreted the specified type. Currently known types are rpc (Remote Procedure Call), rtp (Real-Time Applications protocol), rtcp (Real-Time Applications control protocol), vat (Visual Audio Tool), and wb (distributed White Board).
  33. Nstcpdump is just a wrapper for tcpdump, standard syntax applies.
  34. # nsapimgr-K &lt;nstrace-file&gt; -s tcpdump=1 -k &lt;tcpdump-file&gt;Offline conversion of traces, those are in our NSTRACE format, to TCPDUMP format.&lt;nstrace-file&gt;: the file, which is in the NSTRACE format.&lt;tcpdump-file&gt;: the file into which the traces are to be converted and dumped in the TCPDUMP format.0=nstrace-format (default)
  35. Two different directories. One for cores and one for crashes
  36. Pitboss controls the processes on a NetScalerIf the pitboss detects a process failing it will try to restart itThe nsppe process is in userland so can be “warm” startedIf a process fails 5 times, on the sixth failure the NetScaler will undergo a full reboot
  37. Don’t hurt meCaslon Ampersand!