SlideShare ist ein Scribd-Unternehmen logo
1 von 48
SYN402: Advanced Tools and
Techniques for Troubleshooting
NetScaler Appliances
Andrew Redman | Lead Escalation Engineer
May 8, 2014
© 2014 Citrix. Confidential.2
Tweet about this session with hashtag #SYN402 and
#citrixsynergy
© 2014 Citrix. Confidential.3
NetScaler System Overview
Troubleshooting Tools & Techniques
Case Studies
Resources
Conclusion
Q&A
Agenda
NetScaler System Overview
© 2014 Citrix. Confidential.5
Key NetScaler Processes
ns_master/NSPPE
nsvpnd
nsaaad
nsconf
nsauthd
nslog.sh
nssync
nsreadfile
nslcd
nsfsyncd
nsnetsvc
nsconmsg
nscollect
Runs Citrix NetScaler OS
SSL VPN File Transfer
RBA and SSL VPN external authorization
Writes the ns.conf file
CLI authentication
Controls logging for the newnslog
HA synchronization
Used to read SSL certificate files
Runs the front panel LCD
Synchronizes bookmarks and SSL certificates
Used by the GUI for configuration changes
Controls writing of the newnslog
Statistics gathering for historical purposes
Process Description
© 2014 Citrix. Confidential.6
NetScaler File System
/var (hard drive) Logs - /var/log & /var/nslog
Install - /var/nsinstall
Trace - /var/nstrace
Core Dumps - /var/crash & /var/core
/flash (flash drive) Config - /flash/nsconfig
SSL Certificates - /flash/nsconfig/ssl
© 2014 Citrix. Confidential.7
NetScaler File System (cont.)
/flash (cont.) User Monitors - /flash/nsconfig/monitors
Custom Options - /flash/nsconfig
/ (ram drive) OS - (operating system)
Troubleshooting Tools & Techniques
> show techsupport
Critical
System Data
In-Depth
Performance
Monitoring
Stats
Detailed Log
Files
USER
Command
Logging
/var/tmp/support/collector_P_10.10.10.10_21Apr2014_21_42_tar.gz
NetScaler Tech Support Bundle
© 2014 Citrix. Confidential.10
The NetScaler Tech Support Bundle
© 2014 Citrix. Confidential.11
Citrix Predictive Support
© 2014 Citrix. Confidential.12
‘Single Mission … Data Collection’
FAQ: http://support.citrix.com/article/CTX131233
Data Collection Analyze Data
Tailored
Recommendations
© 2014 Citrix. Confidential.13
https://taas.citrix.com
© 2014 Citrix. Confidential.14
Technical Issues Flagged
© 2014 Citrix. Confidential.15
Investigate Issues Further
The ‘BELL’
© 2014 Citrix. Confidential.16
Crash File(s) Location
nscollect-542.gz
© 2014 Citrix. Confidential.17
Intuitive Navigation
Select a different
newnslog file to view
© 2014 Citrix. Confidential.18
Detailed Graphs
Mouse over graph
to see more detail
Informative
reference legend
Download the data
as an excel sheet
© 2014 Citrix. Confidential.19
IPMI – Intelligent Platform Management Interface
Default LOM IP Address: http://192.168.1.3
Change NetScaler
IP Address
Obtain Health
Monitoring Detail
Harvest Serial
Number
Determine MAC
Address
© 2014 Citrix. Confidential.20
Common CLI Show Commands
Common show commands for system information:
show node, show info, show license
Common show commands for vserver and service:
show lb vserver, show cs vserver, show service, show persistencesession
show connectiontable
Other common show commands:
show route, show ip
© 2014 Citrix. Confidential.21
Common CLI Stat Commands
Common stat commands for system information:
stat ns, stat cpu, stat interface
Common stat commands for vserver and service:
stat lb vserver, stat cs vserver, stat service
Other common stat commands:
stat dns, stat ssl, stat http
© 2014 Citrix. Confidential.22
Leveraging ‘nsconmsg’
Nsconmsg common use cases:
View events
View console messages
View statistics
Debug system counters
Debug load balancing issues
Debug CPU/Memory utilization
Make absolutely
sure that you
use a capital -K
and NOT a
lower-case -k
© 2014 Citrix. Confidential.23
Example ‘nsconmsg’ Usage
# cd /var/nslog
# nsconmsg -K newnslog -j fqdn-ssl-vip -s ConLb=1 -d oldconmsg
current log file
newnslog
name of vserver
fqdn-ssl-vip
LB stats
ConLb=1
© 2014 Citrix. Confidential.24
Displaying debug performance information
NetScaler V20 Performance Data
NetScaler NS10.1: Build 123.11.nc, Date: Feb 24 2014, 17:30:43
current time is Sun Mar 23 18:33:43 2014
-------------------------------------------------------
NATSession : Free(6553)A(6553)InUse(0)
NATSession: Cur(Tcp[0] Udp[0] Icmp[0] Other[0])
NATSession: Op/s(Tcp[0] Udp[0] Icmp[0] Other[0])
Session: A:0 F:0 IUse:0 SEs: SIP:0 C:0 SSL:0 Svr:0 UserId:0 SIPDIP:0 DIP:0 SO:0
SSF: Conn (Srvr 0 Clnt 0) U:0
CM: Conn (Srvr 0 Clnt 0) Sessions PCB 0 NATPCB 0
Z(SIP[0], C[0], SSL[0] Server[0] SIPDIP[0] DIP[0] SO[0])
Mon: Probes: 434562009, Failed: 15
VIP(10.54.169.75:443:UP:LEASTCONNS): Hits(7317, 0/sec) Mbps(0.00) Pers(OFF) Err(0) SO(0) LConn_BestIdx: 0
S(10.54.148.201:80:UP) Hits(7317, 0/sec, P[0, 0/sec]) ATr(0:0) Mbps(0.00) BWlmt(0 kbits) RspTime(0.00 ms)
Load(0) LConn_Idx: (C:0; V:0,I:1)
-------------------------------------------------------
CPU:0.2% MEM:182472560 UP:10.00:00:38 since:Thu Mar 13 18:33:05 2014
current time is Sun Mar 23 18:33:43 2014
Mon: Probes: 434562009, Failed: 15
VIP(10.54.169.75:443:UP:LEASTCONNS): Hits(7317, 0/sec) Mbps(0.00) Pers(OFF)S(10.54.148.201:80:UP) Hits(7317, 0/sec, P[0, 0/sec]) ATr(0:0) Mbps(0.00) BWlmt(0
kbits) RspTime(0.00 ms)
CPU:0.2% MEM:182472560 UP:10.00:00:38 since:Thu Mar 13 18:33:05 2014
© 2014 Citrix. Confidential.25
# nsconmsg -K newnslog -j <name of VIP> -s ConLb=1(2 or 3) -d oldconmsg | more
# nsconmsg -K newnslog -s ConMon=1 -d oldconmsg
# nsconmsg -K newnslog -s ConMEM=1 -d oldconmsg
# nsconmsg -K newnslog -s ConSSL=1 -d oldconmsg
ConDebug - Debugging
ConLb - Load Balancing
ConMon - Monitoring Probes
ConMEM - Memory Management
ConCSW - Content Switching
ConSSL - SSL Offload
ConCMP - Compression
ConIC - Integrated Caching
© 2014 Citrix. Confidential.26
Log File Analysis
# cd /var/log
ns.log:Mar 20 16:45:06 <local0.info> 10.54.169.73 03/20/2014:20:45:06 GMT atlvpx 0-PPE-0 : UI CMD_EXECUTED
2947 0 : User nsroot - Remote_ip 10.13.73.65 - Command "login nsroot "********"" - Status "Success"
ns.log:Mar 20 16:45:06 <local0.info> 10.54.169.73 03/20/2014:20:45:06 GMT atlvpx 0-PPE-0 : UI CMD_EXECUTED
2948 0 : User nsroot - Remote_ip 10.13.73.65 - Command "show ns license" - Status "Success"
# zgrep -i cmd_executed ns.log* | more (the -i means ignore CASE)
interface down vServer down panic signaled
© 2014 Citrix. Confidential.27
NetScaler + Wireshark = ‘thumbs up’
http://www.wireshark.org
© 2014 Citrix. Confidential.28
RED HOT Wireshark Tip
Custom
Columns
Custom Menu
Options
Pre-build
Custom Filters
Much Faster
Analysis
Get the red hot details on how to empower your default Wireshark
configuration in the Reference Section at the end of this presentation.
Troubleshooting Techniques & Case Studies
© 2014 Citrix. Confidential.30
Top Tips
Use Citrix Predictive Support
Pay attention to the issues!
Note the highlighted counter(s)
Use nsconmsg to see even more detail
Correlate time-frames in other log files
Achieve root cause analysis faster!
Case #1 - High Availability Synchronization
© 2014 Citrix. Confidential.32
Primary NetScaler Secondary NetScaler
Same type of
appliance
Same firmware
version
Same nsroot
password
Same RPC
Node password
Open requisite
TCP ports
HA Pre-requisites
© 2014 Citrix. Confidential.33
Predictive Support Flags The Issues
© 2014 Citrix. Confidential.34
The HA Pair Struggled To Synchronize
# nsconmsg -K newnslog -d statswt0 | grep nic_tot_bdg_mac_moved (nic_err_bdg_muted)
57520 0 71837018 nic_tot_bdg_mac_moved interface(0/1)
57521 0 71837018 nic_tot_bdg_mac_moved interface(0/2)
9861 0 65 nic_err_bdg_muted interface(0/1)
9862 0 65 nic_err_bdg_muted interface(0/2)
71,837,018 MAC Moves
65 Interface Mutes
© 2014 Citrix. Confidential.35
The ‘newnslog’ Time-Frame
# nsconmsg -K newnslog -d setime
Displaying start and end time information
NetScaler V20 Performance Data
NetScaler NS9.3: Build 54.4.nc, Date: Dec 20 2011, 22:44:41
start time Fri Feb 28 21:49:58 2014
end time Fri Feb 28 21:53:28 2014
total duration 00.00:03:30
data size 1,718,949 bytes
total duration 00.00:03:30
Case #2 - XA/XD Slow Performance
© 2014 Citrix. Confidential.37
XenAppTablets
Smartphones XenDesktop
Predictive
Support
Critical Insight
Gleaned
Preventative
Approach
Don’t
Underestimate
XA/XD Slow Performance
© 2014 Citrix. Confidential.38
Predictive Support Flags The Issues
http://support.citrix.com/article/CTX136926
© 2014 Citrix. Confidential.39
Performance Was Extremely Latent
# nsconmsg -K newnslog -d statswt0 | grep nic_tot_bdg_mac_moved
4263 0 23 nic_tot_bdg_mac_moved interface(0/1)
4264 0 51 nic_tot_bdg_mac_moved interface(1/1)
4265 0 28 nic_tot_bdg_mac_moved interface(1/2)
23, 51 & 28 MAC Moves
© 2014 Citrix. Confidential.40
Networking Issues Again?
# nsconmsg -K newnslog -d statswt0 | grep nic_err
4274 0 1995 nic_err_rl_pkt_drops interface(1/1)
4275 0 40736 nic_err_rl_pkt_drops interface(1/2)
4276 0 1995 nic_err_rl_rate_pkt_drops interface(1/1)
4277 0 40736 nic_err_rl_rate_pkt_drops interface(1/2)
4678 0 42731 allnic_err_rl_rate_pkt_drops
System Limits Exceeded
Rate-limited Packets!
© 2014 Citrix. Confidential.41
The Moral of the Story
Leverage Citrix Predictive Support
Leverage
Pred. Support
Pay Attention
Gain Quick
Insight
Dig Into
‘nsconmsg’
On Target for
Success!
Resources
© 2014 Citrix. Confidential.43
Helpful Resources
Comprehensive NetScaler Counters
Wireshark Developer Editions
Customizing Wireshark Tutorial
Citrix Predictive Support Forum
NSTRACE Options
How To Manage VLAN’s, Interfaces and Subnets
Conclusion
© 2014 Citrix. Confidential.45
What We’ve Actually Covered
An Overview of the NetScaler System to give you a high-level understanding of the core system.
I shared with you some excellent Troubleshooting Tools that are available at your disposal.
I also discussed a few key Troubleshooting Techniques that you can use to diagnose issues.
I then highlighted two different Case Studies leveraging the tools & techniques that I shared with
you in the presentation.
In addition I provided you with a few Resources for your future reference and edification.
Q & A
© 2014 Citrix. Confidential.47
Before you leave…
Conference surveys are available online at www.citrixsynergy.com starting
Thursday, May 8 at 9:00 a.m.
Provide your valued feedback by 6:00 p.m. today to be entered to win one of
many prizes!
Download presentations starting Monday, May 19 from the My Event Planning
tool
© 2014 Citrix. Confidential.48
WORK BETTER. LIVE BETTER.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference GuideAruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
 
Understand the iptables step by step
Understand the iptables step by stepUnderstand the iptables step by step
Understand the iptables step by step
 
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 
Citrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix Netscaler Deployment Guide
Citrix Netscaler Deployment Guide
 
EMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issuesEMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issues
 
Qemu & KVM Guide #1 (intro & basic)
Qemu & KVM Guide #1 (intro & basic)Qemu & KVM Guide #1 (intro & basic)
Qemu & KVM Guide #1 (intro & basic)
 
Using GTP on Linux with libgtpnl
Using GTP on Linux with libgtpnlUsing GTP on Linux with libgtpnl
Using GTP on Linux with libgtpnl
 
Android 10
Android 10Android 10
Android 10
 
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense FirewallDetect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKDoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDK
 
Issues of OpenStack multi-region mode
Issues of OpenStack multi-region modeIssues of OpenStack multi-region mode
Issues of OpenStack multi-region mode
 
Kubernetes Networking - Sreenivas Makam - Google - CC18
Kubernetes Networking - Sreenivas Makam - Google - CC18Kubernetes Networking - Sreenivas Makam - Google - CC18
Kubernetes Networking - Sreenivas Makam - Google - CC18
 
Aruba OS 6.3 Command Line Interface Reference Guide
Aruba OS 6.3 Command Line Interface Reference GuideAruba OS 6.3 Command Line Interface Reference Guide
Aruba OS 6.3 Command Line Interface Reference Guide
 
Open vSwitch Introduction
Open vSwitch IntroductionOpen vSwitch Introduction
Open vSwitch Introduction
 
What's new with MQ on z/OS 9.3 and 9.3.1
What's new with MQ on z/OS 9.3 and 9.3.1What's new with MQ on z/OS 9.3 and 9.3.1
What's new with MQ on z/OS 9.3 and 9.3.1
 
Architecture Of The Linux Kernel
Architecture Of The Linux KernelArchitecture Of The Linux Kernel
Architecture Of The Linux Kernel
 
Redhat ha cluster with pacemaker
Redhat ha cluster with pacemakerRedhat ha cluster with pacemaker
Redhat ha cluster with pacemaker
 
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdfQuantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
 
Understanding DPDK
Understanding DPDKUnderstanding DPDK
Understanding DPDK
 
2023 Ivanti August Patch Tuesday
2023 Ivanti August Patch Tuesday2023 Ivanti August Patch Tuesday
2023 Ivanti August Patch Tuesday
 

Andere mochten auch

Advanced Netscaler Customizations-BriForum 2011
Advanced Netscaler Customizations-BriForum 2011Advanced Netscaler Customizations-BriForum 2011
Advanced Netscaler Customizations-BriForum 2011
shoesing
 

Andere mochten auch (9)

Common Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First TimeCommon Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First Time
 
NetScaler TCP Performance Tuning
NetScaler TCP Performance TuningNetScaler TCP Performance Tuning
NetScaler TCP Performance Tuning
 
AUCUG Cloud PBX, Call Queuing & Sonus SBC's
AUCUG Cloud PBX, Call Queuing & Sonus SBC'sAUCUG Cloud PBX, Call Queuing & Sonus SBC's
AUCUG Cloud PBX, Call Queuing & Sonus SBC's
 
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesUsing NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
 
Advanced Netscaler Customizations-BriForum 2011
Advanced Netscaler Customizations-BriForum 2011Advanced Netscaler Customizations-BriForum 2011
Advanced Netscaler Customizations-BriForum 2011
 
Top Troubleshooting Tips and Techniques for Citrix XenServer Deployments
Top Troubleshooting Tips and Techniques for Citrix XenServer DeploymentsTop Troubleshooting Tips and Techniques for Citrix XenServer Deployments
Top Troubleshooting Tips and Techniques for Citrix XenServer Deployments
 
Citrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktopCitrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktop
 
IdP, SAML, OAuth
IdP, SAML, OAuthIdP, SAML, OAuth
IdP, SAML, OAuth
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0
 

Ähnlich wie Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetScaler Appliances

DockerCon14 Performance Characteristics of Traditional VMs vs. Docker Containers
DockerCon14 Performance Characteristics of Traditional VMs vs. Docker ContainersDockerCon14 Performance Characteristics of Traditional VMs vs. Docker Containers
DockerCon14 Performance Characteristics of Traditional VMs vs. Docker Containers
Docker, Inc.
 
Advanced Troublesshooting Nexus 7K.pdf
Advanced Troublesshooting Nexus 7K.pdfAdvanced Troublesshooting Nexus 7K.pdf
Advanced Troublesshooting Nexus 7K.pdf
JeanChristian12
 
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdfBRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
aaajjj4
 

Ähnlich wie Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetScaler Appliances (20)

DockerCon14 Performance Characteristics of Traditional VMs vs. Docker Containers
DockerCon14 Performance Characteristics of Traditional VMs vs. Docker ContainersDockerCon14 Performance Characteristics of Traditional VMs vs. Docker Containers
DockerCon14 Performance Characteristics of Traditional VMs vs. Docker Containers
 
Performance characteristics of traditional v ms vs docker containers (dockerc...
Performance characteristics of traditional v ms vs docker containers (dockerc...Performance characteristics of traditional v ms vs docker containers (dockerc...
Performance characteristics of traditional v ms vs docker containers (dockerc...
 
NCS: NEtwork Control System Hands-on Labs
NCS:  NEtwork Control System Hands-on Labs NCS:  NEtwork Control System Hands-on Labs
NCS: NEtwork Control System Hands-on Labs
 
Kubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, KyivKubernetes Navigation Stories – DevOpsStage 2019, Kyiv
Kubernetes Navigation Stories – DevOpsStage 2019, Kyiv
 
Mastering the move
Mastering the moveMastering the move
Mastering the move
 
Advanced Troublesshooting Nexus 7K.pdf
Advanced Troublesshooting Nexus 7K.pdfAdvanced Troublesshooting Nexus 7K.pdf
Advanced Troublesshooting Nexus 7K.pdf
 
LXC – NextGen Virtualization for Cloud benefit realization (cloudexpo)
LXC – NextGen Virtualization for Cloud benefit realization (cloudexpo)LXC – NextGen Virtualization for Cloud benefit realization (cloudexpo)
LXC – NextGen Virtualization for Cloud benefit realization (cloudexpo)
 
Monitoring CloudStack and components
Monitoring CloudStack and componentsMonitoring CloudStack and components
Monitoring CloudStack and components
 
Scaling Docker Containers using Kubernetes and Azure Container Service
Scaling Docker Containers using Kubernetes and Azure Container ServiceScaling Docker Containers using Kubernetes and Azure Container Service
Scaling Docker Containers using Kubernetes and Azure Container Service
 
Best Practices to Create Infrastructure Services in OpenNebula Using viApps
Best Practices to Create Infrastructure Services in OpenNebula Using viAppsBest Practices to Create Infrastructure Services in OpenNebula Using viApps
Best Practices to Create Infrastructure Services in OpenNebula Using viApps
 
OpenNebulaConf 2013 - Best Practices to Create Infrastructure Services in Ope...
OpenNebulaConf 2013 - Best Practices to Create Infrastructure Services in Ope...OpenNebulaConf 2013 - Best Practices to Create Infrastructure Services in Ope...
OpenNebulaConf 2013 - Best Practices to Create Infrastructure Services in Ope...
 
Known basic of NFV Features
Known basic of NFV FeaturesKnown basic of NFV Features
Known basic of NFV Features
 
[OpenInfra Days Korea 2018] Day 2 - E6 - OpenInfra monitoring with Prometheus
[OpenInfra Days Korea 2018] Day 2 - E6 - OpenInfra monitoring with Prometheus[OpenInfra Days Korea 2018] Day 2 - E6 - OpenInfra monitoring with Prometheus
[OpenInfra Days Korea 2018] Day 2 - E6 - OpenInfra monitoring with Prometheus
 
Deploying windows containers with kubernetes
Deploying windows containers with kubernetesDeploying windows containers with kubernetes
Deploying windows containers with kubernetes
 
Presentation 12c grid_upgrade
Presentation 12c grid_upgradePresentation 12c grid_upgrade
Presentation 12c grid_upgrade
 
Designing CloudStack Clouds
Designing CloudStack CloudsDesigning CloudStack Clouds
Designing CloudStack Clouds
 
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdfBRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
 
Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!
 
FPC for the Masses - CoRIIN 2018
FPC for the Masses - CoRIIN 2018FPC for the Masses - CoRIIN 2018
FPC for the Masses - CoRIIN 2018
 
2011-11-03 Intelligence Community Cloud Users Group
2011-11-03 Intelligence Community Cloud Users Group2011-11-03 Intelligence Community Cloud Users Group
2011-11-03 Intelligence Community Cloud Users Group
 

Mehr von David McGeough

Mehr von David McGeough (20)

Manage and Diagnose your Environment using Citrix Insight Services
Manage and Diagnose your Environment using Citrix Insight ServicesManage and Diagnose your Environment using Citrix Insight Services
Manage and Diagnose your Environment using Citrix Insight Services
 
PVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep DivePVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep Dive
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScaler
 
Best practices for implementing, administering, and troubleshooting XenDeskto...
Best practices for implementing, administering, and troubleshooting XenDeskto...Best practices for implementing, administering, and troubleshooting XenDeskto...
Best practices for implementing, administering, and troubleshooting XenDeskto...
 
Maintaining and Troubleshooting your XenDesktop 7.5 Environment
Maintaining and Troubleshooting your XenDesktop 7.5 EnvironmentMaintaining and Troubleshooting your XenDesktop 7.5 Environment
Maintaining and Troubleshooting your XenDesktop 7.5 Environment
 
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
 
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
 
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
 
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
 
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
 
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktopCitrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
 
Maintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentMaintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 Environment
 
Jump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 DeploymentJump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 Deployment
 
Jump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentJump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 Deployment
 
Designing your XenApp 7.5 Environment
Designing your XenApp 7.5 EnvironmentDesigning your XenApp 7.5 Environment
Designing your XenApp 7.5 Environment
 
10 Tips Every XenDesktop Admin Should Know
10 Tips Every XenDesktop Admin Should Know10 Tips Every XenDesktop Admin Should Know
10 Tips Every XenDesktop Admin Should Know
 
Troubleshooting Provisioning Services Target Boot Processes
Troubleshooting Provisioning Services Target Boot ProcessesTroubleshooting Provisioning Services Target Boot Processes
Troubleshooting Provisioning Services Target Boot Processes
 
Troubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDKTroubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDK
 
Configuring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop SitesConfiguring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop Sites
 
Troubleshooting XenApp with the Citrix Diagnostic Toolkit
Troubleshooting XenApp with the Citrix Diagnostic ToolkitTroubleshooting XenApp with the Citrix Diagnostic Toolkit
Troubleshooting XenApp with the Citrix Diagnostic Toolkit
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Citrix TechEdge 2014 - Advanced Tools and Techniques for Troubleshooting NetScaler Appliances

  • 1. SYN402: Advanced Tools and Techniques for Troubleshooting NetScaler Appliances Andrew Redman | Lead Escalation Engineer May 8, 2014
  • 2. © 2014 Citrix. Confidential.2 Tweet about this session with hashtag #SYN402 and #citrixsynergy
  • 3. © 2014 Citrix. Confidential.3 NetScaler System Overview Troubleshooting Tools & Techniques Case Studies Resources Conclusion Q&A Agenda
  • 5. © 2014 Citrix. Confidential.5 Key NetScaler Processes ns_master/NSPPE nsvpnd nsaaad nsconf nsauthd nslog.sh nssync nsreadfile nslcd nsfsyncd nsnetsvc nsconmsg nscollect Runs Citrix NetScaler OS SSL VPN File Transfer RBA and SSL VPN external authorization Writes the ns.conf file CLI authentication Controls logging for the newnslog HA synchronization Used to read SSL certificate files Runs the front panel LCD Synchronizes bookmarks and SSL certificates Used by the GUI for configuration changes Controls writing of the newnslog Statistics gathering for historical purposes Process Description
  • 6. © 2014 Citrix. Confidential.6 NetScaler File System /var (hard drive) Logs - /var/log & /var/nslog Install - /var/nsinstall Trace - /var/nstrace Core Dumps - /var/crash & /var/core /flash (flash drive) Config - /flash/nsconfig SSL Certificates - /flash/nsconfig/ssl
  • 7. © 2014 Citrix. Confidential.7 NetScaler File System (cont.) /flash (cont.) User Monitors - /flash/nsconfig/monitors Custom Options - /flash/nsconfig / (ram drive) OS - (operating system)
  • 9. > show techsupport Critical System Data In-Depth Performance Monitoring Stats Detailed Log Files USER Command Logging /var/tmp/support/collector_P_10.10.10.10_21Apr2014_21_42_tar.gz NetScaler Tech Support Bundle
  • 10. © 2014 Citrix. Confidential.10 The NetScaler Tech Support Bundle
  • 11. © 2014 Citrix. Confidential.11 Citrix Predictive Support
  • 12. © 2014 Citrix. Confidential.12 ‘Single Mission … Data Collection’ FAQ: http://support.citrix.com/article/CTX131233 Data Collection Analyze Data Tailored Recommendations
  • 13. © 2014 Citrix. Confidential.13 https://taas.citrix.com
  • 14. © 2014 Citrix. Confidential.14 Technical Issues Flagged
  • 15. © 2014 Citrix. Confidential.15 Investigate Issues Further The ‘BELL’
  • 16. © 2014 Citrix. Confidential.16 Crash File(s) Location nscollect-542.gz
  • 17. © 2014 Citrix. Confidential.17 Intuitive Navigation Select a different newnslog file to view
  • 18. © 2014 Citrix. Confidential.18 Detailed Graphs Mouse over graph to see more detail Informative reference legend Download the data as an excel sheet
  • 19. © 2014 Citrix. Confidential.19 IPMI – Intelligent Platform Management Interface Default LOM IP Address: http://192.168.1.3 Change NetScaler IP Address Obtain Health Monitoring Detail Harvest Serial Number Determine MAC Address
  • 20. © 2014 Citrix. Confidential.20 Common CLI Show Commands Common show commands for system information: show node, show info, show license Common show commands for vserver and service: show lb vserver, show cs vserver, show service, show persistencesession show connectiontable Other common show commands: show route, show ip
  • 21. © 2014 Citrix. Confidential.21 Common CLI Stat Commands Common stat commands for system information: stat ns, stat cpu, stat interface Common stat commands for vserver and service: stat lb vserver, stat cs vserver, stat service Other common stat commands: stat dns, stat ssl, stat http
  • 22. © 2014 Citrix. Confidential.22 Leveraging ‘nsconmsg’ Nsconmsg common use cases: View events View console messages View statistics Debug system counters Debug load balancing issues Debug CPU/Memory utilization Make absolutely sure that you use a capital -K and NOT a lower-case -k
  • 23. © 2014 Citrix. Confidential.23 Example ‘nsconmsg’ Usage # cd /var/nslog # nsconmsg -K newnslog -j fqdn-ssl-vip -s ConLb=1 -d oldconmsg current log file newnslog name of vserver fqdn-ssl-vip LB stats ConLb=1
  • 24. © 2014 Citrix. Confidential.24 Displaying debug performance information NetScaler V20 Performance Data NetScaler NS10.1: Build 123.11.nc, Date: Feb 24 2014, 17:30:43 current time is Sun Mar 23 18:33:43 2014 ------------------------------------------------------- NATSession : Free(6553)A(6553)InUse(0) NATSession: Cur(Tcp[0] Udp[0] Icmp[0] Other[0]) NATSession: Op/s(Tcp[0] Udp[0] Icmp[0] Other[0]) Session: A:0 F:0 IUse:0 SEs: SIP:0 C:0 SSL:0 Svr:0 UserId:0 SIPDIP:0 DIP:0 SO:0 SSF: Conn (Srvr 0 Clnt 0) U:0 CM: Conn (Srvr 0 Clnt 0) Sessions PCB 0 NATPCB 0 Z(SIP[0], C[0], SSL[0] Server[0] SIPDIP[0] DIP[0] SO[0]) Mon: Probes: 434562009, Failed: 15 VIP(10.54.169.75:443:UP:LEASTCONNS): Hits(7317, 0/sec) Mbps(0.00) Pers(OFF) Err(0) SO(0) LConn_BestIdx: 0 S(10.54.148.201:80:UP) Hits(7317, 0/sec, P[0, 0/sec]) ATr(0:0) Mbps(0.00) BWlmt(0 kbits) RspTime(0.00 ms) Load(0) LConn_Idx: (C:0; V:0,I:1) ------------------------------------------------------- CPU:0.2% MEM:182472560 UP:10.00:00:38 since:Thu Mar 13 18:33:05 2014 current time is Sun Mar 23 18:33:43 2014 Mon: Probes: 434562009, Failed: 15 VIP(10.54.169.75:443:UP:LEASTCONNS): Hits(7317, 0/sec) Mbps(0.00) Pers(OFF)S(10.54.148.201:80:UP) Hits(7317, 0/sec, P[0, 0/sec]) ATr(0:0) Mbps(0.00) BWlmt(0 kbits) RspTime(0.00 ms) CPU:0.2% MEM:182472560 UP:10.00:00:38 since:Thu Mar 13 18:33:05 2014
  • 25. © 2014 Citrix. Confidential.25 # nsconmsg -K newnslog -j <name of VIP> -s ConLb=1(2 or 3) -d oldconmsg | more # nsconmsg -K newnslog -s ConMon=1 -d oldconmsg # nsconmsg -K newnslog -s ConMEM=1 -d oldconmsg # nsconmsg -K newnslog -s ConSSL=1 -d oldconmsg ConDebug - Debugging ConLb - Load Balancing ConMon - Monitoring Probes ConMEM - Memory Management ConCSW - Content Switching ConSSL - SSL Offload ConCMP - Compression ConIC - Integrated Caching
  • 26. © 2014 Citrix. Confidential.26 Log File Analysis # cd /var/log ns.log:Mar 20 16:45:06 <local0.info> 10.54.169.73 03/20/2014:20:45:06 GMT atlvpx 0-PPE-0 : UI CMD_EXECUTED 2947 0 : User nsroot - Remote_ip 10.13.73.65 - Command "login nsroot "********"" - Status "Success" ns.log:Mar 20 16:45:06 <local0.info> 10.54.169.73 03/20/2014:20:45:06 GMT atlvpx 0-PPE-0 : UI CMD_EXECUTED 2948 0 : User nsroot - Remote_ip 10.13.73.65 - Command "show ns license" - Status "Success" # zgrep -i cmd_executed ns.log* | more (the -i means ignore CASE) interface down vServer down panic signaled
  • 27. © 2014 Citrix. Confidential.27 NetScaler + Wireshark = ‘thumbs up’ http://www.wireshark.org
  • 28. © 2014 Citrix. Confidential.28 RED HOT Wireshark Tip Custom Columns Custom Menu Options Pre-build Custom Filters Much Faster Analysis Get the red hot details on how to empower your default Wireshark configuration in the Reference Section at the end of this presentation.
  • 30. © 2014 Citrix. Confidential.30 Top Tips Use Citrix Predictive Support Pay attention to the issues! Note the highlighted counter(s) Use nsconmsg to see even more detail Correlate time-frames in other log files Achieve root cause analysis faster!
  • 31. Case #1 - High Availability Synchronization
  • 32. © 2014 Citrix. Confidential.32 Primary NetScaler Secondary NetScaler Same type of appliance Same firmware version Same nsroot password Same RPC Node password Open requisite TCP ports HA Pre-requisites
  • 33. © 2014 Citrix. Confidential.33 Predictive Support Flags The Issues
  • 34. © 2014 Citrix. Confidential.34 The HA Pair Struggled To Synchronize # nsconmsg -K newnslog -d statswt0 | grep nic_tot_bdg_mac_moved (nic_err_bdg_muted) 57520 0 71837018 nic_tot_bdg_mac_moved interface(0/1) 57521 0 71837018 nic_tot_bdg_mac_moved interface(0/2) 9861 0 65 nic_err_bdg_muted interface(0/1) 9862 0 65 nic_err_bdg_muted interface(0/2) 71,837,018 MAC Moves 65 Interface Mutes
  • 35. © 2014 Citrix. Confidential.35 The ‘newnslog’ Time-Frame # nsconmsg -K newnslog -d setime Displaying start and end time information NetScaler V20 Performance Data NetScaler NS9.3: Build 54.4.nc, Date: Dec 20 2011, 22:44:41 start time Fri Feb 28 21:49:58 2014 end time Fri Feb 28 21:53:28 2014 total duration 00.00:03:30 data size 1,718,949 bytes total duration 00.00:03:30
  • 36. Case #2 - XA/XD Slow Performance
  • 37. © 2014 Citrix. Confidential.37 XenAppTablets Smartphones XenDesktop Predictive Support Critical Insight Gleaned Preventative Approach Don’t Underestimate XA/XD Slow Performance
  • 38. © 2014 Citrix. Confidential.38 Predictive Support Flags The Issues http://support.citrix.com/article/CTX136926
  • 39. © 2014 Citrix. Confidential.39 Performance Was Extremely Latent # nsconmsg -K newnslog -d statswt0 | grep nic_tot_bdg_mac_moved 4263 0 23 nic_tot_bdg_mac_moved interface(0/1) 4264 0 51 nic_tot_bdg_mac_moved interface(1/1) 4265 0 28 nic_tot_bdg_mac_moved interface(1/2) 23, 51 & 28 MAC Moves
  • 40. © 2014 Citrix. Confidential.40 Networking Issues Again? # nsconmsg -K newnslog -d statswt0 | grep nic_err 4274 0 1995 nic_err_rl_pkt_drops interface(1/1) 4275 0 40736 nic_err_rl_pkt_drops interface(1/2) 4276 0 1995 nic_err_rl_rate_pkt_drops interface(1/1) 4277 0 40736 nic_err_rl_rate_pkt_drops interface(1/2) 4678 0 42731 allnic_err_rl_rate_pkt_drops System Limits Exceeded Rate-limited Packets!
  • 41. © 2014 Citrix. Confidential.41 The Moral of the Story Leverage Citrix Predictive Support Leverage Pred. Support Pay Attention Gain Quick Insight Dig Into ‘nsconmsg’ On Target for Success!
  • 43. © 2014 Citrix. Confidential.43 Helpful Resources Comprehensive NetScaler Counters Wireshark Developer Editions Customizing Wireshark Tutorial Citrix Predictive Support Forum NSTRACE Options How To Manage VLAN’s, Interfaces and Subnets
  • 45. © 2014 Citrix. Confidential.45 What We’ve Actually Covered An Overview of the NetScaler System to give you a high-level understanding of the core system. I shared with you some excellent Troubleshooting Tools that are available at your disposal. I also discussed a few key Troubleshooting Techniques that you can use to diagnose issues. I then highlighted two different Case Studies leveraging the tools & techniques that I shared with you in the presentation. In addition I provided you with a few Resources for your future reference and edification.
  • 46. Q & A
  • 47. © 2014 Citrix. Confidential.47 Before you leave… Conference surveys are available online at www.citrixsynergy.com starting Thursday, May 8 at 9:00 a.m. Provide your valued feedback by 6:00 p.m. today to be entered to win one of many prizes! Download presentations starting Monday, May 19 from the My Event Planning tool
  • 48. © 2014 Citrix. Confidential.48 WORK BETTER. LIVE BETTER.

Hinweis der Redaktion

  1. Let’s invest a minute chatting about the NetScaler File System. With advanced NetScaler troubleshooting you’ll frequently find yourself in the BSD SHELL of the system (I’ll discuss the SHELL in more detail later in the presentation), so knowing the actual structure of the file system will greatly assist you in your troubleshooting efforts. /var contains historical data in the form of logs and is one of the first places to look when trying to troubleshoot a NetScaler issue. /var/log is the “traditional” location for logs in a UNIX-based operating systems. /var/nslog contains NetScaler-specific logs --- <click> /var/nstrace will house all of the trace files taken on the NetScaler --- <click> /var/crash & /var/core will contain any crash files or core dumps on the system --- <click> /flash contains the actual NetScaler configuration file and any customizations that have been done --- <click> /flash/nsconfig/ssl will store all of the SSL certificates installed on the system <click>
  2. /flash (cont.) Flash also includes User Monitors and additional custom options as well --- <click> / (or the ram drive) contains the operating system So what happens if the various components fail? Well, the appliance will be able to operate without /var, but will not be able to log any statistics or other relevant data. The appliance cannot boot without /flash The appliance also cannot boot without / the RAM drive <click>
  3. Now that we have a high-level overview of the key process and file system structure, let’s invest some time reviewing Troubleshooting Tools & Techniques <click>
  4. The NetScaler tech support bundle, sometimes referred to as the collector file, is one of your very best resources in analyzing the health of your NetScaler appliance. <click> The tech support bundle captures critical system data about the performance of the appliance, error logs and a host of other extremely important data that can be used for analysis. <click> To create a new tech support bundle that can be analyzed for potential issues on the appliance, simply log into the NetScaler via your favorite SSH client and enter the command: > show techsupport The tech support file will be generated and stored on the hard drive of the NetScaler in the /var/tmp/support directory and the file name will start with collector_P or S You can log into the NetScaler via WinSCP and navigate to the /var/tmp/support directory to transfer the collector file to your local computer. IMPORTANT NOTE: If this appliance is part of an HA pair, make sure that you log into the SECONDARY appliance and collect a tech support bundle on it as well. Citrix Technical Support will use both support bundles to correlate issues between the HA pair. <click>
  5. Another equally good method for harvesting the support bundle is via the NetScaler GUI. Log into the NetScaler GUI via your favorite web browser, navigate to the System Node, then select Diagnostics, and then select Generate support file under the Technical Support Tools section. Click Run to start the process, which is really just a set of scripts to harvest key data. Once the process has completed, click Download… and you’ll be presented with a simple dialogue to choose a suitable download location on your local computer for the newly generated support bundle. I’ll talk more about how you will use the tech support bundle shortly. <click>
  6. Let’s talk for a minute about Citrix Predictive Support. Predictive Support (formerly known as TaaS) is an initiative from Citrix focused on making the support of your Citrix environment as easy as possible. Citrix has developed tools and online analysis capabilities to help you collect environment information, analyze that information and receive tailored recommendations based on your Citrix environment and configuration. <click>
  7. The tools are focused on a single mission (data collection), and their impact to your environment is minimal in terms of disk space, prerequisites and performance impact during the data collection process. Predictive Support is going to analyze the data captured in the support bundle and provide you with Tailored Recommendations, specific to your environment. Let’s take a look at how you should use Predictive Support. <click>
  8. Login to Predictive Support with your ** CITRIX ** username and password, upload your NetScaler tech support bundle with the ‘Upload Data’ option, then select the ‘Upload File’ option when prompted. You’ll be presented with a simple dialogue option to browse your local computer where you saved the support bundle for upload. Depending on the size of your support bundle and the relevant speed of your internet connection, it may take a few minutes to accomplish this task. The size of your support bundle will be directly affected by the size of your configuration file, the rate of traffic flowing through the appliance, error logs and potential crash files that may have been captured. <click>
  9. When you log into Predictive Support, you’ll see each of the files which have been uploaded. This will include your support bundle at a minimum, but may include trace files or other related log files that you have uploaded as well for analysis. You can see in the example provided that there are (10) different issues which have been flagged from the uploaded support bundle. You can also see that this support bundle is from the PRIMARY NetScaler in an HA (High Availability) pair, as the collector references a capital ‘P’ to identify the file as primary. You’ll see a capital ‘S’ if the file is from the secondary. Click on the line with the (10) issues and you’ll be presented with another dialogue screen which itemizes each of the respective issues for your review. <click>
  10. Once the tech support bundle has been uploaded, Predictive Support will execute a series of scripts against the bundle and will flag important issues that have been identified. Each issue will have a brief problem summary for review. Items marked with the RED BELL icon are the most important issues to address first. In this particular example we can see that the NetScaler crashed and produced a ‘crash file’ –referred to also as a ‘core dump’. Crash files are exceptionally helpful to Citrix, as in most cases the RCA (root cause analysis) for the actual crash can be identified by running what’s called a ‘back trace’ on the crash file to identify the reason for the crash. Understanding why the NetScaler crashed from the back trace will provide key information to assist in stabilizing your environment and for charting a course to resolve the issue entirely. Selecting the Crash file found on NetScaler link will take you to another dialogue with additional detail about the location of the crash files on the NetScaler. <click>
  11. Crash files will be stored on the hard drive of the NetScaler appliance. You can log into the NetScaler with a tool such as WinSCP (http://winscp.net) and navigate to the /var/core directory to find the crash files. You may need to navigate even further into the directory structure depending on how many times the NetScaler may have crashed. You can see in the example above that there are (5) directories created under the root /var/core directory, which would represent different days or times for the relevant crash files. You’ll note from a previous slide that I mentioned there are two locations for crash files, /var/core and /var/crash respectively. Make sure that you inspect both locations for potential crash files. Tech Support will request these crash files for further analysis. Additionally, the NetScaler tech support bundle may or may not include the crash files depending on file size, so it is important to inspect these directories for files. <click>
  12. When you log into Predictive Support you’ll be presented with a NetScaler Overview. You’ll see the issues which have been flagged for your attention as previously referenced, but you can also navigate to the NetScaler Environment option (among the other options of course) to investigate key sub-systems of the appliance, such as CPU, Memory, System traffic rate, etc. Select the area that you want to investigate to drill down further. <click> You can also select a different newnslog file to analyze the data for a different time-frame if so desired. <click>
  13. Navigating into each sub-system will provide you with an excellent selection of very intuitive and informative graphs to help pinpoint specific issues during certain time-frames. Simple place your <cursor> over the interactive graph for even more specific data. Additionally you can download the data detail as an Excel spreadsheet for further analysis, correlation or data manipulation with other data points. Leveraging the information provided to you by Predictive Support will not only empower you to effectively troubleshoot your NetScaler appliance, but it will provide you with critical data points and helpful graphs to incorporate into a Post Mortem presentation for internal management as required. Please feel free, and I’m going to highly encourage you to leverage Predictive Support on a regular basis for a system health check. All you need to do is upload a fresh support bundle to gain instant insight into the health of your NetScaler appliance. Later in the presentation I’ll show you how I use Predictive Support in two case studies that I will be sharing with you. <click
  14. Let’s invest a brief minute discussing IPMI. Many of the NetScaler appliances have been equipped with an IPMI (or Intelligent Platform Mgmt. Interface), perhaps more commonly referred to as the LOM (or Lights Out Management) in the industry. The MPX 8005/8015/8200/8400/8600/8800, MPX 11500/13500/14500/16500/18500/20500, MPX 11515/11520/11530/11540/11542, MPX 17550/19550/20550/21550, and MPX 22040/22060/22080/22100/22120 appliances have the LOM port on the front panel of the appliance. By using the LOM, you can remotely monitor and manage the appliance, completely independent of the NetScaler software. So what are the things that you can do with the LOM? You can remotely change the NetScaler IP address, perform different power operations, and obtain information from the appliance, such as health monitoring information, the MAC address, serial number, and properties of the host, by connecting to the appliance through the LOM port. <click> Simply connect a computer with a standard copper cable to the LOM port. In a web browser, type the IP address of the LOM port to access the intuitive GUI, which by default is http://192.168.1.3. You’ll need to ensure that the computer from which you’re access the LOM port has been configured for the same subnet. Once logged into the GUI you can modify the default IP address and associated username and password for critical access control.
  15. Show commands in the NetScaler CLI primarily provide configuration and status information about the system or specified entity: Show commands for SYSTEM information sh node – is an essential command to leverage when troubleshooting HA-related issues sh info - consolidates sh version, sh feature, sh mode in one output sh license <click> Show commands for a Vserver and Service sh lb vserver/sh cs vserver, generic command vs specific referencing an entity sh service, just like sh lb vserver, generic vs specific output sh persistencesession, helpful for tracking a persistent session without a trace sh connectiontable, large output but also useful for connection tracking <click> Other helpful show commands sh route & sh ip, sh <click>
  16. The primary function of the “stat” command is to provide statistical information about a particular entity. Similar to the “show” commands, and as a general rule, there are generic and specific output based on whether or not an entity name is specified Common system stats Stat ns – system overview. Shows SSL card, disk, TCP, HTTP, SSL, IC, CMP, AppFW statistics Stat cpu – cpu utilization Stat interface – interface generic and specific information. Most useful output is achieved by specifying interface number specifically. <click> Common entity statistics Stat lb vserver – provides generic req/s data on bound services. Specific output gives us greater detail on how many connections are coming in and how the server is performing Stat cs vserver – similar to stat lb vserver output Stat service – provides generic req/s data on all services. Specific output gives us extended data regarding connections and server performance. <click> Other common statistics commands Stat dns – dns request/response/type statistics Stat ssl – ssl session statistics Stat http – http statistics <click>
  17. As you’ve seen there are quite a few different show and stat commands accessed from the NSCLI which can provide you with very quick and insightful data about your NetScaler appliance. There will be times where you would like to know more in-depth information about how your NetScaler appliance is performing. In addition you may need to investigate why a particular problem occurred. This is where you’ll use nsconmsg and not the NSCLI. nsconmsg logs all of the statistics in the NetScaler every (7) seconds. This will include performance statistics, error messages, console messages, etc. It logs almost every process that the NetScaler performs. There are numerous different counters that you can harvest critical data from, and nsconmsg is one of the primary tools used by the Citrix support teams for performing analysis or RCA. As highlighted in the slide, when using the nsconmsg command, make absolutely sure that you use a capital (K) and not a lower-case (k) or you’ll wipe out the log file <click>
  18. Let’s take a look at an example nsconmsg command. When you log into the NetScaler appliance via an SSH client, you’ll need to drop to the BSD SHELL with the command > shell You’ll see the prompt change to the # (pound sign). Change to the /var/nslog directory with the # cd /var/nslog command and then execute the referenced nsconmsg command string shown. newnslog is the current log file, fqdn-ssl-vip is the name of the vserver, and ConLb=1 will present the load balancing stats Again, use a capital (K) with the command. <click>
  19. So in this example from the previous newnslog command I am analyzing the latest LB statistics of a particular vServer stored in the current log file, the newnslog. <click for each number> From this output we can see a few key data points: The actual recorded time of the (7) second log record The total # of monitor probes sent to the back-end service and the # of probes which have failed You can see the VIP detail and associated Hits/sec, Mbps and Persistency method used You can also see the Service associated with the VIP and specific details about that Service Additionally you can reference the CPU and MEM utilization, coupled with the UP TIME of that VIP, referenced of course during the (7) second log record interval <click>
  20. Here are some additional examples of leveraging nsconmsg to perform in-depth analysis of major functions within the NetScaler system. You may want to append the | more option at the end of your command to truncate the output of the statistics onto a single page for ease of readability. Also as a point of reference, some of the functions won’t have all 1, 2 or 3 options. The detail of the command output will increase with the 2 or 3 options. So with load balancing stats, you’ll see significantly more information when appending the 3 to ConLb. <click>
  21. So far in this presentation I’ve discussed using the stat, show and nsconmsg commands for system analysis. As referenced, the nsconmsg binary log file has considerable detail captured, but you may want to correlate different log files during the same time frame to see what may have caused a particular event to occur. <click> For example, you may want to see why an INTERFACE flapped, or perhaps see why all of your CSW Vservers went DOWN at the same time. Each of the respective log files has a time stamp associated with each event record. If you notice that all CSW Vservers go DOWN at the same time in the newnslog, perhaps an engineer within your company logged into the NetScaler appliance and issued a particular command that caused the condition to occur. The ns.log log file located in the /var/log directory captures all of the USER NSCLI or SHELL commands. <click> You can use the following command in the /var/log directory to search through ALL of the ns.log log files to see if a particular command was issued at the time at which all of the CSW Vserver went DOWN: # zgrep -i CMD_EXECUTED ns.log* | more The ns.log and messages log files are some of the most frequent log files that I reference for certain time-frames when attempting to correlate events in the system. There are numerous other log files that have excellent data recorded that you can leverage for analysis purposes, so don’t be bashful, dig around the system to familiarize yourself with each respective file. You can simply use the command CAT or MORE against a standard log file to examine the contents for your edification. The more familiar you are with the various log files, the more confident and efficient you will be at determining the RCA (root cause analysis). <click>
  22. Leverage Wireshark to perform detailed traffic analysis. There’s an old saying, “Packets never lie”. NetScaler log file analysis is a fantastic resource, but when you really need to get into the packets to see the details of what may be occurring, you’ll want to use the Wireshark tool in conjunction with a NetScaler trace file to improve your opportunity of determining RCA. Take a NetScaler trace to capture the bits and bites, and then dig into the details with Wireshark. As a note, I frequently browse the Wireshark web page to download the latest developer editions to keep my revision as up-to-date as I can: http://www.wireshark.org <click>
  23. They key message that I want to share here is … invest the time to enhance your default Wireshark configuration. There are many excellent additions that can be configured into your edition of Wireshark within 10 or 15 minutes to greatly speed up your analysis towards determining root cause for an issue experienced. You can create custom menu options, such as HTTP errors, bad TCP packets, etc. A push of a menu button can instantly apply a comprehensive filter combination that you don’t have to memorize! <click> You can add custom columns to your Wireshark view that will assist you in your analysis. You can see from my example that I have created a few key columns that I use all the time. You just have to use your creativity to enhance your Wireshark edition. <click>
  24. Now we’re going to focus on some key troubleshooting techniques and look at a few case studies. <click>
  25. When I examined the NIC counters I could see that interfaces 1/1 and 1/2 were dropping packets due to rate limiting occurring. This was because the NetScaler appliance was exceeding its system limits per the purchased license. Basically there were more packets hitting the NetScaler than licensed for. When the NetScaler drops packets because of a rate limit, it’s a hard policing at the NIC. This will cause significant issues for TCP, with a high rate of retransmissions, further exasperating the problem with superfluous traffic. The end result was that when USERS were attempting to access their XA or XD sessions, sometimes it would take several tries before the application or desktop would launch; and then when launched, there was quite a bit of slowness while using the resource. The resolution was two-fold: 1) The customer correctly VLAN’d their different IP subnets, binding the subnets to the VLAN’s and associated interfaces to correctly segment their traffic. 2) The customer purchased an upgraded NetScaler license to facilitate the growth in their traffic base. <click>
  26. The moral of the story is to leverage Citrix Predictive Support often with a tech support bundle. Pay attention to the issues which have been flagged for your attention. Use the NetScalers NSCLI to gain quick insight into live performance. Dig into the counters with nsconmsg and review the associated log files in the BSD SHELL to give you critical insight into the relative health and performance of the NetScaler appliance. Follow this systematic, but really straight-forward process and you’ll be well on your way to determining the RCA for issues experienced much more efficiently. When all else fails, contact Citrix Technical Support and we’ll be more than happy to engage, partnering with you towards problem resolution. <click>
  27. We all like extra goodies, so I’ve put together a few Resources that I believe will help bolster your NetScaler toolkit! <click>
  28. Here are some excellent resources for your reference and review at a later time: Comprehensive NetScaler Counters Wireshark Developer Editions Customizing Wireshark Tutorial Citrix Predictive Support Forum NSTRACE Options How To Manage VLAN’s, Interfaces and Subnets <click>
  29. Conclusion: So let’s see what we’ve actually covered. <click>
  30. During this presentation I have provided you with: <click> An Overview of the NetScaler System to give you a high-level understanding of the core system --- <click> I shared with you some excellent Troubleshooting Tools that are available at your disposal --- <click> I also discussed a few key Troubleshooting Techniques that you can use to diagnose issues with your NetScaler appliance --- <click> I then highlighted two different Case Studies leveraging the tools and techniques that I shared with you in the presentation --- <click> In addition I have provided you with a few Resources for your future reference and edification --- DO NOT CLICK Again I want to thank you for your kind attention during this presentation. <click>
  31. Q & A This is your opportunity to ask a few questions. As a brief note, if during this Q & A session we don’t have enough time to address your particular question, please do find me while I’m here at TechEdge and I’ll be quite happy to chat with you for any follow-up questions that you may have. ASK: Are there any questions? Wait for the questions to be asked and answered and then… <click>
  32. Real quick before you leave… Conference surveys are available online at www.citrixsynergy.com. Please do provide your valued feedback by 6:00 p.m. tonight to be entered to win one of many prizes. In addition, you’ll be able to download each of the respective presentations starting Monday, May 19th from the My Event Planning Tool <click>
  33. Thank you!