SlideShare ist ein Scribd-Unternehmen logo
1 von 90
Andrew Sandford
Senior Readiness Specialist, Worldwide Support Readiness EMEA
Citrix Support Secrets Webinar
Series
In-depth Troubleshooting on NetScaler using Command
Line Tools
27 March 2014
© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
netscaler.descr: NetScaler Virtual Appliance 3G
netscaler.num_pe_running: 1
netscaler.version: NetScaler NS10.1: Build
124.13.nc, Date: Feb 20 2014, 18:53:27
netscaler.model: 3000
netscaler.vmpe_max_cpus: 2
netscaler.nCore: 1
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
50185 root 1 44 -52 814M 815M CPU1 1 20.2H 100.00% NSPPE-00
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
LB_RGB (192.168.47.3:80) - HTTP Type: ADDRESS
State: UP
Client Idle Timeout: 180 sec
Down state flush: ENABLED
Disable Primary Vserver On Down : DISABLED
Appflow logging: ENABLED
Port Rewrite : DISABLED
No. of Bound Services : 1 (Total) 1 (Active)
Configured Method: ROUNDROBIN
Mode: IP
Persistence: NONE
Vserver IP and Port insertion: OFFWarning: Feature(s) not enabled [LB]
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
1) svc_blue (192.168.196.62: 80) - HTTP State: UP Weight: 1
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
1) Monitor Name: mon-http-ecv
State: UP Weight: 1 Passive: 0
Probes: 14887 Failed [Total: 124 Current: 0]
Last response: Success - Pattern found in response.
Response Time: 10.220 millisec
State: UP
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute
Show commands
System show node
show info
show license
Vserver/Service show lb vserver
show cs vserver
show service
show persistencesession
show connectiontable
IP related show route
show ip
show dns addrec -type proxy
Diagnostic show techsupport
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
2) Node ID: 1
IP: 192.168.1.45
Node State: STAYSECONDARY
Master State: Secondary
Fail-Safe Mode: OFF
INC State: DISABLED
Sync State: ENABLED
Propagation: ENABLED
Enabled Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1
Disabled Interfaces : None
HA MON ON Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1
Interfaces on which heartbeats are not seen : 1/8 1/6 1/5 1/4
1/3 1/2 1/1
Interfaces causing Partial Failure: 1/8 1/6 1/5 1/4 1/3 1/2
1/1
SSL Card Status: UP
Local node information:
Critical Interfaces: 1/8 1/6 1/5 1/4 1/3 1/2 1/1
>
Node State: NOT UP
Master State: Secondary
Master Enabled Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1
Disabled Interfaces : None
HA MON ON Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1
Interfaces on which heartbeats are not seen : 1/8 1/6 1/5 1/4 1/3
1/2 1/1
Interfaces causing Partial Failure: 1/8 1/6 1/5 1/4 1/3 1/2 1/1
Node State: STAYSECONDARY
Master State: Secondary
© 2014 Citrix | Confidential – Do Not Distribute
NetScaler Processes
Process Description Process Description
nsppe NetScaler Packet Engine nsfsyncd
Sync bookmarks and SSL
certificates
nsaaad
RBA and SSL VPN External
Auth nsnetsvc
Used by the GUI for config
changes
nsconf Writes the ns.conf file nsumond Runs the scriptable monitors
nslog.sh Controls Logging for newnslog nsconmsg Controls writing of newnslog
nssync HA sync nscollect
Statistics gathering for
historical reporting
nsreadfile Used to read SSL Cert Files
imi/ripd/
ospfd/bgpd
Routing processes
nscrlrefresh SSL CRL list update
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
System
Entities
Protocols
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
> stat interface 1/1
Interface [1/1]:
Interface StateUP
Link uptime 00:40:21
Link downtime00:00:00
Throughput Statistics
Rate (/s) Total
Bytes received42393 54497294
Bytes transmitted 2584 20222135
Packets received 629 710246
Packets transmitted 47 69066
Packet Statistics
Rate (/s) Total
Multicast packets 18 41219
NetScaler packets 85 98954
LACP Statistics
Rate (/s) Total
LACPDUs received 0 0
LACPDUs transmitted 0 0
Error Statistics
Rate (/s) Total
Error packets received (hw) 0 0
Error packets transmitted (hw) 0 0
Inbound packets discarded (hw) 0 0
Outbound packets discarded (hw)0 0
Packets dropped in Rx (sw) 539 599904
Packets dropped in Tx (sw) 0 0
NIC hangs -- 0
Status stalls -- 0
Transmit stalls -- 0
Receive stalls -- 0
Error-disables -- 0
Duplex mismatches -- 0
Link re-initializations -- 0
MAC moves registered 0 0
Times NIC became muted -- 0
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
Non-authoritative entries 0
Authoritative entries 98
Error Statistics
Nonexistent domain 102359
Response class unsupported 0
Invalid query format 0
Stray answers 0
Incorrect RD length 0
Requests refused 0
Response type unsupported 0
Query class unsupported 0
Invalid response format 0
No answer responses 102334
Multi queries disabled 0
Other errors 0
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
Vserver hits 0 0
Requests 0 0
Responses 0 0
Request bytes 0 65
Response bytes 0 188
Total Packets rcvd 0 5
Total Packets sent 0 4
Current client connections -- 0
Current Client Est connections -- 0
Current server connections -- 0
Requests in surge queue -- 0
Requests in vserver's surgeQ -- 0
Requests in service's surgeQs -- 0
Spill Over Threshold -- 0
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
NetScaler File System
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
View events
View console messages
View statistics
Debug system counters
Debug load balancing issues
Debug CPU/Memory utilization
Use
cases
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
nsconmsg Common Syntax
Make sure to use –K, NOT -k
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
Live CPU related stats
Archived events
HA Failover cause
LB stats
CS related counters
Real-time policy hits
SSL related counters
Compression related counters
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
1906 3910 PPE-0 'interface(1/1)' has been disabled Wed Aug 14 12:27:16 2013
1907 0 PPE-0 'interface(1/1)' DOWN Wed Aug 14 12:27:16 2013
1912 0 PPE-0 'server_svc_cfg_NSSVC_DNS_192.168.204.50:53(SVC_CTXANG_DNS1)'
DOWN Wed Aug 14 12:27:25 2013
1913 0 PPE-0 'server_svc_cfg_NSSVC_DNS_192.168.204.51:53(SVC_CTXANG_DNS2)'
DOWN Wed Aug 14 12:27:25 2013
1910 0 PPE-0 MonServiceBinding_192.168.204.51:53_(ping-
default)(SVC_CTXANG_DNS2): DOWN; Last response: Failure - Probe timed out. Wed Aug
14 12:27:25 2013
1911 0 PPE-0 MonServiceBinding_192.168.204.50:53_(ping-
default)(SVC_CTXANG_DNS1): DOWN; Last response: Failure - Probe timed out. Wed Aug
14 12:27:25 2013
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
VIP(127.0.0.2:53:DOWN:WEIGHTEDRR): Hits(0, 0/sec)
Mbps(0.00) Pers(OFF) Err(0) SO(0) LConn_BestIdx: 1024
Pkt(0/sec, 0 bytes) actSvc(0) DefPol(NONE)
override(0) newlyUP(0)
Conn: Clt(0, 0/sec, OE[0]) Svr(0) SQ(Total: 0
OnVserver: 0 OnServices: 0)
slimit_SO: (Sothreshhold: 0 [Ex: 0] Consumed: [Ex:
0 Borrowed: 0 TotActiveConn: 0] Available: 0-
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
ipConflictAddr = 192.168.47.1
last
message repeated 169 times
© 2014 Citrix | Confidential – Do Not Distribute
Troubleshooting Techniques
Common NetScaler issues/resolutions
HDD Issues Logging fails
/var missing
Flash Issues Config fails to save
Config saves partially
Sync fails
Device fails to boot
Memory starvation Dropped sessions
CPU starvation All services failing
All VIPS down
Degraded performance
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute
nstrace & nstcpdump
nstrace
Common syntax:
Nstrace.sh –sz 0
Nstrace.sh –sz 0 –filter “SOURCEIP =
10.198.4.10” –link enabled
Filter qualifiers and operators:
SOURCEIP, SOURCEPORT, DESTIP,
DESTPORT, SVCNAME, VSVRNAME, STATE
==, eq, !=, neq, >, gt, <, lt, >=, ge, <=, le,
BETWEEN
Compound filters using || and &&
nstcpdump
Common syntax:
Nstcpdump.sh –X tcp port 80
Nstcpdump.sh –w testcapture.cap –X src
host 10.198.4.10 tcp port 80
Filter qualifiers and operators:
tcpdump standard
© 2014 Citrix | Confidential – Do Not Distribute
Packet Tracing
Differences between nstrace.sh & nstcpdump.sh
Nstcpdump.sh Nstrace.sh
Useful if traces are to be viewed on standard output
nstcpdump.sh –w <filename> option helps
writing output to file
Useful for offline collection
nstrace.sh –sz 0
Saves traces in /var/nstrace in cap format
can be used with expressions so that you get to see
filtered traffic
nstcpdump.sh host <IP>
nstcpdump.sh port 21
useful for collection of traces in separate log files based
on NICs
nstrace.sh –tcpdump1 –nic 1
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
-h - prints this message - exclusive option
-nf - number of files to be generated in cycle (def. 24)
-time - seconds per file (def. 3600) (could be an expression)
-sz - size of the captured data (bytes from 60 to 1514)
-tcpdump - 0=nstrace-format (default) or 1=tcpdump-format
-nic - use separate trace files for each interface (only works if -tcpdump
option is set)
-name - name of the trace file
-filter - Filter expression for nstrace. The maximum length of filter
expression is 255 and it can of following format: <expression> [<relop>
<expression>]
-link - Log filtered connection's peer's (linked connection's) traffic. Works
only with -filter option
© 2014 Citrix | Confidential – Do Not Distribute
Packet Tracing
nstrace.sh nstcpdump.sh
Proprietary capture format TCPdump PCAP capture format
Native format captures more information Useful for live capture from CLI
Files are stored in /var/nstrace Option to write to a file
Needs custom dissector in Wireshark (1.6+) Most TCPdump options supported
Works in standard Wireshark
© 2014 Citrix | Confidential – Do Not Distribute
Trace analysis
nstrace.sh
By Default if nstrace.sh is executed from shell prompt
Trace files are stored in NetScaler proprietary (.cap) format
The trace capture runs for 1 hr. (3600 sec) if not interrupted
Files are cyclically numbered from 1-24. Trace mode is 6 (that is the TXB and RX packets
are captured)
The size of the captured data for each packet is 164
© 2014 Citrix | Confidential – Do Not Distribute
Trace Analysis
nstrace syntax examples
Command Purpose
# nstrace.sh Stores the traces in default (proprietary) format
# nstrace.sh -tcpdump 1 Begins to save the traces in the TCPDUMP format for a default 3600 seconds
# nstrace.sh -tcpdump 1 -nic 1 Logs the traces (in TCPDUMP format) into separate log files based on the NIC IDs
# nstrace.sh –nf <value> No of files to be generated in cycle by default is 24
# nstrace.sh –time <value> Seconds per file by default 3600 seconds
# nstrace.sh -sz 0 Size of the captured data( by default it is 164), -sz 0 is the entire packet length
# nstrace.sh –m Capturing mode: sum of the values (def. 6):
1-Transmitted packets (TX)
2 - Packets buffered for transmission (TXB)
4 - Received packets (RX)
# nstrace.sh -stop Can be used to disable tracing (when 'nstrace.sh' is run in the background
© 2014 Citrix | Confidential – Do Not Distribute
Trace Analysis
nstcpdump.sh example syntax
Command Purpose
# nstcpdump.sh <type> Possible types are host, net and port .If there is no type qualifier host
assumed
# nstcpdump.sh <dir> Qualifiers specify a particular transfer direction to and/or
from id. Possible directions are src, dst, src or dst and
src and dst. If there is no dir qualifier, src or dst is
assumed. src foo', `dst net 128.3', `src or dst port ftp-
data'
# nstcpdump.sh <proto> ether, fddi, ip, arp, rarp, decnet, tcp and udp.
# nstcpdump.sh –c <value> Exit after receiving ‘value’ number of packets
# nstcpdump.sh –F –I –r Not supported and not to give them as options to the script
# nstcpdump.sh –w <file
name>
Write the raw packets to file rather than parsing and printing them out.
Read by typing tcpdump –r test
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
CTX109304 Data Collection Procedure to Troubleshoot NetScaler Related Issues
http://www.slideshare.net/davidmcg/common-pitfalls-when-setting-up-a-net-scaler-for-
the-first-time
http://support.citrix.com/search/basic?searchQuery=counters&refinement=Content+Ty
pe,Technotes&refinement=Product+Family,NetScaler
CTX114999 How to Troubleshoot Authentication with Aaad.debug
https://taas.citrix.com/
© 2014 Citrix | Confidential – Do Not Distribute
Maximize your knowledge.
Continue your journey with Citrix Education.
Recommended next step for hands-on technical training:
CNS-205 Citrix NetScaler 10 Essentials and Networking
Identify the capabilities and functionality of the NetScaler
Explain basic NetScaler network architecture
Obtain, install, and manage NetScaler licenses
Explain how SSL is used to secure the NetScaler
Implement NetScaler TriScale Technology, including Clustering
Visit bit.ly/NSCOURSE to save 10% now through April 30.*
*Not valid with any other promotions, packages or discounts. Applies only to new purchases. Regional limitations may apply.
© 2014 Citrix | Confidential – Do Not Distribute
About
Citrix Services
Citrix Services make sure
you succeed with your
virtualization programs.
How we can help
Citrix Education – The fastest, most efficient way to
get your team the virtualization skills they need.
Online,
on-site or in class.
citrix.com/training
Citrix Consulting – Intensive engagements for
complex, critical or just plain massive projects.
citrix.com/consulting
Citrix Support – Always-on support services that
leverage everything we know about best-practice
deployment and maintenance.
citrix.com/support
Educate | Guide | Support | Succeed
© 2014 Citrix | Confidential – Do Not Distribute
• 40 insider troubleshooting tips
• Covering XenDesktop, XenServer, XenApp and NetScaler
• Citrix Support top engineers
• FREE eBook
• Citrix Auto Support
• Now available!
Secrets of the Citrix Support Ninjas
© 2014 Citrix | Confidential – Do Not Distribute
Premier Support Calculator
Check it out
Work better. Live better. Use NetScaler

Weitere ähnliche Inhalte

Was ist angesagt?

NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project Presentation
Andrew McGarry
 
Service Function Chaining in Openstack Neutron
Service Function Chaining in Openstack NeutronService Function Chaining in Openstack Neutron
Service Function Chaining in Openstack Neutron
Michelle Holley
 

Was ist angesagt? (20)

The Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitchThe Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitch
 
NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project Presentation
 
2014 OpenStack Summit - Neutron OVS to LinuxBridge Migration
2014 OpenStack Summit - Neutron OVS to LinuxBridge Migration2014 OpenStack Summit - Neutron OVS to LinuxBridge Migration
2014 OpenStack Summit - Neutron OVS to LinuxBridge Migration
 
CloudStack Architecture
CloudStack ArchitectureCloudStack Architecture
CloudStack Architecture
 
CloudStack Networking
CloudStack NetworkingCloudStack Networking
CloudStack Networking
 
Campus_Network_Design_with_ArubaOS-CX_-_Leading_Practices
Campus_Network_Design_with_ArubaOS-CX_-_Leading_PracticesCampus_Network_Design_with_ArubaOS-CX_-_Leading_Practices
Campus_Network_Design_with_ArubaOS-CX_-_Leading_Practices
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
 
Meetup 23 - 02 - OVN - The future of networking in OpenStack
Meetup 23 - 02 - OVN - The future of networking in OpenStackMeetup 23 - 02 - OVN - The future of networking in OpenStack
Meetup 23 - 02 - OVN - The future of networking in OpenStack
 
Routed Provider Networks on OpenStack
Routed Provider Networks on OpenStack Routed Provider Networks on OpenStack
Routed Provider Networks on OpenStack
 
Understanding Open vSwitch
Understanding Open vSwitch Understanding Open vSwitch
Understanding Open vSwitch
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
 
Opendaylight SDN Controller
Opendaylight SDN ControllerOpendaylight SDN Controller
Opendaylight SDN Controller
 
macvlan and ipvlan
macvlan and ipvlanmacvlan and ipvlan
macvlan and ipvlan
 
OpenShift Virtualization- Technical Overview.pdf
OpenShift Virtualization- Technical Overview.pdfOpenShift Virtualization- Technical Overview.pdf
OpenShift Virtualization- Technical Overview.pdf
 
Maxscale switchover, failover, and auto rejoin
Maxscale switchover, failover, and auto rejoinMaxscale switchover, failover, and auto rejoin
Maxscale switchover, failover, and auto rejoin
 
Turning Virtual Machines Cloud-Native using KubeVirt
Turning Virtual Machines Cloud-Native using KubeVirtTurning Virtual Machines Cloud-Native using KubeVirt
Turning Virtual Machines Cloud-Native using KubeVirt
 
NTP Server - How it works?
NTP Server - How it works?NTP Server - How it works?
NTP Server - How it works?
 
OpenvSwitch Deep Dive
OpenvSwitch Deep DiveOpenvSwitch Deep Dive
OpenvSwitch Deep Dive
 
An Introduction to OpenStack
An Introduction to OpenStackAn Introduction to OpenStack
An Introduction to OpenStack
 
Service Function Chaining in Openstack Neutron
Service Function Chaining in Openstack NeutronService Function Chaining in Openstack Neutron
Service Function Chaining in Openstack Neutron
 

Ähnlich wie In-depth Troubleshooting on NetScaler using Command Line Tools

Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2
Cisco Canada
 
Making Meetings Simple: "It's Just A Meeting"
Making Meetings Simple:  "It's Just A Meeting" Making Meetings Simple:  "It's Just A Meeting"
Making Meetings Simple: "It's Just A Meeting"
Cisco Canada
 
Implementing and Troubleshooting PVS
Implementing and Troubleshooting PVSImplementing and Troubleshooting PVS
Implementing and Troubleshooting PVS
David McGeough
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
 

Ähnlich wie In-depth Troubleshooting on NetScaler using Command Line Tools (20)

DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190	Targeted Threat (APT) Defense for Hosted ApplicationsDEVNET-1190	Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guide
 
Common Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First TimeCommon Pitfalls when Setting up a NetScaler for the First Time
Common Pitfalls when Setting up a NetScaler for the First Time
 
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, CitrixXPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
 
Designing your XenApp 7.5 Environment
Designing your XenApp 7.5 EnvironmentDesigning your XenApp 7.5 Environment
Designing your XenApp 7.5 Environment
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
Successfully Interconnecting Data Centers
Successfully Interconnecting Data CentersSuccessfully Interconnecting Data Centers
Successfully Interconnecting Data Centers
 
Maintaining and troubleshooting your xen desktop 7.5 environment
Maintaining and troubleshooting your xen desktop 7.5 environmentMaintaining and troubleshooting your xen desktop 7.5 environment
Maintaining and troubleshooting your xen desktop 7.5 environment
 
Designing your xen app 7.5 environment
Designing your xen app 7.5 environmentDesigning your xen app 7.5 environment
Designing your xen app 7.5 environment
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security Services
 
VMworld 2013: vCloud Hybrid Service Jump Start Part Four of Five: Identifying...
VMworld 2013: vCloud Hybrid Service Jump Start Part Four of Five: Identifying...VMworld 2013: vCloud Hybrid Service Jump Start Part Four of Five: Identifying...
VMworld 2013: vCloud Hybrid Service Jump Start Part Four of Five: Identifying...
 
Maintaining and Troubleshooting your XenDesktop 7.5 Environment
Maintaining and Troubleshooting your XenDesktop 7.5 EnvironmentMaintaining and Troubleshooting your XenDesktop 7.5 Environment
Maintaining and Troubleshooting your XenDesktop 7.5 Environment
 
Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2
 
Making Meetings Simple: "It's Just A Meeting"
Making Meetings Simple:  "It's Just A Meeting" Making Meetings Simple:  "It's Just A Meeting"
Making Meetings Simple: "It's Just A Meeting"
 
Cisco prime network 4
Cisco prime network 4Cisco prime network 4
Cisco prime network 4
 
Implementing and Troubleshooting PVS
Implementing and Troubleshooting PVSImplementing and Troubleshooting PVS
Implementing and Troubleshooting PVS
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
Primend Pilveseminar - Soodne hind + lihtne haldus – pilve minek= ?
 
Citrix Mobility Conference 2015 - Migrating XenApp & XenDesktop
Citrix Mobility Conference 2015 - Migrating XenApp & XenDesktopCitrix Mobility Conference 2015 - Migrating XenApp & XenDesktop
Citrix Mobility Conference 2015 - Migrating XenApp & XenDesktop
 
Decrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern TrafficDecrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern Traffic
 

Mehr von David McGeough

Mehr von David McGeough (20)

Citrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktopCitrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktop
 
Manage and Diagnose your Environment using Citrix Insight Services
Manage and Diagnose your Environment using Citrix Insight ServicesManage and Diagnose your Environment using Citrix Insight Services
Manage and Diagnose your Environment using Citrix Insight Services
 
PVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep DivePVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep Dive
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScaler
 
Best practices for implementing, administering, and troubleshooting XenDeskto...
Best practices for implementing, administering, and troubleshooting XenDeskto...Best practices for implementing, administering, and troubleshooting XenDeskto...
Best practices for implementing, administering, and troubleshooting XenDeskto...
 
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
 
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
 
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
 
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
 
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
 
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktopCitrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
Citrix TechEdge 2014 - A Deep Dive Look Into Supporting XenDesktop
 
Maintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 EnvironmentMaintaining and Troubleshooting your XenApp 7.5 Environment
Maintaining and Troubleshooting your XenApp 7.5 Environment
 
Jump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 DeploymentJump Start your XenDesktop 7.5 Deployment
Jump Start your XenDesktop 7.5 Deployment
 
Jump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 DeploymentJump Start your XenApp 7.5 Deployment
Jump Start your XenApp 7.5 Deployment
 
10 Tips Every XenDesktop Admin Should Know
10 Tips Every XenDesktop Admin Should Know10 Tips Every XenDesktop Admin Should Know
10 Tips Every XenDesktop Admin Should Know
 
Troubleshooting Provisioning Services Target Boot Processes
Troubleshooting Provisioning Services Target Boot ProcessesTroubleshooting Provisioning Services Target Boot Processes
Troubleshooting Provisioning Services Target Boot Processes
 
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesUsing NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
 
Troubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDKTroubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDK
 
Configuring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop SitesConfiguring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop Sites
 
Troubleshooting XenApp with the Citrix Diagnostic Toolkit
Troubleshooting XenApp with the Citrix Diagnostic ToolkitTroubleshooting XenApp with the Citrix Diagnostic Toolkit
Troubleshooting XenApp with the Citrix Diagnostic Toolkit
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

In-depth Troubleshooting on NetScaler using Command Line Tools

  • 1. Andrew Sandford Senior Readiness Specialist, Worldwide Support Readiness EMEA Citrix Support Secrets Webinar Series In-depth Troubleshooting on NetScaler using Command Line Tools 27 March 2014
  • 2. © 2014 Citrix | Confidential – Do Not Distribute
  • 3.
  • 4. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 5. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 6. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 7. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 8.
  • 9. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 10. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 11. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 12. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 13. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 14. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute netscaler.descr: NetScaler Virtual Appliance 3G netscaler.num_pe_running: 1 netscaler.version: NetScaler NS10.1: Build 124.13.nc, Date: Feb 20 2014, 18:53:27 netscaler.model: 3000 netscaler.vmpe_max_cpus: 2 netscaler.nCore: 1
  • 15.
  • 16. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 17. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 18. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 19. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 20. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 21. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 22.
  • 23. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 24. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute 50185 root 1 44 -52 814M 815M CPU1 1 20.2H 100.00% NSPPE-00
  • 25. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 26. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 27. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 28. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 29. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute LB_RGB (192.168.47.3:80) - HTTP Type: ADDRESS State: UP Client Idle Timeout: 180 sec Down state flush: ENABLED Disable Primary Vserver On Down : DISABLED Appflow logging: ENABLED Port Rewrite : DISABLED No. of Bound Services : 1 (Total) 1 (Active) Configured Method: ROUNDROBIN Mode: IP Persistence: NONE Vserver IP and Port insertion: OFFWarning: Feature(s) not enabled [LB]
  • 30. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute 1) svc_blue (192.168.196.62: 80) - HTTP State: UP Weight: 1
  • 31. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute 1) Monitor Name: mon-http-ecv State: UP Weight: 1 Passive: 0 Probes: 14887 Failed [Total: 124 Current: 0] Last response: Success - Pattern found in response. Response Time: 10.220 millisec State: UP
  • 32. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 33. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 34.
  • 35.
  • 36. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 37. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 38. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 39. © 2014 Citrix | Confidential – Do Not Distribute Show commands System show node show info show license Vserver/Service show lb vserver show cs vserver show service show persistencesession show connectiontable IP related show route show ip show dns addrec -type proxy Diagnostic show techsupport
  • 40. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute 2) Node ID: 1 IP: 192.168.1.45 Node State: STAYSECONDARY Master State: Secondary Fail-Safe Mode: OFF INC State: DISABLED Sync State: ENABLED Propagation: ENABLED Enabled Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1 Disabled Interfaces : None HA MON ON Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1 Interfaces on which heartbeats are not seen : 1/8 1/6 1/5 1/4 1/3 1/2 1/1 Interfaces causing Partial Failure: 1/8 1/6 1/5 1/4 1/3 1/2 1/1 SSL Card Status: UP Local node information: Critical Interfaces: 1/8 1/6 1/5 1/4 1/3 1/2 1/1 > Node State: NOT UP Master State: Secondary Master Enabled Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1 Disabled Interfaces : None HA MON ON Interfaces : 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1/1 Interfaces on which heartbeats are not seen : 1/8 1/6 1/5 1/4 1/3 1/2 1/1 Interfaces causing Partial Failure: 1/8 1/6 1/5 1/4 1/3 1/2 1/1 Node State: STAYSECONDARY Master State: Secondary
  • 41. © 2014 Citrix | Confidential – Do Not Distribute NetScaler Processes Process Description Process Description nsppe NetScaler Packet Engine nsfsyncd Sync bookmarks and SSL certificates nsaaad RBA and SSL VPN External Auth nsnetsvc Used by the GUI for config changes nsconf Writes the ns.conf file nsumond Runs the scriptable monitors nslog.sh Controls Logging for newnslog nsconmsg Controls writing of newnslog nssync HA sync nscollect Statistics gathering for historical reporting nsreadfile Used to read SSL Cert Files imi/ripd/ ospfd/bgpd Routing processes nscrlrefresh SSL CRL list update
  • 42. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute System Entities Protocols
  • 43. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 44. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 45. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 46. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute > stat interface 1/1 Interface [1/1]: Interface StateUP Link uptime 00:40:21 Link downtime00:00:00 Throughput Statistics Rate (/s) Total Bytes received42393 54497294 Bytes transmitted 2584 20222135 Packets received 629 710246 Packets transmitted 47 69066 Packet Statistics Rate (/s) Total Multicast packets 18 41219 NetScaler packets 85 98954 LACP Statistics Rate (/s) Total LACPDUs received 0 0 LACPDUs transmitted 0 0 Error Statistics Rate (/s) Total Error packets received (hw) 0 0 Error packets transmitted (hw) 0 0 Inbound packets discarded (hw) 0 0 Outbound packets discarded (hw)0 0 Packets dropped in Rx (sw) 539 599904 Packets dropped in Tx (sw) 0 0 NIC hangs -- 0 Status stalls -- 0 Transmit stalls -- 0 Receive stalls -- 0 Error-disables -- 0 Duplex mismatches -- 0 Link re-initializations -- 0 MAC moves registered 0 0 Times NIC became muted -- 0
  • 47. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute Non-authoritative entries 0 Authoritative entries 98 Error Statistics Nonexistent domain 102359 Response class unsupported 0 Invalid query format 0 Stray answers 0 Incorrect RD length 0 Requests refused 0 Response type unsupported 0 Query class unsupported 0 Invalid response format 0 No answer responses 102334 Multi queries disabled 0 Other errors 0
  • 48. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 49. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute Vserver hits 0 0 Requests 0 0 Responses 0 0 Request bytes 0 65 Response bytes 0 188 Total Packets rcvd 0 5 Total Packets sent 0 4 Current client connections -- 0 Current Client Est connections -- 0 Current server connections -- 0 Requests in surge queue -- 0 Requests in vserver's surgeQ -- 0 Requests in service's surgeQs -- 0 Spill Over Threshold -- 0
  • 50. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 51. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute NetScaler File System
  • 52. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 53. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 54. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 55. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 56. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute View events View console messages View statistics Debug system counters Debug load balancing issues Debug CPU/Memory utilization Use cases
  • 57. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute nsconmsg Common Syntax Make sure to use –K, NOT -k
  • 58. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute Live CPU related stats Archived events HA Failover cause LB stats CS related counters Real-time policy hits SSL related counters Compression related counters
  • 59. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 60. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute 1906 3910 PPE-0 'interface(1/1)' has been disabled Wed Aug 14 12:27:16 2013 1907 0 PPE-0 'interface(1/1)' DOWN Wed Aug 14 12:27:16 2013 1912 0 PPE-0 'server_svc_cfg_NSSVC_DNS_192.168.204.50:53(SVC_CTXANG_DNS1)' DOWN Wed Aug 14 12:27:25 2013 1913 0 PPE-0 'server_svc_cfg_NSSVC_DNS_192.168.204.51:53(SVC_CTXANG_DNS2)' DOWN Wed Aug 14 12:27:25 2013 1910 0 PPE-0 MonServiceBinding_192.168.204.51:53_(ping- default)(SVC_CTXANG_DNS2): DOWN; Last response: Failure - Probe timed out. Wed Aug 14 12:27:25 2013 1911 0 PPE-0 MonServiceBinding_192.168.204.50:53_(ping- default)(SVC_CTXANG_DNS1): DOWN; Last response: Failure - Probe timed out. Wed Aug 14 12:27:25 2013
  • 61. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 62. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 63. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute VIP(127.0.0.2:53:DOWN:WEIGHTEDRR): Hits(0, 0/sec) Mbps(0.00) Pers(OFF) Err(0) SO(0) LConn_BestIdx: 1024 Pkt(0/sec, 0 bytes) actSvc(0) DefPol(NONE) override(0) newlyUP(0) Conn: Clt(0, 0/sec, OE[0]) Svr(0) SQ(Total: 0 OnVserver: 0 OnServices: 0) slimit_SO: (Sothreshhold: 0 [Ex: 0] Consumed: [Ex: 0 Borrowed: 0 TotActiveConn: 0] Available: 0-
  • 64. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute ipConflictAddr = 192.168.47.1 last message repeated 169 times
  • 65. © 2014 Citrix | Confidential – Do Not Distribute Troubleshooting Techniques Common NetScaler issues/resolutions HDD Issues Logging fails /var missing Flash Issues Config fails to save Config saves partially Sync fails Device fails to boot Memory starvation Dropped sessions CPU starvation All services failing All VIPS down Degraded performance
  • 66. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 67. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 68. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 69. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 70. © 2014 Citrix | Confidential – Do Not Distribute nstrace & nstcpdump nstrace Common syntax: Nstrace.sh –sz 0 Nstrace.sh –sz 0 –filter “SOURCEIP = 10.198.4.10” –link enabled Filter qualifiers and operators: SOURCEIP, SOURCEPORT, DESTIP, DESTPORT, SVCNAME, VSVRNAME, STATE ==, eq, !=, neq, >, gt, <, lt, >=, ge, <=, le, BETWEEN Compound filters using || and && nstcpdump Common syntax: Nstcpdump.sh –X tcp port 80 Nstcpdump.sh –w testcapture.cap –X src host 10.198.4.10 tcp port 80 Filter qualifiers and operators: tcpdump standard
  • 71. © 2014 Citrix | Confidential – Do Not Distribute Packet Tracing Differences between nstrace.sh & nstcpdump.sh Nstcpdump.sh Nstrace.sh Useful if traces are to be viewed on standard output nstcpdump.sh –w <filename> option helps writing output to file Useful for offline collection nstrace.sh –sz 0 Saves traces in /var/nstrace in cap format can be used with expressions so that you get to see filtered traffic nstcpdump.sh host <IP> nstcpdump.sh port 21 useful for collection of traces in separate log files based on NICs nstrace.sh –tcpdump1 –nic 1
  • 72. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute -h - prints this message - exclusive option -nf - number of files to be generated in cycle (def. 24) -time - seconds per file (def. 3600) (could be an expression) -sz - size of the captured data (bytes from 60 to 1514) -tcpdump - 0=nstrace-format (default) or 1=tcpdump-format -nic - use separate trace files for each interface (only works if -tcpdump option is set) -name - name of the trace file -filter - Filter expression for nstrace. The maximum length of filter expression is 255 and it can of following format: <expression> [<relop> <expression>] -link - Log filtered connection's peer's (linked connection's) traffic. Works only with -filter option
  • 73. © 2014 Citrix | Confidential – Do Not Distribute Packet Tracing nstrace.sh nstcpdump.sh Proprietary capture format TCPdump PCAP capture format Native format captures more information Useful for live capture from CLI Files are stored in /var/nstrace Option to write to a file Needs custom dissector in Wireshark (1.6+) Most TCPdump options supported Works in standard Wireshark
  • 74. © 2014 Citrix | Confidential – Do Not Distribute Trace analysis nstrace.sh By Default if nstrace.sh is executed from shell prompt Trace files are stored in NetScaler proprietary (.cap) format The trace capture runs for 1 hr. (3600 sec) if not interrupted Files are cyclically numbered from 1-24. Trace mode is 6 (that is the TXB and RX packets are captured) The size of the captured data for each packet is 164
  • 75. © 2014 Citrix | Confidential – Do Not Distribute Trace Analysis nstrace syntax examples Command Purpose # nstrace.sh Stores the traces in default (proprietary) format # nstrace.sh -tcpdump 1 Begins to save the traces in the TCPDUMP format for a default 3600 seconds # nstrace.sh -tcpdump 1 -nic 1 Logs the traces (in TCPDUMP format) into separate log files based on the NIC IDs # nstrace.sh –nf <value> No of files to be generated in cycle by default is 24 # nstrace.sh –time <value> Seconds per file by default 3600 seconds # nstrace.sh -sz 0 Size of the captured data( by default it is 164), -sz 0 is the entire packet length # nstrace.sh –m Capturing mode: sum of the values (def. 6): 1-Transmitted packets (TX) 2 - Packets buffered for transmission (TXB) 4 - Received packets (RX) # nstrace.sh -stop Can be used to disable tracing (when 'nstrace.sh' is run in the background
  • 76. © 2014 Citrix | Confidential – Do Not Distribute Trace Analysis nstcpdump.sh example syntax Command Purpose # nstcpdump.sh <type> Possible types are host, net and port .If there is no type qualifier host assumed # nstcpdump.sh <dir> Qualifiers specify a particular transfer direction to and/or from id. Possible directions are src, dst, src or dst and src and dst. If there is no dir qualifier, src or dst is assumed. src foo', `dst net 128.3', `src or dst port ftp- data' # nstcpdump.sh <proto> ether, fddi, ip, arp, rarp, decnet, tcp and udp. # nstcpdump.sh –c <value> Exit after receiving ‘value’ number of packets # nstcpdump.sh –F –I –r Not supported and not to give them as options to the script # nstcpdump.sh –w <file name> Write the raw packets to file rather than parsing and printing them out. Read by typing tcpdump –r test
  • 77. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 78. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 79.
  • 80. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 81. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 82. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 83. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 84. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute
  • 85. © 2014 Citrix | Confidential – Do Not Distribute© 2014 Citrix | Confidential – Do Not Distribute CTX109304 Data Collection Procedure to Troubleshoot NetScaler Related Issues http://www.slideshare.net/davidmcg/common-pitfalls-when-setting-up-a-net-scaler-for- the-first-time http://support.citrix.com/search/basic?searchQuery=counters&refinement=Content+Ty pe,Technotes&refinement=Product+Family,NetScaler CTX114999 How to Troubleshoot Authentication with Aaad.debug https://taas.citrix.com/
  • 86. © 2014 Citrix | Confidential – Do Not Distribute Maximize your knowledge. Continue your journey with Citrix Education. Recommended next step for hands-on technical training: CNS-205 Citrix NetScaler 10 Essentials and Networking Identify the capabilities and functionality of the NetScaler Explain basic NetScaler network architecture Obtain, install, and manage NetScaler licenses Explain how SSL is used to secure the NetScaler Implement NetScaler TriScale Technology, including Clustering Visit bit.ly/NSCOURSE to save 10% now through April 30.* *Not valid with any other promotions, packages or discounts. Applies only to new purchases. Regional limitations may apply.
  • 87. © 2014 Citrix | Confidential – Do Not Distribute About Citrix Services Citrix Services make sure you succeed with your virtualization programs. How we can help Citrix Education – The fastest, most efficient way to get your team the virtualization skills they need. Online, on-site or in class. citrix.com/training Citrix Consulting – Intensive engagements for complex, critical or just plain massive projects. citrix.com/consulting Citrix Support – Always-on support services that leverage everything we know about best-practice deployment and maintenance. citrix.com/support Educate | Guide | Support | Succeed
  • 88. © 2014 Citrix | Confidential – Do Not Distribute • 40 insider troubleshooting tips • Covering XenDesktop, XenServer, XenApp and NetScaler • Citrix Support top engineers • FREE eBook • Citrix Auto Support • Now available! Secrets of the Citrix Support Ninjas
  • 89. © 2014 Citrix | Confidential – Do Not Distribute Premier Support Calculator Check it out
  • 90. Work better. Live better. Use NetScaler

Hinweis der Redaktion

  1. Access to the appliance CLI is through the serial console, or by connecting with SSH to the NetScaler management IP /SNIP with Management Access enabled.This lands you in the NetScaler CLI – which has custom commands. Some TCSH-like shortcuts can apply.TCSH shortcuts like CTRL-A brings you to the start of the line, and CTRL-E brings you to the end. Most day to day NetScaler commands will begin with the following verbs: show Display information about an entity.add Create an entity.remove Delete an entity.set Change/modify an entity.enable Turn a feature or setting ON.disable Turn a feature or setting OFF.force Used in High Availability to Sync &amp; Failover.bind Create a relationship between two entities.unbind Remove a relationship between two entities.
  2. &gt;set cli prompt %u@%h-%T&gt;set cli mode -color ON&gt;help set cli promptAutocomplete is your best friend… &lt;tab&gt; &amp; ? %! - will be replaced by the history event number %u - will be replaced by the NetScaler user name %h - will be replaced by the NetScaler hostname %t - will be replaced by the current time %T - will be replaced by the current time (24 hr format) %d - will be replaced by the current date %s - will be replaced by the node state
  3. There is another shell (BASH) that is only used for file handling – never to configure the NetScaler. Note the different prompts.&gt; shell to enter BASH shell in BSD#Ctrl+D to exit BASH or type exit
  4. All of the UNIX command goodness in FreeBSD!
  5. Show feature provides an output that allows us to quickly identify which features are enabledNotice these common features are disabledLBICREWRITE This output almost certainly would indicate a misconfiguration2. At a bare minimum most deployments will have at LEAST “load balancing” enabled. If LB is off, you can see issues where a vserver wont come up, or it will only utilize 1 service. If you have any inexplicable errors where features just don’t work at all despite a proper config it is almost ALWAYS that the feature has been disabled. This is a common mistake, I make it frequently.
  6. In this case we specified a vserver name, this is the most desirable way to execute this command as it shows you the most detail, namely the state of your bound services.Key difference between this example and the generic example is the bound service summaryWe now know that this vserver is down because the only service bound to it is down. A vserver will go down when all of its bound services are down.
  7. Two different directories. One for cores and one for crashes
  8. Pitboss controls the processes on a NetScalerIf the pitboss detects a process failing it will try to restart itThe nsppe process is in userland so can be “warm” startedIf a process fails 5 times, on the sixth failure the NetScaler will undergo a full reboot
  9. Show commands primarily provide configuration and status information about the system or specified entityShow commands for SYSTEM infoShow node, talk about various bad states. Essential to troubleshooting HA issuesConsolidate show version, show feature, show mode into “show info”Show license3. Show commands for a vserver and service:Shlbvserver/shcsvserver, generic command vs specific referencing an entitySh service, just like shlbvserver, generic vs specific outputShpersistencesession, helpful for tracking a persistent session without a traceShconnectiontable, large output but also useful for connection tracking4. Other show commandsSh route, ship, shShdnsaddrec –type proxy, useful for debugging cached DNS records
  10. Why is this node down?2. Things to notice here:Node State: NOT UPMaster State: Secondary3. Its down because unused interfaces are enabled and not receiving heartbeats. If we compare which interfaces are enabled to which interfaces are not receiving heartbeats we can determine that 1/7 is the only interface receiving heartbeats.4. We can correct this by disabling all interfaces except for 1/7 (which is the only interface in use).5. Notice the partner node, he is secondary but has only one interface enabled. Its *NOT* failing for the same reason, notice the Node State: STAYSECONDARY setting.6. So we know the node we are on is down because its interfaces are misconfigured, and the partner node is forced to stay secondary.
  11. BSD/NS relationship:BSD controls disk/time slicing, primarily a bootloader for NS kernelLogs are written by BSDLogs are rolled by BSDNetScaler runs inside of FreeBSD, nsppeConsumes majority of user land processer (99%)NetScaler controls NICs/packet processing/etc.Key processes:NsppeNsaaadNsconfigdNsauthdNslog.shKey processes:NsnetsvcNsumondNsconmsgDynamic routing processes
  12. Taken on an MPX 15500
  13. 1. Things to notice here:Various hit countersClient conn vs Server connSpilloverService stats (ttfb, transactions)
  14. A significant portion of the information we care about is already available from “stat lbvserver [name]”TTFBSurge QueueThings to notice:TTFBSurge queue
  15. 1. Discuss an overview of each mount point “/var” contains historical data in the form of logs. This is one of the first places to look when trying to troubleshoot a NetScaler issue./var/log is the “traditional” location for logs in Unix/Linux operating systems/var/nslog contains NetScaler specific logs“/flash” contains configuration and customizationsrc.netscalerAny modified configs from /etcUser monitorsKernel itself“/” contains the OSRam driveAvoid writing anything to it, no reason to2. What happens if the components fail?Device can operate without /var, but will not be able to logDevice cannot boot without /flashDevice cannot boot without /
  16. 1. Discuss an overview of each mount point “/var” contains historical data in the form of logs. This is one of the first places to look when trying to troubleshoot a NetScaler issue./var/log is the “traditional” location for logs in Unix/Linux operating systems/var/nslog contains NetScaler specific logs“/flash” contains configuration and customizationsrc.netscalerAny modified configs from /etcUser monitorsKernel itself“/” contains the OSRam driveAvoid writing anything to it, no reason to2. What happens if the components fail?Device can operate without /var, but will not be able to logDevice cannot boot without /flashDevice cannot boot without /
  17. /var/nslog/dmesg.boot/var/nslog/dmesg.prev/var/nslog/dmesg.last
  18. 1. THIS IS AN INCOMPLETE LIST, THESE ARE THE MOST COMMON FILESNs.log (INCLUDING BUT NOT LIMITED TO):contains NSCLI commandscontains syslog messages useful for reconstructing user input and event timelinesBy far the most informative file containing the most information in one placeMessages contains system events authentication messages system startup messages commands executed under shellconsole messages
  19. 1. THIS IS AN INCOMPLETE LISTNewnslogCurrent live fileNewnslog.*.gzRolled log filesNs.log - contains newnslog related eventsNsumond.log – contains log output for user land monitors using KASNslog.nextfile – next newnslog file to be written
  20. If a problem hasn’t been solved by what we have done so far:Logfile analysisShow commandsStat commandsThen the next step is to get even further debug information from Nsconmsg. 2. Nsconmsg logs all of the statistics we have seen so far, and additionally there are literally thousands of other counters we don’t see in the NSCLI which are logged. All of these counters are recorded every 7 seconds and written to the file in a binary format.Nsconmsg is one of the primary tools support uses to debug issues3. Some things we can get from newnslog are:Events: UP/DOWN messages for entities (vservers, services), HA events, interface events, etc. Most of these events are also logged to syslog.Console messages: Mostly BSD messages, disk write errors, etc
  21. If a problem hasn’t been solved by what we have done so far:Logfile analysisShow commandsStat commandsThen the next step is to get even further debug information from Nsconmsg. 2. Nsconmsg logs all of the statistics we have seen so far, and additionally there are literally thousands of other counters we don’t see in the NSCLI which are logged. All of these counters are recorded every 7 seconds and written to the file in a binary format.Nsconmsg is one of the primary tools support uses to debug issues3. Some things we can get from newnslog are:Events: UP/DOWN messages for entities (vservers, services), HA events, interface events, etc. Most of these events are also logged to syslog.Console messages: Mostly BSD messages, disk write errors, etcSystem statistics: all counters are captured every 7 seconds. We can view lb statistics, system statistics.System counters: mostly for software debugLoad balancing counters: ConLb shows us detailed load balancing statistics
  22. This is a freshly booted device so we see a variety of messages here:Service up/down eventsInternal services coming upBootup messagesCPUCONFIG STARTUbsec_0 UPInterface eventsDisabled interfacesHA eventsVersion mismatch messageRemote node UP
  23. -d consmsg provides output on any BSD console messagesThis console output consists only of bootup output, but you may also see things like: IP conflicts here NIC errors (duplex issues) lack of file handlers OS errors, etc.
  24. –d oldconmsg provides CPU and memory utilization outputI will use this to quickly establish trends in CPU/MEM utilization (just let the output scroll and watch mem/cpu and see if they increase steadily).
  25. 1. –s ConLB=2 provides detailed debug output regarding load balancingSpecific detail on the lbvserver, the types of traffic its handling, Specific detail on services and the traffic THEY are subsequently handling.2. Most interested in the following sections: Hits, particularly Pers (persistence status to explain hits) Pkt (packet stats) Conn (Current server, Maximum server, Open Established, Established, Reuse Pool, Surge queue)
  26. 1. HDD issues – primary failure is that logging fails, /var is missingCheck df, are any drives missing?Check dmesg, are there any drives missing or errors?Run fsck on the drive to check for errorsAttempt to re-mount the drive2. Flash issues – config save issues, sync fails, device fails to bootThe box wont boot without flash, so if the NetScaler is running the device mounted OK.Check df, is the /flash missing or full?Check dmesg, is flash missing or getting any errors?Run fsck on the drive to check for errors3. Memory starvation – dropped session, cant allocate memory for other tasks (CPU profile, etc.)Feature memory allocation, IC, APPFW, TCPBUFFERINGConMEM4. CPU overutilizationSNMP pollingNewnslogs roll USIP? CMP?Anything in userland?
  27. http://support.citrix.com/article/CTX109304
  28. Perl script/netscaler/showtechsupport.plAlso available in the UI: System &gt; Diagnostics &gt; Generate support file
  29. Perl script/netscaler/showtechsupport.plAlso available in the UI: System &gt; Diagnostics &gt; Generate support file
  30. If we haven&apos;t been able to solve the issue with stat and show commands, cant find anything in the logs, the next step might be to get a sniff. Personally I like to get a sniff first and work forward from there, assuming the problem warrants it.2 kinds of traces,Nstrace – preferable, gives extended NetScalerdataNstcpdump – all NIC wrapper for tcpdump. quick, familiar, uses tcpdump syntax. 2. Common syntax -sz 0, or with a filter. Truncated traces are almost always worthless.3. 9.0 adds filter support to nstrace. This is the preferred acquisition method as we write extended data to the capture useful for session tracking, NIC tracking, operation tracking, etc. Requires custom build of Wireshark to view.If you use a filter, use the –link option to capture all of the other related traffic on that session.Operators: ==, !=, etc.4. Nstcpdump good for looking at live traffic, or for when traces need to be viewed with a standard Wireshark build. All we are doing is an all NIC trace when invoking tcpdump via nstcpdump.sh. Since we now have filtering in nstrace, it is much more preferable to use that method to capture instead of nstcpdump. Filtering in tcpdump is expensive in userspace due to the way we provide the data to tcpdump.Common syntax –X to print payload in ASCIICommon syntax –w to write the capture to a fileTcpdump not effective due to the way packets are captured from the kernel
  31. Cover various switches, the most common syntax will be “nstrace.sh –sz 0”-sz specifies size of data to be captured-nf number of files in a cycle-tcpdump, writes file in tcpdump format (doesn’t need special Wireshark build)-filter, specifies the filter to apply-link, link associated traffic from filter
  32. type qualifiers say what kind of thing the id name or number refers to. Possible types are host, net and port. E.g., `host foo&apos;, `net 128.3&apos;, `port 20&apos;. If there is no type qualifier, host is assumed. dir qualifiers specify a particular transfer direction to and/or from id. Possible directions are src, dst, srcordst and srcanddst. E.g., `src foo&apos;, `dst net 128.3&apos;, `src or dst port ftp-data&apos;. If there is no dir qualifier, srcordst is assumed. For `null&apos; link layers (i.e. point to point pro- tocols such as slip) the inbound and out-bound qualifiers can be used to specify a desired direction. proto qualifiers restrict the match to a particular protocol. Possible protos are: ether, fddi, ip, arp, rarp, decnet, lat, moprc, mopdl, tcp and udp. E.g., `ether src foo&apos;, `arp net 128.3&apos;, `tcp port 21&apos;. If there is no proto qualifier, all protocols consistent with the type are assumed. E.g., `src foo&apos; means `(ip or arp or rarp) src foo&apos; (except the latter is not legal syntax), `net bar&apos; means `(ip or arp or rarp) net bar&apos; and `port 53&apos; means `(tcp or udp) port 53&apos;. The –r option must not be given to the script because internally we are supplying ‘-r –‘ option as a default entry, so that TCPDUMP reads the traces from the standard input. So it does look logical, not to supply a ‘-r’ option from the CLI.The –i option must be avoided too. This is because TCPDUMP listens only on 1 interface at a time. In our case we are dumping packets that arrive on all the interfaces on to the standard output. If you want to view per interface packets, ‘nstrace.sh’ can be used with the ‘-tcpdump 1 -nic 1’ option as input.The ‘-F’ option is not encouraged. If this is to be put to full use, use ‘nstrace.sh’ or ‘nstcpdump.sh –w &lt;file&gt;’ and do an offline filtering using TCPDUMP directly. This is because we felt that, since you are using the standard output to dump the traces, it would not be a wise idea to use ‘complex’ filter expressions. So the better idea would be to store in a file the entire trace and view it using Ethereal or graphical packet analyzer and based on the fields you are interested, generate your ‘expression’ file and use TCPDUMP directly on the shell with the ‘-F’ option to filter the trace captured.-sSnarfsnaplen bytes of data from each packet rather than the default of 68 (with SunOS&apos;s NIT, the mini- mum is actually 96). 68 bytes is adequate for IP, ICMP, TCP and UDP but may truncate protocol infor- mation from name server and NFS packets (see below). Packets truncated because of a limited snapshot are indicated in the output with ``[|proto]&apos;&apos;, where proto is the name of the proto- col level at which the truncation has occurred. Note that taking larger snapshots both increases the amount of time it takes to process packets and, effectively, decreases the amount of packet buffering. This may cause packets to be lost. You should limit snaplen to the smallest number that will capture the protocol information you&apos;re interested in. -T Force packets selected by &quot;expression&quot; to be interpreted the specified type. Currently known types are rpc (Remote Procedure Call), rtp (Real-Time Applications protocol), rtcp (Real-Time Applications control protocol), vat (Visual Audio Tool), and wb (distributed White Board).
  33. Nstcpdump is just a wrapper for tcpdump, standard syntax applies.
  34. # nsapimgr-K &lt;nstrace-file&gt; -s tcpdump=1 -k &lt;tcpdump-file&gt;Offline conversion of traces, those are in our NSTRACE format, to TCPDUMP format.&lt;nstrace-file&gt;: the file, which is in the NSTRACE format.&lt;tcpdump-file&gt;: the file into which the traces are to be converted and dumped in the TCPDUMP format.0=nstrace-format (default)
  35. Two different directories. One for cores and one for crashes
  36. Pitboss controls the processes on a NetScalerIf the pitboss detects a process failing it will try to restart itThe nsppe process is in userland so can be “warm” startedIf a process fails 5 times, on the sixth failure the NetScaler will undergo a full reboot
  37. Don’t hurt meCaslon Ampersand!