Jump to content
Updated Privacy Statement

Harihara Sudhan

Internal Members
  • Posts

    52
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by Harihara Sudhan

  1. What is the limitation on total number of NICs that can be dedicated to NetScaler BLX? Does the limitation vary with DPDK and NON-DPDK capable NICs?
  2. What is the maximum limit on number of VNICs that can be attached to a NetScaler VPX on Public cloud - AWS, Azure and GCP ?
  3. Thank you for your query Chris. At this time, we have not actively begun development of ARM processor support. However, we are putting plans into motion to begin work on it soon. We will keep everyone updated when we make significant progress so you have all the information you need.
  4. After rebooting my VPX on AWS, the local DNS request are failing and DNS servers get deleted. How to avoid this?
  5. After modifying the default route pointing to client interface, on every reboot it gets reverted back to management interface on AWS. How to overcome this?
  6. I am unable to apply license file to my Netscaler or add it to backend pool license. What could be the issue?
  7. After detaching and attaching my interface, I notice that my HA Multizone Private IP setup is failing on AWS. How to debug this?
  8. Can we form ENI based HA between VPX running on different releases (Example - Between 13.0 and 13.1) on public clouds?
  9. I see a route to 169.254.169.254 address is added in my “show route” command by default on AWS. Why is it so?
  10. My client and servers are within the AWS VPC and I don’t want to use Elastic IP but want to preserve my client ip (USIP mode enabled) . What type of High availability deployment should I use?
  11. Where I can check HA related errors for basic troubleshooting on public cloud deployments?
  12. Why should I use Netscaler backend autoscaling, when AWS provides inbuilt autoscaling solution with ALB?
  13. I am using multizone HA deployment. My clients are connecting from both Internet and Internal AWS network. At present I am using 2 VIPs - 1 for Public facing EIP and 1 for the Private IP using route modification. Is it possible to merge them both ?
  14. Can the same EIP be used for multiple Load balancers VIP on NetScaler ADC VPX running on public clouds?
  15. How to achieve multi cloud high availability? Is it possible to provision three Netscaler ADCs in AWS, Azure and GCP each and provide load balancing along with a fail-safe topology ?
  16. We state: "For the high availability setup to work effectively, associate a dedicated NAT device to management Interface or associate EIP to NSIP." Which would be the best practice? Is there a good reason to use the NAT Gateway over EIP?
  17. Is there any use case to use Elastic IP HA and Private IP HA together for a Multi-zone HA deployment in AWS ?
  18. What are the limitations in downgrading an ADC from higher release to a lower release? For example, can we downgrade from 13.1 Netscaler to 13.0 ?
  19. How to install NetScaler ADC BLX if the host doesn't have internet connectivity?
  20. How to increase the disk space of an existing partition on NetScaler ADC VPX?
  21. How to identify host ID for NetScaler ADC BLX instances running on Linux to generate license files?
  22. It is possible to run NetScaler ADC BLX, when the host Linux SELinux is configured to be "enforcing" ?
  23. NetScaler TIPs: 5 questions about deploying NetScaler ADCs in Azure Submitted May 12, 2021 Author: Roger LaMarca As they transition to public cloud providers, organizations everywhere are navigating cloud-native technologies used to support key infrastructure components such as NetScaler ADC. With new platforms come new questions that you must answer to help drive a successful deployment. As a consultant on the U.S. Public Sector team, I often work with businesses to design and deploy NetScaler ADCs in Azure. In this blog post, I will share some of the most common questions I get and provide technical guidance for dealing with some of the crucial decision points. (Everything I cover in this post applies to Azure Government and Azure commercial.) When deploying a production workload in Azure, your NetScaler ADCs should always be in a highly available (HA) pair. In short, Azure Load Balancers (ALB) are required when deploying an ADC HA pair on Azure. The lack of a Layer 2 broadcast domain on public cloud providers does not allow the ADCs to operating how they work in traditional on-premises deployments. On a transitional on-premises network, during a HA failover, the secondary ADC would advertise its MAC address as the new owner of a vServer IP address and assume ownership. To provide HA in Azure, an ALB is required to front-end the ADCs to determine which appliance is primary. How many Azure Load Balancers are required? In typical consulting fashion, the answer is, it depends! The number of ALBs required depends primarily on where, from a networking perspective, users are accessing services from. Two ALBs are usually required for most NetScaler ADC deployments — a public and a private ALB. You can find details on the differences in the Azure documentation. At a high level, Azure differentiates public and private ALBs by the type of front-end IP address that can be associated with them. Public ALB: Provides the ability to assign a public IP address that is routable over the internet. Most commonly, a public ALB will provide high availability for a NetScaler Gateway vServer across the primary and secondary ADCs. Because the NetScaler Gateway is commonly accessed externally by users over the internet, a public ALB is required. If the Gateway was accessed only by users on a private IP address space, a private ALB would be used instead. Private ALB: For services being accessed by internal users through a private IP address, you must use a private ALB. This load balancer front ends services such as Cloud Connectors or Delivery Controllers. One of the most important things to remember is that while you may need multiple ALBs for public and private IPs, the same ALB can support multiple vServers on the ADC. This is done by creating multiple load-balancing rules on a single ALB. Essentially, every load-balancing vServer on the ADC needs a corresponding load-balancing rule on an ALB. What ADC IP should be configured for the ALB health probe? As I mentioned earlier, the ALB’s primary purpose is to facilitate HA between two ADCs. The configuration it uses to determine which ADC is primary is very important. The ADC has built-in functionality to respond to a TCP request on port 9000 only on the primary appliance. The ADC will respond on port 9000 on either the management (NSIP) or SNIP addresses. Please note that the ADC will only provide a response on TCP 9000 when an HA pair has been established. If you are trying to test using an ALB and you have not established an ADC HA pair yet, you will not receive responses on TCP 9000 and the ALB will mark the ADC as down. There are a few different configurations you can make to get the solution working. However, you should use the ADC management IP address (NSIP) as the health probe for all load balancing rules. I recommend against using the IP addresses of individual vServers hosted on the ADC as the health probe on ALB. While this can give you a working configuration, it adds unnecessary configurations and increases the complexity of the deployment. For example, if you use the vServer IPs, that means you will have to create health probes for each set of vServers. Does HDX Enlightened Data Transport (EDT) work through an ALB? While you can establish EDT sessions through an ALB, some planning, and understanding of how ALBs function is required to get the desired outcome. The ALB operates at Layer 4 (Transport Layer) on the OSI model, meaning it supports the TCP and UDP protocols. However, a load balancing rule created on an ALB can only operate at one protocol at a time. This introduces a limitation with the HDX protocol because it has a built-in fallback mechanism to automatically switch between TDP and UDP (EDT). Because HTTP requests during the authentication use TCP, this always requires at least one TCP-based load balancing rule, which would commonly be used for both authentication and HDX traffic that commonly go through the same Gateway vServer. If you want to provide EDT-based NetScaler HDX sessions, you must create separate load-balancing rule configured for UDP traffic. It could point to the same Gateway vServer; however creating a separate DTLS 1.2 Gateway vServer is recommended. This DTLS vServer would be configured on the same IP address as the authentication Gateway vServer. Should I enable the floating IP setting on a load-balancing rule? Yes! I always recommend enabling the floating IP feature inside the load balancing rule configuration. While you can get the solution without this setting, it will require unnecessary configurations. Basically, the floating IP features allow the front-end IP address configured on the ALB to be used across both the primary and secondary ADC. As a reminder, the front-end IP is the address that end users will use to access the vServer hosted on the ADC. So how does this work when you cannot have the same IP assigned to multiple instances? This IP address, whether it is a public or private IP, lives only on the ALB. While you must configure the vServer on the ADC with the front-end IP address used on the ALB, the IP is never configured on the Azure network adapter level for the ADC instance. Using the floating IP features eliminates the need to leverage IPSets. Because deploying Citrix ADC on Azure requires separate IP addresses for every vServer between the primary and secondary, IPSets are needed to enable the secondary ADC to use a different IP address when it becomes the primary. That is a great reason to use a floating IP! The diagram below shows an ADC + ALB configuration using the NSIP as the health probe, along with using a floating IP: Should you use the Basic or Standard ALB? I recommend using a Standard Azure Load Balancer for all production workloads. Here’s why: Service Level Agreements (SLAs): Microsoft does not provide a guaranteed SLA for Basic ALBs. Standard ALBs include a 99.99 percent SLA. Since all NetScaler ADC traffic must first pass through an ALB, you will want to make sure it is as redundant as possible. I recommend reviewing the official Microsoft documentation on the Azure Load Balancer for more information. Multiple Availability Zones: If Virtual Delivery Agents or other workloads are in multiple availability zones (AZs) in the same Azure Region, a Standard ALB will enable you to have an ADC HA pair deployed across AZs. This is not possible with a Basic ALB. Also, note that while ALBs can be used across AZs in the same region, you cannot attach Azure Load Balancer to Azure VMs in different regions. Lastly, be sure to select the Zone Redundant ALB when creating it to provide resilience on the ALB level if an AZ failover occurs. I often get asked is why the NetScaler GitHub Azure Resource Manager (ARM) templates deploy a Basic ALB? The ARM templates NetScaler provides are only recommended for light production and testing workloads. Because Standard ALBs come with a price tag, it only makes sense to use them in a rapid deployment script. The ARM templates provided are met as a starting point for individuals to build upon for additional functionality. I use the NetScaler -provided ARM templates all the time when rapidly deploying an ADC pair HA in Azure for testing. However, during production deployments, please be aware of the options presented in the ARM templates and their potential design implementations: VNet Planning: The NetScaler ARM template provides the ability to create a new vNet for NetScaler ADCs. Creating a vNet in production deployment is something that should be very thoroughly planned out. It has implications for cost and network design because vNet Peering would be required to reach other components. A vNet can scale to 65k hosts and segregation is more commonly achieved by using subnets inside a single vNet. In short, there will almost never be a technical reason that the ADCs require their own vNet. Disable this option and specify already existing subnets that are created ahead of time and are carefully planned out. Naming Conventions: The ARM templates do not allow you to properly name the ADC instances or any of the associated items created such as network interfaces. This is perfectly fine for a proof of concept or testing. However, for production deployment, you need to make sure everything is named appropriately. Renaming items in Azure can be challenging, so you need to do it correctly the first time. All these concerns can be easily addressed by updating the ARM templates to include variables for ADC names and support for a Standard ALB. Key Takeaways Here are a few key points to remember when starting your NetScaler ADC journey on Azure: Multiple Load Balancing Rule on One ALB: The same ALB can support multiple vServers on the ADC. You just need to create multiple load balancing rules, each with a different front-end IP that references each individual vServer being hosted on the ADC. Deploy a Standard ALB: For production deployments, I recommend using the Standard ALB. This provides SLAs from Azure and allows for ADCs to be deployed across multiple availability zones. Use a Floating IP: This eliminates the need to create IPSets for each vServer and overall simplifies the ADC configuration. A big thanks goes out to Juliano Reckziegel, who helped with testing for this blog.
×
×
  • Create New...