Jump to content
Chris Chau
ADM Service agents, which are deployed in your every on-premises or Cloud data center, are "evergreen".  Similar to other SaaS, most of the ADM components and their lifecycles can be managed by Citrix/NetScaler.  Hence, these little ADM Agents on premises, which communicate with the ADM Service in the Cloud, can be maintained and automatically upgraded to the latest firmware, if necessary.
 
There is a little tweak for you to schedule the upgrade time according to your local time zone or GMT time zone by default.  Please refer to the following short video to view the details.
 


Chris Chau
Having been released for several years already, most of the NetScaler customers had already heard of NetScaler Console many times.  Moreover, many of the them have even been using such an on-premise VM for managing multiple NetScaler ADCs and providing application analytics, like Web Insights and HDX Insights. 
 
In fact, besides the on-premise NetScaler Console, NetScaler has also offered another SaaS-based NetScaler Console.  With that, the customers can enjoy the same manageability and analytics of NetScaler Console, but without any hassle in managing the on-premise NetScaler Console Server and its storage.  In addition, only NetScaler Console Service can provide AI/ML capabilities in helping customers manage, monitor and secure their app delivery performance.
 
Many customers have been using ADM Service already.  Why not you??
 


Chris Chau
Recently, couple of identified CVEs triggered many of our customers thinking:
1) Whether their NetScaler being impacted?
2) If yes, what version of firmware should their NetScaler be upgraded to?
3) Any other workaround needed to be done?
 
With the Security Advisory in ADM, it can alert the admin which NetScaler instances (which are being managed by ADM) are impacted and should be upgraded.  It will also list out what version should be, or can be, upgraded to, together with the online firmware repository.
 
This video will show how ADM Security Advisory can help in the recent CVE-2022-27518.
 
 


Isha Khurana
Automating your way to greatness with the ADC Nitro API
The Citrix ADC Nitro API is an extremely powerful tool to automate and orchestrate time-consuming tasks on the Citrix ADC. However, few administrators and developers are actually using it or perhaps are not even aware of its existence. In this session, you will learn how to set up your first scripts/applications with Python and combine the Nitro API with some great libraries to create your own day-to-day time saving tools. 
Watch this video to
:
 
 

Chris Chau
Action Policy is a feature in ADM, which defines what should be done whenever an specific event happened.  For example, a user can use Action Policy to define whom should be notified, if an critical app's response time was over the threshold.  
 
In the old days, 1 Action Policy can be assigned to one application only.  If a user has multiple critical apps, which should have the same response time threshold and action, multiple Action Policies need to be created and assigned.  
 
With the current enhancement, one Action Policy can be assigned to multiple apps if the requirements and behaviour are similar.  Also, you may create the Action Policy directly from the Web Insight Analytics, if anything went wrong as seen in the statistics.  It is a much simpler workflow.
 


Mayur Vadhar
Below is the list of Terraform scripts and Get Started guide for NetScaler Automation:-
NetScaler Deployment :
Terraform cloud scripts to deploy NetScaler in AWS Terraform cloud scripts to deploy NetScaler in Azure Terraform cloud scripts to deploy NetScaler in GCP Terraform scripts to provision NetScaler in ESX NetScaler Configuration :
 NetScaler Terraform provider in Hashicorp Registry to configure NetScaler  Source code for NetScaler Terraform provider  NetScaler Configs Examples in Terraform NetScaler Solutions using Terraform Provider :
Blue-green deployment using NetScaler VPX and Azure pipelines  NetScaler Consul-Terraform-Sync Module for Network Infrastructure Automation ADM Terraform Provider :
Source Code for ADM Terraform provider Examples of ADM Configuration via Terraform Get Started using Terraform for NetScaler :
Get Started with installing terraform and making first NetScaler configuration Hands-on Lab to try out Terraform with NetScaler  Example of SSL Offloading configuration on NetScaler using Terraform Example of SSL Intelligent Content Routing on NetScaler using Terraform Let us know in the comments section if you need anything else on NetScaler automation with Terraform. 
 

Chris Chau
NetScaler is designed in a software-centric approach. With NetScaler, you can have the same app delivery functions and consistent operational efforts, across different form factors and platforms. NetScaler BLX enables our customers to transform their own standardized server hardware into a NetScaler appliance. As DevOps and infra automation are hot in the industrty, customers may also be seeking for some ideas on how to automate the operation and management tasks of NetScaler in the hybrid mutli-cloud environment.
 
In this video, our NetScaler experts will showcase the below:
Demonstration of the smart conversion of a Linux host into NetScaler BLX through the Terraform. The co-existence aspect of NetScaler BLX to function with other Linux apps Here, you may find more information regarding our NetScaler BLX and the automation capability with Terraform.
https://docs.citrix.com/en-us/citrix-adc-blx/ https://docs.citrix.com/en-us/citrix-adc/current-release/deploying-vpx/citrix-adc-automation.html

Guest Sara Austin
NetScaler Deployment Builder: Simplifying NetScaler cloud-native deployments
Submitted March 16, 2021Author: Subash Dangol
 Deploying applications to Kubernetes, the powerful and popular container-orchestration system, can be complex. Setting up a single application can involve creating multiple, interdependent Kubernetes resources such as pods, services, deployments, ingresses, replica sets, and CRDs, each of which requires a detailed YAML manifest file.
Writing and maintaining Kubernetes YAML manifests for all these Kubernetes objects can be a time-consuming process, and editing YAMLs to fit with required architectures can be tedious and prone to errors. Helm charts simplify this process. Helm is a package manager for Kubernetes that enables developers and operators to easily package, configure, and deploy apps and services onto Kubernetes clusters.
NetScaler offers cloud-native solutions such as Citrix Ingress Controller (CIC), Citrix IP Address Management (IPAM) , and Citrix Observability Exporter (COE) that empower customers in their cloud migration journeys, and we’ve created Helm charts for easier deployment and management of these products under NetScaler's cloud-native portfolio
Each Helm chart is made up of a “values.yaml” file that contains Helm chart variables and associated values. You need to understand and configure these variables while installing these charts on your Kubernetes cluster. In this blog post, I’ll introduce the deployment builder, a GUI-based tool that eases application deployment using our Helm charts.

Citrix (now NetScaler) Deployment Builder
NetScaler offers multiple solutions that can be deployed alongside your applications and improves their delivery and secures security. We’ve created a universal (consolidated) Helm chart — NetScaler Cloud Native Chart — to help you deploy any (or all) of these solutions with single command.
Although you can install NetScaler Citrix cloud-native solutions (for example, CIC and IPAM controller or COE) together or separately with a single Helm command, you still need to understand and input all the parameters before the installation. You can also provide a consolidated “values.yaml” like the one here to install multiple charts.
Because GUIs are widely considered to be more intuitive and simpler than CLIs, we developed the deployment builder to make installing the NetScaler cloud-native portfolio easier and faster. With the deployment builder, IT admins have various options for deploying NetScaler ADC as ingress in different topologies. Whether you need to deploy NetScaler ADC VPX/MPX as an ingress device in front of clusters (single-tier) or deploy NetScaler ADC VPX in front of individual cluster-nodes or NetScaler ADC CPX inside nodes (dual-tier), the deployment builder makes it easy.
Consider a deployment topology that needs multiple NetScaler products to work in unison. For example, a user might want to install the CIC, COE, CNC, and NetScaler ADC metrics exporter to deploy NetScaler ADC in a single-tier ingress topology. The deployment builder is designed to make these installations easier. In the deployment builder, a user can simply select options to install each of the various products they need as part of the deployment topology.
As shown below, an IT admin can fill in the values on the left side, and the associated “values.yaml” is generated automatically as shown on the right side. Each field has a short, self-explanatory description associated with it. Once all the necessary fields are filled with the proper value, the IT admin can download or copy the “values.yaml”; then, the NetScaler services can be installed using these two commands:
helm repo add citrix https://citrix.github.io/citrix-helm-charts/helm install "name" citrix/citrix-cloud-native -f values.yaml
Figure 1: Citrix deployment builder (now NetScaler deployment builder) in actionLet’s generate ‘values.yaml’ for a Tier 1 ingress (or single-tier topology), one of the deployment topologies mentioned here. Follow the below steps:
Make sure Helm version 3 is installed on the Kubernetes Cluster. Check out the Helm site or this resource for more information. A prerequisite for this deployment is the creation of a Kubernetes secret for the NetScaler ADC VPX or MPX credentials, which can be done with the following command: kubectl create secret generic your_secret_name --from-literal=username='ADC_username' --from-literal=password='ADC_password'
Fill in the mandatory parameters for the ingress solutions. Provide the NetScaler ADC VPX/MPX NSIP in the MANAGEMENT IP field and the name of the Kubernetes secret you created using the command above in the KUBERNETES SECRET NAME field. If you scroll down, you will see an option to deploy CNC, COE, and the metrics exporter along with this ingress solution, as shown below.
Figure 2: How to install other cloud-native networking products with ingressWhen you select any of the NetScaler products, the fields necessary for installation will appear on the form automatically. For illustrative purposes, assume in this the Tier 1 ingress example, the NetScaler ADC IP is 1.1.1.1, the secret created for the ADC credentials is nslogin, and the NetScaler ADC metrics exporter is being installed along with the ingress. The “values.yaml” will appear as shown below:
Figure 3: Tier 1 ingress with Citrix ADC Metrics Exporter (now NetScaler ADC Metrics Exporter)Once the “values.yaml” file is generated, it can be either copied or downloaded, then installed using the Helm commands mentioned earlier in this blog post (and as shown in the figure below), and voila! Now you have your deployment topology ready.

Figure 4: Installing Citrix Ingress Controller with Citrix Metrics Exporter (now NetScaler) using values.yaml generatedLearn More
NetScaler’s cloud-native Helm charts support the installation of various cloud-native offerings with a single Helm command. And our GUI-based NetScaler deployment builder makes your cloud-native deployments easier and faster.
To learn more about using Citrix Ingress Controller to enable various features on NetScaler ADC CPX, VPX, and MPX, check out our GitHub repository.

Guest
Tech Insight: Microservices-Based Application Delivery with Citrix and Red Hat OpenShift - Reference Architecture overview
September 22, 2021Author:  Matt Brooks; Priyanka Sharma
Special thanks:  Dhiraj N Gedam
Cloud-Native applications are developed to take advantage of the distributed and scalable nature of the cloud. It includes many benefits around Enterprise productivity, operational efficiency, and user experience. Red Hat OpenShift is an enterprise Kubernetes container platform that helps companies deploy, operate, and secure microservice applications across these environments. Citrix provides flexible topologies for traffic management in these environments, depending on requirements, including Full Mesh, ServiceMesh Lite, Single-Tier, and Dual-Tier.
Watch this video to
:

×
×
  • Create New...