Optimizing User Sessions For Xenapp 6all About Citrix



downloadWhy can't I download this file?Optimizing User Sessions For Xenapp 6all About Citrix Download
  • Optimizing User Sessions For Xenapp 6all About Citrix Free
  • Optimizing User Sessions For Xenapp 6all About Citrix Using
  • Optimizing User Sessions For Xenapp 6all About Citrix Software
  • HDX WAN Optimization powered by Citrix Branch Repeater and HDX SmartAccesspowered by Citrix Access Gateway are integrated into the XenDesktop solution. Using the Repeater plug-in together with the Access Gateway plug-in, mobile users enjoy accelerated, secure remoteaccess to XenDesktop and XenApp.

    • Find the settings in the user half of a Citrix Policy under the Session Watermark category. For limitations of this feature, see Text-based session watermark at Citrix Docs. Citrix Blog Post Receiver for HTML5 and Chrome File Transfer Explained: How to use the toolbar to transfer files; Citrix Policy settings to enable/disable file transfer.
    • Best practices for Citrix Virtual Apps and Desktops optimization Your Citrix Virtual Apps and Desktops solution delivers great value out-of-the-box—but that’s only the beginning. By taking full advantage of the available settings, tools, and best practices, you can provide a faster, more seamless experience for users.

    Applicable Products

    • Workspace Environment Management
    • XenDesktop
    • XenApp

    Information

    Optimizing User Sessions For Xenapp 6all About Citrix Download

    The WEM System Optimization feature is a group of settings designed to dramatically lower resource usage on a VDA on which the WEM Agent is installed.
    These are machine-based settings that will apply to all user sessions.


    Managing Servers with different Hardware Configurations
    Sets of VMs may have been configured with different hardware configurations. For instance some machine may have 4 CPU cores and 8GB RAM, while others have 2 CPU Cores and 4GB RAM. The determination could be made such that each server set requires a different set of WEM System Optimization settings. Because machines can only be part of one WEM ConfigSet, administrators must consider whether they need to create multiple ConfigSets to accommodate different optimization profiles.
    WEM System Optimization Settings
    Fast Logoff
    A purely visual option that will end the HDX connection to a remote session, giving the impression that the session has immediately closed. However, the session itself continues to progress through the session logoff phases on the VDA.
    CPU Management
    CPU Priority:
    You can statically define the priority for a process. Every instance of, for example, Notepad that is launched on the VDA will be launched with a priority of the desired CPU priority. The choices are:
    • Idle
    • Below Normal
    • Normal
    • Above Normal
    • High
    • Realtime *
    * https://stackoverflow.com/questions/1663993/what-is-the-realtime-process-priority-setting-for
    CPU Affinity:
    You can statically define how many CPU cores a process will use. Every instance of Notepad that is launched on the VDA will use the number of cores defined.
    Process Clamping:
    Process clamping allows you to prevent a process from using more CPU percentage than the specified value. A process in the Process Clamping list can use CPU up to the configured percentage, but will not go higher. The setting limits the CPU percentage no matter which CPU cores the process uses.
    Note: The clamping percentage is global, not per core (that is, 10% on a quad-core CPU is 10%, not 10% of one core).

    Generally, Process Clamping is not a recommended solution for keeping the CPU usage of a troublesome process artificially low. It’s a brute force approach and computationally expensive. The better solution is to use a combination of CPU spikes protection and to assign static Limit CPU / Core Usage, CPU priorities, CPU affinities values to such processes.

    CPU Management Settings:
    CPU Spikes Protection:
    CPU Spikes Protection is not the same as Process Clamping. Process Clamping will prevent a process from exceeding a set CPU percentage usage value. Spikes Protection manages the process when it exceeds the CPU Usage Limit (%) value.

    CPU Spikes Protection is not designed to reduce overall CPU usage. CPU Spikes Protection is designed to reduce the impact on user experience by processes that consume an excessive percentage of CPU Usage.
    If a process exceeds the CPU Usage Limit (%) value, for over a set period of time (defined by the Limit Sample Time (s) value), the process will be relegated to Low Priority for a set period of time, defined by the Idle Priority Time (s) value. The CPU usage Limit (%) value is global across all logical processors.
    The total number of logical processors is determined by the number of CPUs, the number of cores in the CPU, and whether HyperThreading is enabled. The easiest method of determining the total number of logical cores in a machine is by using Windows Task Manager (2 logical processors shown in the image):

    To better understand CPU Spikes Protection, let’s follow a practical scenario:
    Users commonly work with a web app that uses Internet Explorer. An administrator has noticed that iexplore.exe processes on the VDAs consume a lot of CPU time and overall responsiveness in user sessions is suffering. There are many other user processes running and percentage CPU usage is running in the 90 percent range.
    To improve responsiveness, the administrator sets the CPU Usage Limit value to 50% and a Idle Priority Time of 180 seconds. For any given user session, when a single iexplore.exe process instance reaches 50% CPU usage, it's CPU priority is immediately lowered to Low for 180 seconds. During this time iexplore.exe will consequently get less CPU time due to its low position in the CPU queue and thereby reduce its impact on overall session responsiveness. Other user processes that haven't also reached 50% have a higher CPU priority and so continue to consume CPU time and although the overall percentage CPU usage continues to show above 90%, the session responsiveness for that user is greatly improved.
    In this scenario, the machine has 4 logical processors. If the processes' CPU usage is spread equally across all logical processors, each will show 12.5% usage for that process instance.
    If there are two iexplore.exe process instances in a session, their respective percentage CPU usage values are not added to trigger Spikes Protection. Spikes Protection settings apply on each individual process instance.​

    User-centric CPU Optimization (process tracking on the WEM Agent):

    Optimizing User Sessions For Xenapp 6all About Citrix Free


    As stated previously, all WEM System Optimization settings are machine-based and settings configured for a particular ConfigSet will apply to all users launching sessions from the VDA.
    The WEM Agent records the history of every process on the machine that has triggered Spikes Protection. It records the number of times that the process has triggered Spikes Protection, and it records the user for which the trigger occurred.
    So if a process triggers the CPU Spikes Protection in User A’s session, the event is recorded for User A only. If User B starts the same process, then WEM Process Optimization behavior is determined only by process triggers in User B’s session. On each VDA the Spike Protection triggers for each user (by user SID) are stored in the local database on the VDA and refreshing the cache does not interfere with this stored history.

    Limit CPU / Core Usage:
    When a process has exceeded the CPU Usage Limit value (i.e. Spikes Protection for the process has been triggered), in addition to setting the CPU priority to Low, WEM can also limit the amount of CPU cores that the process uses if a CPU / Core Usage Limit value is set. The limit is in effect for the duration of the Idle Priority Time.
    Enable Intelligent CPU Optimization:
    When Enable Intelligent CPU Optimization is enabled, all processes that the user launches in their session will start at a CPU Priority of High. This makes sense as the user has purposefully launched the process, so we want the process to be reactive.
    If a process triggers Spikes Protection, it will be relegated to Low priority for 180 seconds (if default setting is used). But, if it triggers Spikes Protection a certain number of times, the process will run at the next lowest CPU Priority the next time it’s launched.
    So it was launching at High priority initially; once the process exceed a certain number of triggers, it will launch at Above Normal priority the next time. If the process continues to trigger Spikes Protection, it will launch at the next lowest priority until eventually it will launch at the lowest CPU priority.

    Optimizing User Sessions For Xenapp 6all About Citrix Using


    The behavior of Enable Intelligent CPU Optimization is overridden if a static CPU Priority value has been set for a process. If Enable Intelligent CPU Optimization is enabled and a process’s CPU Priority value has been set to Below Normal, then the process will launch at Below Normal CPU priority instead of the default High priority.
    If Enable Intelligent CPU Optimization is enabled and a process’s CPU Priority value has been statically set to High, then the process will launch at High. If the process triggers Spikes Protection, it will be relegated to Low priority for 180 seconds (if default setting is used), but then return to High priority afterwards.
    Note: The Enable CPU Spikes Protection box must be ticked for Enable Intelligent CPU Optimization to work.
    Optimizing user sessions for xenapp 6all about citrix softwareMemory Management
    Working Set Optimization:
    WEM determines how much RAM a running process is currently using and also determines the least amount of RAM the process requires, without losing stability. The difference between the two values is considered by WEM to be excess RAM. The process’s RAM usage is calculated over time, the duration of which is configured using the Idle Sample Time (min) WEM setting. The default value is 120 minutes.
    Let’s look at a typical scenario when WEM Memory Management has been enabled:

    Optimizing User Sessions For Xenapp 6all About Citrix Software


    A user opens Internet Explorer, navigates to YouTube, and plays some videos. Internet Explorer will use as much RAM as it needs. In the background, and over the sampling period, WEM determines the amount of RAM Internet Explorer has used and also determines the least amount of RAM required, without losing stability.
    Then the user is finished with Internet Explorer and minimizes it to the Task Bar. When the process percentage CPU usage drops to the value set by the Idle State Limit (percentage) value (default is 1%), WEM then forces the process to release the excess RAM (as previously calculated). The RAM is released by writing it to the pagefile.
    When the user restores Internet Explorer from the Task Bar, it will initially run in its optimized state but can still go on to consume additional RAM as needed.
    When considering how this affects multiple processes over multiple user sessions, the result is that all of that RAM freed up is available for other processes and will increase user density by supporting a greater amount of users on the same server.
    Idle State Limit (percent):
    The value set here is the percentage of CPU usage under which a process is considered to be idle. The default is 1% CPU usage. Remember that when a process is considered to be idle, WEM forces it to shed its excess RAM. So be careful not to set this value too high; otherwise a process being actively used may be mistaken as an idle process, resulting in its memory being released. It is not advised to set this value higher than 5%.
    I/O Management
    These settings allow you to optimize the I/O priority of specific processes, so that processes which are contending for disk and network I/O access do not cause performance bottlenecks. For example, you can use I/O Management settings to throttle back a disk-bandwidth-hungry application.
    The process priority you set here establishes the 'base priority' for all of the threads in the process. The actual, or 'current,' priority of a thread may be higher (but is never lower than the base). In general, Windows give access to threads of higher priority before threads of lower priority.
    I/O Priority Settings:
    Enable Process I/O Priority
    When selected, this option enables manual setting of process I/O priority. Process I/O priorities you set take effect when the agent receives the new settings and the process is next restarted.
    Add Process I/O Priority
    Process Name: The process executable name without the extension. For example, for Windows Explorer (explorer.exe) type 'explorer'.
    I/O Priority: The 'base' priority of all threads in the process. The higher the I/O priority of a process, the sooner its threads get I/O access. Choose from High, Normal, Low, Very Low.
    Enable Intelligent I/O Optimization:
    This adopts exactly the same principles as Enable Intelligent CPU Optimization, but for I/O instead of CPU.
    Note: The Enable CPU Spikes Protection box must be ticked for Enable Intelligent I/O Optimization to work.
    Exclude specified processes:
    By default, WEM CPU Management excludes all of the most common Citrix and Windows core service processes. This is because they make the environment run and they need to make their own decisions about how much CPU time & priority they need. WEM administrators can however, add processes they want to exclude from Spikes Protection to the list. Typically, antivirus processes would be excluded. In this case, in order to stop antivirus scanning taking over disk I/O in the session, administrators would also set a static I/O Priority of Low for antivirus processes.
    Notes:
    1. When configuring, the entered process name is a match to the process name’s entry in Windows Task Manager.
    2. Process names are not case-sensitive.
    3. You don’t enter “.exe” after the process name. So for instance, enter “notepad” rather than “notepad.exe”.

    Additional Resources