Wednesday, September 28, 2016

Using the same FSLogix Profile Container at the same time on different machines

A FSLogix Profile Container is more or less a Windows user profile living in a VHD- or VHDX-File. The concept is similar to Microsoft’s User Profile Disks for RDS which tries to solve issue with traditional Windows roaming profiles

A user profile disk in Microsoft’s world can only be mounted once. Additional attempts mounting the disk will fail.

There is a new option for FSLogix Profile Container which enables you to mount a VHD(X) at the same time on different machines. This is a kind of concurrent access to a FSLogix Profile Container.

Typical use cases:
Somebody has a workstation PC which uses FSLogix Profile Containers. At the same time the users connects from this PC to a remote desktop session, which needs to load the same FSLogix Profile Container.

From a XenDektop Virtual Machine, which uses FSLogix Profile Containers, a user starts a published application on a XenApp Server. On the XenApp Server the same FSLogix Profile Container needs to be used.

You have 4 different options for the behavior of FSLogix Profile Containers on a machine.

  1. Normal profile behavior:
    This means that the VHD(X) gets exclusively mounted and can not be mounted on a different machine at the same time.
     
  2. RW profile:
    This means that the VHD(X) gets mounted in read/write mode, but it can also be mounted read only on a different machine at the same time.
     
  3. RO profile:
    This means that the VHD(X) gets only mounted in read only mode, and it can also be mounted in read/write mode or read only mode on a different machine at the same time.
     
  4. Try RW profile:
    This means that the machine tries to mount the VHD(X) in read/write mode, but if it fails, then it fails back and mounts it in read only mode.


If we remember our use case, we can say the XenDesktop VM is our main working place and our FSLogix Profile Container gets read/write mounted. When starting a published application, then the XenApp Server uses the same FSLogix Profile Container, but mounts it only in read only mode.

The configuration setting to allow concurrent access to FSLogix Profile Containers are not available in any GUI-configuration dialog, but are documented in the FSLogix Apps Administration Guide.



What really happens under the hood?


To trace a little bit and find out what happens under the hood, we can use some simple tools.
Because of the VHD(X) files are on a file share, we can use the “Shared Folders” MMC-Snap-in on the file server, to see which user opens and locks which file.

Normal profile behavior

For the normal profile behavior, we see that there is a lock on the VHDX-file and FSLogix opened it in read/write mode



RW profile

If we configure FSLogix Profile Containers on a machine using the option RW profile, we see that the user has opened two different VHDX files, but only one of them is opened in read/write mode.
The one with the read/write mode is a differencing disk and the other is the base disk. So, FSLogix automatically creates a differencing disk and writes to it. And now any other machine can easily access the base disk also in read only mode.



We can also trace the algorithm in the log file of FSLogix, where we see the used mode - in this case RW profile and also the information about creating a differencing disk.



At logoff the differencing disk gets successfully merged into the base disk.




RO profile

If we configure FSLogix Profile Containers on a machine using the option RO profile, we see that a user has opened the VHDX file in read only mode.



If we trace this in the log again, we see that we are using the read-only option, but there is also a differencing disk created. In contrast to the option RW profile, the differencing disk is not stored on the file share but in the local Windows-TEMP. The reason why here is also a differencing disk is that we need writeable disk for our user profile in any case.




But in contrast to the RW profile at logoff the differencing disk is not merged, but gets deleted.




Try RW profile

If we configure FSLogix Profile Containers on a machine using the option Try RW profile, then at logon there happens a check if there exists a differencing disk named RW.vhdx in the file share. If not then a differencing disk is created in the file share and the RW role is taken.
Otherwise if the differencing disk already exists in the file share then FSLogix assumes that another machine already has the RW role. That means, this machine can only take the RO role.





Here is also a comparison table between FSLogix Profile Containers and Microsoft Profile Disks, which shows a lot more differencies.

Tuesday, May 3, 2016

Wednesday, January 27, 2016

Webcast: Macrium Reflect - Technicians Portable Application Support

Macrium Reflect is an easy to use Windows backup tool. There a technicial license model which allows you to backup/restore multiple PCs. Using this license model you can use Macrium Reflect as a portable application on a USB stick. At the same time the USB stick contains a bootable restore environment.
This is a german webcast about to use it.

Monday, December 21, 2015

FSLogix Apps - App Containerization & User Profile Containers

german webcast about FSLogix Apps - App Containerization & User Profile Containers.
This video shows the basic concepts of FSLogix Apps and also an advanced example running multiple Microsoft Office versions on one RDSH Server.


Wednesday, November 4, 2015

Webcast: PernixData Architect - learn about the I/O Pattern of your virtual infrastructure

german webcast about the new PernixData Architect.
PernixData Architect provides deep insight into the I/O pattern of each VM including latency, IOPS, throughput, block size, read/write ratio,...


Thursday, October 22, 2015

Some findings about file type associations (FTA) in Windows 8.1, 10 and Server 2012 R2

There is a lot of confusion about FTA since Microsoft introduced some changes since Windows 8. There are already very good blog posts on the internet which give some insights and suggestions.

One of those blog post, which in my opinion has done currently the best deep-dive into the inner workings of FTAs is from The AppSence Bigot.

If you are not aware of all the confusion about FTAs I would suggest to read the above mentioned blog post. It gives you a very good introduction to the issues.

This blog post has the intention to add further insights into FTAs and to maybe add an additional piece of the FTAs puzzle.

It is already know that Microsoft introduced since Windows 8 a hash to secure the default handler for a file type. Which means you can no longer use a script or something else to manipulate the registry directly to change the default handler. According to a Mircrosoft Technet blog post, this hash is calculated based on the application and the user. This matches also my findings. And I would like to go a little further and estimate that the hash is calculated base in which place the ProgId of the application has been registered and the user. In the example below the ProgId is FoxitReader.Document.
In contrast to James Rankin (Appsense Bigot), in my environment I am able to roam these settings between different operating systems as long as the application has the registered ProgIds in the same place on each system.
ProgIds can be registered in the following locations, where 1. takes precedence: (example .pdf)

  1. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithProgids
  2. HKCU\Software\Classes\.pdf\OpenWithProgIds
  3. HKLM\Software\Classes\.pdf\OpenWithProgIds

I asume, we all know that HKCR is a combined view of HKCU\Software\Classes and HKLM\Software\Classes where HKCU takes precedence.





Some further rules for FTAs regarding registry entries:

  1. If there is a valid Hash and ProgId in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\UserChoice then this is your default handler.
     
  2. If hash is invalid or does not exist then OpenWithProgIds and OpenWithList keys are compared. OpenWithProgIds has precedence. That means the MRUList value gives you the ordered list of applications. In our example below MRUList is bac, which means:
    first is b = SumatraPDF.exe, second is a = FoxitReader.exe and third is c = AcroRd32.exe.
    That means SumatraPDF is only used as default handler for .pdf if there is actually the correct corresponding ProgId in the OpenWithProgIds Key.

    Please remember that OpenWithProgIds can also exist in HKCU\Classes\Software\.pdf\ and in HKLM\Software\Classes\.pdf\.




     
  3. If 1. and 2. does not match, then the selection for the default handler falls back to ProgId which is found in HKCR\.pdf\(Default). As we know this is a combind view of HKLM\Software\Classes and HKCU\Software\Classes, where HKCU takes precedence.




Monday, October 12, 2015

Session Picklist for VMworld 2015, Barcelona

There are so many session I am interested in at VMworld, but I need to make compromises because of conflicting schedules. This is my initial interest list:

STO5336 - VMware Virtual SAN - Architecture Deep Dive
This session walks you through the architecture decisions made for VMware’s Virtual SAN (VSAN) product and the reasoning behind those decisions. The first part of the session... 
Christian Dickmann
Rawlinson Rivera

This session will walk you through the Virtual SAN product architecture, so that you can have an in-depth technical conversation with your customers about the inner workings... 
Simon Todd
Tony Waldemarsson

PAR6641 - How to Reduce Time to Sale and Increase your Deal Size for VMware’s End-User Computing Business
In this session, you will learn about two FREE tools that will help reduce your sales cycle and make you become a trusted advisor for your customers. SysTrack Desktop... 
Garry Owen
Ben Goodman
Marilyn Basanta

Join us for a deep dive into Veeam® Availability Suite™ v9. Anton Gostev (@Gostev) and Doug Hazelman (@VMDoug) will introduce v9’s new features and enhancements designed to... 
Doug Hazelman
Anton Gostev

All about Virtual Volumes - the technical goods of what it is and how it works from a senior architect in technical marketing and the manager of the VVol R&D team!VMware... 
Ken Werneburg
Patrick Dirks

VMware Horizon is a proven desktop virtualization solution that has been deployed around the world. Balancing the performance and cost of a storage solution for Horizon can... 
Travis Wood
Simon Long

Horizon 6 continues to evolve with new features and functions that increase the breadth of use cases and enhance the end user experience. This session will provide a... 
Ray Heffer
Jim Yanik

VMware App Volumes enables real-time application delivery and lifecycle management for Windows desktops and RDSH servers. This session will provide a technical deep dive into... 
Andrew Johnson
Jim Yanik

The Internet of Things and connected cars are the next big thing. In this session you will hear how existing VMware solutions contribute to the value chain of connected car... 
Greg Bollella
Matthias Schorer
Emil Novakov

EUC5573 - Introducing Project Enzo – Low Cost, Simplified Desktop and Application Deployment and ManagementOrganizations are seeking to accelerate their ability to deploy and manage End User Computing (EUC) assets such as virtual desktops and applications. At the same time, they... 
Shikha Mittal
Ken Ringdahl

This session will familiarize security architects and operators with the security features of NSX and how they apply to the Horizon View environment. We will review in detail... 
Bruno Germain

The delivery of policy-managed containerized desktops to end-points not necessarily owned by the business, or to end-points that are offline more than online are modern use... 
Garry Owen
Matthias Multerer

Futures & Trends for Hardware and Next gen distributed services" - Insight into the new storage server hardware architectures: shared NVMe/PCIe rack scale, flash densities,... 
Richard McDougall

VMware NSX is leading the transformation of networking into a software industry, bringing accelerated innovation and giving rise to new technologies and new use cases. How... 
Guido Appenzeller
Mukesh Hira
Scott Lowe

Are you a vSphere expert? Curious about DevOps and OpenStack? In this workshop you will get hands on experience on deploying OpenStack on vSphere infrastructure and using... 
Trevor Roberts Jr

Everyone wants mobility and user freedom but at what price? Being able to provide user customized environment and session persistence, in a non-persistent Virtualized... 
Jim Yanik

App Volumes is a great solution for Just-In-Time application delivery to your virtual desktops or your remote sessions (RDSH or Citrix). There are a lot of ways to deploy... 
Jim Yanik

In this session we will present how to build a stretched cluster configuration on VMware Virtual SAN, in order to expand your enterprise capabilities. A stretched cluster on... 
Rawlinson Rivera
Duncan Epping

Some people say that if you get the storage right in your VDI environment, everything else is easy! In this fun-filled technical workshop, attendees will receive a wealth of... 
Jim Yanik
Michael Cooney

VMware NSX virtualizes the network and decouples logical networks and services from the underlying physical infrastructure. By bringing compute and networking together in a... 
Amol Tipnis
Deepesh Govindan

What kinds of virtual data services can plug into vSphere 6 and what would an administrator use them for? How does the Software Defined Storage model for vSphere 6... 
Manish Apte

Join us for a session on VMware in the ‘Internet-of-Things’ (IoT). We’ll share insights and feedback from some of our customers, discuss internal IoT projects and highlight... 
Greg Bollella
Matthias Schorer

Deep dive into UEM demonstrating all the features and showing why every customer can benefit from UEM. Demo packed session which is interesting for everybody who wants to... 
Pim van de Vis

In the brave new world of IT there is a shift in customer expectations which which is driving a change in how applications are developed and operated (e.g. DevOps), how... 
Emad Benjamin
Ed Hoppitt
Martijn Baecke
Robbie Jerrom
Joe Baguley

VMware continues to innovate and evolve, introducing Linux virtual desktops with Horizon. Come and join our session as we take you on a technical deep dive for delivering... 
Ray Heffer

Are you tired of managing complex backup workflows? Are you confident in providing a successful recovery in the event of a failure? Is your backup infrastructure a black hole... 
Chris Wahl
Arvind Nithrakashyap

The end-user computing landscape continues to evolve with ever growing heterogeneity, new breakthroughs in application and device management and unprecedented security for... 
Dor Zakai
Harry Labana
Erik Frieberg
Shankar Iyer

Hear directly from VMware’s strategists and field professionals on End User Computing (EUC) Act 2 strategy into 2015 and beyond. The session will provide peek into the... 
Shawn Bass
Harry Labana
Karthik Lakshminarayanan
Garry Owen

How do you stay relevant when it seems that every other day, another Silicon Valley upstart attempts to disrupt your business? How do you keep up with its pace of innovation?... 
Chris Mills

Docker and container technology in general have been one of the hottest technologies of the last year. At VMworld 2014, VMware boldy announced that VMs and containers are... 
Benjamin Corrie

How do you deliver ever more complicated environments covering the vast array of technologies your developers are asking for? How do you do this in timescales quicker than... 
Chris Mills

In this session you’ll get to insight into the perspectives and thinking of VMware’s Chief Technology Officers (CTOs), i.e. the leaders driving the technology agendas within... 
Guido Appenzeller
Ray O'Farrell
Joe Baguley
Paul Strong

Meet with a top subject-matter expert from VMware in this intimate one-to-few setting.  No presentations, just whiteboard tables, flip charts, laptops, and deep-dive... 
Scott Lowe

Meet with a top subject-matter expert from VMware in this intimate one-to-few setting.  No presentations, just whiteboard tables, flip charts, laptops, and deep-dive... 
Pim van de Vis

A lot has been said and written about deduplication, and it seems like it’s old news.  There is a lot more than meets the eye, and not every deduplication technique is born... 
  
Using server memory to accelerate applications is not new. But the traditional approach, which requires extensive changes to the application and new hardware, is expensive...