Re: DD Cloud Tier chunk size – what is it?

Hi David,

So in general most of the traffic going from a DDR to the cloud will be file data – this is stored in ~64Kb ‘compression regions’/chunks and this size is not configurable. There will be other types of data also written to the cloud (i.e. metadata) however this is likely to be a much smaller proportion of what is uploaded.

Note, however, that its not possible to take a file on the DDR and divide its size by 64Kb to work out how many put requests you are likely to see as all data in the cloud is de-duplicated/compressed.

For example, lets say you have a 10Mb file on the active tier of your DDR which you are going to migrate to the cloud – you might think you can do 10Mb/64Kb = 160 PUT requests. Note, however, that this wouldn’t be correct for the following reasons:

– The data being written to the cloud will be de-duplicated against data already in the cloud. For example if 95% of the data in your 10Mb file already exists within the cloud unit you are migrating to (as its referenced by other files which have already been migrated) the DDR will only need to upload the 5% unique data (i.e. 512Kb / 8 PUT requests). Working out how much of a file on the active tier is ‘unique’ when compared with existing data in a cloud unit is very complex and certainly not something that customers can do themselves (so you cannot gain any insight into how much data a file will upload during migration without actually uploading it)

– The data being written to the cloud will be compressed prior to upload. So again lets consider that 95% of the files data already exists in the cloud unit so only 512Kb need to be physically uploaded. If, however, this is compressed via lz before being uploaded it might get 2x compression so now only 256Kb physical data needs to be uploaded (i.e. 4 PUT requests). Again compression ratios depend on a number of factors and its pretty much impossible to say how ‘compressible’ some data is without actually compressing in during migration

Basically customers don’t get any insight into this process which can make it hard to estimate exact costings. That being said DD LTR (long term retention to cloud) has been designed so that it writes to/reads from the cloud as little as possible to minimise costs.

Sorry I don’t have a better answer but I hope this helps to some extent.

Thanks, James

Related:

  • No Related Posts

Help Mid Market Customers Drive the Technology Changes Needed to be Successful

Dell EMC is your strategic technology partner that Mid Market customers can depend on for efficient solutions to meet their business goals.

Who are Mid Market Customers?

IT is small – often small department and their level of experience varies widely. IT or Business decision makers are typically in hybrid roles, wearing multiple hats and stretched thin.

Technology is critical to their businessesMid Market customers need ‘commercial’ systems and some level of infrastructure. They are dealing with complex IT needs (mobility; cloud; security; operations), looking to keep up with and take advantage of change with solutions that scale to their needs.

Need assurance and support – because of their size, each IT decision is a big one and can have a significant impact on their business. With limited budgets and resources, they need confidence and trust in their vendor and solutions.

Efficiency is the end goal for ITMid Market customers may have different goals; grow big, increase their margin, compete, however they are all looking to technology to provide efficiency toward that goal—automate, speed-up and make things easy to accomplish.

What do Mid Market customers need?

Easy to install and maintain – Mid Market customers don’t need a lot of layers, complexity or staff. They would rather invest in future-oriented solutions that allow them to take on more, while staying lean.

Flexible + scalable – Mid Market customers prefer solutions that are flexible and scalable, should things change and they can adjust as needed. Technology is a big investment for them—they don’t want to over or under buy.

Comprehensive – Comprehensive products and comprehensive support. Mid Market customers prefer vendors who can offer a range of solutions across IT, not just one-offs. Vendors who can help upfront with expertise and throughout the process with deployment, support and lifecycle services.

Dell EMC has the latest innovative solutions from end users to infrastructure, plus the strategic guidance and expert execution, that make it easy for mid-size organizations to adopt transformative technologies to grow, compete or perform their best.

Product Portfolio –the broadest range with the latest solutions from end users to infrastructure, to help adopt transformative technology that Mid Market customers need to improve speed and agility.

Security Portfolio a full range of innovative data security and data protection solutions that scale to the needs of any business, working together to protect data, prevent threats and assure business continuity.

Services Portfolio best-in-class services to extend their IT teams. Get systems up and running faster and resolve issues more quickly, whether refreshing PCs or modernizing infrastructure.

What’s the benefit to your business?

Mid Market customers have limited bandwidth to manage multiple vendors and solutions. Partnering with Dell EMC enables you to:

  • Offer businesses the solutions they need to achieve their goals and build long-term loyal relationships
  • Achieve higher sales and margins by selling a broad range of products and solutions
  • Boost profitability by offering a wide range of services

Find campaign assets to support you in planning and creating your own marketing activity, targeting these growing businesses on theDigital Marketing Platform.

Related:

  • No Related Posts

Notice of Change Announcement for NetScaler SD-WAN 4000-SE (Standard Edition)

Citrix Systems, Inc. announces End of Maintenance for NetScaler SD-WAN 4000-SE (Standard Edition) appliances.

The tables below explain the Citrix NetScaler SD-WAN life cycle management milestones as well as important information regarding dates and options during this period. The dates and milestones provided are in accordance with stated End of Life/End of Support policies for Citrix Systems, Inc.

Table 1. Milestones and Dates

Milestone Definition Date
Notice of Change (NSC) The NSC date is the date on which Citrix announces the intent to initiate the lifecycle management process for a hardware platform. May 15, 2018
End of Sale (EOS) The date on which Citrix will no longer offer the product. June 15, 2018
End of Maintenance (EOM) / End of Life (EOL) The EOL milestone signals the point at which no support or maintenance is provided. Product information will be limited to the historical material available on MyCitrix.com or other online resources and is subject to removal beyond this date. June 15, 2023

Click here for the Citrix Product LifecycleMilestones Definitions.

Products Affected

The products affected by this announcement and their replacements are listed in Table 2 (below). The products listed in the Product Replacement / Alternatives column represent the migration path for these discontinued platforms.

Table 2. Platforms affected by this announcement.

Product Description Replacement / Alternatives
NetScaler SD-WAN 4000-SE (Standard Edition) 4100-SE (Standard Edition)

Customer Actions

Citrix recommends that existing customers take steps to upgrade to the latest NetScaler SD-WAN platform so that they can take advantage of the upgraded features and performance. This will ensure the best transition of the product.

For More Information

For more information about the Citrix NetScaler SD-WAN, visit https://www.citrix.com/products/netscaler-sd-wan/ or contact your local Citrix sales representative / authorized Citrix business partner..

Related:

  • No Related Posts

VDA Cannot Communicate With Delivery Controllers

To resolve this issue:

1. If the communication between VDA and Delivery Controllers were set using

a) Policy or Manually/Registry-based:

  • Verify the ListOfDDCs is not empty, and that the hostnames are correctly entered and can be resolved. To do this, you can ping each host name or use nslookup from the command prompt.
  • Value will be stored in:
HKLMSoftwarePoliciesCitrixVirtualDesktopAgent (ListOfDDCs)

or

HKLMSoftwareWow6432NodeCitrixVirtualDesktopAgent (ListOfDDCs)

*For more information, see [Best Practices for XenDesktop Registry-based DDC Registration] (https://support.citrix.com/article/CTX133384) in the Citrix Knowledge Center.

b) Active Directory OU-based discovery:

  • Value will be stored in:
32 Bit: HKEY_LOCAL_MACHINESoftwareCitrixVirtualDesktopAgentFarmGUID

64 Bit HKEY_LOCAL_MACHINESoftwareWow6432NodeCitrixVirtualDeskto pAgentFarmGUID

*For more information, see [Active Directory OU-based Controller Discovery](https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-6/xad-controller-intro/xad-controller-ou-dscvr.html)

c) Provisioned by MCS

  • The MCS process creates C:Personality.ini, containing a list of contactable DDCs in following format:

[VdaData] ListOfDDCs=<FQDN of the Controller>

2. Verify the VDA’s DNS settings are correctly configured so the Delivery Controller’s FQDN can be resolved from the VDA.

3. Verify the network communication by pinging VDA from the Controller and vice versa.

4. Verify the VDA and the Delivery Controller can communicate on the same port.

5. Verify that any Delivery Controller host names in the Windows Hosts file are correctly entered and can be resolved. To do this, you can ping each host name or use nslookup from the command prompt.

Related:

  • No Related Posts

Citrix XenApp/XenDesktop Site is unreachable by a FMA Service



Smart Check has detected that the XenApp/XenDesktop site is unreachable by one of the following services:

ADIdentity Service

Analytics Service

AppLibrary Service

Broker Service

Configuration Service

Delegated Admin Service

Environment Test Service

Host Availability Service

Machine Creation Service

Monitor Service

StoreFront Service

Trust Service

Orchestration Service

The database is compatible and the service group for the Controller Service is available for registration. The Controller Service can communicate with the database, but no endpoints are registered in the Central Configuration Service. This can occur when the Site setup or upgrade did not complete, resulting in a partially configured Site.

For more information about these services, refer to [CTX139415](http://support.citrix.com/article/CTX139415).

Related:

  • No Related Posts

Symatec 14 On Prem to Cloud – Add encryption?

I need a solution

We currently have a on prem Symatec EPP solution.

I’m looking for a ‘simple’ way to add FDE to our device and It looks like the Symnatec on prem solution would require anotehr server with a completely seperate management conolse/

If we move to the 14.1 cloud solution would that allow us to simply purchase the licences for encryprion and then deploy the encryption software and policies to the remote devices?

Thanks

0

Related:

  • No Related Posts

Site isolated for a Citrix XenApp/XenDesktop Controller Service



Smart Check has detected that the site has been isolated for one of the following XenApp/XenDesktop services:

ADIdentity Service

Analytics Service

AppLibrary Service

Broker Service

Configuration Service

Delegated Admin Service

Environment Test Service

Host Availability Service

Machine Creation Service

Monitor Service

StoreFront Service

Trust Service

Orchestration Service

The database is compatible and the service group for the Controller Service is available for registration. The Controller Service can communicate with the database, but no endpoints are registered in the Central Configuration Service. This can occur when the Site setup or upgrade did not complete, resulting in a partially configured Site.

For more information about these services, refer to [CTX139415](http://support.citrix.com/article/CTX139415).

Related:

  • No Related Posts

Enforce TLS

I need a solution

Are there any guides for configuring TLS to send from an internal Exchange 2010 server to an external body via Symantec Cloud.

I assume the configuration within the cloud portal is via the TLS Enforcement section, but are there any specific requirements for the Exchange send connector?

Thanks.

0

Related:

  • No Related Posts

Symantec Endpoint Protection Cloud Event Logs

I need a solution

Hi, we are deploying SEP Cloud to a new environment and ideally want our monitoring tool to capture events such as virus detection or out of date definitions. Can anyone advise whether the application writes to any event log we can monitor? I have triggered a virus detection using a test file but cannot see anything obvious in the application or system log. Thanks in advance

0

Related:

  • No Related Posts