Think IPM

Thursday, April 9, 2015

Come see Sam Jacobs talk StoreFront at Citrix Synergy!

imageIf you have had a Web Interface, Netscaler or Storefront issue and took it to the Citrix Forums, there’s a good chance Sam Jacobs (@WIGuru) has helped you sort it out!  For the second year in a row, Sam has landed a coveted spot at Citrix Synergy to share his deep knowledge on bending Citrix technologies to his will.  ;)  (BTW: Last year was standing room only for BOTH sessions so if you are going to be at Synergy, pre-register for the session to get a seat!)

Here is Sam’s official Promo announcement with all the details:

Making a Splash with Storefront – A Deep Dive!

It’s official! StoreFront is here to stay so let’s ensure StoreFront servers are production-ready through solid documentation. Documentation is essential because is allows you to:

- Clone a StoreFront server group,
- Help troubleshoot any issues with the deployment, and
- Re-create servers after a crash.

Dive deep with me during my session at Citrix Synergy, where you will see how easy it is to automagically generate awesome StoreFront documentation (in MS Word or PDF format) using the StoreFront PowerShell SDK. You will learn which PowerShell cmdlets are used to document a StoreFront server group (there are also complementary cmdlets with which you can create/modify your server group).

Plus, the techniques you will learn in this session are not limited to StoreFront! You will learn how to create an intuitive GUI for your PowerShell scripts that can modify itself based upon variables in the script. You will also learn how to add custom icons and graphics to the forms used in your scripts.

As usual, all source code for the session customizations will be made available to presentation attendees.
[Be sure to subscribe for all updates!]

So join me at Citrix Synergy for SYN417: StoreFront PowerShell documentation deep dive, on Tuesday, May 12 from 4:00-4:45 PM PST in Valencia Ballroom D. Let me show you how to produce awesome StoreFront documentation, and become more proficient in PowerShell in the process. Hope to see you there!

Sam Jacobs is IPM’s Director of Technology Development Services. With more than 25 years of IT consulting, Sam is a Citrix StoreFront, Web Interface and Netscaler customizations and integrations expert. He holds Microsoft MCSD and Citrix Netscaler certifications, is the author of IPM’s TechDev blog and is an active Citrix Forum contributor. A seasoned technical speaker, Sam integrates industry insight with real implementation experience, and has presented customizations at Synergy and BriForum.

Learn more about
IPM or the TechDev practice.
Sam can be reached at:
sjacobs@ipm.com.

Click Here to Continue Reading >>

Friday, March 6, 2015

Is your Citrix Netscaler vulnerable to the FREAK Attack?

Man in the MiddleI have heard this asked before and thought it would make a good post to get some information out.

The FREAK (Factoring RSA Export Keys) attack is the latest threat to exploit vulnerabilities in the OpenSSL libraries. You might remember the HeartBleed bug from last year.

FREAK (formally known as CVE-2015-0204) affects versions of OpenSSL prior to 1.0.1i (released January 15, 2015).  It’s a man in the middle type of attack and affects a lot of different devices.  The official description is here and a good editorialized version here.

I searched and searched but couldn't really find anything official from Citrix on the KBs.  I did run across an old Citrix Forum post related to the Heartbleed bug that stated Netscalers do not use OpenSSL on the internet facing side and therefore would not be affected by internet based OpenSSL attacks.  They actually use an internal SSL stack that they privately test against any known SSL threats.  OpenSSL is only used for connections to the management side.  The information is from a Netscaler Product Manager and can be found here.

It’s a good bet that Citrix engineers are busy testing the internal code stack against the new CVE-2015-0204 vulnerability. Once complete, I am sure will release a KB article like they did with Heartbleed but until then, this will have to do. :) 

Click Here to Continue Reading >>

Friday, February 20, 2015

PSA: SuperFish Malware Threat

Just a quick note with some good information on the newest Malware threat to be in the news.

Image result for friday fish fry
Some background information on the whole story (if you haven’t heard of it) can be found here, there and also over here.

Aaron Silber sent over some useful links to test if you have been infected and some instructions on removing it if you have been compromised.  Be sure to test all installed browsers on your machine.

Microsoft updated Windows Defender to catch the malware and remove it.
http://www.theverge.com/2015/2/20/8077033/superfish-fix-microsoft-windows-defender

You can also go to this website to see if you have been infected:  https://filippo.io/Badfish/

Click Here to Continue Reading >>

Tuesday, February 17, 2015

Lock-Blocked by vSphere Lockdown mode.

I was doing some routine upgrades this past night when I ran into a strange issue that I figured I would make a note of.  While using VMware’s Update Manager to upgrade an ESXi host from 5.1 to 5.5, I ended up getting a pretty cryptic error message from Update Manager letting me know I couldn’t proceed.

The details complained about not having enough memory to create a scratch space partition to store the upgrade image.  Weird.  My host had plenty of free space on the drive and tons of memory – All the VMs were evacuated and I had all the host memory to myself.

image

Fast forward after a bit of Googling and I ran across this blog post.  The alert message was exact but the resolution wasn’t correct for my situation.  Luckily someone had posted another resolution in the comments. (Side Note: Even if you don’t have the time or desire to run a blog, just adding comments to existing blog posts is a great way to contribute back to the virtualization community.)

The hosts I was working on were in a DMZ and had Lockdown Mode enabled.  The commenter had mentioned disabling Lockdown mode as the answer.  Worth trying!

image

I made the quick modification in vCenter to the DMZ host, reran the Update Scan and successfully upgraded the host to 5.5.  Just had to remember to re-enable lockdown mode after the reboot.  Lockdown mode only affected the actual upgrade and not the patches.  Patching a lockdown host presented no issues at all.

Click Here to Continue Reading >>

Thursday, December 25, 2014

Happy Holidays from vCloudInfo!

The holidays are upon us.  The year is almost over.  Another one in the books.

imageThank you for readership, support and encouragement in my personal and professional life this year.

Just a quick note to wish my friends, family, colleagues and clients a happy holiday season and prosperous 2015!

Click Here to Continue Reading >>