Be sure you don't have CBT enabled on the master image you're deploying.
Geoff
Be sure you don't have CBT enabled on the master image you're deploying.
Geoff
Yes, Windows 10 (currently) requires Windows Server 2012 R2 KMS servers, with the new Hotfix, and the Windows 10 KMS key registered.
Supposedly there is a patch coming for Server 2008 R2 but it's not out yet. So migrate your KMS server to 2012 R2, or wait for the Hotfix.
You can modify the registry on your template to enable MAK activation instead, if your VM's have access to the internet on boot.
If you want to run non-activated, you can also disable activation in that same KB.
If you attempt to provision a pool without one of the above, customization will fail (Error:)
I have a pool configured. After working through a few issues, VM's are now provisioning, customizing, and accessible.
Problem is the Windows Start menu is blank when you log on, and Microsoft Edge is missing.
There may other things "wrong" but that's as far as I have dug in so far.
Disabled all GPO's but it had no effect.
Anyone else seen similar behavior?
-Matt
Haven't seen that behavior. Unless it's related to this. I'm still using this fix so it's possible this is still needed.
After solving the Windows Activation Issues, the only problem I'm having is a blank Start Menu, and Windows Edge browser missing. Still scratching my head on that one.
-Matt
Hi,
We are successfully using View 6.1 / Lync 2010 and Teradici Zero clients in a Windows 7 floating linked clone environment.
We need to use IM, audio and video - no telephony integration required.
This is working ok (a few problems with mic and speaker levels but we are tuning this.
My question is around the bandwidth requirements noting we are using zero client and not thin clients.
Audio and video traffic will originate from the zero client and go via the data centre (VDI home) rather than peer to peer.
I understand this but would like to understand it better .
Does anyone have experience of this scenario and possible restrictions on video quality at the source using either the Teradici Management Console or the Windows group policy RTAV options?
Thanks
Hello, We are using VMware View Horizon version 6. We are currently using Linked Cones with Floating Pools that get refreshed every night. We are using storage Tiering where the replicas are on fast SSD storage and the Linked Clones are stored on slower 7.2k Sas Storage. Performance wise things are looking good.
Currently we only have about 200 Desktops provisioned.
We are in the middle of redesigning some of storage as there is allot of wasted space and other things. While looking at things, I noticed that all are Master images for our pools are on a 15k Sas Lun. This is the master images of the Desktop that has the Snapshots for the linked clones to be made from. We currently have about 8 pools so 8 Master images, im calling them master images there might be a term for them that im not using.
My question is, do these Master Images with the Snapshots need to be on Fast 15k Sas storage, or can they be on 7.2k Sas storage? We also have 10k Sas as well.
Ive been looking this up and having found info on it yet, found plenty on setting up Storage Tiering, but no guidelines as to what type of storage the master should be on.
I know that we can test this by moving one to slower storage and then seeing how fast they get provisioned, but not sure I have time at the moment.
Thanks for any input
Whatever you prefer, it depends on the environment, and how much available fast storage you have. It will work either way. I prefer it on faster storage (mine is on SSD) as I want to be able to update my master images as quickly as possible, and it also makes the replica creation finish sooner.
Hi SysteembeheerNSD,
You mean the use of VMware Horizon Client installed on Windows 10 gives sometimes the blankscreen?
I have the same issue here.
Think the client is not compatible yet.
And to access a Windows 10 desktop in View 6.1.1 is an nice job for next week .
Regards
Ronny.
I'm looking into this as well. Any updates from support?
Hi,
Just a thought on this. vSphere has a hard limit of 3GB ram for any 32bit OS, so 3072 is max or there will be a 2nd memory module in Device Manager showing a 'cannot load' error. Windows 7 32bit does support 4GB ram as per M$.
It may be that if the parent container is initially configured as 64bit, that means vSphere will not 'hard limit ram'. Theoretically, you can install a 32bit Win7 and assign 4GB to it and not have any error as stated above.
Just $0.02
Hello,
I'm going through an eval of View and three issues came up while working on external access via the Security Server in our DMZ.
1. Using this article: VMware KB: Guidelines for generating and importing an SSL certificate for the View Connection Server for View 5.0.1 … I bought a certificate from an external CA (Thawte) and imported it into the keystore on the security server. I created the locked.properties file in C:\Program Files\VMware\VMware View\Server\sslgateway\conf. After restarting the Security Server, it still seems to be using its self-signed certificate. Is there some other step missing from this document? I came across one guy's blog who walks through doing this without keytool, and one of his steps says that the friendly name on the cert had to be vdm... not sure if that's specific to his environment, or a VMWare requirement.
2. I was able to log into the Horizon client externally after acknowledging that the self signed certificate wasn't trusted. However if I launch a desktop from the linked clone pool using PCoIP it won't connect. It looks like it's connecting (the screen goes black, and I get the control bar on the top of the screen, but then it closes out and I get a message saying ""The connection to the remote computer has ended". I assume this is a firewall issue, and I've looked at http://blogs.vmware.com/consulting/files/2014/06/Horizon-6-Firewall-3.png and View TCP and UDP Ports. I'm fairly certain that I got all of them. For PCoIP, is all that I need TCP/UDP 4172 open from external in to the Security Server and from the Security Server in to the desktop VMs?
3. If I change the protocol to Microsoft RDP, the connection works from external, however I get a permissions error when it starts to log in to the desktop saying that I need to be in the Remote Desktop Users group. I'm able to connect to the same Linked Clone pool from an internal machine using the same credentials though. Is there something different about how the desktop launches externally vs internally?
Thanks in advance for any help!
Dylan
Well, I figured number 3 out. I didn't realize that there was a separate View Agent Direct-Connection Users group, which I guess is why I could log on internally. Once added to the Remote Desktop Users group, I was good to be able to log in using MS RDP as the protocol from outside the firewall. But i'm still having the same PCoIP and SSL cert issues.
1. The friendly name of the certificate must be "vdm".
This is how view selects the right certificate.
2. getting a black screen when logging in, is almost always a firewall issue. beside the rules, check that you configured the public url's correctly. in the admin page under view configuration -> servers.
Thanks for responding. Regarding the friendly name, what would that mean for the keystore? Do I change the alias of the certificate? It's currently the default, which was mykey. When I tried to change it, I got this:
C:\Program Files\VMware\VMware View\Server\sslgateway\conf>keytool -storetype pkcs12 -changealias -keystore mykeystore.p12 -alias mykey -destalias vdm
Enter keystore password:
keytool error: java.io.IOException: failed to decrypt safe contents entry: javax.crypto.BadPaddingException: Given final block not properly padded
I'll run through those URLs to make sure they are all what they should be.
The PCoIP External URL was set wrong (it was the private IP of the Security Server). Once I switched that to the correct public FQDN, it connected right up!
As for the cert, I imported it into the certificates mmc snapin and changed the friendly name, but was still getting the self signed cert when I connected. Then I realized that the self signed cert must have the same friendly name, which it did. Changed that and restarted the VMWare Horizon View Security Server, and I got the right cert!
Thanks for the help!
Hi,
If the storage capacity is a concern put them on slow disk, all you need is
just putting the replica image on fastest disk possible when you crating the
desktop pool from your snapshot.
Hi All,
I need to generate audit login for our VMware Horizon security server. I need to create this report to show management who try to log into our environment from public network.
I am looking for automate way to generate this report on daily or weekly basis. I looked in VRealize and log insight but couldn't found what I am looking for.
Hi there,
We have a Horizon View 6 deployment going live soon (ish). One of the steps we would like to take either now or soon after go-live is to have all internal users connect directly to their desktops after the initial connection, and for external users to be tunnelled via the Security/Connection server pairing. I am pretty happy with how the config would roughly look, but in lieu of a decent test bed (and not wanting to go installing/re-configuring/uninstalling on the Prod platform for the sake of cleanliness) can anyone answer some basic questions about the practicalities?
Assuming I don't care about resilience it seems that I should have one Connection Server handling the tunnelled users and another connection server paired with a Security Server handling the external users (reference here:Documentation Center for VMware Horizon 6.0 with View). However, should either of those Connection Servers be a replica of the other or would they then simply inherit the tunnelling config of the other? If that is the case and the Connection Servers had to be two standalone instances with their own pairings and tunnelling config does that then mean managing two identical sets of desktop pools or can that be aggregated across the Connection Server instances.
Sorry if this seems like a fundamental question but I don't see everything I've asked definitively answered all in one place.
I think you've got the basic architecture figured out: one connection broker for the internal users (no tunneling) to connect to and a paired connection broker and security server (with tunneling) for the external users. The 2nd connection broker can be a replica install. Once installed you can change the tunneling settings per broker within the View admin interface. Each connection broker has its own set of configuration values for tunneling. The security server will inherit whatever settings the paired connection broker has (excluding URLs), which is why you can't build this configuration with a single connection broker and a security server.
We are migrating our new purchases to include slim clients, but we can not afford to do all of them at once. I am a system admin at a college and will need to setup a lab with older machines to go directly into VMware View to run the virtualized desktop. Does anyone have a recommendations/faq/instructions/references that help lock down a machine so that the end user can only use the virtual desktop and can not get out of it?