NSX Advanced Loadbalancer Basic Edition for VMware Horizon Connection Server

VMware generally recommends using loadbalancer for VMware Horizon components to increase availability and scalability (https://kb.vmware.com/s/article/2146312).

In this post a Horizon Connection Server load balancer will be set up for users with NSX ALB Basic Edition license. If you already own a Enterprise license of NSX ALB you can use Advanced Features. The setup for Enterprise Edition license holders is documented at the AVI documentation page here: 

https://avinetworks.com/docs/latest/configure-avi-vantage-for-vmware-horizon/.


The general setup of NSX ALB is documented in this blog post: https://phisiescloud.com/2022/12/configuring-nsx-advanced-basic-edition.html


1. Create an Connectionserver specific application profile

Go to Templates --> Profiles --> Application Profiles.

 


Select Detect NTLM App, Websockets Proxy and Proxy Expect Header


2. Create a Health Monitor to check Connection Server health status

Also located under Templates --> Profiles create a Health Monitor called Horizon-HTTPS. This health monitor can be used for Connectionserver and Unified Access Gateways.


Configure the Health Monitor Port to 443.

HTTPS section

In the HTTPS section configure the Client Request Header to GET /favicon.ico HTTP/1.0.

Server Maintenance Mode section

In the Server Maintenance Mode section configure the response code to 2xx . This enables to check for HTTP 200er values. Connection server will return these values if the overall health status is good.

Enable the SSL Attributes and choose the System-Standard Profile. Click on save to finish the Health Monitor.

3. Create an SSL/TLS Profile

This profile is used for services connecting to the loadbalancer mostly UAG (Unified Access Gateways) or Horizon Clients. It is called Connectionserver-SSL in this example


In the General section configure the TLS 1.2 encryption as version. In NSX ALB 22.1.3 and older only TLS 1.2 is available with Basic license. TLS1.3 can be only selected with Enterprise license tier.

Select the currently 2023.03 secure ciphers: 

TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

4. Configure the loadbalancer pool next



Configure the Connection Server pool in the Cloud and VRF which is in the same network range like your NSX-T network segment.

Load balance algorithm Round robin is recommended.

Enter the 2 Connection servers in the Servers section. Enter servers FQDN and IP-address.

Set Deactivation Type for Maintenance windows. Configure the previously created Health Monitor "Horizon-HTTPS".


Select the Default Profiles System-Persistence-Client-IP and System-Analytics Profile. This allows the regogniction of the devices connecting to the load balancer and its pool members.

Select the Connectionserver-SSL profile which is created in the previous step.


Fail Action should be set to Close connection.

5. Create the loadbalancer (Virtual Service)

Now in this step the virtual service (load balancer) will be created.
Configure the Virtual IP first, which will be used for external devices like UAG or Horizon Clients.


Choose default profile System-TCP-proxy and the previouly in step 1 created profile App-Profile-Connectionserver.
Select Services 443 and SSL and the previously created Pool profile.
The SSL profile created previously should be used, too. A custom SSL certificate can be imported, too. How to import an SSL certificate can be read here https://avinetworks.com/docs/latest/ssl-certificates/

Click on save and the virtual service will be created an tested shortly after creation.






Comments