Horizon Architecture Noindex
Horizon Architecture Noindex
Horizon Architecture Noindex
Please visit
https://techzone.vmware.com/resource/horizon-architecture for the latest version.
Horizon Architecture
VMwareHorizon
Table of contents
Components .......................................................................................................................................... 5
Pod and Block ........................................................................................................................................ 8
Cloud Pod Architecture .......................................................................................................................... 10
Introduction ............................................................................................................................................. 12
Authentication .......................................................................................................................................... 29
Active-Passive ...................................................................................................................................... 40
Active-Active ........................................................................................................................................ 40
Stretched Active-Active - Unsupported .................................................................................................... 41
Multi-site Global Server Load Balancing ................................................................................................... 41
Multi-site Architecture Diagram .............................................................................................................. 42
Horizon Architecture
This chapter is one of a series that make up the VMware Workspace ONE and VMware Horizon Reference Architecture, a
framework that provides guidance on the architecture, design considerations, and deployment of Workspace ONE and Horizon
solutions. This chapter provides information about architecting VMware Horizon 8. A companion chapter, Horizon Configuration,
provides information about common configuration and deployment tasks for VMware Horizon.
Architectural Overview
The core components of Horizon include a VMware Horizon® Client™ authenticating to a Connection Server, which brokers
connections to virtual desktops and apps. The Horizon Client then forms a protocol session connection to a Horizon Agent running
in a virtual desktop, RDSH server, or physical machine. The protocol session can also be configured to be tunneled via the
Connection Server, although this is not generally recommended as it makes the ongoing session dependent on the Connection
Server.
Components
The following figure shows the high-level logical architecture of the Horizon components, with other Horizon components shown for
illustrative purposes.
Component Description
The Horizon Connection Server securely brokers and connects users to the Horizon Agent that has been
installed in the desktops and RDS Hosts.
Connection Server
The Connection Server authenticates users through Active Directory and directs the request to the
appropriate and entitled resource.
The Horizon Agent is installed on the guest OS of the target VM or system. This agent allows the machine to
Horizon Agent be managed by Connection Servers and allows a Horizon Client to form a protocol session to the machine.
Machines can be virtual desktops, Remote Desktop Session Hosts (RDS Hosts), or physical desktops PCs.
The Horizon Client is installed on a client device to access a Horizon-managed system that has the Horizon
Agent installed.
Horizon Client
You can optionally use a web browser as an HTML client for devices on which installing client software is not
possible.
VMware Unified Access Gateway is a virtual appliance that enables secure remote access from an external
network to a variety of internal resources, including Horizon-managed resources.
When providing access to internal resources, Unified Access Gateway can be deployed within the corporate
Unified Access DMZ or internal network and acts as a reverse proxy host for connections to your company’s resources.
Gateway Unified Access Gateway directs authenticated requests to the appropriate resource and discards any
unauthenticated requests. It also can perform the authentication itself, leveraging an additional layer of
authentication when enabled.
(See Unified Access Gateway Architecture for design and implementation details.)
A web application that is part of the Connection Server, allowing administrators to configure the server,
Horizon Console deploy and manage desktops, control user authentication, initiate and examine system and user events,
carry out end-user support, and perform analytical activities.
VMware technology that provides single-image management with automation capabilities. You can rapidly
create automated pools or farms of instant-clone desktops or RDSH servers from a golden image VM.
VMware Instant Clone
The technology reduces storage costs and streamlines desktop management by enabling easy updating and
Technology
patching of hundreds or thousands of images from the golden image VM.
See the Instant Clone Smart Provisioning section for more information.
Microsoft Windows Servers that provide published applications and session-based remote desktops to end
RDSH servers
users.
Server that delivers True SSO functionality by ensuring a user can single-sign-on to a Horizon resource when
launched from Workspace ONE Access, or through Unified Access Gateway, regardless of the authentication
Enrollment Server
method.
See the True SSO section for more information.
The Horizon Edge Gateway is a virtual appliance that connects a Horizon 8 pod to Horizon Cloud Services –
Horizon Edge Gateway next-gen. This is required when you want to use Horizon Cloud Service – next-gen control plane services,
appliance for example, subscription licensing.
For more information, see Horizon Edge Gateway appliance
The Horizon Cloud Connector is a virtual appliance that connects a Horizon 8 pod to Horizon Cloud Services –
Horizon Cloud first gen. This is required when you want to use Horizon Cloud Service – first-gen control plane services, for
Connector example, subscription licensing.
For more information, see Horizon Cloud Connector and First-Gen Horizon Control Plane Architecture.
The vSphere product family includes VMware ESXi and VMware vCenter Server®, and it is designed for
building and managing virtual infrastructures. The vCenter Server system provides key administrative and
vSphere
operational functions, such as provisioning, cloning, and VM management features, which are essential for
VDI.
From a data center perspective, several components and servers must be deployed to create a functioning Horizon environment to
deliver the desired services.
Workspace ONE Access – Provides enterprise single sign-on (SSO), securing and simplifying access to apps with the
included identity provider or by integrating with existing identity providers. It provides application provisioning, a self-
service catalog, conditional access controls, and SSO for SaaS, web, cloud, and native mobile applications. See
Workspace ONE Access Architecture for design and implementation details.
App Volumes Manager – Orchestrates application delivery by managing assignments of application volumes (packages
and writable volumes) to users, groups, and target computers. See App Volumes Architecture for design and
implementation details.
Dynamic Environment Manager – Provides profile management by capturing user settings for the operating system
and applications. See Dynamic Environment Manager Architecture for design and implementation details.
VMware vSAN storage – Delivers high-performance, flash-optimized, hyper-converged storage using server-attached
flash devices or hard disks to provide a flash-optimized, highly resilient, shared datastore.
VMware NSX-T Data Center – Provides network-based services such as security, virtualized networking, routing, and
switching in a single platform. With micro-segmentation, you can set application-level security policies based on
groupings of individual workloads, and you can isolate each virtual desktop from all other desktops as well as protect
the Horizon management servers.
Database Servers – Microsoft SQL servers or PostgreSQL servers are used to host an event database used by the
Connection Servers.
Note: VMware NSX-T Data Center is licensed separately from Horizon.
A pod can broker up to 20,000 sessions, including desktop and RDSH sessions.
Multiple pods can be interconnected by either using the Horizon Universal Broker or by using Cloud Pod Architecture
(CPA).
A single Cloud Pod Architecture can scale to a maximum of 250,000 sessions. For numbers above that, separate CPAs
can be deployed.
The resource capacity for a pod is provided by one or more resource blocks. Each block is made up of one or more resource
vSphere clusters, and each block has its own vCenter Server. The number of virtual machines (VMs) a block can typically host
depends on the type of Horizon VMs used. See vCenter Server for details. Resource blocks can be either in the same location as
the Connection Servers or in a different location, using the Remote Agents deployment model.
for management is too high. If you place everything on the same vSphere cluster, you must configure the setup to ensure resource
prioritization for the management components. Sizing of resources (for example, virtual desktops) must also take into account the
overhead of the management servers. See vSphere Resource Management for more information.
Table 3: Pod and Block Design for this Reference Architecture
Deploying multiple, separate pods in different sites provides site redundancy and allows an equivalent service
Justification to be delivered to the user from an alternate location.
This allowed the design and deployment of the block and pod architecture to be validated and documented.
Introduction
VMware Horizon® is a platform for managing and delivering virtualized or hosted desktops and applications to end users. Horizon
allows you to create and broker connections to Windows virtual desktops, Linux virtual desktops, Remote Desktop Server
(RDS)–hosted applications and desktops, Linux-hosted applications, and Windows physical machines.
This chapter of the reference architecture covers the architecture and design considerations for Horizon 8 for vSphere. Horizon 8
can be deployed on-premises or on other supported cloud platforms. This chapter covers the foundational and common
architectural information for deploying Horizon and is applicable across all supported platforms. Separate chapters give the
additional design considerations for Horizon on supported cloud platforms, including VMware Cloud on AWS, Azure VMware
Solution, Google Cloud VMware Engine, Oracle Cloud VMware Solution, and Alibaba Cloud VMware Service.
Table 1: Horizon Environment Setup Strategy
A Horizon deployment was designed, deployed, and integrated with the VMware Workspace ONE platform.
Decision
The environment was designed to be capable of scaling to 8,000 concurrent connections for users.
Justification This strategy allowed the design, deployment, and integration to be validated and documented.
Connection Server
A single Connection Server supports a maximum of 4,000 sessions. This is reduced to 2,000 sessions when tunneling connections
through the Connection Server by using the Blast Secure Gateway, PCoIP Secure Gateway, or the HTTP(s) Secure Tunnel on the
Connection Server.
Up to seven Connection Servers are supported per pod, with up to 20,000 active sessions in total per pod.
To satisfy the requirements that the proposed solution be robust and able to handle failure, deploy one more server than is
required for the number of connections (n+1).
Important: The Connection Servers in a single pod cannot span physical locations. They must be located within a single data
center and run on a well-connected LAN segment.
Table 5: Strategy for Deploying Connection Servers
An NSX Advanced load balancer was used in front of the Connection Servers for internal connections.
Decision
Source IP was configured for the persistence or affinity type.
This provides an internal common namespace for the Connection Servers, which allows for ease of use, scale,
Justification
and redundancy.
vCenter Server
vCenter Server is the delimiter of a resource block.
The recommended number of VMs that a vCenter Server can typically host depends on the type of Horizon VMs used. The
following limits have been tested.
20,000 instant-clone VMs
4,000 full-clone VMs
Just because VMware publishes these configuration maximums does not mean you should necessarily design to that limit. Using a
single vCenter Server does introduce a single point of failure that could affect too large a percentage of the VMs in your
environment. Therefore, carefully consider the size of the failure domain and the impact should a vCenter Server become
unavailable.
A single vCenter Server might be capable of supporting your whole environment, but to reduce risk and minimize the impact of an
outage, you will probably want to include more than one vCenter Server in your design. You can increase the availability of
vCenter Server by using VMware vSphere® High Availability (HA), which restarts the vCenter Server VM in the case of a vSphere
host outage. vCenter High Availability can also be used to provide an active-passive deployment of vCenter Server appliances,
although caution should be used to weigh the benefits against the added complexity of management.
Sizing can also have performance implications because a single vCenter Server could become a bottleneck if too many
provisioning tasks run at the same time. Do not just size for normal operations but also understand the impact of provisioning
tasks and their frequency.
For example, consider a use case with non-persistent, parent-based, instant-clone desktops, which are deleted after a user logs off
and are provisioned when replacements are required. Although a non-persistent, floating desktop pool can be pre-populated with
spare desktops, it is important to understand how often replacement VMs would need to be generated and when that happens. Are
user logoffs and the demand for new desktops spread throughout the day? Or are desktop deletion and replacement operations
clustered at certain times of day? If these events are clustered, can the number of spare desktops satisfy the demand, or do
replacements need to be provisioned? How long does provisioning desktops take, and is there a potential delay for users?
Understanding provisioning tasks, like this, helps understand the demand placed on the vCenter Server and whether it is better to
scale out rather than scale up.
Table 7: Implementation Strategy for vCenter Server
Two resource blocks were deployed per site, each with their own vCenter Server virtual appliance, located in
Decision
the internal network.
A single resource block and a single vCenter Server are supported for the intended target of 8,000 instant-
clone VMs; however, having a single vCenter Server for the entire user environment presents too large a
failure domain.
Justification Splitting the environment across two resource blocks, and therefore over two vCenter Servers reduces the
impact of any potential outage.
This approach also allows each resource block to scale to a higher number of VMs and allow for growth, up to
the pod recommendation, without requiring us to rearchitect the resource blocks.
External Access
Secure, external access for users accessing resources is provided through the integration of Unified Access Gateway (UAG)
appliances. We also use load balancers to provide scalability and allow for redundancy. A Unified Access Gateway appliance can be
used in front of Connection Servers to provide access to on-premises Horizon desktops and published applications.
Figure 9: Options for Load Balancing Connection Servers for Internal Connections
Single DMZ
For on-premises deployment of Horizon within a data center of an organization, it is common to install Unified Access Gateway
appliances in a single DMZ, which provides a network isolation layer between the Internet and the customer data center.
Double DMZ
Some organizations have two DMZs (often called a double DMZ or a double-hop DMZ) that are sometimes used to provide an extra
layer of security protection between the Internet and the internal network. In a double DMZ, traffic has to be passed through a
specific reverse proxy in each DMZ layer. Traffic cannot simply bypass a DMZ layer.
Note that in a Horizon deployment, a double DMZ is not required, but for environments where a double DMZ is mandated, an extra
Unified Access Gateway appliance acting as a Web Reverse Proxy can be deployed in the outer DMZ.
Six standard-size Unified Access Gateway appliances were deployed as part of the Horizon solution.
Decision
These were located in the DMZ network.
UAG provides secure external access to internally hosted Horizon desktops and applications.
One standard-size UAG appliance is recommended for up to 2,000 concurrent Horizon connections.
Four UAG appliances are required to handle the load of the target 8,000 users.
Justification We elected not to place a load balancer in-line between the UAGs and the Connection Server, so each UAG
targets a particular Connection Server. To match up with the requirement for three Connection Servers, we
should look to have a 2-to-1 ratio of UAG to Connection Server. This leads to an overall count of six UAGs, to
ensure redundancy and availability.
enabling IT administrators to perform maintenance, upgrades, and configuration changes while minimizing impact to users.
To implement them in a highly available configuration, provide a virtual IP address (VIP), and present users with a single
namespace, the following options can be used.
A third-party load balancer, such as the NSX Advanced Load Balancer (Avi) can be used.
Unified Access Gateway high availability (HA) can be used.
When load balancing Horizon traffic to multiple Unified Access Gateway appliances, the initial XML-API connection (authentication,
authorization, and session management) needs to be load balanced. The secondary Horizon protocols must be routed to the same
Unified Access Gateway appliance to which the primary Horizon XML-API protocol was routed. This allows the Unified Access
Gateway to authorize the secondary protocols based on the authenticated user session.
If the secondary protocol session is misrouted to a different Unified Access Gateway appliance from the primary protocol one, the
session will not be authorized. The connection would therefore be dropped in the DMZ, and the protocol connection would fail.
Misrouting secondary protocol sessions is a common problem if the load balancer is not configured correctly.
The load balancer affinity must ensure that XML-API connections made for the whole duration of a session (with a default
maximum of 10 hours) continue to be routed to the same Unified Access Gateway appliance.
With the use case of providing secure, external access to resources, there is no need to provide a single namespace to the Horizon
Connection Servers because only external users will be connecting. This means that there is no need to provide a load balancer
VIP in front of the Connection Servers.
Although the secondary protocol session must be routed to the same Unified Access Gateway appliance as was used for the
primary XML-API connection, there is a choice of whether the secondary protocol session is routed through the load balancer or
not. This normally depends on the capabilities of the load balancer.
For more detail on load balancing of Unified Access Gateway appliances, see:
Load Balancing in the Unified Access Manager Architecture chapter
Unified Access Gateway Load Balancing Topologies
Load Balancing Unified Access Gateway for Horizon
An existing load balancer can be used, or a new one such as the VMware NSX Advanced Load Balancer (formerly Avi Vantage) can
be deployed. See Configure Avi Vantage for VMware Horizon for more details.
Table 9: Strategy for Using Load Balancers with Connection Servers
For the on-premises deployments of Horizon, an NSX Advanced load balancer was used in front of the Unified
Decision Access Gateways.
Source IP was configured for the persistence or affinity type.
This provides a common namespace for the Unified Access Gateways, which allows for ease of use, scale, and
Justification
redundancy.
Network Ports
To ensure correct communication between the components, it is important to understand the network port requirements for
connectivity in a Horizon deployment. The Network Ports in VMware Horizon guide has more detail and includes diagrams
illustrating the traffic. It has specific sections and diagrams on internal, external, and tunneled connections.
Notes:
The network ports shown are destination ports.
The arrows indicate the direction of traffic initiation (source to destination).
Horizon UDP protocols are bidirectional, so stateful firewalls should be configured to accept UDP reply datagrams.
Display Protocol
Horizon is a multi-protocol solution. Three remoting protocols are available when creating desktop pools or RDSH-published
applications: Blast Extreme, PCoIP, and RDP.
Table 10: Display Protocol for Virtual Desktops and RDSH-Published Apps
This display protocol supports multiple codecs, both TCP and UDP from a transport protocol perspective, and
Justification
the ability to do hardware encoding with NVIDIA GRID vGPU.
Blast Extreme is configured through Horizon when creating a pool. The display protocol can also be selected directly on the
Horizon Client side when a user selects a desktop pool.
See the following guides for more information, including optimization tips:
VMware Blast Extreme Optimization Guide
VMware Blast Extreme Display Protocol in Horizon
Internal Connections
With internal connections, the Horizon Client authenticates to a Connection Server, which brokers connections to virtual desktops
and apps. The Horizon Client then forms a protocol session connection to a Horizon Agent running in a virtual desktop, RDSH
server, or physical machine.
The following diagram shows the ports required to allow an internal Blast Extreme connection.
External Connections
External connections include the use of VMware Unified Access Gateway to provide secure edge services. The Horizon Client
authenticates to a Connection Server through the Unified Access Gateway. The Horizon Client then forms a protocol session
connection, through the secure gateway service on the Unified Access Gateway, to a Horizon Agent running in a virtual desktop or
RDSH server.
The following diagram shows the ports required to allow an external Blast Extreme connection.
Figure 19: Horizon 8 Pods Connected to Horizon Cloud Service – next-gen with Horizon Edge Gateway Appliances
For instructions on deploying Horizon Edge Gateway Appliances to connect a Horizon 8 pod to Horizon Cloud Service – next-gen,
see the Deploying a Horizon Edge Gateway for Horizon 8 Environments guide.
The documentation also has several resources to assist in the Horizon Edge Gateway appliance deployment:
VMware Horizon Cloud Service - next-gen Deployment and Onboarding
Requirements Checklist for Deploying a Horizon 8 Edge
Horizon 8 Deployments, Horizon Edge - Preparing to Deploy
Deploying a Horizon 8 Edge for Use with Horizon 8 Deployments and the Horizon Cloud - next-gen Control Plane
To understand the network communication and port requirements for the Horizon Edge Gateway appliance, see Network Ports in
VMware Horizon.
Authentication
There are a variety of methods for authenticating users in Horizon to control access to desktops and published applications.
A SAML authenticator for Workspace ONE was configured to be required on the Connection Servers.
Decision
Workspace ONE mode was enabled on the Connection Servers.
With this configuration, Connection Servers allow Workspace ONE Access to be a dynamic SAML authenticator.
Justification This strategy facilitates the launch of Horizon resources only from Workspace ONE Access and redirects any
attempts to authenticate directly to Horizon back to Workspace ONE Access.
Unified Access Gateway was left with the default pass-through authentication and no additional authentication
Decision
methods were implemented on Unified Access Gateway.
This configuration facilitates the launch of Horizon resources from Workspace ONE Access and will use that as
the user authentication point.
Justification
Implementing further authentication on the Unified Access Gateway would force users to have to authenticate
twice.
True SSO
Many user authentication options are available for users logging into Horizon including using Workspace ONE Access or Unified
Access Gateway. Active Directory credentials are only one of these many authentication options. Ordinarily, using anything other
than AD credentials would prevent a user from being able to single-sign-on to a Horizon virtual desktop or published application.
After selecting the desktop or published application from the catalog, the user would be prompted to authenticate again, this time
with AD credentials.
True SSO provides users with SSO to Horizon desktops and applications regardless of the authentication mechanism used. If a user
authenticates by using Active Directory credentials, the True SSO feature is not necessary, but you can configure True SSO to be
used even in this case so that the AD credentials that the user provides are ignored and True SSO is used.
True SSO uses SAML, where Workspace ONE is the Identity Provider (IdP) and the Horizon Connection Server is the Service
Provider (SP). True SSO generates unique, short-lived certificates to manage the login process.
This feature allows SSO to Horizon resources when launched from Workspace ONE Access, even when the user
Justification
does not authenticate with Active Directory credentials.
True SSO requires the Enrollment Server service to be installed using the Horizon installation media.
Component Description
A server that delivers True SSO functionality by ensuring a user can single-sign-on to a Horizon
resource when launched from Workspace ONE Access, regardless of the authentication method.
The Enrollment Server is responsible for receiving certificate signing requests from the Connection
Enrollment Server
Server and then passing them to the Certificate Authority to sign.
True SSO requires Microsoft Certificate Authority services, which it uses to generate unique, short-
lived certificates to manage the login process.
Certificate Authority Active Directory Certificate Services (AD CS) role running on a Windows server.
Certificate Template Used for issuing short-lived certificates that are used as part of the SSO process.
The Connection Server was configured to load balance requests using round robin between the two Enrollment
Decision
Servers.
Justification With two Enrollment Servers per pod, this is the recommendation when designing for availability.
vSphere HA and VMware vSphere® Storage DRS™ can be used to ensure the maximum availability of the Enrollment Servers. DRS
rules are configured to ensure that the devices do not reside on the same vSphere host.
Remote Agents
Horizon now supports the deployment of Horizon Agents in a remote location from the Horizon Connection Servers. This is useful
when you need to consume capacity in another data center or cloud platform without having to stand up a full Horizon pod in that
location.
The recommended scale for this feature is up to 1,000 VMs in the remote location. With larger numbers, although this feature
would still work, the scale becomes large enough to warrant a separate Horizon pod deployed in the cloud platform.
Networking and routing are required between the existing Horizon environment and the location where capacity is going to be
consumed and the remote agents installed. One technical constraint to be aware of is that the Horizon Agents (running in the
virtual desktops and RDSH hosts) must be within 120 milliseconds of latency of the Horizon Connection Servers.
See the VMware Knowledge Base article Remote Agent Support for Horizon Enterprise for more information.
Use Cases
The two common use cases for this feature are:
Centralize Horizon Pods for Private Datacenters – Minimize the number of Horizon pods across multiple locations
and private data centers. This is useful when virtual desktops are required to be physically in multiple locations, such as
branch offices. Normally this would require separate pods per location but with the remote agent architecture, the
management infrastructure can be centralized reducing the number of pods that needs to be deployed.
Extend an existing Horizon pod to consume capacity from a cloud platform – Existing Horizon pods can be
extended to manage and consume capacity deployed in the cloud.
Figure 29: Centralized Horizon Pod Consuming Capacity in Other Private Datacenters
Pod Size
Using remote capacity (other data centers or cloud capacity) to host virtual desktops or RDSH servers, and remotely deploying
Horizon agents does not change the size limitations or recommendations for a single Horizon pod. See Scalability and Availability.
Each Horizon pod can host a max of 20,000 sessions and can consume capacity from up to 5 vCenter servers. Check the VMware
Configuration Maximums for the up-to-date maximums supported.
Connection Servers
Horizon Connection Servers within a single pod must be deployed in a single location and cannot be spread across private data
centers and cloud data centers. See Stretched Active-Active - Unsupported for more detail on why this is not supported.
Latency
Latency between the data center where the existing Horizon pod with the Connection Servers are deployed and every single
remote location where the Horizon Agents are deployed must be 120 milliseconds or less.
Networking connections between private data centers and cloud data centers vary depending on the cloud provider, we
recommend that you work with your VMware technical team as well as your cloud provider for optimal configuration.
Networking
As with any Horizon deployment, correct networking and routing must be in place to ensure the components communicate
properly.
Refer to Network Ports and the Network Ports in VMware Horizon guide to understand the traffic flow and port requirements.
With a remote agent deployment, attention should be paid to ensure that the components that are deployed remotely from each
other can communicate properly. The diagram above highlights the key items with the numbers in circles referenced in the
required traffic flows, below.
1. Connection Servers to vCenter Servers.
2. Horizon Agents in virtual desktops or RDS Hosts to the Connection Servers.
3. For internal user sessions, the Internal Horizon Clients to Horizon Agents.
4. For external user sessions, the Unified Access Gateways to Horizon Agents.
5. Horizon Agents to Active Directory Domain Controllers/file servers.
Versions
The ability to use remote agents in a private data center applies to any currently supported version of Horizon 8.x.
When extending a Horizon pod to manage cloud capacity, the existing Horizon pod must be running Horizon 8 2006 or later.
If Horizon 2106 and later is in use, when you add the cloud vCenter, you must select the correct deployment type. If
this is selected incorrectly, instant clones may not provision properly. For more details, see Add vCenter Server
Instances to VMware Horizon 8.
If Horizon 2103 or earlier is in use, you can set the deployment type of the cloud vCenter in the ADAM DB.
Known Limitations
Horizon Control Plane services are not yet able to differentiate that capacity is deployed across multiple sites. As a result, Image
Management Service functionality will not work when used on a vCenter Server that is remote to the Connection Servers.
Multi-site Architecture
This reference architecture documents and validates the deployment of all features of Horizon across two data centers.
The architecture has the following primary tenets:
Site redundancy – Eliminate any single point of failure that can cause an outage in the service.
Data replication – Ensure that every layer of the stack is configured with built-in redundancy or high availability so
that the failure of one component does not affect the overall availability of the desktop service.
To achieve site redundancy,
Services built using Horizon are available in two data centers that are capable of operating independently.
Users are entitled to equivalent resources from both the primary and the secondary data centers.
Some services are available from both data centers (active/active).
Some services require failover steps to make the secondary data center the live service (active/passive).
To achieve data replication,
Any component, application, or data required to deliver the service in the second data center is replicated to a
secondary site.
The service can be reconstructed using the replicated components.
The type of replication depends on the type of components and data, and the service being delivered.
The mode of the secondary copy (active or passive) depends on the data replication and service type.
Active-Passive
Active-passive architecture uses two or more pods of Connection Servers, with at least one pod located in each data center. Pods
are joined together using Cloud Pod Architecture configured with global entitlements.
Active-passive service consumption should be viewed from the perspective of the user. A user is assigned to a given data center
with global entitlements, and user home sites are configured. The user actively consumes Horizon resources from that pod and site
and will only consume from the other site if their primary site becomes unavailable.
Active-Active
Active-active architecture also uses two or more pods of Connection Servers, with at least one pod located in each data center.
The pods are joined using Cloud Pod Architecture, which is configured with global entitlements.
As with an active-passive architecture, active-active service consumption should also be viewed from the perspective of the user.
A user is assigned global entitlements that allow the user to consume Horizon resources from either pod and site. No preference is
given to which pod or site they consume from. The challenges with this approach are usually related to replication of user data
between sites.
disaster recovery and failover without requiring users to change the way they access the environment.
Note the following features of a GSLB:
GSLB is similar to a Domain Name System (DNS) service in that it resolves a name to an IP address and directs traffic.
Compared to a DNS service, GSLB can usually apply additional criteria when resolving a name query.
Traffic does not flow through the GSLB to the end server.
Similar to a DNS server, the GLSB does not provide any port information in its resolution.
GSLB should be deployed in multiple nodes in an HA or active/passive configuration to ensure that the GSLB itself does
not become a point of failure.
Table 17: Strategy for Global Load Balancing
Justification This provides a common namespace so that users can access both sites.
Composer Server
The Composer server is only required when using linked clones and is considered the legacy method for creating clones. It was
deprecated in Horizon 8 2006, and from Horizon 8 2012 onwards is no longer supported. Instant clones do not require a Composer
server. The recommendation is to use instant clones in preference to linked clones.
See the Modernizing VDI for a New Horizon guide for options and guidance for migrating from legacy components such as View
Composer, persistent disks, and Persona Management to modern alternatives.
The Composer service works with the Connection Servers and a vCenter Server. Each Composer server is paired with a vCenter
Server in a one-to-one relationship. For example, in a block architecture where we have one vCenter Server per 4,000 linked-clone
VMs, we would also have one Composer server.
High availability is provided by vSphere HA, which restarts the Composer VM in the case of a vSphere host outage. VM monitoring
with vSphere HA can also attempt to restart the VM in the case of an operating system crash.
If the VMware View Composer service becomes unavailable, all existing desktops can continue to work just fine. While vSphere HA
is restarting the Composer VM, the only impact is on any provisioning tasks within that block, such as image refreshes or
recomposes, or creating new linked-clone pools.
Overview chapters provide understanding of business drivers, use cases, and service definitions.
Architecture chapters give design guidance on the products you are interested in including in your platform, including
Workspace ONE UEM, Workspace ONE Access, Workspace ONE Assist, Workspace ONE Intelligence, Horizon Cloud
Service, Horizon, App Volumes, Dynamic Environment Manager, and Unified Access Gateway.
Integration chapters cover the integration of products, components, and services you need to create the platform
capable of delivering the services that you want to deliver to your users.
Configuration chapters provide reference for specific tasks as you build your platform, such as installation,
deployment, and configuration processes for Workspace ONE, Horizon Cloud Service, Horizon, App Volumes, Dynamic
Environment Management, and more.
Additional Resources
For more information about VMware Horizon, you can explore the following resources:
VMware Horizon product page
VMware Horizon documentation
VMware Knowledge Base
VMware Product Interoperability Matrix
VMware Professional Services
Changelog
The following updates were made to this guide:
2023-07-13
2306.
8
Horizon
for
Updated
•
chapter.
design
each
within
contributors
and
authors,
changelog,
list
to
section
Resources
Additional
and
Summary
this
Added
•
Horizon Cloud Service
2023-06-02
on
section
New
•
Connector.
Cloud
Horizon
the
using
first-gen
-
Service
Cloud
Horizon
to
or
appliance
Gateway
Edge
Horizon
the
using
next-gen
-
Service
Cloud
Horizon
the
either
to
connecting
on
guidance
give
to
External Access Architecture
detail
Added
•
Gateways.
Access
Unified
with
combination
in
deployed
when
Servers
Connection
balancing
load
for
options
the
and
2303
8
Horizon
for
Updated
•
clarity.
for
additions
and
rewrites
other
Various
•
2022-09-08 Connection Servers
of
sizing
reflect
to
Changes
•
2,000.
of
recommendation
previous
the
removing
connections,
4,000
of
maximum
a
for
2206.
8
Horizon
cover
to
and
clarity
for
rewording
minor
with
updated
chapters
Horizon
All
•
2022-03-30 block and pod
Updated
•
pod.
per
VMs
20,000
of
maximum
the
with
align
and
clarify
to
guidance
remote agents
2021-12-14
for
option
deployment
new
the
covering
section
New
•
.
Horizon Universal Broker
on
section
Added
•
.
2111
version
8
Horizon
for
Updated
•
2020-11-18
8.
Horizon
for
Rewritten
•
Author and Contributors
This chapter was written by:
Graeme Gordon, Senior Staff End-User-Computing (EUC) Architect in End-User-Computing Technical Marketing,
VMware.
Contributors:
Rick Terlep, Staff Technical Marketing Architect, End-User-Computing Technical Marketing, VMware.
Feedback
Your feedback is valuable.
To comment on this paper, contact VMware End-User-Computing Technical Marketing at
[email protected].