VMware Horizon Reach

Release date: November 17th 2023

Welcome to my VMware Horizon series. The reason for creating this session is that VMware Horizon is somewhat lacking when it comes to Notifications to SMTP, Slack etc. It is possible to send logs to SYSLOG and have these analyzed and based on this, send alerts, alarms etc. via SMTP to Helpdesk for instance. But this requires that an extra SYSLOG solution, for example Splunk, to be set up. This is where VMware Horizon Reach shines. It is a very small and neat tool that can be used to send emails if for example desktop pools stops provisioning or if datastores are nearly full, and lots more. VMware Horizon Reach is a VMware Fling created by Andrew Morgan, who describes the goal for Horizon Reach as this:

The design goal of Horizon Reach is to be the “first port of call,” as Andrew calls it, when troubleshooting issues in large or complex Horizon environments. It accomplishes this by providing a web-based monitoring and alerting platform that performs health checking of multiple Horizon Pods. The Pods in question may or may not be connected via Cloud Pod Architecture. They often are in separate datacenters.

Andrew Morgan’s blog about Horizon Reach: Featured Flings for VMware Horizon

Previously, the VMware Flings were available at https://flings.vmware.com/ but, for some reason, VMware has moved/removed access to Flings. Finding this Fling wan’t easy, but after a little googling I found the VMware Horizon Reach Fling here: Files for Horizon Reach

I wont go into details about the capabilities and features of Horizon Reach, as this is comprehensibly discussed in the above mentioned blog by Matt Frey. Instead, I will do the actual installation of Horizon Reach and the describe following configurations:

  • Windows firewall port openings
  • Replace self-signed certificate with domain ca signed certificate
  • Initial Horizon configuration
    • UAG configuration
    • LDAPS setup
    • Notifications setup towards smtp and slack

Installation

Once I have downloaded the executable, running through the installation is quick and simple, show below.

Configurations:

Windows Firewall

The first thing I need to do, is to create a rule in the Windows Firewall to allow TCP 9443 traffic.

Replace Self-signed certificate

Horizon Reach comes default with a self-signed certificate. As this isn’t trusted I will be replacing this with my domain CA signed certificate.

Before I continue I stop the HorizonReach service

Next I run certlm.msc and change the Friendly Name of the self-signed certificate

I can now request a new certificate from my Domain CA. Before I do this, I make sure that the computer account of the server I’m requesting from, has enroll permissions on the certificate template I will be using. Request New Certificate…

Next…

I use the Active Directory Enrollment Policy, Next…

I click the link to configure the settings

I provide my server’s fqdn as both Common name and DNS. From the General tab I set the Friendly Name to “HorizonReach“, OK…

I click Enroll and Finish once completed.

The new certificate is now present with the correct Friendly Name. I can now start the HorizonReach service

The certificate warning is now gone and I can login and continue the setup.

NOTE: Replacing the self-signed certificate could also have been done using Powershell, as I previously have posted here: VMware Horizon – Replace self-signed vdm certificate with Domain CA signed certificate using PowerShell

Horizon Reach Setup

The first time I log in to Horizon Reach, the Setup wizard launches. Next…

I provide my Connection Server details, Validate and OK…

The Dashboard and the rest of the GUI is fairly self-explaining…

Configure UAG Connections

Next, I will configure my UAG Connections, which is done from the settings menu

I click ADD and provide the UAG Connection details in the next window, VALIDATE and OK…

Configure LDAPS Integration

Before I can log into Horizon Reach with a Domain User, I need to configure LDAPS, LDAP is NOT supported. From the settings menu I click Web Service Settings…

From Authentication Settings, I Enable LDAP Integration and provide the necessary information.

I find the BIND User DN (=distinguishedName) from the Attribute Editor in ADUC.

Once everything is configured, I test the connection and hit CLOSE…

Finally, I test the LDAPS configuration by logging in with a user from AD

Configure Notifications to SMTP/Slack etc.

To configure Notifications to SMTP/SLACK, I select Alarm Configuration from the settings menu.

CONFIGURE NOTIFICATIONS…

To configure SMTP or Slack, I first enable the feature…

I provide the necessary information for the SMTP Settings, Next…

I personally don’t use Slack for this, but I guess I would have to configure the Web Hook URL, TEST CONFIGURATION, Next…

Having done this basic configuration, I now have a solution that notifies me of alerts/alarms from my VMware Horizon Connection Servers. A very nice little Fling from VMware, and best of all, license-free….

Download here: Files for Horizon Reach

Documentation:

VMware Horizon planning, deployment etc.

Official VMware Horizon 8 Documentation

Disclaimer: Every tips/tricks/posting I have published here, is tried and tested in different it-solutions. It is not guaranteed to work everywhere, but is meant as a tip for other users out there. Remember, Google is your friend and don’t be afraid to steal with pride! Feel free to comment below as needed.