Desktop Pool Parameters
Define these parameters when creating or editing a desktop pool.
Desktop Pool Parameter | Required? | Editable? | Description |
---|---|---|---|
Name | Yes | Yes | The name for the desktop pool, to be used to list desktops in the Secure Desktops interface (1024-character maximum). Avoid entering confidential information. |
Description | No | Yes | A description for the desktop pool (1024-character maximum). Avoid entering confidential information. |
Pool start time | No | Yes | The date and time when the pool becomes accessible (useful if you want to configure a pool in advance). All times are in Coordinated Universal Time (UTC) format. |
Pool stop time | No | Yes | The date and time when the pool stops and becomes inaccessible (useful if you want to restrict pool access to a defined period, for example, a trade show). All times are in Coordinated Universal Time (UTC) format. |
Administrator contact details | No | Yes | Information that’s displayed to desktop users if they need to contact the administrator (1024-character maximum). Avoid entering confidential information. |
Enable administrator privileges | No | Yes | Allow the desktop users to have administration privileges on their virtual desktops. |
Pool size: Maximum size | Yes | Yes | The maximum number of desktops in the pool. |
Pool size: Standby size | Yes | Yes | The number of available, unassigned desktops. Standby desktops consume resources because they’re running and available for immediate allocation to desktop users. |
Placement | Yes | No | The availability domain in which to locate the desktop resources. |
Image and Shape: Desktop image |
Yes | No | The image used for the desktops. This can be a standard image or custom image. See Desktop Images. |
Image and Shape: Use dedicated virtual machine host |
No | No | Select this option to enable the desktops in the pool to be provisioned on Dedicated Virtual Machine Hosts (DVH). |
Image and Shape: Desktop virtual machine shape type |
No | No | Select Flexible or Fixed. |
Image and shape: Desktop shape |
Yes | No | The compute shape for the desktops. The list of available shapes is automatically generated based on your selected desktop image and settings for dedicated virtual machine host and desktop virtual machine shape type. For Windows desktop pools, which require dedicated virtual machine hosts, use one of the following preferred shapes. They are mapped to DVH shapes for allocation of OCPUs and memory.
|
Image and shape: Desktop system resource configuration |
No | No | These options are displayed only when a Flexible shape is selected. Select High, Medium, or Low. For each selection, corresponding values for Number of OCPUs and Amount of memory (GB) are displayed:
If the Custom setting is available for the selected shape configuration, you can enter custom values in these fields. This does not apply when using dedicated virtual machine hosts. For flexible OCI standard VM shapes, you can adjust the baseline utilization per OCPU value to configure the shape for cloud bursting. This does not apply when using dedicated virtual machine hosts. Select a baseline level of CPU utilization with the ability to burst to a higher level to support occasional spikes in usage. Choices include 100%, 50%, or 12.5%. |
Storage: Enable desktop storage |
No | No | Provide persistent storage to desktop users by creating a block volume associated with a user. |
Storage: Desktop storage volume size in GB |
No | No | The size in gigabytes of the block volume given to each user in the pool. The range is 50 to 10,000. The default value is 50. Enter the storage size, not an increment. |
Storage: Backup policy |
No | No | The volume backup policy to apply to the block volumes. The default value is No Policy. |
Desktop pool network: Virtual cloud network |
Yes | No | The virtual cloud network (VCN) for the desktops in a pool. The VCN is used for connections to the desktop from Secure Desktops and for connections from the desktop. |
Desktop pool network: Subnet |
Yes | No | The subnet in the VCN to use for the desktops. |
Desktop pool network: Network security groups (NSGs) |
No | No | Specify one or more network security groups (NSGs) that will include the primary virtual network interface card (VNIC) for the desktop, click Show advanced options and select Use network security groups to control traffic. Then, select the network security groups to apply. For Secure Desktops, you can specify a maximum of four network security groups. |
Private access network: Virtual cloud network |
No | No | The Virtual Cloud Network (VCN) where the private access subnet is configured. |
Private access network: Subnet |
No | No | The subnet in the VCN from which desktops will be accessed. |
Private access network: Private IP address |
No | No | A private IPv4 IP address to assign to the private endpoint in the private access subnet. If not defined, an available IPv4 address from the subnet is automatically assigned. |
Private access network: Network security groups (NSGs) |
No | No | Select Use network security groups to control traffic. Specify one or more network security groups (NSGs) for private desktop access. You can specify a maximum of five network security groups. |
Device access policy: Clipboard access |
Yes | Yes | Controls virtual desktop access to the clipboard on the client device. |
Device access policy: Audio access |
Yes | Yes | Controls virtual desktop access to the speakers and microphone on the client device. This option is supported only when using the installed client, and the Audio In (microphone) value is supported only on Windows desktops. |
Device access policy: Drive mapping access |
Yes | Yes | Controls virtual desktop access to drives on the client device. If you select Read/Write, users can move content between their local system and the desktop. |
Desktop management policy: Action on inactivity |
No | No | Select the inactivity action for interactive desktop sessions after a period of inactivity. that remain inactive for a specified grace period.
|
Desktop management policy: Action on disconnect |
No | No | Select the disconnect action for interactive desktop sessions when they
|
Desktop management policy: Regular schedule: Start |
No | Yes | The scheduled time and days when all desktops in the pool start and become accessible, for example, 7:00 Monday through Friday. All times are in UTC format. Set this value as part of Desktop management policy. |
Desktop management policy: Regular schedule: Stop |
No | Yes | The scheduled time and days when all desktops in the pool stop and become inaccessible. All times are in UTC format. Set this value as part of Desktop management policy. |
Show tagging options | No | Yes | Add tags to the desktop pool. If you have permissions to create a resource, then you also have permissions to apply free-form tags to that resource. To apply a defined tag, you must have permissions to use the tag namespace. For more information about tagging, see Resource Tags. If you're not sure whether to apply tags, ask an administrator or skip this option. You can apply tags later. |