Feeds

What does this button do?

Desktop imaging lessons learned

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Blog All software is designed to deal with a specific problem. In the case of the current set of articles that problem is desktop deployment.

If multiple different developers attempt to solve the same problem, then chances are good that they will run into the same obstacles. Different developers will have different approaches regarding overcoming these obstacles, and differing levels of success.

Some developers create workarounds so seamless that you only notice that an obstacle needed to be overcome in the most exceptional of circumstances. In other more unfortunate cases visible and ugly problems affect all software in a given field. This article will expand on some of these gotchas - both those endemic to individual desktop imaging applications, and those to which all desktop imaging apps fall prey.

In the previous articles on this subject I examined the desktop imaging applications PING (Partimage Is Not Ghost), Windows Deployment Services (WDS) and Symantec Ghost. Ghost was head and shoulders above the other offerings, with PING offering a rather lackluster showing for open source imaging applications. On the advice of a colleague, and wanting to give open source another go, I promised to take a look at both FOG (Free Open-source Ghost) and Clonezilla, having wrongfully neglected them in my implementation article.

Fog and Clonezilla both serve as fantastic examples of the two standard types of imaging options available, PXE multicast and boot CD. FOG is a PXE multicast solution: create an image, send it to the FOG server, and from there you can stream it to multiple target computers simultaneously.

Clonezilla is a boot CD: put it into a computer, boot from the CD, and you can make an image of that computer onto another hard drive, a flash drive or a network share. Alternately, you can boot from the Clonezilla CD and deploy an image to that computer. It is theoretically possible to use a PXE/TFTP setup to deploy Clonezilla in a manner that would allow it to run on multiple computers simultaneously, but frankly FOG just does it better.

Both Clonezilla and FOG do their jobs remarkably well; they are complimentary programs that in tandem offer all of the major features of either WDS or Symantec Ghost. While I don’t feel that either FOG or Clonezilla are of themselves a complete solution to the desktop imaging problem, combined they are a very serious challenger to Symantec Ghost, and a viable option for business desktop deployment in their own right. For those wanting to give FOG a try without the hassle of setting it up yourselves, a VMWare appliance is available. Clonezilla is available as a livecd.

As a server-based multicast imaging solution, FOG is designed to help systems administrators roll out collections of customised images to large numbers of desktops. As such, FOG is designed largely with corporate setups and demands in mind. One of the most notable features is that of partial Active Directory (AD) integration. FOG can be configured to rename any copies of Windows it deploys and join them to the domain. Fog does this by relying on the image it is deploying having the Windows Support Tools installed, specifically netdom.exe. Without it, any attempt to join the imaged computer to the domain will fail. Fog scales well, with real-world uses managing deployments to tens of thousands of computers.

Like any application though, FOG is not without its foibles, however they are very well documented in the site’s wiki. Be very certain to correctly tell FOG which operating system you are imaging. I have found it is far touchier about this than other imaging applications. As with WDS or Clonezilla, you will need to Sysprep systems before you image them, there is no built-in SID regenerator.

Ghost on the other hand does have an SID regenerator built in. You can configure your multicast sessions such that a given image has its SID wiped on the fly during deployment. Ghost is packed full of these sorts of features, faced with heavy competition from all corners, adding features is the only way to survive. When you buy Ghost you are buying not only the features but the constant updates and bug fixes.

Beginner's guide to SSL certificates

More from The Register

next story
It's Big, it's Blue... it's simply FABLESS! IBM's chip-free future
Or why the reversal of globalisation ain't gonna 'appen
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
Microsoft and Dell’s cloud in a box: Instant Azure for the data centre
A less painful way to run Microsoft’s private cloud
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.