Altiris rdepolyt . How do i image a pc into a image bigger then 2gigs.

Posted on 2011-02-17
Last Modified: 2012-06-21
I would to image a computer with rdeployt from a linux boot disk. I am using
./rdeployt -mu -f /m/altiris.exe  but it creates four 2 gig images I would like to just make one
8gig. Does anyone know what the switch is to make a single image?
Question by:CityInfoSys
  • 2
  • 2
LVL 48

Expert Comment

ID: 34924390
From the syntax for rdeploy on page 86 show

I presume the syntax for redployt would be the same.

-split:[n] Function Breaks an image into multiple files of a specified size during an upload (in megabytes).

Example To set the file size to 500 MB, type rdeploy -mu -f[filename] -split:500

So possibly -split 8000 is what you want.

LVL 18

Expert Comment

ID: 34924423

What file system does your target have? It might be a limitation in the filesystem.

Regards, Tobias

Author Comment

ID: 34926351
The target system is windows xp sp3. So with the split "-split 8000" is there a limit to the size like
 "-split 10000"? Or is there a way to say no limit to size. "-split nosplit"?

Author Comment

ID: 34927150
The -split command only works with 2000 and below. To clarify I would like to image this computer with no splitting.
LVL 48

Accepted Solution

dbrunton earned 500 total points
ID: 34928593

The maximum file size that can be written is 2040 MB. Any image that is larger than 2040 MB, whether it is spanned or not, will be split into multiple files.

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now