You are on page 1of 14

Technical white paper

HP StoreAll Storage with


iTernity Compliant Archive
Solution
Table of contents
Executive summary ..............................................................................................................................................................2
Audience .................................................................................................................................................................................2
Disclaimer...............................................................................................................................................................................2
Introduction............................................................................................................................................................................3
HP StoreAll Storage overview .........................................................................................................................................3
HP StoreAll Storage models ............................................................................................................................................4
HP StoreAll Storage data services ..................................................................................................................................4
iCAS overview ....................................................................................................................................................................5
iCAS terminology ...............................................................................................................................................................5
HP StoreAll Storage and iCAS ..........................................................................................................................................6
Solution configuration ..........................................................................................................................................................6
Configuration setup ..........................................................................................................................................................7
Installing iCAS on Microsoft Windows ..........................................................................................................................7
Archival configuration with HP StoreAll Storage...........................................................................................................7
Archival process ................................................................................................................................................................8
Restore process ................................................................................................................................................................8
Use case scenarios ................................................................................................................................................................9
Use case scenario 1 ..........................................................................................................................................................9
Use case scenario 2 ....................................................................................................................................................... 10
iCAS best practices ............................................................................................................................................................. 11
Test results for the tested configuration ........................................................................................................................ 13
Summary ............................................................................................................................................................................. 14
Appendix: Bill of materials ................................................................................................................................................ 14

Click here to verify the latest version of this document

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

Executive summary
This technical white paper provides quick start information on integrating iTernity 3.7 SP3 with the HP StoreAll Storage 6.5
for archive and restore solution.

Audience
This document is intended for solution architects, project managers, engineers, and support personnel involved in planning,
designing, and configuring archive solution using iTernity Compliant Archive (iCAS) solution with HP StoreAll Storage
technology.
Familiarity with the following topics is recommended:
HP StoreAll Storage architecture

Disclaimer
The configurations in this document are HP tested configurations. They are provided as a reference only, as configurations
vary with specific customer needs. The mentionedmemory, processor count and speed, and I/O storage
recommendationsshould be considered as a minimum requirement.

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

Introduction
This document describes how to configure the HP StoreAll Storage 6.5 for use with iCAS software.

HP StoreAll Storage overview


HP StoreAll Storage enables you to tame and mine unstructured data. StoreAll Storage is a hyperscale and economic
platform that scales up to 16 PB of capacity, and billions of objects and file in a single namespace while enabling
policy-based tiering and scale-out pay as you grow your architecture. Delivering structure for unstructured data, StoreAll
Storage instantly harnesses the value extraction of your data with custom metadata tagging and ultra-fast search at
petabyte scale with Express Query.
The StoreAll Storage platforms are turnkey appliances comprising the following components. A couplet represents the
physical foundation of the StoreAll Storage architecture. A couplet comprises a pair of nodes combined with shared storage.
Multiple couplets are bound together into a scale-out cluster with a distributed file engine. StoreAll Storage gives you the
flexibility to create either a single file system or multiple file systems to host shares that can be made available to clients via
file and object modes using a broad portfolio of data access protocols.
A rich set of data services are built on its robust and massively scalable foundation. StoreAll data services relevant to this
overall archive solution include those shown in figure 1.
Figure 1. StoreAll data services

Fusion Manager, which maintains a persistent and consistent view of the StoreAll Storage cluster environment, manages the
StoreAll Storage system configuration and all file systems. Fusion Manager provides both GUI and CLI for managing the
StoreAll Storage solution. Additionally, Fusion Manager is involved in all StoreAll Storage cluster maintenance and service
operations such as failover, replication, and statistics gathering. It also controls tasks like cluster membership, file system
creation, file system allocation policies, local users, and other StoreAll Storage cluster services.
In short, Fusion Manager, which runs on any active cluster node, coordinates and synchronizes all StoreAll processing and
operational tasks across the entire cluster. In the event that the active Fusion Manager node leaves the cluster, through
either planned or unplanned circumstances, one of the remaining StoreAll nodes automatically becomes the active Fusion
Manager node. This maintains the integrity of the highly available and high-performing HP StoreAll Storage solution and
thereby provides an enterprise-class storage platform.

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

HP StoreAll Storage models


The StoreAll Storage family consists of the HP StoreAll 8800 Storage models, as well as HP StoreAll 8200 Gateway Storage.
HP StoreAll Storage is targeted toward the diverse needs of the HP archive customers. These StoreAll Storage systems,
each of which includes options for multiple disk capacities and geometries, deliver a properly sized, flexible, simple, and
powerful archive storage platform for enterprise information archival. Solution designs may include one or more of the
following models with one or more different capacity and performance options.
HP StoreAll 8200 Gateway Storage
HP StoreAll 8200 Gateway Storage enables you to leverage investments in HP 3PAR StoreServ Storage for file
archiving, while integrating seamlessly with HP StoreAll 8800 Storage. HP 3PAR StoreServ 7000 and 10000
Storage supported via Fibre Channel enables converged capacity pool for primary storage and archives.

HP StoreAll 8800 Enterprise SAS Storage


HP StoreAll 8800 Enterprise SAS Storage is converged hyperscale, economic, ultra-dense appliance that can be
flexibly configured. This is an ideal storage platform for active archive operations that require a reliable, scalable,
and high-performing solution. It is capable of handling application workload of heavier read and write. In addition,
storage is highly reliable to sustain heavier duty cycle. StoreAll 8800 Enterprise SAS is a performance-driven
storage.
HP StoreAll 8800 MDL SAS Storage
HP StoreAll 8800 MDL SAS Storage is converged hyperscale, harnessed, instant, and economic storage to provide
structure for unstructured data. This is an ideal storage platform for deep archive operations with configurable 1
or 2 MDL SAS capacity blocks. Being a capacity-driven storage with low duty cycle, StoreAll 8800 MDL SAS Storage
is best suited for archival and compliance purposes.

HP StoreAll 8800 Hybrid Storage


HP StoreAll 8800 Hybrid Storage is converged hyperscale and harnessed storage to provide structure for
unstructured data. This is an ideal storage platform for hybrid or tiered archive operations with
configurable 1 to 4 Enterprise SAS capacity blocks and 1 MDL SAS capacity block per node pair.

HP StoreAll Storage data services


While StoreAll Storage possesses an extensive array of data services, the data services highlighted below are best
leveraged for the HP StoreAll Storage with a specific ISV application based solution.
Protection
StoreAll Storage enables real-time snapshots for instantaneous point-in-time archive data recovery at a directory or file
system level. This means that the enterprise information archival environment retains a local recovery point of the directory
or file system to recover the environment within minutes of a point of failure.
To maintain data integrity within the enterprise information archival environment, StoreAll Constant Validation helps
confirm that the file has not been modified through either hardware or software errors or through malicious intent for a
retention-enabled file system, and reports on any discrepancies.
Retention
The StoreAll Storage enterprise Write Once, Read Many (WORM) and retention capability meets most corporate compliance
requirements. With an enterprise WORM-enabled file system, these files prevent both inadvertent and deliberate attempts
to delete, modify, or manipulate file content or metadata within an enterprise or corporate compliance environment.
The StoreAll Storage platform governs data based on its internal retention policies. Maintaining this strict control enables
the application to purge files only after the retention policy has expired. Retention policies in Enterprise Mode can be
extended, but the retention duration cannot be reduced.

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

Mobility
StoreAll Storages non-disruptive automated policy-based data tiering enables performance and capacity improvement
over the life of the data. For instance, a file or set of files, whether governed by a retention policy or not, can be tiered from
a performance StoreAll model (i.e., HP StoreAll 8800 Enterprise SAS Storage) to a deep archive StoreAll model (i.e., HP
StoreAll 8800 MDL SAS Storage) as capacity and cost requirements dictate.
The StoreAll Storage has continuous remote replication (CRR) that enables replication of enterprise information archival
data for a disaster recovery option. This enables a copy of the archival environment to be protected and maintained at a
remote data center in the event of a disaster at the primary site.
Management
StoreAll Storages quota management provides user-level and directory-level granular control over storage consumption to
properly manage resource allocation and protect against runaway applications.
The StoreAll Storage solutions statistical tools can report on utilization and performance over time, as archive demand
grows. This enables archival environments to plan the growth and resource utilization properly as demands change.

iCAS overview
iTernity Compliant Archive (iCAS) is a storage middleware that enables compliant archiving and data encryption by legal
standards. With the patented and certified content storage container (CSC) technology, the solution provides (WORM
functionality for data protection by using future-proof HMAC-SHA-512-bit hashes. The CSC technology compiles the
archived data and documents with its corresponding index data, creation date, and retention date into a data container,
which remains verifiable and can be stored on any storage medium. It combines the advantages of a content-addressablestorage system with the flexibility and transparency of a file share. The flexibility and openness of iCAS on HP gives
customers the advantage of using existing or newly acquired storage capacity more efficiently, and saving costs as
hardware, software, and training investments are protected.
The archiving technology from iTernity (iCAS) provides an open archiving platform based on the complete portfolio of HP
servers and storage systems. This solution delivers a new level of simplicity, integration, and automation that lowers costs
and risk while enabling better utilization of information assets.

iCAS terminology
The iTernity Compliant Archive Solution offers you the following benefits:
Object-oriented data integrity via hash values: iCAS uses HMAC-SHA-512-bit hashes to secure the integrity of archived data.
Integrated data encryption: iCAS offers an integrated but optional AES256 encryption enabling additional security for

stored data.
Modular and transparent pay-as-you-grow licensing: The license model is based on a node license per each node iCAS is

running on, combined with a volume license for the data volume that must be archived. The demand can be adjusted to
the actual needs. The hardware independence of iCAS enables sustained use of the archive license. Hardware
replacement requires no renewed licensing.
Data replication without additional licensing: For safety reasons, company internal audit rules often require duplication of

one or more sites. iCAS enables this by using another backup path to a different site. Alternatively, standard storage tools
(for example, array-based replication or server-based replication) can be used to replicate the archived data to any
remote site. No additional iCAS licenses are needed to write on a second site.
Self-healing: When iCAS is writing the archive data to two different locations, the system can audit the integrity of the

data by comparing the content with the hash value. If the data on one site is corrupt, iCAS can automatically copy the valid
data and overwrite the corrupt files. Certainly all these processes are logged transparently.
Scalability: iCAS scales seamlessly from gigabyte to petabyte. The iCAS on HP archiving platform is scalable for

midmarket and enterprise businesses, making it ideal for new implementations of any size. Cluster configurations enable
a high data throughput, availability, and security for archive operations.
Data migration without downtimes: iCAS enables secure and fast data migration during regular operation on storage level.

A special copy tool allows compliant data migration by logging the migration process and verifying the copied data. iCAS
is based on open industry standards, which enables your data can be migrated into future storage architectures and
technologies.

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

Supports virtual machines (VMware, Microsoft Hyper-V Citrix, and Xen): The iCAS solution itself can also be

virtualized; technologies such as VMware, Citrix, Xen, and Microsoft Hyper-V are fully supported. iCAS enables a
comprehensive virtualization of the entire archive infrastructure and offers users the complete range of associated
advantages with regard to flexibility and economy.
Secure data shredder: Once the retention period has expired, the data can be deleted according to the specifications of

the U.S. Department of Defense (DoD), i.e., fully destroyed by means of multiple overwrites with changing bit patterns.
Multi-subscriber capability: The multi-subscriber capability of iCAS on HP allows departments, subsidiaries, and

customers to archive separately. Different storage paths can be defined for each subscriber, enabling spatial separation
of the individual data stacks.
Addressable by numerous content sources (ERP, DMS, mail): iCAS supports more than 50 applications (for example,

various PACS, ECM-Systems such as OpenText and Symantec Enterprise Vault, and more) permitting iCAS on HP to be
used in a wide range of applications and markets.
Accessible via different interfaces: In addition to the easy-to-integrate Web Service API Interface, iCAS provides a file

system interface iTernity File System Gateway (iFSG). iFSG can also be configured using the iAdmin tool and it enables
WORM functionality without the need of integrating into the ISVs program code.
Easy and efficient archive backup: Since the iCAS archive is stored on standard file systems, all backup facilities are

available.

HP StoreAll Storage and iCAS


The combination of HP StoreAll Storage and iTernity Compliant Archive Solution (iCAS) software delivers a flexible
information management solution offering simplified and agile retention of data across backup and archives. This solution
balances cost and performance through seamless as well as unified archiving of data across multiple storage tiers, while
enabling tamper-proof data retention, and seamless access and recovery. With this solution, businesses can better harness
information to reduce risk, improve decision-making, and realize productivity gains.

Solution configuration
This section describes the test setup using HP StoreAll Storage and iCAS.
The iCAS software was tested for compatibility with HP StoreAll 8200 Gateway Storage. The versions of the different
software and hardware components used in the test configurations are:
HP StoreAll Software (Red Hat Enterprise Linux): 5.8 64-bit (2.6.18-308.24.1.el5)
StoreAll file serving software version 6.5
iCAS software version 3.7
Communication protocols used to HP StoreAll Storage clients and/or target systemsCIFS

For more information on the hardware and software specifications, see the Appendix.
Note
The configuration used to test the HP StoreAll Storage with iCAS software is applicable to the entire HP StoreAll Storage
family.

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

Configuration setup
The archive setup involves installing and setting up the iCAS.

Installing iCAS on Microsoft Windows


1.

Before you install iCAS, check that all the prerequisites required for this specific installation.

2.

Execute the self-extractor iSetupV3SFX.exe to install the software. The setup must always be executed with
administration permissions from a local disk. The self-extractor will start extracting necessary files and run the main
installer iSetupV3.exe.

See iTernity-Install4OEM-3.7.0-EN.pdf, the on-demand installation guide provided by iTernity.


In case of problems during installation, contact support@iTernity.com

Archival configuration with HP StoreAll Storage


Configuring iCAS base and archive path
Figure 2. iCAS path configuration

1.

On the iCAS server, open iAdmin tool from C:\Program Files\iTernity\iAdmin

2.

On the Connection dialog box, enter the PIN to load the configuration.

3.

After a successful connect, click the iFSG Config tab.

4.

Click Edit iCAS Base Settings

5.

Configure archive and base path pointing to the UNC path (for example, \\10.9.243.101\x9320_fs1\Archive)

6.

Click the Save iCAS Config button, to save the changes.

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

Configuring iCAS repository


There is only one iCAS repository client called, Default.
1.

In the iAdmin tool, click the API Config tab.

2.

Click the Edit iCAS Repository menu.

3.

Edit the archive path for the repository.

4.

Configure the optimization to the Space and Backup.

5.

Click the Save iCAS Config button, to save the changes.

Note
See the iTernity-FilesystemGateway-3.7.0-EN.pdf and iTernity-SoftwareAdministrationGuide-3.7.0-EN.pdf document to
configure and administrate the iCAS software, which will be available in C:\Program Files\iTernity\iAdmin folder after
installing the iCAS software.

In case of problems during configuration and archiving, contact support@iTernity.com

Archival process
Archival is done to make the files WORM-enabled and to retain them for fixed period, by leveraging the WORM/Retention
capabilities of iCAS. Once WORM-enabled, the archived files remains read-only until the retention period expires.
The archival process includes the following:
1.

Select the Mark Files as Read-Only option.

2.

Configure iCAS base and archive path through the iAdmin Console.

3.

Click the Edit iCAS Base Settings to configure the primary storage location (See Figure 2).

4.

Configure the repository (See Figure 3).

Note
A file that is in the WORM state cannot be modified or deleted within the retention period.

To archive a file using iCAS:


1.

Open the virtual drive (I:) iTernity File System Gateway, which is created by default after the iCAS installation.

2.

The iTernity File System Gateway will have many shares in it, which will be accessed by many clients like CIFS share.

3.

Navigate to iTernity File System Gateway >CEYONIQ (or any shares) and select the Mark files as read only.

4.

If the file Attributes is Read Only (RO), then the file is archived completely.

5.

Verify in the archive location whether the archived file exists.

Restore process
To restore a file:

1.

On the iCAS server, navigate to the iTernity File System Gateway >CEYONIQ (or any shares), which has archived files

2.

Double-click the archived file, which will restore the file from the repository.

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

Use case scenarios


Use case scenario 1
Files available in iTernity file system gateway (i-Mapped drive) in the server where iTernity is installed are archived. HP
StoreAll 8200 Storage is the target server for this archival.
Figure 4. Scenario 1
HP StoreAll 8800 Storage cluster

LAN
switch

HP StoreAll Storage/FS1
Non-WORM CIFS Share

File server

HP StoreAll Storage/FS1
Non-WORM CIFS Share
Windows 2008 R2
iTernity Console
Source: iTernity Filesystem gateway
Target: \\10.9.243.101\FS1_NonWORM

Restore
Archive

Data used
200 GB of file data used for archival.
Hardware used end-to-end
1. iTernity installed on HP ProLiant DL380 G7 Server.
2.

StoreAll 6.5 build installed on the HP StoreAll 8200 Storage Gateway model.

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

Use case scenario 2


Files available in iTernity file system gateway (i-Mapped drive), in the server where iTernity is installed, are archived using
the additional archiving path of the secondary cluster. The files from the secondary cluster are retrieved during failover.
Figure 5. Scenario 2
iTernity server
Source (I):
iTernity file system Gateway

Archive Path://10.9.246.76/iternity/archive
Additional write path: 10.9.247.85/iternity/archive

LAN
Archive

CIFS Share
//10.9.246.76/iternity/
archive

HP StoreAll 8200 Gateway Storage


Primary cluster

CIFS Share
//10.9.247.85/iternity/
archive

HP StoreAll 8200 Gateway Storage


Secondary cluster

Data used
200 GB of file data used for archival.
Hardware used end-to-end
1. iTernity installed on HP ProLiant DL380 G7 Server.
2.

StoreAll 6.5 build installed on the HP StoreAll 8200 Gateway Storage model (two clusters).

Note
To retrieve files during the disaster, configure the secondary cluster CIFS share path as archiving path in the iTernity server.

10

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

iCAS best practices


1.

General
A suitable backup or mirroring solution for the iCAS server needs to be used, as RAID cannot be protected against a
total system failure, such as fire or water damage.
Frequently check the logs of the iCAS heads and the appliances, respectively. This allows a quick reaction on warnings
and errors. You can use the email notification service for this purpose.
Multipath volumes must have a minimum capacity of one terabyte. It is recommended to use the maximum capacity
possible for the volume or file system type. Volumes must only be part of one repository (if there is a plan to increase
the LUN size later, the last LUN is excluded from this recommendation).
When using multipath repositories archive and additional write paths must use volumes of roughly the same size.
Archiving is done until the smaller volume is full. Then, the next path pair is used for writing. A specific path can only be
used within a particular repository.
There must be a distinct repository for clearly separated, large units, such as separation of different departments (HR,
accounting, and such). Only a few users (less than five iCAS accounts or shares) must be created per repository,
possibly with different rights (read/write/admin). We recommend having less than 100 users.
If encryption is desired, it is best to use AES256. This provides the highest level of security, with minimal extra effort
compared to the standard encryption.
The compression achieved is comparable to those achieved by WinZip. Tiff Group 4/JPEG are very bad to compress and
WinWord/Excel are very good to compress.
In general, compression, encryption, and HTTPS (only with the API) do reduce performance. Maximum performance can
be reached using no compression, no encryption, and HTTPS. You have to decide how much security or speed is
needed to get the best performance. We recommend using message transmission optimization mechanism (MTOM).

2.

iFSG Interface
iCAS can handle archiving files greater than 4 GB. However, for best performance we recommend archiving files
smaller than 1 GB in size. This performance can be reached with files between 4 MB and 100 MB. For files larger than
100 MB, we recommend using the asynchronous On Policies archive mode.
No more than 10000 files must be put into a single folder, as the mapping of filename and common service center
(CSC)-ID are optimized for that size. This is not a problem for Document Management System (DMS)/ Enterprise
Content Management (ECM), because this is the same principle as used in jukeboxes so far. Other than for performance
reasons, there is no general limit on how many files you put in a folder.
The entire, absolute path to a file must not exceed 256 characters. Umlauts and special characters must be avoided.
These restrictions are also well-known jukebox restrictions.
During a high network load, the offline bit might be delayed in display, usually for not more than 10 seconds. Generally, we recommend
running the iCAS server and its storage within a separated network, especially in collaboration with time-critical applications.
Since using the file system gateway requires one container per file, we recommend the Space & Backup optimization,
as long as the archived files are smaller than 20 MB.
The ideal archive mode is On Read Only. If that is not possible, use one of the other two synchronous modes (On Close,
On Close Plus). These offer good security measures. For better performance, use the asynchronous On Policy.
Data verification needs to be performed by the writing applications (DMS, ECM, and such) after files have been written to the
archive. This is necessary to rule out any transmission errors to the iCAS application due to faulty network components. iCAS has
no control over this part of the data path to the iCAS system, so the accessing application has to perform this check itself.
If you do not use a synchronous mode (On Read Only, On Close, On Close Plus) and the accessing system does not
check the correct writing, we recommend to perform the Read after Write function.

Note
Select the option None, only if a synchronous mode is used or the application waits for the offline bit to appear.

A network connection (CIFS, SMB, and NFS) to the iFSG drive needs to be secured as tightly as possible. Only accessing
applications must be allowed.

11

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

3.

API/Web service Interface


For security reasons, we recommend using the HTTPS protocol if you connect over the API.
To verify if a container was written correctly, we recommend calling the VerifyCsc function directly after the write
process finishes. For 100% security, you need to read the content from the container back and compare that against
the original file. This is the only way to exclude errors securely, which for example could have occurred through faulty
network components.
In general, compression, encryption, and HTTPS do reduce performance. Maximum performance can be reached by
using no compression, no encryption, and HTTPS. You have to decide how much security or speed is needed. To get the
best performance, we recommend using MTOM.
The recommended size of CSC containers is between 1 MB and 64 MB. Containers must not contain more than 1000
files. The advantage of the container technology (reduction of file overhead) can only be used by saving multiple files
into one container. A single file storage container can produce a small file overhead.

4.

Third-party software/ System integration


The servers running the iCAS software must only be used in a well-equipped data center. The latter must have
sufficient cooling and access must be restricted as necessary. It would be best to run an UPS for uninterrupted power
usage.
Integration into an existing Windows domain is possible, but not recommended for compliance reasons. If you decide
on such a setup, you must disable the log on rights for the domain admin to the iCAS system.
The administrative login must always be performed under the four eyes principle. Therefore, it is recommended that
the iCAS administrator and the compliance manager only know the two differing halves of the administrative system
password.
A virus scanner can be implemented on the system to avoid data loss.

Note
All archive paths as well as the iFSG base paths must be excluded from a scan. The iFSG drive must not be scanned under
any circumstances, as this will lead to a significant performance reduction.

We recommend frequently checking the Windows Event Logs of the iCAS systems.
Backup Clients can be installed on the iCAS system. All archive paths and iFSG Base Paths must be backed up. The iFSG
drive (I :\) must not be backed up, because it shows the virtual archive information that was already saved via the
archive paths. A backup of the iFSG drive would also lead to a loss of the compliance information (a backup of the
archive path on the other hand keeps this information).
Only applications certified for iCAS or from iTernity must be used.
In general, the SOAP API is preferable over the file system gateway.
If the accessing application has a verify-after-write function, it must be used.
All instructions for the accessing applications (ECM, DMS, and others) need to be followed. The applications have to be
configured correctly. A person certified by the manufacturer or in-house must do the configuration.

12

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

Test results for the tested configuration


The following tests were executed for the certification of backup and restore solution.
Table 1. HP StoreAll Storage data services validation
Feature

Checked

Validation of CIFS

Validation of data mobility features (Tiering, Rebalancer, Migrator and Evacuator)

Validation of WORM/Retention properties of archived files of different sizes within iTernity

Validation of retrieving and extending retention within iTernity

Validation of performance tests

Validation of deep directory structure up to 100 levels

Validation of file deletion allowed after retention period expires within iTernity

Validation of files sizes after the archival is done from the iCAS share

Hardware functions correctly without generating any critical error messages while installing iCAS

iCAS software installed without incurring any resource limitations

13

Technical white paper | HP StoreAll Storage with iTernity Compliant Archive Solution

Summary
This technical white paper outlines the scenarios that enable the ISVs to easily use the archive, restore, WORM, or data
retention features of iTernity server with HP StoreAll Storage.
The certification is done with the above-mentioned use cases on the iCAS v3.7. The primary storage was provided by the HP
StoreAll 8200 Gateway Storage while the secondary device was a disk library (HP StoreAll Storage NAS file share).

Appendix: Bill of materials


The following are the software versions, firmware revisions, OS revisions, and patch numbers that are used on various
components of the solutions discussed in this technical white paper:
Table 2. Components utilized for certification
Hardware

Software

HP servers

HP ProLiant DL380 G7 servers

HP StoreAll Storage Model

HP StoreAll 8200 Gateway Storage

iTernity

HP StoreAll Storage file serving software 6.5


v3.7

Learn more at
hp.com/go/storeall
iternity.com/index.php/technology.html
hp.com/products/quickspecs/14792_div/14792_div.pdf

Sign up for updates


hp.com/go/getupdated

Share with colleagues

Rate this document

Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for
HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as
constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Microsoft and Windows are U.S. registered trademarks of the Microsoft group of companies. Linux is a trademark of Linus Torvalds in the United States and
other countries. Citrix and Xen is a trademark of Citrix Systems, Inc. in the United States and other countries. VMware is a trademark of VMware, Inc.
4AA3-8113ENW, June 2014