-
Technical white paper
HP StoreAll Storage with iTernity Compliant Archive Solution
Table of contents Executive summary
..............................................................................................................................................................
2
Audience
.................................................................................................................................................................................
2
Disclaimer
...............................................................................................................................................................................
2
Introduction
............................................................................................................................................................................
3
HP StoreAll Storage overview
.........................................................................................................................................
3
HP StoreAll Storage models
............................................................................................................................................
4
HP StoreAll Storage data services
..................................................................................................................................
4
iCAS overview
....................................................................................................................................................................
5
iCAS terminology
...............................................................................................................................................................
5
HP StoreAll Storage and iCAS
..........................................................................................................................................
6
Solution configuration
..........................................................................................................................................................
6
Configuration setup
..........................................................................................................................................................
7
Installing iCAS on Microsoft Windows
..........................................................................................................................
7
Archival configuration with HP StoreAll Storage
...........................................................................................................
7
Archival process
................................................................................................................................................................
8
Restore process
................................................................................................................................................................
8
Use case scenarios
................................................................................................................................................................
9
Use case scenario 1
..........................................................................................................................................................
9
Use case scenario 2
.......................................................................................................................................................
10
iCAS best practices
.............................................................................................................................................................
11
Test results for the tested configuration
........................................................................................................................
13
Summary
.............................................................................................................................................................................
14
Appendix: Bill of materials
................................................................................................................................................
14
Click here to verify the latest version of this document
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
2
Executive summary
This technical white paper provides quick start information on
integrating iTernity 3.7 SP3 with the HP StoreAll Storage 6.5 for
archive and restore solution.
Audience
This document is intended for solution architects, project
managers, engineers, and support personnel involved in planning,
designing, and configuring archive solution using iTernity
Compliant Archive (iCAS) solution with HP StoreAll Storage
technology.
Familiarity with the following topics is recommended:
HP StoreAll Storage architecture
Disclaimer
The configurations in this document are HP tested
configurations. They are provided as a reference only, as
configurations vary with specific customer needs. The
mentionedmemory, processor count and speed, and I/O storage
recommendationsshould be considered as a minimum requirement.
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
3
Introduction
This document describes how to configure the HP StoreAll Storage
6.5 for use with iCAS software.
HP StoreAll Storage overview HP StoreAll Storage enables you to
tame and mine unstructured data. StoreAll Storage is a hyperscale
and economic platform that scales up to 16 PB of capacity, and
billions of objects and file in a single namespace while enabling
policy-based tiering and scale-out pay as you grow your
architecture. Delivering structure for unstructured data, StoreAll
Storage instantly harnesses the value extraction of your data with
custom metadata tagging and ultra-fast search at petabyte scale
with Express Query.
The StoreAll Storage platforms are turnkey appliances comprising
the following components. A couplet represents the physical
foundation of the StoreAll Storage architecture. A couplet
comprises a pair of nodes combined with shared storage. Multiple
couplets are bound together into a scale-out cluster with a
distributed file engine. StoreAll Storage gives you the flexibility
to create either a single file system or multiple file systems to
host shares that can be made available to clients via file and
object modes using a broad portfolio of data access protocols.
A rich set of data services are built on its robust and
massively scalable foundation. StoreAll data services relevant to
this overall archive solution include those shown in figure 1.
Figure 1. StoreAll data services
Fusion Manager, which maintains a persistent and consistent view
of the StoreAll Storage cluster environment, manages the StoreAll
Storage system configuration and all file systems. Fusion Manager
provides both GUI and CLI for managing the StoreAll Storage
solution. Additionally, Fusion Manager is involved in all StoreAll
Storage cluster maintenance and service operations such as
failover, replication, and statistics gathering. It also controls
tasks like cluster membership, file system creation, file system
allocation policies, local users, and other StoreAll Storage
cluster services.
In short, Fusion Manager, which runs on any active cluster node,
coordinates and synchronizes all StoreAll processing and
operational tasks across the entire cluster. In the event that the
active Fusion Manager node leaves the cluster, through either
planned or unplanned circumstances, one of the remaining StoreAll
nodes automatically becomes the active Fusion Manager node. This
maintains the integrity of the highly available and high-performing
HP StoreAll Storage solution and thereby provides an
enterprise-class storage platform.
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
4
HP StoreAll Storage models The StoreAll Storage family consists
of the HP StoreAll 8800 Storage models, as well as HP StoreAll 8200
Gateway Storage. HP StoreAll Storage is targeted toward the diverse
needs of the HP archive customers. These StoreAll Storage systems,
each of which includes options for multiple disk capacities and
geometries, deliver a properly sized, flexible, simple, and
powerful archive storage platform for enterprise information
archival. Solution designs may include one or more of the following
models with one or more different capacity and performance
options.
HP StoreAll 8200 Gateway Storage
HP StoreAll 8200 Gateway Storage enables you to leverage
investments in HP 3PAR StoreServ Storage for file archiving, while
integrating seamlessly with HP StoreAll 8800 Storage. HP 3PAR
StoreServ 7000 and 10000 Storage supported via Fibre Channel
enables converged capacity pool for primary storage and
archives.
HP StoreAll 8800 Enterprise SAS Storage
HP StoreAll 8800 Enterprise SAS Storage is converged hyperscale,
economic, ultra-dense appliance that can be flexibly configured.
This is an ideal storage platform for active archive operations
that require a reliable, scalable, and high-performing solution. It
is capable of handling application workload of heavier read and
write. In addition, storage is highly reliable to sustain heavier
duty cycle. StoreAll 8800 Enterprise SAS is a performance-driven
storage.
HP StoreAll 8800 MDL SAS Storage
HP StoreAll 8800 MDL SAS Storage is converged hyperscale,
harnessed, instant, and economic storage to provide structure for
unstructured data. This is an ideal storage platform for deep
archive operations with configurable 1 or 2 MDL SAS capacity
blocks. Being a capacity-driven storage with low duty cycle,
StoreAll 8800 MDL SAS Storage is best suited for archival and
compliance purposes.
HP StoreAll 8800 Hybrid Storage
HP StoreAll 8800 Hybrid Storage is converged hyperscale and
harnessed storage to provide structure for unstructured data. This
is an ideal storage platform for hybrid or tiered archive
operations with configurable 1 to 4 Enterprise SAS capacity blocks
and 1 MDL SAS capacity block per node pair.
HP StoreAll Storage data services While StoreAll Storage
possesses an extensive array of data services, the data services
highlighted below are best leveraged for the HP StoreAll Storage
with a specific ISV application based solution.
Protection StoreAll Storage enables real-time snapshots for
instantaneous point-in-time archive data recovery at a directory or
file system level. This means that the enterprise information
archival environment retains a local recovery point of the
directory or file system to recover the environment within minutes
of a point of failure.
To maintain data integrity within the enterprise information
archival environment, StoreAll Constant Validation helps confirm
that the file has not been modified through either hardware or
software errors or through malicious intent for a retention-enabled
file system, and reports on any discrepancies.
Retention The StoreAll Storage enterprise Write Once, Read Many
(WORM) and retention capability meets most corporate compliance
requirements. With an enterprise WORM-enabled file system, these
files prevent both inadvertent and deliberate attempts to delete,
modify, or manipulate file content or metadata within an enterprise
or corporate compliance environment.
The StoreAll Storage platform governs data based on its internal
retention policies. Maintaining this strict control enables the
application to purge files only after the retention policy has
expired. Retention policies in Enterprise Mode can be extended, but
the retention duration cannot be reduced.
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
5
Mobility StoreAll Storages non-disruptive automated policy-based
data tiering enables performance and capacity improvement over the
life of the data. For instance, a file or set of files, whether
governed by a retention policy or not, can be tiered from a
performance StoreAll model (i.e., HP StoreAll 8800 Enterprise SAS
Storage) to a deep archive StoreAll model (i.e., HP StoreAll 8800
MDL SAS Storage) as capacity and cost requirements dictate.
The StoreAll Storage has continuous remote replication (CRR)
that enables replication of enterprise information archival data
for a disaster recovery option. This enables a copy of the archival
environment to be protected and maintained at a remote data center
in the event of a disaster at the primary site.
Management StoreAll Storages quota management provides
user-level and directory-level granular control over storage
consumption to properly manage resource allocation and protect
against runaway applications.
The StoreAll Storage solutions statistical tools can report on
utilization and performance over time, as archive demand grows.
This enables archival environments to plan the growth and resource
utilization properly as demands change.
iCAS overview iTernity Compliant Archive (iCAS) is a storage
middleware that enables compliant archiving and data encryption by
legal standards. With the patented and certified content storage
container (CSC) technology, the solution provides (WORM
functionality for data protection by using future-proof
HMAC-SHA-512-bit hashes. The CSC technology compiles the archived
data and documents with its corresponding index data, creation
date, and retention date into a data container, which remains
verifiable and can be stored on any storage medium. It combines the
advantages of a content-addressable-storage system with the
flexibility and transparency of a file share. The flexibility and
openness of iCAS on HP gives customers the advantage of using
existing or newly acquired storage capacity more efficiently, and
saving costs as hardware, software, and training investments are
protected.
The archiving technology from iTernity (iCAS) provides an open
archiving platform based on the complete portfolio of HP servers
and storage systems. This solution delivers a new level of
simplicity, integration, and automation that lowers costs and risk
while enabling better utilization of information assets.
iCAS terminology The iTernity Compliant Archive Solution offers
you the following benefits:
Object-oriented data integrity via hash values: iCAS uses
HMAC-SHA-512-bit hashes to secure the integrity of archived
data.
Integrated data encryption: iCAS offers an integrated but
optional AES256 encryption enabling additional security for stored
data.
Modular and transparent pay-as-you-grow licensing: The license
model is based on a node license per each node iCAS is running on,
combined with a volume license for the data volume that must be
archived. The demand can be adjusted to the actual needs. The
hardware independence of iCAS enables sustained use of the archive
license. Hardware replacement requires no renewed licensing.
Data replication without additional licensing: For safety
reasons, company internal audit rules often require duplication of
one or more sites. iCAS enables this by using another backup path
to a different site. Alternatively, standard storage tools (for
example, array-based replication or server-based replication) can
be used to replicate the archived data to any remote site. No
additional iCAS licenses are needed to write on a second site.
Self-healing: When iCAS is writing the archive data to two
different locations, the system can audit the integrity of the data
by comparing the content with the hash value. If the data on one
site is corrupt, iCAS can automatically copy the valid data and
overwrite the corrupt files. Certainly all these processes are
logged transparently.
Scalability: iCAS scales seamlessly from gigabyte to petabyte.
The iCAS on HP archiving platform is scalable for midmarket and
enterprise businesses, making it ideal for new implementations of
any size. Cluster configurations enable a high data throughput,
availability, and security for archive operations.
Data migration without downtimes: iCAS enables secure and fast
data migration during regular operation on storage level. A special
copy tool allows compliant data migration by logging the migration
process and verifying the copied data. iCAS is based on open
industry standards, which enables your data can be migrated into
future storage architectures and technologies.
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
6
Supports virtual machines (VMware, Microsoft Hyper-V Citrix, and
Xen): The iCAS solution itself can also be virtualized;
technologies such as VMware, Citrix, Xen, and Microsoft Hyper-V are
fully supported. iCAS enables a comprehensive virtualization of the
entire archive infrastructure and offers users the complete range
of associated advantages with regard to flexibility and
economy.
Secure data shredder: Once the retention period has expired, the
data can be deleted according to the specifications of the U.S.
Department of Defense (DoD), i.e., fully destroyed by means of
multiple overwrites with changing bit patterns.
Multi-subscriber capability: The multi-subscriber capability of
iCAS on HP allows departments, subsidiaries, and customers to
archive separately. Different storage paths can be defined for each
subscriber, enabling spatial separation of the individual data
stacks.
Addressable by numerous content sources (ERP, DMS, mail): iCAS
supports more than 50 applications (for example, various PACS,
ECM-Systems such as OpenText and Symantec Enterprise Vault, and
more) permitting iCAS on HP to be used in a wide range of
applications and markets.
Accessible via different interfaces: In addition to the
easy-to-integrate Web Service API Interface, iCAS provides a file
system interface iTernity File System Gateway (iFSG). iFSG can also
be configured using the iAdmin tool and it enables WORM
functionality without the need of integrating into the ISVs program
code.
Easy and efficient archive backup: Since the iCAS archive is
stored on standard file systems, all backup facilities are
available.
HP StoreAll Storage and iCAS The combination of HP StoreAll
Storage and iTernity Compliant Archive Solution (iCAS) software
delivers a flexible information management solution offering
simplified and agile retention of data across backup and archives.
This solution balances cost and performance through seamless as
well as unified archiving of data across multiple storage tiers,
while enabling tamper-proof data retention, and seamless access and
recovery. With this solution, businesses can better harness
information to reduce risk, improve decision-making, and realize
productivity gains.
Solution configuration
This section describes the test setup using HP StoreAll Storage
and iCAS.
The iCAS software was tested for compatibility with HP StoreAll
8200 Gateway Storage. The versions of the different software and
hardware components used in the test configurations are:
HP StoreAll Software (Red Hat Enterprise Linux): 5.8 64-bit
(2.6.18-308.24.1.el5)
StoreAll file serving software version 6.5
iCAS software version 3.7
Communication protocols used to HP StoreAll Storage clients
and/or target systemsCIFS
For more information on the hardware and software
specifications, see the Appendix.
Note The configuration used to test the HP StoreAll Storage with
iCAS software is applicable to the entire HP StoreAll Storage
family.
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
7
Configuration setup The archive setup involves installing and
setting up the iCAS.
Installing iCAS on Microsoft Windows 1. Before you install iCAS,
check that all the prerequisites required for this specific
installation. 2. Execute the self-extractor iSetupV3SFX.exe to
install the software. The setup must always be executed with
administration permissions from a local disk. The self-extractor
will start extracting necessary files and run the main installer
iSetupV3.exe.
See iTernity-Install4OEM-3.7.0-EN.pdf, the on-demand
installation guide provided by iTernity.
In case of problems during installation, contact
[email protected]
Archival configuration with HP StoreAll Storage Configuring iCAS
base and archive path Figure 2. iCAS path configuration
1. On the iCAS server, open iAdmin tool from C:\Program
Files\iTernity\iAdmin 2. On the Connection dialog box, enter the
PIN to load the configuration. 3. After a successful connect, click
the iFSG Config tab. 4. Click Edit iCAS Base Settings
5. Configure archive and base path pointing to the UNC path (for
example, \\10.9.243.101\x9320_fs1\Archive) 6. Click the Save iCAS
Config button, to save the changes.
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
8
Configuring iCAS repository There is only one iCAS repository
client called, Default.
1. In the iAdmin tool, click the API Config tab. 2. Click the
Edit iCAS Repository menu.
3. Edit the archive path for the repository. 4. Configure the
optimization to the Space and Backup. 5. Click the Save iCAS Config
button, to save the changes.
Note See the iTernity-FilesystemGateway-3.7.0-EN.pdf and
iTernity-SoftwareAdministrationGuide-3.7.0-EN.pdf document to
configure and administrate the iCAS software, which will be
available in C:\Program Files\iTernity\iAdmin folder after
installing the iCAS software.
In case of problems during configuration and archiving, contact
[email protected]
Archival process Archival is done to make the files WORM-enabled
and to retain them for fixed period, by leveraging the
WORM/Retention capabilities of iCAS. Once WORM-enabled, the
archived files remains read-only until the retention period
expires.
The archival process includes the following:
1. Select the Mark Files as Read-Only option. 2. Configure iCAS
base and archive path through the iAdmin Console. 3. Click the Edit
iCAS Base Settings to configure the primary storage location (See
Figure 2).
4. Configure the repository (See Figure 3).
Note A file that is in the WORM state cannot be modified or
deleted within the retention period.
To archive a file using iCAS:
1. Open the virtual drive (I:) iTernity File System Gateway,
which is created by default after the iCAS installation. 2. The
iTernity File System Gateway will have many shares in it, which
will be accessed by many clients like CIFS share. 3. Navigate to
iTernity File System Gateway >CEYONIQ (or any shares) and select
the Mark files as read only. 4. If the file Attributes is Read Only
(RO), then the file is archived completely.
5. Verify in the archive location whether the archived file
exists.
Restore process To restore a file:
1. On the iCAS server, navigate to the iTernity File System
Gateway >CEYONIQ (or any shares), which has archived files
2. Double-click the archived file, which will restore the file
from the repository.
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
9
Use case scenarios
Use case scenario 1 Files available in iTernity file system
gateway (i-Mapped drive) in the server where iTernity is installed
are archived. HP StoreAll 8200 Storage is the target server for
this archival.
Figure 4. Scenario 1
HP StoreAll 8800 Storage cluster
HP StoreAll Storage/FS1 Non-WORM CIFS Share
HP StoreAll Storage/FS1 Non-WORM CIFS Share
LANswitch File server
Windows 2008 R2iTernity Console
Source: iTernity Filesystem gatewayTarget:
\\10.9.243.101\FS1_NonWORM
Restore
Archive
Data used 200 GB of file data used for archival.
Hardware used end-to-end 1. iTernity installed on HP ProLiant
DL380 G7 Server. 2. StoreAll 6.5 build installed on the HP StoreAll
8200 Storage Gateway model.
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
10
Use case scenario 2 Files available in iTernity file system
gateway (i-Mapped drive), in the server where iTernity is
installed, are archived using the additional archiving path of the
secondary cluster. The files from the secondary cluster are
retrieved during failover.
Figure 5. Scenario 2
+ + + +
iTernity server
Archive
Source (I):iTernity file system Gateway
LAN
HP StoreAll 8200 Gateway Storage Primary cluster
HP StoreAll 8200 Gateway Storage Secondary cluster
CIFS Share//10.9.246.76/iternity/
archive
CIFS Share//10.9.247.85/iternity/
archive
Archive Path://10.9.246.76/iternity/archiveAdditional write
path: 10.9.247.85/iternity/archive
Data used 200 GB of file data used for archival.
Hardware used end-to-end 1. iTernity installed on HP ProLiant
DL380 G7 Server. 2. StoreAll 6.5 build installed on the HP StoreAll
8200 Gateway Storage model (two clusters).
Note To retrieve files during the disaster, configure the
secondary cluster CIFS share path as archiving path in the iTernity
server.
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
11
iCAS best practices
1. General A suitable backup or mirroring solution for the iCAS
server needs to be used, as RAID cannot be protected against a
total system failure, such as fire or water damage.
Frequently check the logs of the iCAS heads and the appliances,
respectively. This allows a quick reaction on warnings and errors.
You can use the email notification service for this purpose.
Multipath volumes must have a minimum capacity of one terabyte.
It is recommended to use the maximum capacity possible for the
volume or file system type. Volumes must only be part of one
repository (if there is a plan to increase the LUN size later, the
last LUN is excluded from this recommendation).
When using multipath repositories archive and additional write
paths must use volumes of roughly the same size. Archiving is done
until the smaller volume is full. Then, the next path pair is used
for writing. A specific path can only be used within a particular
repository.
There must be a distinct repository for clearly separated, large
units, such as separation of different departments (HR, accounting,
and such). Only a few users (less than five iCAS accounts or
shares) must be created per repository, possibly with different
rights (read/write/admin). We recommend having less than 100
users.
If encryption is desired, it is best to use AES256. This
provides the highest level of security, with minimal extra effort
compared to the standard encryption.
The compression achieved is comparable to those achieved by
WinZip. Tiff Group 4/JPEG are very bad to compress and
WinWord/Excel are very good to compress.
In general, compression, encryption, and HTTPS (only with the
API) do reduce performance. Maximum performance can be reached
using no compression, no encryption, and HTTPS. You have to decide
how much security or speed is needed to get the best performance.
We recommend using message transmission optimization mechanism
(MTOM).
2. iFSG Interface iCAS can handle archiving files greater than 4
GB. However, for best performance we recommend archiving files
smaller than 1 GB in size. This performance can be reached with
files between 4 MB and 100 MB. For files larger than 100 MB, we
recommend using the asynchronous On Policies archive mode.
No more than 10000 files must be put into a single folder, as
the mapping of filename and common service center (CSC)-ID are
optimized for that size. This is not a problem for Document
Management System (DMS)/ Enterprise Content Management (ECM),
because this is the same principle as used in jukeboxes so far.
Other than for performance reasons, there is no general limit on
how many files you put in a folder.
The entire, absolute path to a file must not exceed 256
characters. Umlauts and special characters must be avoided. These
restrictions are also well-known jukebox restrictions.
During a high network load, the offline bit might be delayed in
display, usually for not more than 10 seconds. Generally, we
recommend running the iCAS server and its storage within a
separated network, especially in collaboration with time-critical
applications.
Since using the file system gateway requires one container per
file, we recommend the Space & Backup optimization, as long as
the archived files are smaller than 20 MB.
The ideal archive mode is On Read Only. If that is not possible,
use one of the other two synchronous modes (On Close, On Close
Plus). These offer good security measures. For better performance,
use the asynchronous On Policy.
Data verification needs to be performed by the writing
applications (DMS, ECM, and such) after files have been written to
the archive. This is necessary to rule out any transmission errors
to the iCAS application due to faulty network components. iCAS has
no control over this part of the data path to the iCAS system, so
the accessing application has to perform this check itself.
If you do not use a synchronous mode (On Read Only, On Close, On
Close Plus) and the accessing system does not check the correct
writing, we recommend to perform the Read after Write function.
Note Select the option None, only if a synchronous mode is used
or the application waits for the offline bit to appear.
A network connection (CIFS, SMB, and NFS) to the iFSG drive
needs to be secured as tightly as possible. Only accessing
applications must be allowed.
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
12
3. API/Web service Interface For security reasons, we recommend
using the HTTPS protocol if you connect over the API. To verify if
a container was written correctly, we recommend calling the
VerifyCsc function directly after the write
process finishes. For 100% security, you need to read the
content from the container back and compare that against the
original file. This is the only way to exclude errors securely,
which for example could have occurred through faulty network
components.
In general, compression, encryption, and HTTPS do reduce
performance. Maximum performance can be reached by using no
compression, no encryption, and HTTPS. You have to decide how much
security or speed is needed. To get the best performance, we
recommend using MTOM.
The recommended size of CSC containers is between 1 MB and 64
MB. Containers must not contain more than 1000 files. The advantage
of the container technology (reduction of file overhead) can only
be used by saving multiple files into one container. A single file
storage container can produce a small file overhead.
4. Third-party software/ System integration The servers running
the iCAS software must only be used in a well-equipped data center.
The latter must have
sufficient cooling and access must be restricted as necessary.
It would be best to run an UPS for uninterrupted power usage.
Integration into an existing Windows domain is possible, but not
recommended for compliance reasons. If you decide on such a setup,
you must disable the log on rights for the domain admin to the iCAS
system.
The administrative login must always be performed under the four
eyes principle. Therefore, it is recommended that the iCAS
administrator and the compliance manager only know the two
differing halves of the administrative system password.
A virus scanner can be implemented on the system to avoid data
loss.
Note All archive paths as well as the iFSG base paths must be
excluded from a scan. The iFSG drive must not be scanned under any
circumstances, as this will lead to a significant performance
reduction.
We recommend frequently checking the Windows Event Logs of the
iCAS systems. Backup Clients can be installed on the iCAS system.
All archive paths and iFSG Base Paths must be backed up. The
iFSG
drive (I :\) must not be backed up, because it shows the virtual
archive information that was already saved via the archive paths. A
backup of the iFSG drive would also lead to a loss of the
compliance information (a backup of the archive path on the other
hand keeps this information).
Only applications certified for iCAS or from iTernity must be
used. In general, the SOAP API is preferable over the file system
gateway. If the accessing application has a verify-after-write
function, it must be used.
All instructions for the accessing applications (ECM, DMS, and
others) need to be followed. The applications have to be configured
correctly. A person certified by the manufacturer or in-house must
do the configuration.
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
13
Test results for the tested configuration
The following tests were executed for the certification of
backup and restore solution.
Table 1. HP StoreAll Storage data services validation
Feature Checked
Validation of CIFS
Validation of data mobility features (Tiering, Rebalancer,
Migrator and Evacuator)
Validation of WORM/Retention properties of archived files of
different sizes within iTernity
Validation of retrieving and extending retention within
iTernity
Validation of performance tests
Validation of deep directory structure up to 100 levels
Validation of file deletion allowed after retention period
expires within iTernity
Validation of files sizes after the archival is done from the
iCAS share
Hardware functions correctly without generating any critical
error messages while installing iCAS
iCAS software installed without incurring any resource
limitations
-
Technical white paper | HP StoreAll Storage with iTernity
Compliant Archive Solution
Sign up for updates hp.com/go/getupdated
Share with colleagues
Rate this document
Copyright 2014 Hewlett-Packard Development Company, L.P. The
information contained herein is subject to change without notice.
The only warranties for HP products and services are set forth in
the express warranty statements accompanying such products and
services. Nothing herein should be construed as constituting an
additional warranty. HP shall not be liable for technical or
editorial errors or omissions contained herein.
Microsoft and Windows are U.S. registered trademarks of the
Microsoft group of companies. Linux is a trademark of Linus
Torvalds in the United States and other countries. Citrix and Xen
is a trademark of Citrix Systems, Inc. in the United States and
other countries. VMware is a trademark of VMware, Inc.
4AA3-8113ENW, June 2014
Summary
This technical white paper outlines the scenarios that enable
the ISVs to easily use the archive, restore, WORM, or data
retention features of iTernity server with HP StoreAll Storage.
The certification is done with the above-mentioned use cases on
the iCAS v3.7. The primary storage was provided by the HP StoreAll
8200 Gateway Storage while the secondary device was a disk library
(HP StoreAll Storage NAS file share).
Appendix: Bill of materials
The following are the software versions, firmware revisions, OS
revisions, and patch numbers that are used on various components of
the solutions discussed in this technical white paper:
Table 2. Components utilized for certification
Hardware Software
HP servers HP ProLiant DL380 G7 servers
HP StoreAll Storage Model HP StoreAll 8200 Gateway Storage HP
StoreAll Storage file serving software 6.5
iTernity v3.7
Learn more at hp.com/go/storeall
iternity.com/index.php/technology.html
hp.com/products/quickspecs/14792_div/14792_div.pdf
Executive summaryAudienceDisclaimerIntroductionHP StoreAll
Storage overviewHP StoreAll Storage modelsHP StoreAll Storage data
servicesProtectionRetentionMobilityManagement
iCAS overviewiCAS terminologyHP StoreAll Storage and iCAS
Solution configurationConfiguration setupInstalling iCAS on
Microsoft WindowsArchival configuration with HP StoreAll
StorageConfiguring iCAS base and archive pathConfiguring iCAS
repository
Archival processRestore process
Use case scenariosUse case scenario 1Data usedHardware used
end-to-end
Use case scenario 2Data usedHardware used end-to-end
iCAS best practicesTest results for the tested
configurationSummaryAppendix: Bill of materialsLearn more at
hp.com/go/storeall iternity.com/index.php/technology.html
hp.com/products/quickspecs/14792_div/14792_div.pdf