HPE ProLiant DL380 Gen11
Intel Xeon Scalable (4th Gen) · bis zu 64 Kerne · 4 TB DDR5 · iLO 6

Europe's leading sovereign AI infrastructure platform trusts
Rooted in critical infrastructure
clouditiv builds on 30+ years of SETUP Protokolltester GmbH's experience in telecommunications, finance, and critical infrastructure.
Switch to Gen12
Die aktuelle Generation bietet Intel Xeon 6 (P-core / E-core), verbesserte Performance und iLO 7 Management.
HPE ProLiant DL380 Gen12 ansehenWhy choose HPE ProLiant DL380
Engineered for the most demanding workloads in its class.
Versatile Configuration
2U chassis supports diverse storage configurations — SFF, LFF and NVMe in the same server.
Scalable Storage
Up to 30 drive bays for massive local storage capacity — ideal for HCI and Ceph deployments.
Large Memory Capacity
Up to 8 TB RAM supports in-memory databases, large VM workloads and data-intensive applications.
Use cases
What the HPE ProLiant DL380 is designed for.
Hyper-Converged Infrastructure
The most popular HCI node — runs compute, storage and networking on a single versatile 2U platform.
Ceph Object Storage
30 drive bays provide massive Ceph OSD density for scale-out object and block storage clusters.
Database & In-Memory
Up to 8 TB RAM supports Galera Cluster, Redis and large in-memory database workloads.
Intelligent remote management
HPE iLO gives you full out-of-band management — power cycling, console access, firmware updates and health monitoring, all without physical access.
Integrated Lights-Out 6
Redfish API · HTML5 KVM · Silicon Root of Trust
Remote Console
Full HTML5 KVM access to the system console from anywhere.
Power & Lifecycle
Remote power on/off, reset and firmware update without physical access.
Redfish API
Industry-standard API for automation and integration with infrastructure tools.
Health Monitoring
Real-time hardware health data — temperature, fans, PSU and more.
Enterprise security, built in
HPE servers are designed from the silicon up with security as a core requirement — not an afterthought.
Silicon Root of Trust
Hardware-anchored boot chain verification prevents firmware tampering at the lowest level.
Secure Encryption
Hardware-accelerated encryption for data at rest and in transit.
BIOS/UEFI Protection
Signed firmware and secure boot ensure only trusted code runs on your hardware.
How we deliver your hardware
From your order to a running system — handled end to end by us.
Configure & Order
Choose your chassis, CPU, RAM and storage using our configurator. We generate a binding quote within 24 hours.
Integration & Testing
We assemble, configure and burn-in your system in our integration center. Full factory acceptance test included.
Rack-Ready Delivery
Your server arrives configured, tested and ready to rack. Optional on-site installation available.


