You can apply all the required roles by using the JSON files inside the archive attached to this article (including the new permissions required for v4.0 and up). Note that for some editions there is more then 1 json file. If you are using FLR or ...
Q: Does Apache Log4j2 vulnerability CVE-2021-44228 (https://nvd.nist.gov/vuln/detail/CVE-2021-44228) affect CPM? A: No, this vulnerability is not relevant to any version of CPM
Issue: When attempting instance recovery, it may fail with the following error in the recovery log: Error - First step (launching instance) failed. Reason: Address xxx.xx.xx.xx is in use. Solution: This usually happens because you are trying to ...
Important: This procedure should be performed when there are no Backups/DR/Cleanup/S3 Copy running. In addition, Linux knowledge is Required. If you need to install a CA SSL certificate, here are the instructions: Connect to the N2WS instance over ...
CPM removes the snapshots in accordance with defined retention policies. However, only successful backups are counted towards the retention. It is crucial to understand what a "successful backup" is. A "successful backup" is a backup that has both ...