You can apply all the required roles by using the JSON files inside the archive attached to this article (including the new permissions required for v4.0 and up). To apply these permissions in AWS, follow these instructions: 1. Go to the IAM Console ...
Q: Does Apache Log4j2 vulnerability CVE-2021-44228 (https://nvd.nist.gov/vuln/detail/CVE-2021-44228) affect CPM? A: No, this vulnerability is not relevant to any version of CPM
Issues: When attempting instance recovery, it may fail with the following error in the recovery log: Error - First step (launching instance) failed. Reason: Address xxx.xx.xx.xx is in use. Solution: This usually happens because you are trying to ...
Important: This procedure should be performed when there are no Backups/DR/Cleanup/S3 Copy running. If you need to install a CA SSL certificate, here are the instructions: Connect to the N2WS instance over SSH You will need to use "sudo" to reach the ...
CPM removes the snapshots in accordance with defined retention policies. However, only successful backups are counted towards the retention. It is crucial to understand what a "successful backup" is. A "successful backup" is a backup that has both ...