After 12th of June 2021, you may encounter a situation on your Commserve whereby the SQL TempDB (tempdb.mdf) and Log (templog.ldf) are increasing in size unexpectedly.This may continue until the volume on the Commserve holding these files becomes full, which can lead to performance issues on the Commserve and observed in the Commcell console.Commvault released a reporting enhancement on the 11th June 2021 that has inadvertently caused tempdb/templog file growth.This enhancement has since been fixed however your environment may still be showing high space cosumption from the tempdb and templog files.If you are witnessing this behaviour and have low disk space on the drive hosting these SQL database files, please carry out the following on the Commserve server:1. Disable All Activity in the Console Activity Control (commvault.com)(Right click Commserve > Properties > Activity Control > Uncheck "Enable All Job Activity" > Set "Enable after a Delay" for 30 minutes)2. Suspend al
An edge condition was found when performing a file-level restore of a virtual machine using the Virtual Server Agent, the Access or Proxy Node may reboot due to the CVVD.sys driver that loads the backup data for browsing.The following versions are affected:FeatureRelease 22.42 to 22.49 FeatureRelease 23.29 to 23.34 FeatureRelease 24.15 to 24.20 FeatureRelease 25.0 to 25.2Some common symptoms are the CVD log will flood with NULL values and the following error will be reported for the browse on the media agent.Failed to receive browse response from MediaAgent. Please check Browse.log on MediaAgent.The Browse log on the media agent and\or access node (VSA Proxy) may indicate the following:CCvNetwork::CheckIfDataAvailable() - Thread is waiting for data on a socket. Waited for 600 sec(s). Requested wait time = no time out. Connection details : The CVVD challenge is addressed with the latest maintenance releases when applied to the Virtual Server Proxy or Access Node. These can be downloaded
IssueVMWare recently released update 7.0 U2b to address two high profile security vulnerabilities.If this update is installed it breaks VMWare tag associations, which in turn means that if Commvault backups and virtual machine reporting (specifically Chargeback) are based on VMWare Tags those backups or Reports will also no longer function properly.Security IssuesVMware vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the VMware vSAN health check plug-in. A malicious actor with network access to port 443 might exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2021-21985 to this issue. For more information, see VMware Security Advisory VMSA-2021-0010. VMware vSphere Client (HTML5) contains a vulnerability in a vSphere authentication mechanism for the vSAN h
Already have an account? Login
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
Sorry, our virus scanner detected that this file isn't safe to download.