Veritas CloudPoint Administrator's Guide
- Getting started with CloudPoint
- Section I. Installing and configuring CloudPoint
- Preparing for installation
- Deploying CloudPoint
- Deploying CloudPoint in the AWS cloud
- Using plug-ins to discover assets
- Configuring off-host plug-ins
- AWS plug-in configuration notes
- Google Cloud Platform plug-in configuration notes
- Microsoft Azure plug-in configuration notes
- HPE RMC plug-in configuration notes
- NetApp plug-in configuration notes
- Hitachi plug-in configuration notes
- InfiniBox plug-in configuration notes
- About CloudPoint plug-ins and assets discovery
- Configuring the on-host agents and plug-ins
- Oracle plug-in configuration notes
- Protecting assets with CloudPoint's agentless feature
- Preparing for installation
- Section II. Configuring users
- Section III. Protecting and managing data
- User interface basics
- Indexing and classifying your assets
- Protecting your assets with policies
- Tag-based asset protection
- Replicating snapshots for added protection
- Managing your assets
- About snapshot restore
- Single file restore requirements and limitations
- Additional steps required after a SQL Server snapshot restore
- Monitoring activities with notifications and the job log
- Protection and disaster recovery
- Section IV. Maintaining CloudPoint
- CloudPoint logging
- Troubleshooting CloudPoint
- Working with your CloudPoint license
- Managing CloudPoint agents and plug-ins
- Upgrading CloudPoint
- Uninstalling CloudPoint
- Section V. Reference
Snapshot restore for encrypted AWS assets may fail
If the AWS assets that you wish to protect using CloudPoint are encrypted using AWS KMS Customer Managed Keys (CMK), then the CloudPoint restore operations may fail due to access permission errors. The AWS instances that are spawned may go in to a terminated state.
You may see the following error messages in the AWS CloudTrail logs:
"errorCode": "AccessDenied", with the following error message: User: arn:aws:sts::<ID>:assumed-role/<iamrole>/<awsinstance> is not authorized to perform: kms:ReEncryptFrom on resource: <resourcename>"
Waiter InstanceRunning failed: Waiter encountered a terminal failure state
This error occurs because CloudPoint is unable to perform encrypt and decrypt operations on the AWS assets. This happens because the IAM user or role that is provided to CloudPoint does not have the requisite permissions to use the CMKs.
Workaround:
To resolve this issue, do the following:
If using an IAM user for CloudPoint plug-in configuration, ensure that the IAM user is added as a key user of the CMK.
For source account configuration, ensure that the IAM role that is attached to the CloudPoint instance is added as a key user of the CMK.
For cross account configuration, ensure that the IAM role that is assigned to the other AWS account (cross account) is added as a key user of the CMK.
Adding these IAM roles and users as the CMK key users allows them to use the AWS KMS CMK key directly for cryptographic operations on the assets. Refer to the AWS documentation for more details: