Problem upgrading: Random generator.

Hi,

 

  I am trying to upgrade upsource from 1.1781 to 2.2197 in a CentOS virtual machine.

 

I followed the procedure in https://upsource-support.jetbrains.com/hc/en-us/articles/207242085?input_string=upsource+upgrade  and the following error happens at US start:

[Upsource Error] Failed to start JetBrains Upsource 2017.2 due to unexpected exception: Native random generator does not seem to have enough entropy for JetBrains Upsource 2017.2 to start.
[Upsource Error] You can fix it by switching to PRNG (with -Djava.security.egd=/dev/zrandom) or by reconfiguring your operation system to provide more random bits.

I saw your https://hub-support.jetbrains.com/hc/en-us/articles/206545269-Hub-hangs-up-on-start page and tryed to follow the second option, but I am not able to run rng-tools in my centos (https://bugzilla.redhat.com/show_bug.cgi?id=893342 )

 

I do not really understand the first option: where the -Djava.security.egd=/dev/zrandom ; OR  parameter must be placed?

We are off service until this is resolved, so I appreciate any help.

Thanks.

5 comments
Comment actions Permalink

Hi Nicolas, how did you resolve this issue?

0
Comment actions Permalink

I installed timer_entropyd -> did not work

I followed https://redhatlinux.guru/index.php/2016/04/03/increase-system-entropy-on-rhel-centos-6-and-7/


You can also follow 'The rngd Service' section in: https://www.certdepot.net/rhel7-get-started-random-number-generator/
It will give you a high number, but not sure how good the entropy is... This might be a good enough solution if your server is not exposed?

1
Comment actions Permalink

Thanks for your quick reply - we ended up fixing it by installing "epel-release" and "haveged" on redhat.

0
Comment actions Permalink

Для CentOS поможет правка конфигов java

В моем случае тут

/usr/lib/jvm/java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.x86_64/jre/lib/security/java.security

from

securerandom.source=file:/dev/random

to

securerandom.source=file:/dev/urandom
 
 
0

Please sign in to leave a comment.