Reviewed-by: Pruthi, Vineet <vineet.pruthi@t-systems.com> Reviewed-by: Rechenburg, Matthias <matthias.rechenburg@t-systems.com> Co-authored-by: Yang, Tong <yangtong2@huawei.com> Co-committed-by: Yang, Tong <yangtong2@huawei.com>
15 KiB
ALM-12040 Insufficient System Entropy
Description
MRS 3.2.0-LTS.2 or later:
The system checks whether the rng-tools or haveged tool has been enabled and correctly configured every 5 minutes. If neither tool is configured, this alarm is generated. If either is configured, the system continues to check the entropy. If the entropy is less than 100 for five consecutive times, this alarm is generated.
This alarm is cleared when rng-tools or haveged has been installed and enabled on the target node and the entropy of the OS is greater than or equal to 100 in at least one of five entropy checks.
MRS 3.1.2-LTS.6 or earlier:
The system checks the entropy for five consecutive times at 00:00 every day. Specifically, the system checks whether rng-tools or haveged has been enabled and correctly configured. If neither is configured, the system continues to check the entropy. If the entropy is less than 100 for five consecutive times, this alarm is reported.
This alarm is cleared when the system detects that the true random number mode has been configured, the random number parameters have been configured in the pseudo-random number mode, or neither mode is configured but the entropy of the OS is greater than or equal to 100 in at least one of five entropy checks.
Attribute
Alarm ID |
Alarm Severity |
Auto Clear |
---|---|---|
12040 |
Major |
Yes |
Parameters
Name |
Meaning |
---|---|
Source |
Specifies the cluster or system for which the alarm is generated. |
ServiceName |
Specifies the service for which the alarm is generated. |
RoleName |
Specifies the role for which the alarm is generated. |
HostName |
Specifies the host for which the alarm is generated. |
Impact on the System
The system is not running properly.
Possible Causes
- rng-tools or haveged has not been installed or started.
- The entropy of the OS is smaller than 100 for multiple consecutive times.
Procedure
Check whether haveged or rng-tools has been installed or started.
- Log in to MRS Manager and choose O&M > Alarm > Alarms.
- Check the value of HostName in the Location area to obtain the name of the host for which the alarm is generated.
- Log in to the node for which the alarm is generated as user root.
- Run the /bin/rpm -qa | grep -w "haveged" command to check the haveged installation status and check whether the command output is empty.
- Run the /sbin/service haveged status |grep "running" command and check the command output.
- Run the /bin/rpm -qa | grep -w "rng-tools" command to check the rng-tools installation and check whether the command output is empty.
- Run the ps -ef | grep -v "grep" | grep rngd | tr -d " " | grep "\-r/dev/urandom" command and check the command output.
Check the entropy of the OS.
- Manually check the entropy of the OS.
Log in to the target node as user root and run the cat /proc/sys/kernel/random/entropy_avail command to check whether the entropy of the OS meets cluster installation requirements (no less than 100).
- If yes, the entropy of the OS is not less than 100. Go to 9.
- If no, the entropy of the OS is less than 100. Use either of the following methods and go to 9.
- Method 1: Use haveged (true random number mode). Contact the OS vendor to install and start haveged.
In Kylin, run the following command:
vi /usr/lib/systemd/system/haveged.service
Configure Type, ExecStar, SuccessExitStatus, and Restart in [Service] as follows:
Type=simple ExecStar=/usr/sbin/haveged -w 1024 -v 1 –Foreground SuccessExitStatus=137 143 Restart=always
- Method 2: Use rng-tools (pseudo-random number mode). Contact the OS vendor to install and start rng-tools and configure it based on the OS type.
- In Red Hat Linux or CentOS, run the following commands:
echo 'EXTRAOPTIONS="-r /dev/urandom -o /dev/random -t 1 -i"' >> /etc/sysconfig/rngd
service rngd start
chkconfig rngd on
- In SUSE, run the following commands:
rngd -r /dev/urandom -o /dev/random
echo "rngd -r /dev/urandom -o /dev/random" >> /etc/rc.d/after.local
- In Kylin, run the following command as user root on the node where the alarm is reported:
vi /usr/lib/systemd/system/rngd.service
Change the value of ExecStart in [Service] as follows:
ExecStart=/sbin/rngd -f -r /dev/urandom -s 2048
- In Red Hat Linux or CentOS, run the following commands:
- Method 1: Use haveged (true random number mode). Contact the OS vendor to install and start haveged.
- Wait until the system to check the entropy at 00:00 on the following day and check whether the alarm is cleared.
- If yes, no further action is required.
- If no, go to 10.
Collect fault information.
- On MRS Manager, choose O&M. In the navigation pane on the left, choose Log > Download.
- Select NodeAgent for Service and click OK.
- Click
in the upper right corner, and set Start Date and End Date for log collection to 10 minutes ahead of and after the alarm generation time, respectively. Then, click Download.
- Contact O&M personnel and provide the collected logs.
Alarm Clearing
This alarm is automatically cleared after the fault is rectified.