Open cweagans opened 5 months ago
@rbarkerSL Can you please explain how this ticket does not belong on the DevOps-CI Planning Board?
@rbarkerSL Can you please explain how this ticket does not belong on the DevOps-CI Planning Board?
@poulok I think it probably belongs under performance or release engineerings board since it is more in the scope of how the images in the runners are configured as opposed to being part of the workflows themselves.
@rbarkerSL ok, sounds good to me. Next time, will you please just move it to the Rel. Eng. board?
Problem
Spinning off a new issue from https://github.com/hashgraph/hedera-services/issues/5364, which was closed.
Right now, we have to run havaged on all of the consensus nodes. If we don't run havaged, /dev/random starts blocking on reads eventually. havaged must be run as a privileged container to be able to feed entropy to the kernel. This is not ideal. We'll also see some minor issues as we move towards more modern ways of orchestrating our containers (where two instances of the havaged container could be running at the same time, which is something that should be avoided).
Additionally, the quality of the entropy that havaged provides is not guaranteed and is sometimes contested (see banner on https://wiki.archlinux.org/title/Haveged for details).
We're adding additional operational complexity and not gaining much from it.
Solution
Start Java with the right flags to read from /dev/urandom instead of /dev/random. This solution was suggested by Leemon in https://github.com/hashgraph/hedera-services/issues/5364#issuecomment-1454327461
Once that's done, we can get rid of havaged and simplify our deployments a bit.
Alternatives
No response