<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: workaround for &amp;quot;unable to write 'random state'&amp;quot; when installing? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/workaround-for-quot-unable-to-write-random-state-quot-when/m-p/351635#M161256</link>
    <description>&lt;P&gt;What's happening is OpenSSL is trying to create/modify &lt;CODE&gt;~splunk/.rnd&lt;/CODE&gt; and can't.  &lt;/P&gt;

&lt;P&gt;To resolve, check &lt;CODE&gt;/etc/passwd&lt;/CODE&gt; to see where the system thinks the home directory, and then make sure it exists with the correct permissions.  In theory you could set splunk's home directory to your install location, but there may or may not be security implications of having the .rnd in &lt;CODE&gt;$SPLUNK_HOME&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;I'm still working on grocking the full Splunk security model, but I'm sure the ultimate solution is to not user the self signed certificates and install real certificates.&lt;/P&gt;</description>
    <pubDate>Sat, 29 Apr 2017 20:16:05 GMT</pubDate>
    <dc:creator>dslife_splunk</dc:creator>
    <dc:date>2017-04-29T20:16:05Z</dc:date>
    <item>
      <title>workaround for "unable to write 'random state'" when installing?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/workaround-for-quot-unable-to-write-random-state-quot-when/m-p/351634#M161255</link>
      <description>&lt;P&gt;When installing latest version on Linux, with a splunk OS user set (SPLUNK_OS_USER=splunk) in etc/splunk-launch.conf, I get "unable to write 'random state'" when it's generating the keys.  This means the ssh keys have been generated with inadequate randomisation.&lt;/P&gt;

&lt;P&gt;Is there a workaround?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:51:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/workaround-for-quot-unable-to-write-random-state-quot-when/m-p/351634#M161255</guid>
      <dc:creator>JeToJedno</dc:creator>
      <dc:date>2020-09-29T13:51:27Z</dc:date>
    </item>
    <item>
      <title>Re: workaround for "unable to write 'random state'" when installing?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/workaround-for-quot-unable-to-write-random-state-quot-when/m-p/351635#M161256</link>
      <description>&lt;P&gt;What's happening is OpenSSL is trying to create/modify &lt;CODE&gt;~splunk/.rnd&lt;/CODE&gt; and can't.  &lt;/P&gt;

&lt;P&gt;To resolve, check &lt;CODE&gt;/etc/passwd&lt;/CODE&gt; to see where the system thinks the home directory, and then make sure it exists with the correct permissions.  In theory you could set splunk's home directory to your install location, but there may or may not be security implications of having the .rnd in &lt;CODE&gt;$SPLUNK_HOME&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;I'm still working on grocking the full Splunk security model, but I'm sure the ultimate solution is to not user the self signed certificates and install real certificates.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Apr 2017 20:16:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/workaround-for-quot-unable-to-write-random-state-quot-when/m-p/351635#M161256</guid>
      <dc:creator>dslife_splunk</dc:creator>
      <dc:date>2017-04-29T20:16:05Z</dc:date>
    </item>
    <item>
      <title>Re: workaround for "unable to write 'random state'" when installing?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/workaround-for-quot-unable-to-write-random-state-quot-when/m-p/351636#M161257</link>
      <description>&lt;P&gt;In practice, the most common reason for this happening seems to be that the .rnd file in your home directory is owned by root rather than your account.&lt;/P&gt;

&lt;P&gt;Easiest solution: &lt;BR /&gt;
As Splunk user&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;sudo rm ~/.rnd&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;~/&lt;/CODE&gt; is equivalent of "the current users home directory" which as @dslife suggested, is also shown in /etc/passwd.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;grep splunk /etc/passwd&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;The splunk users home directory is typically one of the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;/home/splunk
/opt/splunk
/opt/splunkforwarder
/applications/splunk
/applications/splunkforwarder
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Therefore you could delete the .rnd file like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;rm /home/splunk/.rnd
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Or you could change ownership of it like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;chown -f splunk. /home/splunk/.rnd
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 14 Sep 2018 16:35:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/workaround-for-quot-unable-to-write-random-state-quot-when/m-p/351636#M161257</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2018-09-14T16:35:40Z</dc:date>
    </item>
  </channel>
</rss>

