[
https://issues.apache.org/jira/browse/HADOOP-6637?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12847526#action_12847526
]
Konstantin Shvachko commented on HADOOP-6637:
---------------------------------------------
I ran the benchmark on three versions of hadoop
# 0.20.1, which does not have any security code, and therefore kerberos and
delegation token authentications are not applicable there.
# 0.20.100, which contains the latest state of security implementation
# 0.22.trunk, which does not have all the latest security patches applied at
the time of benchmarking (just for the reference)
The benchmark creates a connection to the RPC server 1000 times. Each time the
RPC server authenticates the client using one of the three authentication
methods (no authentication, kerberos, delegation token). The result if the
average latency of the connection request.
The table below shows that
- when security is turned off the the new code still adds 14% overhead.
- The overhead for kerberos authentication is predictably huge.
- The delegation token authentication was intended as a fast alternative to
kerberos. It is somewhat faster, but not as nearly as the non-secure version.
This should definitely be the focus of future optimizations.
- 0.22 is 1-2% slower compared to 0.20.100. It is expected to catch up with it,
when all latest security contributions are ported to the trunk.
||Version||No security||Kerberos||Delegation Tooken||
|0.20.1 |0.920| | |
|0.20.100|1.047 (+14%)|44.670|42.615|
|0.22 |1.597 (+73%)|45.148|43.455|
> Benchmark overhead of RPC session establishment
> ------------------------------------------------
>
> Key: HADOOP-6637
> URL: https://issues.apache.org/jira/browse/HADOOP-6637
> Project: Hadoop Common
> Issue Type: Test
> Components: benchmarks
> Affects Versions: 0.20.2
> Reporter: Konstantin Shvachko
> Assignee: Konstantin Shvachko
> Fix For: 0.20.3
>
> Attachments: miniRPCBenchmark-20.patch, miniRPCBenchmark.patch,
> miniRPCBenchmark.patch
>
>
> Measure the latency of RPC session establishments through three mechanisms:
> # simple - no auth
> # kerberos authentication
> # delegation token authentication
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.