Details
-
Improvement
-
Status: Patch Available
-
Major
-
Resolution: Unresolved
-
3.0.0-alpha1
-
None
-
None
Description
Hadoop RPC encryption is enabled by setting hadoop.rpc.protection to "privacy". It utilized SASL GSSAPI and DIGEST-MD5 mechanisms for secure authentication and data protection. Even GSSAPI supports using AES, but without AES-NI support by default, so the encryption is slow and will become bottleneck.
After discuss with atm, tucu00 and umamaheswararao, we can do the same optimization as in HDFS-6606. Use AES-NI with more than 20x speedup.
On the other hand, RPC message is small, but RPC is frequent and there may be lots of RPC calls in one connection, we needs to setup benchmark to see real improvement and then make a trade-off.
Attachments
Attachments
Issue Links
- causes
-
HBASE-20572 HBase2 does not compile against Hadoop3 after HADOOP-10768
- Open
- duplicates
-
HADOOP-14558 RPC requests on a secure cluster are 10x slower due to expensive encryption and decryption
- Resolved
- is depended upon by
-
HADOOP-15359 IPC client hang in kerberized cluster due to JDK deadlock
- Open
- is duplicated by
-
HADOOP-14558 RPC requests on a secure cluster are 10x slower due to expensive encryption and decryption
- Resolved
- is related to
-
HADOOP-12725 RPC encryption benchmark and optimization prototypes
- Open
- relates to
-
HBASE-16633 Optimize HBase RPC Encryption Performance
- Resolved
-
HBASE-16414 Improve performance for RPC encryption with Apache Common Crypto
- Resolved
-
HDFS-6606 Optimize HDFS Encrypted Transport performance
- Closed
-
HADOOP-15032 Enable Optimize Hadoop RPC encryption performance for branch-2
- Patch Available
- links to