d8tltanc commented on a change in pull request #9485:
URL: https://github.com/apache/kafka/pull/9485#discussion_r532327560



##########
File path: core/src/main/scala/kafka/security/authorizer/AclAuthorizer.scala
##########
@@ -130,6 +130,11 @@ class AclAuthorizer extends Authorizer with Logging {
 
   @volatile
   private var aclCache = new 
scala.collection.immutable.TreeMap[ResourcePattern, VersionedAcls]()(new 
ResourceOrdering)
+
+  @volatile
+  private var resourceCache = new 
scala.collection.immutable.HashMap[AccessControlEntry,
+    scala.collection.mutable.HashSet[ResourcePattern]]()

Review comment:
       commit 230ee36b9147a11d7ce299aa9fcbb590324faf68
   Added the authorizeByResourceType() API to the benchmark and simulate the 
worst case: every allow ACL on the same resource has a dominant deny ACL.
   Adjust the `resourceCount` parameter to "10000", "40000", "80000" since each 
cluster is unlikely to have more than 10k resources. Also, since we are testing 
against the worst case mentioned above, I think the "10000" cases are adequate 
for us.
   Performance result here: https://paste.ubuntu.com/p/k8kV3w6fvF/




----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


Reply via email to