Jean-Marc Saffroy wrote:
Hi Eric,

Thanks for your answers!

On Fri, 8 Dec 2006, Eric Mei wrote:

Speak the performance hit, it's not seriously tested yet. The impact might different from system to system, the main overhead is CPU cycles on crypting, and a little bit more network traffic. So on systems with powerful CPUs or hardware encryption the situation might not too bad. Just a guess though.

The CPU overhead of bulk data checksumming on servers should be quite high; FWIW a simple test of sha1sum gives me 154 MB/s with my fairly recent CPU. The additional cost (CPUs or HW crypto engines) required to achieve good performance may be too high for most HPC users, at least for regular access inside a cluster; it could be interesting to enable or disable checksumming for classes of clients.
I've seen a little laptop running Solaris ZFS do checksumming at over a 1 GByte / sec. Probably finding the right algorithms is important here.

- is it mandatory to deploy a keytab on clients? I don't remember having done that when testing AFS+krb5

Yes it's mandatory, this will add some burden to sysadmin. The reason is a little bit involved, we hope root could always own valid secure contexts, otherwise a failed callback RPC from server to client will lead to the client be kicked out off cluster.

It sounds like an implementation problem that surfaces to the user. :-/ Maybe the operations you mention should be possible with unauthenticated clients?

This was a choice to force the mount command to be authenticated. If AFS mounts without such a file or keys obtained otherwise, then they allow mount without authentication.


- Peter -

_______________________________________________
Lustre-devel mailing list
[email protected]
https://mail.clusterfs.com/mailman/listinfo/lustre-devel

Reply via email to