[cinder] volume encryption performance impact
Arne Wiebalck
Arne.Wiebalck at cern.ch
Wed Jan 9 17:45:25 UTC 2019
Hi Dave,
With the same key length and backend, we’ve done some quick checks at the
time, but did not notice any significant performance impact (beyond a slight
CPU increase). We did not test beyond the QoS limits we apply, though.
Cheers,
Arne
> On 9 Jan 2019, at 16:13, Dave Holland <dh3 at sanger.ac.uk> wrote:
>
> Hello,
>
> I've just started investigating Cinder volume encryption using Queens
> (RHOSP13) with a Ceph/RBD backend and the performance overhead is...
> surprising. Some naive bonnie++ numbers, comparing a plain vs encrypted
> volume:
>
> plain: write 1400MB/s, read 390MB/s
> encrypted: write 81MB/s, read 83MB/s
>
> The encryption was configured with:
>
> openstack volume type create --encryption-provider nova.volume.encryptors.luks.LuksEncryptor --encryption-cipher aes-xts-plain64 --encryption-key-size 256 --encryption-control-location front-end LuksEncryptor-Template-256
>
> Does anyone have a similar setup, and can share their performance
> figures, or give me an idea of what percentage performance impact I
> should expect? Alternatively: is AES256 overkill, or, where should I
> start looking for a misconfiguration or bottleneck?
>
> Thanks in advance.
>
> Dave
> --
> ** Dave Holland ** Systems Support -- Informatics Systems Group **
> ** 01223 496923 ** Wellcome Sanger Institute, Hinxton, UK **
>
>
> --
> The Wellcome Sanger Institute is operated by Genome Research
> Limited, a charity registered in England with number 1021457 and a
> company registered in England with number 2742969, whose registered
> office is 215 Euston Road, London, NW1 2BE.
>
--
Arne Wiebalck
CERN IT
More information about the openstack-discuss
mailing list