-
Notifications
You must be signed in to change notification settings - Fork 20
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat(bench): transform/detransform benchmarks
- Loading branch information
Showing
3 changed files
with
335 additions
and
0 deletions.
There are no files selected for viewing
80 changes: 80 additions & 0 deletions
80
benchmarks/src/main/java/io/aiven/kafka/tieredstorage/benchs/AesKeyAware.java
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,80 @@ | ||
/* | ||
* Copyright 2023 Aiven Oy | ||
* | ||
* Licensed under the Apache License, Version 2.0 (the "License"); | ||
* you may not use this file except in compliance with the License. | ||
* You may obtain a copy of the License at | ||
* | ||
* http://www.apache.org/licenses/LICENSE-2.0 | ||
* | ||
* Unless required by applicable law or agreed to in writing, software | ||
* distributed under the License is distributed on an "AS IS" BASIS, | ||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
* See the License for the specific language governing permissions and | ||
* limitations under the License. | ||
*/ | ||
|
||
package io.aiven.kafka.tieredstorage.benchs; | ||
|
||
import javax.crypto.Cipher; | ||
import javax.crypto.NoSuchPaddingException; | ||
import javax.crypto.spec.GCMParameterSpec; | ||
import javax.crypto.spec.SecretKeySpec; | ||
|
||
import java.security.InvalidAlgorithmParameterException; | ||
import java.security.InvalidKeyException; | ||
import java.security.NoSuchAlgorithmException; | ||
import java.security.SecureRandom; | ||
import java.util.Random; | ||
|
||
public class AesKeyAware { | ||
protected static int ivSize; | ||
protected static SecretKeySpec secretKey; | ||
protected static byte[] aad; | ||
|
||
public static void initCrypto() { | ||
// These are tests, we don't need a secure source of randomness. | ||
final Random random = new Random(); | ||
|
||
final byte[] dataKey = new byte[32]; | ||
random.nextBytes(dataKey); | ||
secretKey = new SecretKeySpec(dataKey, "AES"); | ||
Check failure Code scanning / CodeQL Insecure randomness High
Potential Insecure randomness due to a
Insecure randomness source. Error loading related location Loading |
||
|
||
aad = new byte[32]; | ||
random.nextBytes(aad); | ||
|
||
ivSize = encryptionCipherSupplier().getIV().length; | ||
} | ||
|
||
protected static Cipher encryptionCipherSupplier() { | ||
try { | ||
final Cipher encryptCipher = getCipher(); | ||
encryptCipher.init(Cipher.ENCRYPT_MODE, secretKey, SecureRandom.getInstanceStrong()); | ||
encryptCipher.updateAAD(aad); | ||
return encryptCipher; | ||
} catch (final NoSuchAlgorithmException | InvalidKeyException e) { | ||
throw new RuntimeException(e); | ||
} | ||
} | ||
|
||
protected static Cipher decryptionCipherSupplier(final byte[] encryptedChunk) { | ||
try { | ||
final Cipher encryptCipher = getCipher(); | ||
encryptCipher.init(Cipher.DECRYPT_MODE, secretKey, | ||
new GCMParameterSpec(128, encryptedChunk, 0, ivSize), | ||
SecureRandom.getInstanceStrong()); | ||
encryptCipher.updateAAD(aad); | ||
return encryptCipher; | ||
} catch (final NoSuchAlgorithmException | InvalidKeyException | InvalidAlgorithmParameterException e) { | ||
throw new RuntimeException(e); | ||
} | ||
} | ||
|
||
protected static Cipher getCipher() { | ||
try { | ||
return Cipher.getInstance("AES/GCM/NoPadding"); | ||
} catch (final NoSuchAlgorithmException | NoSuchPaddingException e) { | ||
throw new RuntimeException(e); | ||
} | ||
} | ||
} |
141 changes: 141 additions & 0 deletions
141
benchmarks/src/main/java/io/aiven/kafka/tieredstorage/benchs/transform/DetransformBench.java
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,141 @@ | ||
/* | ||
* Copyright 2023 Aiven Oy | ||
* | ||
* Licensed under the Apache License, Version 2.0 (the "License"); | ||
* you may not use this file except in compliance with the License. | ||
* You may obtain a copy of the License at | ||
* | ||
* http://www.apache.org/licenses/LICENSE-2.0 | ||
* | ||
* Unless required by applicable law or agreed to in writing, software | ||
* distributed under the License is distributed on an "AS IS" BASIS, | ||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
* See the License for the specific language governing permissions and | ||
* limitations under the License. | ||
*/ | ||
|
||
package io.aiven.kafka.tieredstorage.benchs.transform; | ||
|
||
import java.io.ByteArrayInputStream; | ||
import java.io.IOException; | ||
import java.io.SequenceInputStream; | ||
import java.nio.file.Files; | ||
import java.nio.file.Path; | ||
import java.security.SecureRandom; | ||
import java.util.concurrent.TimeUnit; | ||
|
||
import io.aiven.kafka.tieredstorage.benchs.AesKeyAware; | ||
import io.aiven.kafka.tieredstorage.manifest.index.ChunkIndex; | ||
import io.aiven.kafka.tieredstorage.transform.BaseDetransformChunkEnumeration; | ||
import io.aiven.kafka.tieredstorage.transform.BaseTransformChunkEnumeration; | ||
import io.aiven.kafka.tieredstorage.transform.CompressionChunkEnumeration; | ||
import io.aiven.kafka.tieredstorage.transform.DecompressionChunkEnumeration; | ||
import io.aiven.kafka.tieredstorage.transform.DecryptionChunkEnumeration; | ||
import io.aiven.kafka.tieredstorage.transform.DetransformChunkEnumeration; | ||
import io.aiven.kafka.tieredstorage.transform.DetransformFinisher; | ||
import io.aiven.kafka.tieredstorage.transform.EncryptionChunkEnumeration; | ||
import io.aiven.kafka.tieredstorage.transform.TransformChunkEnumeration; | ||
import io.aiven.kafka.tieredstorage.transform.TransformFinisher; | ||
|
||
import org.openjdk.jmh.annotations.Benchmark; | ||
import org.openjdk.jmh.annotations.BenchmarkMode; | ||
import org.openjdk.jmh.annotations.Fork; | ||
import org.openjdk.jmh.annotations.Level; | ||
import org.openjdk.jmh.annotations.Measurement; | ||
import org.openjdk.jmh.annotations.Mode; | ||
import org.openjdk.jmh.annotations.OutputTimeUnit; | ||
import org.openjdk.jmh.annotations.Param; | ||
import org.openjdk.jmh.annotations.Scope; | ||
import org.openjdk.jmh.annotations.Setup; | ||
import org.openjdk.jmh.annotations.State; | ||
import org.openjdk.jmh.annotations.TearDown; | ||
import org.openjdk.jmh.annotations.Warmup; | ||
import org.openjdk.jmh.profile.AsyncProfiler; | ||
import org.openjdk.jmh.runner.Runner; | ||
import org.openjdk.jmh.runner.options.Options; | ||
import org.openjdk.jmh.runner.options.OptionsBuilder; | ||
|
||
@State(Scope.Benchmark) | ||
@Fork(value = 1) | ||
@Warmup(iterations = 4) | ||
@Measurement(iterations = 16) | ||
@BenchmarkMode({Mode.Throughput, Mode.SampleTime}) | ||
@OutputTimeUnit(TimeUnit.MILLISECONDS) | ||
public class DetransformBench extends AesKeyAware { | ||
static Path segmentPath; | ||
@Param({"5242880", "10485760", "52428800"}) | ||
public int contentLength; // 5MiB, 10MiB, 50MiB | ||
@Param({"10240", "102400", "524288", "1048576", "5242880", "10485760"}) | ||
public int chunkSize; // 10KiB, 100KiB, 512KiB, 1MiB, 5MiB, 10MiB | ||
@Param({"false"}) | ||
public boolean compression; | ||
@Param({"false", "true"}) | ||
public boolean encryption; | ||
|
||
byte[] uploadedData; | ||
ChunkIndex chunkIndex; | ||
|
||
@Setup(Level.Trial) | ||
public void setup() throws IOException { | ||
segmentPath = Files.createTempFile("segment", ".log"); | ||
// to fill with random bytes. | ||
final SecureRandom secureRandom = new SecureRandom(); | ||
try (final var out = Files.newOutputStream(segmentPath)) { | ||
final byte[] bytes = new byte[contentLength]; | ||
secureRandom.nextBytes(bytes); | ||
out.write(bytes); | ||
} | ||
if (encryption) { | ||
initCrypto(); | ||
} | ||
|
||
// Transform. | ||
TransformChunkEnumeration transformEnum = new BaseTransformChunkEnumeration( | ||
Files.newInputStream(segmentPath), | ||
chunkSize | ||
); | ||
if (compression) { | ||
transformEnum = new CompressionChunkEnumeration(transformEnum); | ||
} | ||
if (encryption) { | ||
transformEnum = new EncryptionChunkEnumeration(transformEnum, AesKeyAware::encryptionCipherSupplier); | ||
} | ||
final var transformFinisher = new TransformFinisher(transformEnum, contentLength); | ||
try (final var sis = new SequenceInputStream(transformFinisher)) { | ||
uploadedData = sis.readAllBytes(); | ||
chunkIndex = transformFinisher.chunkIndex(); | ||
} | ||
} | ||
|
||
@TearDown | ||
public void teardown() throws IOException { | ||
Files.deleteIfExists(segmentPath); | ||
} | ||
|
||
@Benchmark | ||
public int test() throws IOException { | ||
// Detransform. | ||
DetransformChunkEnumeration detransformEnum = new BaseDetransformChunkEnumeration( | ||
new ByteArrayInputStream(uploadedData), chunkIndex.chunks()); | ||
if (encryption) { | ||
detransformEnum = new DecryptionChunkEnumeration( | ||
detransformEnum, ivSize, AesKeyAware::decryptionCipherSupplier); | ||
} | ||
if (compression) { | ||
detransformEnum = new DecompressionChunkEnumeration(detransformEnum); | ||
} | ||
final var detransformFinisher = new DetransformFinisher(detransformEnum); | ||
try (final var sis = new SequenceInputStream(detransformFinisher)) { | ||
final var bytes = sis.readAllBytes(); | ||
return bytes.length; | ||
} | ||
} | ||
|
||
public static void main(final String[] args) throws Exception { | ||
final Options opts = new OptionsBuilder() | ||
.include(DetransformBench.class.getSimpleName()) | ||
.addProfiler(AsyncProfiler.class, "output=flamegraph") | ||
.build(); | ||
new Runner(opts).run(); | ||
} | ||
} |
114 changes: 114 additions & 0 deletions
114
benchmarks/src/main/java/io/aiven/kafka/tieredstorage/benchs/transform/TransformBench.java
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,114 @@ | ||
/* | ||
* Copyright 2023 Aiven Oy | ||
* | ||
* Licensed under the Apache License, Version 2.0 (the "License"); | ||
* you may not use this file except in compliance with the License. | ||
* You may obtain a copy of the License at | ||
* | ||
* http://www.apache.org/licenses/LICENSE-2.0 | ||
* | ||
* Unless required by applicable law or agreed to in writing, software | ||
* distributed under the License is distributed on an "AS IS" BASIS, | ||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
* See the License for the specific language governing permissions and | ||
* limitations under the License. | ||
*/ | ||
|
||
package io.aiven.kafka.tieredstorage.benchs.transform; | ||
|
||
import java.io.IOException; | ||
import java.io.SequenceInputStream; | ||
import java.nio.file.Files; | ||
import java.nio.file.Path; | ||
import java.security.SecureRandom; | ||
import java.util.concurrent.TimeUnit; | ||
|
||
import io.aiven.kafka.tieredstorage.benchs.AesKeyAware; | ||
import io.aiven.kafka.tieredstorage.transform.BaseTransformChunkEnumeration; | ||
import io.aiven.kafka.tieredstorage.transform.CompressionChunkEnumeration; | ||
import io.aiven.kafka.tieredstorage.transform.EncryptionChunkEnumeration; | ||
import io.aiven.kafka.tieredstorage.transform.TransformChunkEnumeration; | ||
import io.aiven.kafka.tieredstorage.transform.TransformFinisher; | ||
|
||
import org.openjdk.jmh.annotations.Benchmark; | ||
import org.openjdk.jmh.annotations.BenchmarkMode; | ||
import org.openjdk.jmh.annotations.Fork; | ||
import org.openjdk.jmh.annotations.Level; | ||
import org.openjdk.jmh.annotations.Measurement; | ||
import org.openjdk.jmh.annotations.Mode; | ||
import org.openjdk.jmh.annotations.OutputTimeUnit; | ||
import org.openjdk.jmh.annotations.Param; | ||
import org.openjdk.jmh.annotations.Scope; | ||
import org.openjdk.jmh.annotations.Setup; | ||
import org.openjdk.jmh.annotations.State; | ||
import org.openjdk.jmh.annotations.TearDown; | ||
import org.openjdk.jmh.annotations.Warmup; | ||
import org.openjdk.jmh.profile.AsyncProfiler; | ||
import org.openjdk.jmh.runner.Runner; | ||
import org.openjdk.jmh.runner.options.Options; | ||
import org.openjdk.jmh.runner.options.OptionsBuilder; | ||
|
||
@State(Scope.Benchmark) | ||
@Fork(value = 1) | ||
@Warmup(iterations = 4) | ||
@Measurement(iterations = 16) | ||
@BenchmarkMode({Mode.Throughput, Mode.SampleTime}) | ||
@OutputTimeUnit(TimeUnit.MILLISECONDS) | ||
public class TransformBench extends AesKeyAware { | ||
static Path segmentPath; | ||
@Param({"10485760", "104857600", "1073741824"}) | ||
public int contentLength; // 10MiB, 100MiB, 1GiB | ||
@Param({"102400", "1048576", "5242880"}) | ||
public int chunkSize; // 100KiB, 1MiB, 5MiB | ||
@Param({"false", "true"}) | ||
public boolean compression; | ||
@Param({"false", "true"}) | ||
public boolean encryption; | ||
|
||
@Setup(Level.Trial) | ||
public void setup() throws IOException { | ||
segmentPath = Files.createTempFile("segment", ".log"); | ||
// to fill with random bytes. | ||
final SecureRandom secureRandom = new SecureRandom(); | ||
try (final var out = Files.newOutputStream(segmentPath)) { | ||
final byte[] bytes = new byte[contentLength]; | ||
secureRandom.nextBytes(bytes); | ||
out.write(bytes); | ||
} | ||
if (encryption) { | ||
initCrypto(); | ||
} | ||
} | ||
|
||
@TearDown | ||
public void teardown() throws IOException { | ||
Files.deleteIfExists(segmentPath); | ||
} | ||
|
||
@Benchmark | ||
public byte[] test() throws IOException { | ||
// Transform. | ||
TransformChunkEnumeration transformEnum = new BaseTransformChunkEnumeration( | ||
Files.newInputStream(segmentPath), | ||
chunkSize | ||
); | ||
if (compression) { | ||
transformEnum = new CompressionChunkEnumeration(transformEnum); | ||
} | ||
if (encryption) { | ||
transformEnum = new EncryptionChunkEnumeration(transformEnum, AesKeyAware::encryptionCipherSupplier); | ||
} | ||
final var transformFinisher = new TransformFinisher(transformEnum, contentLength); | ||
try (final var sis = new SequenceInputStream(transformFinisher)) { | ||
return sis.readAllBytes(); | ||
} | ||
} | ||
|
||
public static void main(final String[] args) throws Exception { | ||
final Options opts = new OptionsBuilder() | ||
.include(TransformBench.class.getSimpleName()) | ||
.addProfiler(AsyncProfiler.class, "output=flamegraph") | ||
.build(); | ||
new Runner(opts).run(); | ||
} | ||
} |