-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Perform Vault operations concurrently #78
Labels
enhancement
New feature or request
Comments
You are right. Parallelizing the calls could save quite some time when recursively operating on a decent amount of secrets in a path. I like your idea 👍 I can take a look at this if you want - but since you self-assigned this I assume you already gave it a shot? 😎 |
mattlqx
pushed a commit
that referenced
this issue
Feb 15, 2021
theres a minor improvement in read/write times when performing a grep or replace across a large number of secrets in a path (by large, i mean around 90). the real killer on runtime though is the traversal to determine which paths are nodes vs. leaves. this is still early in my tinkering with it. this will be a draft until i see some decent gains in reducing runtime on my workloads. will fix #78.
mattlqx
pushed a commit
that referenced
this issue
Feb 15, 2021
theres a minor improvement in read/write times when performing a grep or replace across a large number of secrets in a path (by large, i mean around 90). the real killer on runtime though is the traversal to determine which paths are nodes vs. leaves. this is still early in my tinkering with it. this will be a draft until i see some decent gains in reducing runtime on my workloads. will fix #78.
mattlqx
pushed a commit
that referenced
this issue
Sep 10, 2021
theres a minor improvement in read/write times when performing a grep or replace across a large number of secrets in a path (by large, i mean around 90). the real killer on runtime though is the traversal to determine which paths are nodes vs. leaves. this is still early in my tinkering with it. this will be a draft until i see some decent gains in reducing runtime on my workloads. will fix #78.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Presently all Vault operations are serial, even for reads/writes that operate recursively on paths. These paths are determined by list api calls to find path targets, but after that a for loop iterates over those paths to get or put the data. We could utilize Go channels for this portion to run the read/write api calls simultaneously.
The text was updated successfully, but these errors were encountered: