Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[2.x] Use predictable serialization logic for transport headers #4288

Conversation

peternied
Copy link
Member

Description

This change will prevent new clusters from using the 'custom serialization' format that was causing performance impact with customers in OpenSearch 2.11.

Background: the serialization changes from #2802 introduced issues where for certain serialization headers that were previously very small for over the wire transmission become much larger. The root cause of this was that the JDK serialization process was able to detect duplicate entries and then use an encoding format to make it compressible. Adding this logic into the serialization system from OpenSearch is non-trivial and is not being invested in.

Issues Resolved

Check List

  • New functionality includes testing
  • New functionality has been documented
  • Commits are signed per the DCO using --signoff

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.

This change will prevent new clusters from using the 'custom serialization' format that was causing performance impact with customers in OpenSearch 2.11.

Background: the serialization changes from opensearch-project#2802 introduced issues where for certain serialization headers that were previously very small for over the wire transmission become much larger. The root cause of this was that the JDK serialization process was able to detect duplicate entries and then use an encoding format to make it compressible. Adding this logic into the serialization system from OpenSearch is non-trivial and is not being invested in.

Signed-off-by: Peter Nied <[email protected]>
Copy link

codecov bot commented Apr 25, 2024

Codecov Report

Attention: Patch coverage is 90.90909% with 2 lines in your changes are missing coverage. Please review.

Project coverage is 66.11%. Comparing base (d6c0ba3) to head (60045e7).
Report is 2 commits behind head on 2.x.

Additional details and impacted files

Impacted file tree graph

@@            Coverage Diff             @@
##              2.x    #4288      +/-   ##
==========================================
+ Coverage   66.09%   66.11%   +0.02%     
==========================================
  Files         300      301       +1     
  Lines       21533    21545      +12     
  Branches     3497     3500       +3     
==========================================
+ Hits        14232    14245      +13     
+ Misses       5545     5544       -1     
  Partials     1756     1756              
Files Coverage Δ
...urity/ssl/transport/SecuritySSLRequestHandler.java 71.95% <100.00%> (ø)
...g/opensearch/security/support/ConfigConstants.java 95.00% <ø> (-0.24%) ⬇️
...ensearch/security/support/SerializationFormat.java 100.00% <100.00%> (ø)
...search/security/transport/SecurityInterceptor.java 79.76% <83.33%> (+1.10%) ⬆️

... and 5 files with indirect coverage changes

Copy link
Member

@DarshitChanpura DarshitChanpura left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@DarshitChanpura DarshitChanpura merged commit b612529 into opensearch-project:2.x Apr 25, 2024
78 checks passed
@peternied peternied deleted the off-ramp-custom-serializer-2.x branch April 25, 2024 18:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants