-
Notifications
You must be signed in to change notification settings - Fork 4.1k
cloud/s3: skip md5 hashing #115189
Copy link
Copy link
Closed
Labels
A-disaster-recoveryC-bugCode not up to spec/doc, specs & docs deemed correct. Solution expected to change code/behavior.Code not up to spec/doc, specs & docs deemed correct. Solution expected to change code/behavior.O-supportWould prevent or help troubleshoot a customer escalation - bugs, missing observability/tooling, docsWould prevent or help troubleshoot a customer escalation - bugs, missing observability/tooling, docsP-0Issues/test failures with a fix SLA of 2 weeksIssues/test failures with a fix SLA of 2 weeksT-disaster-recovery
Metadata
Metadata
Assignees
Labels
A-disaster-recoveryC-bugCode not up to spec/doc, specs & docs deemed correct. Solution expected to change code/behavior.Code not up to spec/doc, specs & docs deemed correct. Solution expected to change code/behavior.O-supportWould prevent or help troubleshoot a customer escalation - bugs, missing observability/tooling, docsWould prevent or help troubleshoot a customer escalation - bugs, missing observability/tooling, docsP-0Issues/test failures with a fix SLA of 2 weeksIssues/test failures with a fix SLA of 2 weeksT-disaster-recovery
Part of #115190
We have observed that backups to s3 cause increased tail latencies in foreground traffic, sometimes significantly.
The S3 SDK hashes chunk sized (currently 8mb) blocks both with MD5 and SHA256, for content checksum and signing respectively. It appears that due in large part to golang/go#64417, this causes us to observe long gc pause times and traces show STW pauses overlapping with block hashing.
We can disable the MD5 hashing as it is also done by amazon server side, and thus exists only to verify the upload integrity, but this is already verified by uploading over TLS, while additionally most of the files we upload already have internal or other hashes included in their content, such as SST block checksums.
Jira issue: CRDB-33923