<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Performance on</title><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/redshift/performance/</link><description>Recent content in Performance on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/redshift/performance/index.xml" rel="self" type="application/rss+xml"/><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/redshift/performance/srs_concurrency_troubleshooting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/redshift/performance/srs_concurrency_troubleshooting/</guid><description>&lt;h2 id="concurrency-troubleshooting">Concurrency Troubleshooting&lt;/h2>
&lt;p>Hitting up against quota limits may indicate that quota adjustments are required. Exceeding quota limits may cause a Redshift query to fail or reduce performance. In the worst case, significant throttling can impact the performance of all your Lambda services in the region.&lt;/p>
&lt;p>Redshift is tolerant of a certain ratio of failed requests and automatically retries. If a high percentage of requests fail, then the query may abort and the last error code will display in the console. For example, &lt;strong>429 Too Many Requests&lt;/strong>.&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/redshift/performance/srs_lambda_tuning/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/redshift/performance/srs_lambda_tuning/</guid><description>&lt;h2 id="lambda-tuning">Lambda Tuning&lt;/h2>
&lt;p>AWS maintains quotas for Lambda concurrent execution. Two of these quotas impact concurrency and compete with other Lambdas in the same account and region:&lt;/p>
&lt;p>&lt;img src="https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/redshift/performance/ssf_lambda_tuning.png" alt="">&lt;/p>
&lt;p>The &lt;strong>Concurrent executions&lt;/strong> quota cap is the maximum number of Lambda instances that can serve requests for an account and region. The default AWS quota may be inadequate based on peak concurrency based on the table in the previous section. This quota can be increased with an AWS support ticket.&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/redshift/performance/srs_sample_benchmarks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/redshift/performance/srs_sample_benchmarks/</guid><description>&lt;h2 id="sample-benchmarks">Sample Benchmarks&lt;/h2>
&lt;p>The following benchmarks were performed against different cluster sizes. These are median times of approximately five runs each. The query unprotected six columns per row (first_name, last_name, email, postal_code, ssn, iban):&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Rows x Cols&lt;/th>
 &lt;th># Ops&lt;/th>
 &lt;th>dc2.large (24 nodes)&lt;/th>
 &lt;th>ra3.4xl (3 nodes)&lt;/th>
 &lt;th>ra3.4xl (7 nodes)&lt;/th>
 &lt;th>ra3.16xl (7 nodes)&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;strong>1M x 6 cols&lt;/strong>&lt;/td>
 &lt;td>6M&lt;/td>
 &lt;td>1.6&lt;/td>
 &lt;td>1.7&lt;/td>
 &lt;td>1.5&lt;/td>
 &lt;td>1.2&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;strong>10M x 6 cols&lt;/strong>&lt;/td>
 &lt;td>60M&lt;/td>
 &lt;td>6.0&lt;/td>
 &lt;td>6.3&lt;/td>
 &lt;td>2.8&lt;/td>
 &lt;td>3.3&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;strong>100M x 6 cols&lt;/strong>&lt;/td>
 &lt;td>600M&lt;/td>
 &lt;td>44.3&lt;/td>
 &lt;td>49.8&lt;/td>
 &lt;td>23.4&lt;/td>
 &lt;td>15.1&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table></description></item><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/redshift/performance/ssf_performance_considerations/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/redshift/performance/ssf_performance_considerations/</guid><description>&lt;h2 id="performance-considerations">Performance Considerations&lt;/h2>
&lt;p>The following factors may cause variation in real performance versus benchmarks:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Cold startup:&lt;/strong> The Lambda spends additional time on the initial invocation to decrypt and load the policy into memory. This time can vary between 400 ms and 1200 ms depending on the policy size. Once the Lambda is initialized, subsequent “warm executions” should process quickly.&lt;/li>
&lt;li>&lt;strong>Size of policy:&lt;/strong> The size of the policy impacts cold start performance. Larger policies take more time to initialize.&lt;/li>
&lt;li>&lt;strong>Lambda memory:&lt;/strong> AWS provides more virtual cores based on the memory configuration. The initial configuration of 1728 MB provides a good tradeoff between performance and cost with the benchmarked policy. Memory can be increased to optimize for your individual cases.&lt;/li>
&lt;li>&lt;strong>Cluster size:&lt;/strong> Cluster size may make a significant difference depending on the workload.&lt;/li>
&lt;li>Number of security operations (protect or unprotect).&lt;/li>
&lt;li>&lt;strong>Lambda concurrency and burst quotas:&lt;/strong> AWS limits the number of concurrent executions and how quickly lambda can scale to meet demand. This is discussed in an upcoming section of the document.&lt;/li>
&lt;li>&lt;strong>Size of data element:&lt;/strong> Operations on larger text consume time.&lt;/li>
&lt;/ul></description></item></channel></rss>