<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Performance on</title><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/gcp/api/performance/</link><description>Recent content in Performance on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/cloud-protect/4.0.0/docs/gcp/api/performance/index.xml" rel="self" type="application/rss+xml"/><item><title>Performance Considerations</title><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/gcp/api/performance/performance_considerations/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/gcp/api/performance/performance_considerations/</guid><description>&lt;h2 id="performance-considerations">Performance Considerations&lt;/h2>
&lt;p>The following factors may affect performance benchmarks:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Cold startup:&lt;/strong> Cloud Function spends additional time on the initial invocation to decrypt and load the policy into memory. This time can vary depending on the policy size. Once the Function is initialized, subsequent “warm executions” should process quickly.&lt;/li>
&lt;li>&lt;strong>Size of policy:&lt;/strong> The size of the policy impacts cold start performance. Larger policies take more time to initialize.&lt;/li>
&lt;li>&lt;strong>Cloud Function memory:&lt;/strong> GCP provides more virtual cores based on the memory configuration. The initial configuration of 2048 MB provides a good tradeoff between performance and cost with the benchmarked policy. Memory can be increased to optimize for your individual cases.&lt;/li>
&lt;li>&lt;strong>Number of security operations (protect or unprotect)&lt;/strong>.&lt;/li>
&lt;li>&lt;strong>Cloud Function max instances and concurrency quota:&lt;/strong> The instance limit affects how functions are scaled. By default the limit is not set to allow handling any traffic pattern. The instance limit can be set to prevent abnormally high request levels. Cloud Functions are also subject to maximum quota for concurrent invocations and request rate.&lt;/li>
&lt;li>&lt;strong>Size of data element:&lt;/strong> Operations on larger text consume time.&lt;/li>
&lt;/ul></description></item><item><title>Log Forwarder Performance</title><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/gcp/api/performance/log_forwarder/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/gcp/api/performance/log_forwarder/</guid><description>&lt;p>

 




	






 






 &lt;ol id="toc">&lt;/ol>
&lt;script>
 // JavaScript to generate the table of contents from H2 headings
 document.addEventListener("DOMContentLoaded", function () {
 //get all h2 headings within the 'main' element and generate a toc with links to them
 //excluding h2 heading 'Feedback' if it exists
 const toc = document.getElementById("toc");
 const headings = document.querySelectorAll("main h2");
 headings.forEach(heading => {
 if (heading.textContent === "Feedback") {
 return; // Skip the 'Feedback' heading
 }

 const li = document.createElement("li");
 const a = document.createElement("a");
 const id = heading.textContent.toLowerCase().replace(/\s+/g, '-');
 heading.id = id; // Set the id for the heading
 a.href = `#${id}`;
 a.textContent = heading.textContent;
 li.appendChild(a);
 toc.appendChild(li);
 });

 });
&lt;/script>





 




	






 






 &lt;h2 id="log-forwarder-performance">Log Forwarder Performance&lt;/h2>
&lt;p>Log forwarder architecture is optimized to minimize the amount of connections and reduce the overall network bandwidth required to send audit logs to ESA. This is achieved with batching and aggregation taking place on two levels. The first level is in protector function instances, where audit logs from consecutive requests to an instance are batched and aggregated. The second level of batching and aggregation takes place in the log forwarder function before audit logs are forwarded to ESA. This section shows how to configure the deployment to accommodate different patterns of anticipated audit log stream. It also shows how to monitor deployment resources to detect problems before audit records are lost.&lt;/p></description></item></channel></rss>