Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Parallelize decryption of reports #1512

Merged

Conversation

andyleiserson
Copy link
Collaborator

No description provided.

Copy link
Collaborator

@akoshelev akoshelev left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

did you have a chance to test it and compare with previous implementation? The way I was doing it was changing the e2e hybrid test to use 2 shards and running it on 1M input. You could observe CPU utilization by helper binaries and see if it is better with this change

@andyleiserson
Copy link
Collaborator Author

I did the CPU utilization experiment you describe. It's not super compelling, since two shards * three helpers is already 6 cores, i.e., most of the performance cores on my laptop (and CPU utilization can get somewhat above 100% per shard even before this change), but there was an improvement.

I also logged the current tokio task ID when decrypting to confirm that decryption was being performed on multiple tasks.

Copy link

codecov bot commented Dec 20, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 93.18%. Comparing base (291efab) to head (5511e63).
Report is 2 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #1512      +/-   ##
==========================================
- Coverage   93.20%   93.18%   -0.02%     
==========================================
  Files         241      241              
  Lines       44054    44051       -3     
==========================================
- Hits        41061    41050      -11     
- Misses       2993     3001       +8     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@akoshelev
Copy link
Collaborator

most of the performance cores on my laptop (and CPU utilization can get somewhat above 100% per shard even before this change), but there was an improvement.

Have you had a chance to compare it with main? The reason I am asking is because I ran this experiment on main a few days ago and it was also showing > 100% CPU utliziation

@andyleiserson
Copy link
Collaborator Author

I see the CPU utilization increase from ~110% per helper to ~150% per helper comparing main to this change.

@andyleiserson
Copy link
Collaborator Author

But that said, I would be more confident in this change if we see a performance improvement on the real cluster. I don't think it will be harmful, but it is rearranging the order in which flattening of the stream and decryption happen. (Doing it in the preferred order ran afoul of 100013.) So there's a small risk.

@akoshelev akoshelev merged commit dc91dcd into private-attribution:main Dec 21, 2024
12 checks passed
@andyleiserson andyleiserson deleted the parallel-decryption-2 branch December 21, 2024 20:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants