Re: speeding up zfs send | recv (update)

From: Charles Sprickman <spork_at_bway.net>
Date: Thu, 23 Feb 2023 20:28:08 UTC
> On Feb 23, 2023, at 2:15 PM, Chris Watson <bsdunix44@gmail.com> wrote:
> 
> [Sorry miroslav, I hit send without checking the To: this was meant to be public] 
> 
> I’m a bit late, but I mentioned this to someone on this thread privately, I’m curious why ‘spiped’ hasn’t been mentioned in this thread. I’ve seen everything from VPN’s to nc. VPNs would be, imo, grossly unwarranted/massively overly complex/hard to secure just to simply have a secure pipe for doing ZFS send|recv. 
> 
> Simply configuring an spiped PtP pipe between A and B seems the simplest, most secure, performant option here. At least considering all the other options tossed out in this thread. 

Does it scale across multiple cores?

Charles

> 
> No one’s using spiped? O.o
> 
> Thoughts? 
> 
> Has anyone compared ssh to spiped regarding overhead and throughput in this scenario?
> 
> Chris
> 
> On Wed, Feb 22, 2023 at 9:29 PM Sysadmin Lists <sysadmin.lists@mailfence.com <mailto:sysadmin.lists@mailfence.com>> wrote:
> 
> On Feb 22, 2023 at 1:43 PM, Freddie Cash <fjwcash@gmail.com <mailto:fjwcash@gmail.com>> wrote:
>> 
>> [Sorry for top part, GMail sucks for replies.]
>> 
>> If this is a LAN or private WAN where you trust the network, piping the send stream through netcat will remove ssh from the equation.
>> 
>> That's what we switched to using once it became almost impossible to get the "none" cipher working with ssh on FreeBSD.
>> 
>> We use ssh to connect to the remote server and enable a netcat listener on port X, then pipe the send through netcat to the remote system on port X. That way it's logged and uses ssh for authentication.
>> 
>> We easily saturate gigabit links between our ZFS systems using netcat.
>> 
>> 
>> 
>> Cheers,
>> Freddie
>> 
>> Typos due to smartphone keyboard.
>> 
>> On Wed., Feb. 22, 2023, 1:31 p.m. Miroslav Lachman, <000.fbsd@quip.cz <mailto:000.fbsd@quip.cz>> wrote:
>> On 22/02/2023 22:08, mike tancsa wrote:
>> > On 2/22/2023 4:03 PM, Miroslav Lachman wrote:
>> >> Interresting numbers. I think I am the only one who get best speed 
>> >> with chacha20-poly1305@openssh.com <mailto:chacha20-poly1305@openssh.com>
>> >>
>> >>
>> >> It seems the speed of SSH is limited by single core performance which 
>> >> is very poor on this machine (Intel(R) Pentium(R) Dual  CPU E2160). 
>> >> Even if CPU has 50% idle, ssh runs on 99.8% of single core.
>> > 
>> > The CPU I have has
>> > aesni0: <AES-CBC,AES-CCM,AES-GCM,AES-ICM,AES-XTS> on motherboard
>> > 
>> > which probably helps.
>> 
>> That explains it
>> aesni0: No AES or SHA support.
>> 
>> >> I know there were some HPN patches to ssh, beside that is there any 
>> >> option I can try to use less CPU?
>> >>
>> >> I will play with cpuset to pin ssh on one core and everything else on 
>> >> the other core.
>> > 
>> > It looks like you are running into a CPU bottleneck TBH
>> 
>> Yes. Pinning on cores with cpuset helps a bit (about +3MiB/s) but 
>> without some tweaks on ssh I will not gain more speed :(
>> 
>> Thank you for your help!
>> 
>> Miroslav Lachman
>> 
>> 
> 
> You could pipe the stream through an encrypting program before piping to
> netcat, then decrypt on the recieving end.
> 
> $ zfs send | crypt | netcat ipaddr 2222
> $ netcat -vl 2222 | crypt | zfs recv
> 
> I don't know if zfs can handle that, but worth a try.
> 
> $ man crypt
>     The enigma utility, also known as crypt is a very simple encryption
>      program, working on a “secret-key” basis.  It operates as a filter, i.e.,
>      it encrypts or decrypts a stream of data from standard input, and writes
>      the result to standard output.  Since its operation is fully symmetrical,
>      feeding the encrypted data stream again through the engine (using the
>      same secret key) will decrypt it.
> 
> 
> -- Sent with https://mailfence.com <https://mailfence.com/> Secure and private email