Bug 1974242
Summary: | Paged search impacts performance [9.3.0] | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | thierry bordaz <tbordaz> | |
Component: | 389-ds-base | Assignee: | Pierre Rogier <progier> | |
Status: | CLOSED ERRATA | QA Contact: | LDAP QA Team <idm-ds-qe-bugs> | |
Severity: | high | Docs Contact: | Evgenia Martynyuk <emartyny> | |
Priority: | high | |||
Version: | 9.1 | CC: | bsmejkal, emartyny, idm-ds-dev-bugs, jonmoore, mreynolds, mrhodes, pasik, progier, tbordaz, tmihinto, vashirov | |
Target Milestone: | rc | Keywords: | Reopened, Triaged, ZStream | |
Target Release: | 9.3 | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | sync-to-jira | |||
Fixed In Version: | 389-ds-base-2.3.4-3.el9 | Doc Type: | Bug Fix | |
Doc Text: |
.Paged searches from a regular user now do not impact performance
Previously, when Directory Server was under the search load, paged searches from a regular user could impact the server performance because a lock conflicted with the thread that polls for network events. In addition, if a network issue occurred while sending the page search, the whole server was unresponsive until the `nsslapd-iotimeout` parameter expired. With this update, the lock was split into several parts to avoid the contention with the network events. As a result, no performance impact during paged searches from a regular user.
|
Story Points: | --- | |
Clone Of: | ||||
: | 2224505 2224507 2231841 2251374 (view as bug list) | Environment: | ||
Last Closed: | 2023-11-07 08:25:17 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 2224505, 2224507, 2231841, 2251374, 2265544 |
Description
thierry bordaz
2021-06-21 07:38:40 UTC
After evaluating this issue, there are no plans to address it further or fix it in an upcoming release. Therefore, it is being closed. If plans change such that this issue will be fixed in an upcoming release, then the bug can be reopened. After evaluating this issue, there are no plans to address it further or fix it in an upcoming release. Therefore, it is being closed. If plans change such that this issue will be fixed in an upcoming release, then the bug can be reopened. Reopening the bug as root cause is finally understood and a fix is in progress. The issue is due to a very small lock contention impacting 0.3% of the server CPU time and 5% of the listening thread time but that was enough to decrease the performance by 60%. Even worse we have seen case (after a network issue (tcp router restarted)) were the server was fully unresponsive until the nsslapd-ioblocktimeout expired. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (389-ds-base bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:6350 |