Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support insecure inter-cluster comms while using secure comms to Clients #5284

Open
gjoseph92 opened this issue Aug 27, 2021 · 1 comment
Open

Comments

@gjoseph92
Copy link
Collaborator

Secure clusters are nice. However, SSL reduces network performance, to some degree unavoidably, and potentially to a further degree because of issues in Tornado or dask (#5258 (comment), #4443).

In some cluster architectures, the scheduler might be exposed to the Internet, but workers are hidden behind an internal network. In those cases, you might want workers to communicate with each other (and possibly the scheduler) over unsecured TCP for data-transfer performance, while keeping scheduer<->client comms over secure TLS.

How could we do:

  1. worker<->worker comms over TCP, everything touching the scheduler TLS
  2. worker<->worker and worker<->scheduler comms over TCP, scheduler<->client over TLS

1 seems both easier and more of a performance win, but 2 might be interesting once we figure out 1.

cc @jcrist

@jakirkham
Copy link
Member

If we make this change, would suggest we only use workarounds like this one and this one for secure connections and disable them otherwise (as they likely impact perf as well)

Though am curious to what extent this is an issue primarily with Tornado ( #5258 (comment) )

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants