Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/nickbabcock/dropwizard-tls-bench
Benchmarks a Dropwizard Application with Jersey and Servlet HTTPS implementations
https://github.com/nickbabcock/dropwizard-tls-bench
benchmark conscrypt dropwizard tls
Last synced: about 1 month ago
JSON representation
Benchmarks a Dropwizard Application with Jersey and Servlet HTTPS implementations
- Host: GitHub
- URL: https://github.com/nickbabcock/dropwizard-tls-bench
- Owner: nickbabcock
- License: mit
- Created: 2018-02-05T23:04:29.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2018-07-27T22:28:31.000Z (over 6 years ago)
- Last Synced: 2024-11-01T02:42:02.845Z (3 months ago)
- Topics: benchmark, conscrypt, dropwizard, tls
- Language: Java
- Size: 51.8 KB
- Stars: 0
- Watchers: 3
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
README
# Dropwizard TLS Benchmark
This repo contains the code, benchmark suite, and the analysis of using the Conscrypt JCE Security provider that is available to Dropwizard 1.3 users. See the complementary post, [Dropwizard 1.3 Upcoming TLS Improvements](https://nbsoftsolutions.com/blog/dropwizard-1-3-upcoming-tls-improvements) for additional background and information.
This repo also demonstrates how easy it is to add Conscrypt as the ALPN provider so one doesn't need to modify the boot class path with a JRE version specific jar.
## Benchmark
- Install Docker and Docker Compose (at least 1.20)
- Execute `./bench.sh` as a user that can use docker and wait a couple hours
- Resulting benchmarks will be in `out.csv`
- Chart of the data can be see in `analysis.R`## Results
Crunch `out.csv` anyway you want, but if you want to replicate the graph below, use `analysis.R`
![](https://github.com/nickbabcock/dropwizard-tls-bench/raw/master/dropwizard-tls.png)
For response / request payloads around 100KB or more, where most of the work comes from encrypting or decrypting a response (like in an echo server seen here), expect to see 7.5x throughput improvement for h2 services and 2.5x for HTTPS 1.1.