You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@flink.apache.org by alpinegizmo <gi...@git.apache.org> on 2017/09/19 13:33:03 UTC
[GitHub] flink pull request #4543: [FLINK-7449] [docs] Additional documentation for i...
Github user alpinegizmo commented on a diff in the pull request:
https://github.com/apache/flink/pull/4543#discussion_r139691558
--- Diff: docs/ops/state/checkpoints.md ---
@@ -99,3 +99,296 @@ above).
```sh
$ bin/flink run -s :checkpointMetaDataPath [:runArgs]
```
+
+## Incremental Checkpoints
+
+### Synopsis
+
+Incremental checkpoints can significantly reduce checkpointing time in comparison to full checkpoints, at the cost of a
+(potentially) longer recovery time. The core idea is that incremental checkpoints only record changes in state since the
+previously-completed checkpoint instead of producing a full, self-contained backup of the state backend. In this way,
+incremental checkpoints can build upon previous checkpoints.
+
+RocksDBStateBackend is currently the only backend that supports incremental checkpoints.
+
+Flink leverages RocksDB's internal backup mechanism in a way that is self-consolidating over time. As a result, the
+incremental checkpoint history in Flink does not grow indefinitely, and old checkpoints are eventually subsumed and
+pruned automatically.
+
+``While we strongly encourage the use of incremental checkpoints for Flink jobs with large state, please note that this is
+a new feature and currently not enabled by default``.
+
+To enable this feature, users can instantiate a `RocksDBStateBackend` with the corresponding boolean flag in the
+constructor set to `true`, e.g.:
+
+```java
+ RocksDBStateBackend backend =
+ new RocksDBStateBackend(filebackend, true);
+```
+
+### Use-case for Incremental Checkpoints
+
+Checkpoints are the centrepiece of Flink’s fault tolerance mechanism and each checkpoint represents a consistent
+snapshot of the distributed state of a Flink job from which the system can recover in case of a software or machine
+failure (see [here]({{ site.baseurl }}/internals/stream_checkpointing.html).
+
+Flink creates checkpoints periodically to track the progress of a job so that, in case of failure, only those
+(hopefully few) *events that have been processed after the last completed checkpoint* must be reprocessed from the data
+source. The number of events that must be reprocessed has implications for recovery time, and so for fastest recovery,
+we want to *take checkpoints as often as possible*.
+
+However, checkpoints are not without performance cost and can introduce *considerable overhead* to the system. This
+overhead can lead to lower throughput and higher latency during the time that checkpoints are created. One reason is
+that, traditionally, each checkpoint in Flink always represented the *complete state* of the job at the time of the
+checkpoint, and all of the state had to be written to stable storage (typically some distributed file system) for every
+single checkpoint. Writing multiple terabytes (or more) of state data for each checkpoint can obviously create
+significant load for the I/O and network subsystems, on top of the normal load from pipeline’s data processing work.
+
+Before incremental checkpoints, users were stuck with a suboptimal tradeoff between recovery time and checkpointing
+overhead. Fast recovery and low checkpointing overhead were conflicting goals. And this is exactly the problem that
+incremental checkpoints solve.
+
+
+### Basics of Incremental Checkpoints
+
+In this section, for the sake of getting the concept across, we will briefly discuss the idea behind incremental
+checkpoints in a simplified manner.
+
+Our motivation for incremental checkpointing stemmed from the observation that it is often wasteful to write the full
+state of a job for every single checkpoint. In most cases, the state between two checkpoints is not drastically
+different, and only a fraction of the state data is modified and some new data added. Instead of writing the full state
+into each checkpoint again and again, we could record only changes in state since the previous checkpoint. As long as we
+have the previous checkpoint and the state changes for the current checkpoint, we can restore the full, current state
+for the job. This is the basic principle of incremental checkpoints, that each checkpoint can build upon a history of
+previous checkpoints to avoid writing redundant information.
+
+Figure 1 illustrates the basic idea of incremental checkpointing in comparison to full checkpointing.
+
+The state of the job evolves over time and for checkpoints ``CP 1`` to ``CP 2``, a full checkpoint is simply a copy of the whole
+state.
+
+<p class="text-center">
+ <img alt="Figure 1: Full Checkpoints vs Incremental Checkpoints" width="80%" src="{{ site.baseurl }}/fig/incremental_cp_basic.svg"/>
+</p>
+
+With incremental checkpointing, each checkpoint contains only the state change since the previous checkpoint.
+
+* For the first checkpoint ``CP 1``, there is no difference between a full checkpoint and the complete state at the time the
+checkpoint is written.
+
+* For ``CP 2``, incremental checkpointing will write only the changes since ``CP 1``: the value for ``K1`` has changed and a mapping
+for ``K3`` was added.
+
+* For checkpoint ``CP 3``, incremental checkpointing only records the changes since ``CP 2``.
+
+Notice that, unlike in full checkpoints, we also must record changes that delete state in an incremental checkpoint, as
+in the case of ``K0``. In this simple example, we can see how incremental checkpointing can reduce the amount of data that
+is written for each checkpoint.
+
+The next interesting question: how does restoring from incremental checkpoints compare to restoring from full
+checkpoints? Restoring a full checkpoint is as simple as loading all the data from the checkpoint back into the job
+state because full checkpoints are self-contained. In contrast, to restore an incremental checkpoint, we need to replay
+the history of all incremental checkpoints that are in the reference chain of the checkpoint we are trying to restore.
+In our example from Figure 1, those connections are represented by the orange arrows. If we want to restore ``CP 3``, as a
+first step, we need to apply all the changes of ``CP 1`` to the empty initial job state. On top of that, we apply the
+changes from ``CP 2``, and then the changes from ``CP 3``.
+
+A different way to think about basic incremental checkpoints is to imagine it as a changelog with some aggregation. What
+we mean by aggregated is that for example, if the state under key ``K1`` is overwritten multiple times between two
+consecutive checkpoints, we will only record the latest state value at the time in the checkpoint. All previous changes
+are thereby subsumed.
+
+This leads us to the discussion of the potential *disadvantages* of incremental checkpoints compared to full checkpoints.
+While we save work in writing checkpoints, we have to do more work in reading the data from multiple checkpoints on
+recovery. Furthermore, we can no longer simply delete old checkpoints because new checkpoints rely upon them and the
+history of old checkpoints can grow indefinitely over time (like a changelog).
+
+At this point, it looks like we didn’t gain too much from incremental checkpoints because we are again trading between
+checkpointing overhead and recovery time. Fortunately, there are ways to improve on this naive approach to recovery. One
+simple and obvious way to restrict recovery time and the length of the checkpoint history is to write a full checkpoint
+from time to time. We can drop all checkpoints prior to the most recent full checkpoint, and the full checkpoint can
+serve as a new basis for future incremental checkpoints.
+
+Our actual implementation of incremental checkpoints in Flink is more involved and designed to address a number of
+different tradeoffs. Our incremental checkpointing restricts the size of the checkpoint history and therefore never
+needs take a full checkpoint to keep recovery efficiently! We present more detail about this in the next section, but
+the high level idea is to accept a small amount of redundant state writing to incrementally introduce
+merged/consolidated replacements for previous checkpoints. For now, you can think about Flink’s approach as stretching
+out and distributing the consolidation work over several incremental checkpoints, instead of doing it all at once in a
+full checkpoint. Every incremental checkpoint can contribute a share for consolidation. We also track when old
+checkpoints data becomes obsolete and then prune the checkpoint history over time.
+
+### Incremental Checkpoints in Flink
+
+In the previous section, we discussed that incremental checkpointing is mainly about recording all effective state
+modifications between checkpoints. This poses certain requirements on the underlying data structures in the state
+backend that manages the job’s state. It goes without saying that the data structure should always provide a decent
+read-write performance to keep state access swift. At the same time, for incremental checkpointing, the state backend
+must be able to efficiently detect and iterate state modifications since the previous checkpoint.
+
+One data structure that is very well-suited for this use case is the *log-structured-merge (LSM) tree* that is the core
+data structure in Flink’s RocksDB-based state backend. Without going into too much detail, the write path of RocksDB
+already roughly resembles a changelog with some pre-aggregation — which perfectly fits the needs of incremental
+checkpoints. On top of that, RocksDB also has a *compaction mechanism* can be regarded as an elaborated form of log
+compaction.
+
+#### RocksDB Snapshots as a Foundation
+
+In a nutshell, *RocksDB is a key-value store based on LSM trees*. The write path of RocksDB first collects all changes as
+key-value pairs in a mutable, in-memory buffer called memtable. Writes to the same key in a memtable can simply replace
+previous values (this is the pre-aggregation aspect). Once the memtable is full, it is written to disk completely with
+all entries sorted by their key. Typically, RocksDB also applies a lightweight compression (e.g. snappy) in the write
+process. After the memtable was written to disk, it becomes immutable and is now called a *sorted-string-table
+(sstable)*. Figure 2 illustrates these basic RocksDB internals.
+
+<p class="text-center">
+ <img alt="Figure 2: RocksDB architecture (simplified)" width="75%" src="{{ site.baseurl }}/fig/rocksdb_architecture_simple.png"/>
+</p>
+
+To avoid the problem of collecting an infinite number of sstables over time, a background task called compaction is
+constantly merging sstables to consolidate potential duplicate entries for each key from the merged tables. Once some
+sstables have been merged, those original sstables become obsolete and are deleted by RocksDB. The newly created merged
+sstable contains all their net information. We show an example for such a merge in Figure 3. SSTable-1 and SStable-2
+contain some duplicate mappings for certain keys, such as key ``9``. The system can apply a sort-merge strategy in which
+the newer mappings from ``SSTable-2`` overwrite mappings for keys that also existed in ``SSTable-1``. For key ``7``, we can also
+see a delete (or antimatter) entry that, when merged, results in omitting key ``7`` in the merge result. Notice that the
+merge in RocksDB is typically generalised to a multi-way merge. We won’t go into details about the read path here,
+because it is irrelevant for the approach that we want to present. You can find more details about RocksDB internals in
+their [documentation](http://rocksdb.org/).
+
+<p class="text-center">
+ <img alt="Figure 3: Merging SSTable files" width="50%" src="{{ site.baseurl }}/fig/sstable_merge.png"/>
+</p>
+
+#### Integrating RocksDB’s Snapshots with Flink’s Checkpoints
+
+Flink’s incremental checkpointing logic operates on top of this mechanism that RocksDB provides. From a high-level
+perspective, when taking a checkpoint, we track which sstable files have been created and deleted by RocksDB since the
+previous checkpoint. This is sufficient for figuring out the effective state changes because sstables are immutable. Our
+backend remembers the sstables that already existed in the last completed checkpoint in order to figure out which files
+have been created or deleted in the current checkpoint interval. With this in mind, we will now explain the details of
+checkpointing state in our RocksDB backend.
+
+In the first step, Flink triggers a flush in RocksDB so that all all memtables are forced into sstables on disk, and all
+sstables are hard-linked in a local temporary directory. This step of the checkpoint is synchronous to the processing
+pipeline, and all further steps are performed asynchronously and will not block processing.
+
+Then, all new sstables (w.r.t. the previous checkpoint) are copied to stable storage (e.g. HDFS) and referenced in the
+new checkpoint. All sstables that already existed in the previous checkpoint will *not be copied again to stable
+storage* but simply re-referenced. Deleted files will simply no longer receive a reference in the new checkpoint. Notice
+that deleted sstables in RocksDB are always the result of compaction. This is the way in which Flink’s incremental
+checkpoints can prune the checkpoint history. Old sstables are eventually replaced by the sstable that is the result of
+merging them. Note that in a strict sense of tracking changes between checkpoints, this uploading of consolidated tables
+is redundant work. But it is performed incrementally, typically adding only a small amount of overhead to some
+checkpoints. However, we absolutely consider that overhead to be a worthwhile investment because it allows us to keep a
+shorter history of checkpoints to consider in a recovery.
+
+Another interesting point is how Flink can determine when it is safe to delete a shared file. Our solution works as
+follows: for each file, we keep a reference count for each sstable file that we copied to stable storage. These counts
+are maintained by the checkpoint coordinator on the job master in a *shared state registry*. This shared registry tracks
+the number of checkpoints that reference a shared file in stable storage, e.g. an uploaded sstable. When a checkpoint is
+completed, the checkpoint coordinator simply increases the counts for all files that are referenced in the new
+checkpoint by 1. If a checkpoint is dropped, the count of all files it has referenced is decreased by 1. When the count
+goes down to 0, the shared file is deleted from stable storage because it is no longer used by any checkpoint.
+
+<p class="text-center">
+ <img alt="Figure 4: Flink incremental checkpointing example" width="100%" src="{{ site.baseurl }}/fig/incremental_cp_impl_example.svg"/>
+</p>
+
+To make this idea a bit more complete, see Figure 4, where we show an example run over 4 incremental checkpoints to make
+things a bit more concrete. We illustrate what is happening for one subtask (here: subtask index 1) of one operator
+(called ``Operator-2``) with keyed state. Furthermore, for this example we assume that the number of retained
+checkpoints is configured to 2, so that Flink will always keep the two latest checkpoints and older checkpoints are
+pruned. The columns show, for each checkpoint, the state of the local RocksDB instance (i.e. the current sstable files),
+the files that are referenced in the checkpoint, and the counts in the shared state registry after the checkpoint is
+completed. For checkpoint 1 (``CP 1``)), we can see that the local RocksDB directory contains two sstable files, which
+are considered as new and uploaded to stable storage. We upload the files under the checkpoint directory of the
+corresponding checkpoint that first uploaded them, in this case ``cp-1``, and use unique filenames because they could
+otherwise collide with identical sstable names from other subtasks. When the checkpoint completes, the two entries are
+created in the shared state registry, one for each newly uploaded file, and their counts are set to 1. Notice that the
+key in the shared state registry is a composite of operator, subtask, and the original sstable file name. In the actual
+implementation, the shared state registry also keeps a mapping from the key to the file path in stable storage besides
+the count, which is not shown to keep the graphic clearer.
+
+At the time of the second checkpoint, two new sstable files have been created by RocksDB and the two older sstable files
+from the previous checkpoint also still exist. For checkpoint ``CP 2``, Flink must now upload the two new files to
+stable storage and can reference the ``sstable-(1)`` and ``sstable-(2)`` from the previous checkpoint. We can see that
+the file references to previously existing sstable files point to existing files in the ``cp-1`` directory and
+references to new sstable files point to the newly uploaded files in directory ``cp-2``. When the checkpoint completes,
+the counts for all referenced files are increased by 1.
+
+For checkpoint ``CP 3``, we see that RocksDB’s compaction has merged ``sstable-(1)``, ``sstable-(2)``, and
+``sstable-(3)`` into ``sstable-(1,2,3)``. This merged table contains the same net information as the source files and
+eliminates any duplicate entries for each key that might have existed across the three source files. The source files of
+the merge have been deleted, ``sstable-(4)`` still exists, and one additional ``sstable-(5)`` was created. For the
+checkpoint, we need to upload the new files ``sstable-(1,2,3)`` and ``sstable-(5)`` and can re-reference ``sstable-(4)``
+from a previous checkpoint. When this checkpoint completes, two things will happen at the checkpoint coordinator, in the
+following order:
+
+* First, the checkpoint registers the referenced files, increasing the count of those files by 1.
+
+* Then, the older checkpoint ``CP 1`` will be deleted because we have configured the number of retained checkpoints to
+two.
+
+* As part of the deletion, the counts for all files referenced by ``CP 1``, (``sstable-(1)`` and ``sstable-(2)``), is
+decreased by 1.
+
+Even though ``CP 1`` is logically deleted, we can see that all the files it created have still a reference count greater
+0 and we cannot yet physically delete them from stable storage. Our graphic shows the counts after ``CP 3`` was
+registered and ``CP 1`` was deleted.
+
+For our last checkpoint ``CP 4``, RocksDB has merged ``sstable-(4)``, ``sstable-(5)``, and another ``sstable-(6)``,
+which was never observed at the time of a checkpoint, into ``sstable-(4,5,6)``. This file ``sstable-(4,5,6)`` is new for
+the checkpoint, and must be uploaded. We reference it together with ``sstable-(1,2,3)`` that was already known in
+``CP 4``. In the checkpoint coordinator’s shared state registry, the counts for ``sstable-(1,2,3)`` and
+``sstable-(4,5,6)`` are increased by 1. Then, ``CP 2`` is deleted as part of our retention policy. This decreases the
+counts for ``sstable-(1)``, ``sstable-(2)``, ``sstable-(3)``, and ``sstable-(4)`` by 1. This means that the counts for
+``sstable-(1)``, ``sstable-(2)``, and ``sstable-(3)`` have now dropped to 0 and they will be physically deleted from the
+stable storage. The final counts for ``CP 4`` after this step are shown in the figure. This concludes our example for a
+sequence of 4 incremental checkpoints.
+
+#### Resolving Races for Concurrent Checkpoints
+
+We sometimes also have to resolve race conditions between concurrent checkpoints in incremental checkpointing. Flink can
+execute multiple checkpoints in parallel, and new checkpoints can start before previous checkpoints are confirmed as
+completed by the checkpoint coordinator to the backend. We need to consider this in our reasoning about which previous
+checkpoint can serve as a basis for a new incremental checkpoint. We are only allowed to reference shared state from a
+confirmed checkpoint, because otherwise we might attempt to reference a shared file that might still be deleted, e.g.
+when the assumed predecessor checkpoint still fails.
+
+This can lead to a situation were multiple checkpoints regard the same sstable files in RocksDB as new because no
+checkpoint that attempted to upload and register those sstable files has been confirmed, yet. To be on the safe side,
+checkpoints must always upload such files to stable storage independently, under unique names, until the sstable files
+have been registered by a completed checkpoint and the confirmation reached the backend. Otherwise, pending previous
+checkpoints might still fail, in which case their newly uploaded files are deleted, and future checkpoints would
+potentially attempt to reference deleted data.
+
+Sometimes, this upload policy will result in the same sstable file been uploaded more than once, from different
+checkpoints. However, at least we can later de-duplicate the sstable files in the checkpoint coordinator because they
+are accounted under the same key. Only the copy that was uploaded by the first-confirmed checkpoint survives and we can
+replace reference to the duplicates in all checkpoints that register afterwards.
--- End diff --
Only the copy that was uploaded by the first-confirmed checkpoint survives, and we can
replace references to the duplicates in all checkpoints that register afterwards.
---