apache heron
play

Apache Heron executor (e.g. Kafka spout, a bold writing output to a - PDF document

CS535 Big Data 2/17/2020 Week 5-A Sangmi Lee Pallickara CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University CS535 BIG DATA FAQs Quiz 1 Pseudocode should be


  1. CS535 Big Data 2/17/2020 Week 5-A Sangmi Lee Pallickara CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University CS535 BIG DATA FAQs • Quiz 1 • Pseudocode should be interpretable as a MapReduce • Your code should be interpretable as a actual MR code • E.g. • Step 1. Read lines • Step 2. Tokenize it PART B. GEAR SESSIONS • Step 3. group records based on the branch SESSION 1: PETA-SCALE STORAGE SYSTEMS • Step 4. Sort all of the record of a branch • Step 5. Find the top 10 per branch • Can this code an effective mapreduce implementation? • <Key, Value> is the core data structure of communication in MR without any exception Google had 2.5 million servers in 2016 • Next quiz: 2/21 ~ 2/23 Sangmi Lee Pallickara • Spark and Storm Computer Science, Colorado State University http://www.cs.colostate.edu/~cs535 CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University FAQs Topics of Todays Class • How to lead the discussion as a presenter • Apache Storm vs. Heron • GOAL: You should involve your audience to the discussion • GEAR Session I. Peta Scale Storage Systems • Please remember that you have at least 10 other students (3 other teams!) who already read the same paper and submitted reviews!! • Initiate questions • “What do you think about this? Do you think that the approach XYZ is suitable for ABC?” • Provide discussion topics • “OK. We will discuss the performance aspect of this project. This project has proposed approach X, Y, and Z…” • Pose questions • “We came up with the following questions…” CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University Limitation of the Storm worker architecture • Multi-level scheduling and complex interaction • Tasks are scheduled using JVM’s preemptive and priority- Executor 1 Executor 2 Executor 3 based scheduling algorithm • Each thread runs several tasks Task Task Task 4. Real-time Streaming Computing Models: JVM process • Executor implements another scheduling algorithm 1 4 6 Apache Storm and Twitter Heron Task Task Task • Hard to isolate its resource usage Apache Storm 2 5 7 • Tasks with different characteristics are scheduled in the same Apache Heron executor (e.g. Kafka spout, a bold writing output to a key- Task Task value store, and a bolt joining data can be in a single 3 8 executor) • Logs from multiple tasks are written into a single file • Hard to debug and track the topology http://www.cs.colostate.edu/~cs535 Spring 2020 Colorado State University, page 1

  2. CS535 Big Data 2/17/2020 Week 5-A Sangmi Lee Pallickara CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University Limitation of the Storm worker architecture Limitation of the Storm worker architecture • Limitation of the Storm Nimbus • If the receiver component is unable to handle incoming data/tuples • Scheduling, monitoring, and distributing JARs • the sender simply drops tuples • In extreme scenarios, this design causes the topology to not make any progress • Topologies are untraceable • While consuming all its resources • Nimbus does not support resource reservation and isolation • Storm workers that belong to different topologies running on the same machine • Interfere with each other • Zookeeper manages heartbeats from workers and the supervisors • Becomes a bottleneck • The Nimbus component is a single point of failure CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University Apache Heron Aurora Scheduler • Maintains compatibility with the Storm API • Aurora • Generic service scheduler runs on Mesos Topology 1 • Data processing semantics • At most once – No tuple is processed more than once, although some tuples may be dropped, Topology 2 and thus may miss being analyzed by the topology Topology 3 • At least once – Each tuple is guaranteed to be processed at least once, although some tuples Aurora may be processed more than once, and may contribute to the result of the topology multiple Scheduler times Topology N CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University CS535 Big Data | Computer Science | Colorado State University Aurora Scheduler Topology Backpressure • Dynamically adjust the rate at which data flows through the topology • Each topology runs as an Aurora job Container • Skewed data flows Stream Heron • Consisting several containers manager Instance Metrics Manager • Topology master Topology • Strategy 1: TCP Backpressure • Stream manager Master(TM) Heron • Using TCP windowing • Heron Instances Instance Messaging System • Generic service scheduler runs on Mesos • TCP connection between HI and SM • E.g. for the slow HI, SM will notice that its send buffer is filling up Zoo Keeper Container • SM will propagate it to other SMs Stream Heron Instance manager Manager Metrics Heron Topology Instance Master(TM) (standby) http://www.cs.colostate.edu/~cs535 Spring 2020 Colorado State University, page 2

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend