GH-40557: [C++] Use `PutObject` request for S3 in OutputStream when only uploading small data
Rationale for this change
See #40557. The previous implementation would always issue multi part uploads which come with 3x RTT to S3 instead of just 1x RTT with a PutObject request.
What changes are included in this PR?
Implement logic in the S3 OutputStream to use a PutObject request if data is below a certain threshold (5 MB) and the output stream is closed. If more data is written, a multi part upload is triggered. Note: Previously, opening the output stream was already expensive because the CreateMultipartUpload request was triggered then. With this change opening the output stream becomes cheap, as we rather wait until some data is written to decide which upload method to use. This required some more state-keeping in the output stream class.
Are these changes tested?
No new tests were added, as there are already tests for very small writes and very large writes, which will trigger both ways of uploading. Everything should therefore be covered by existing tests.
Are there any user-facing changes?
- Previously, we would fail when opening the output stream if the bucket doesn't exist. We inferred that by sending the
CreateMultipartUploadrequest, which we now do not send anymore upon opening the stream. We now rather fail at closing, or at writing (when >5MB have accumulated). Replicating the old behavior is not possible without sending another request which defeats the purpose of this performance optimization. I hope this is fine.
- GitHub Issue: #40557
:warning: GitHub issue #40557 has been automatically assigned in GitHub to PR creator.
From the log output, it seems like the failing CI jobs are not related to this change. Correct me if I am wrong though. Should I rebase (in case the flaky tests are already fixed on main)?
I think it’s worth rebasing to see?
Rebased to current main, now waiting for the CI approval again :)
Previously, we would fail when opening the output stream if the bucket doesn't exist. We inferred that by sending the
CreateMultipartUploadrequest, which we now do not send anymore upon opening the stream. We now rather fail at closing, or at writing (when >5MB have accumulated).
Hmm, I'm not sure that is ok. Usually, when opening a file for writing, you expect the initial open to fail if the path cannot be written to. I have no idea how much code relies on that, but that's a common expectation due to how filesystems usually work (e.g. when accessing local storage).
Previously, we would fail when opening the output stream if the bucket doesn't exist. We inferred that by sending the
CreateMultipartUploadrequest, which we now do not send anymore upon opening the stream. We now rather fail at closing, or at writing (when >5MB have accumulated).Hmm, I'm not sure that is ok. Usually, when opening a file for writing, you expect the initial open to fail if the path cannot be written to. I have no idea how much code relies on that, but that's a common expectation due to how filesystems usually work (e.g. when accessing local storage).
This isn’t guaranteed with the current implementation though? Putting a part, or completing a multipart upload, can fail in various ways? An obvious one would be a checksum failure.
My point is that if the path cannot be written to, the error happens when opening the file, not later on.
My point is that if the path cannot be written to, the error happens when opening the file, not later on.
That is true. I guess the question is if arrow's OutputStream API makes an explicit guarantee that Open should throw if the target does not exist. My guess would be that you shouldn't built code upon this assumption if it isn't explicitly stated in arrow's API/docs (which it is not), but of course real-world usage deviates from that (Hyrum's Law).
But checking if the bucket exists would at least come with another 1x RTT to S3 and the goal of the PR was to reduce the amount of blocking calls to S3 to reduce overall latency. If we add another check here, we'll have a total 2x RTT to S3 for small uploads, which is better than the initial 3x RTT without this change, but still not optimal from a performance-view. (and we would probably have 4x RTT for multipart uploads)
That is true. I guess the question is if
arrow's OutputStream API makes an explicit guarantee thatOpenshould throw if the target does not exist. My guess would be that you shouldn't built code upon this assumption if it isn't explicitly stated inarrow's API/docs (which it is not), but of course real-world usage deviates from that (Hyrum's Law).
The API docs generally do not go into that level of detail. However, it is a general assumption that a filesystem "looks like" a local filesystem API-wise.
It is also much more convenient to get an error early, than after you have already "written" multiple megabytes of data to the file.
A compromise would be to add a dedicated option in S3Options, but of course the optimization would only benefit those users that enable the option.
A compromise would be to add a dedicated option in
S3Options, but of course the optimization would only benefit those users that enable the option.
We can do that. I would propose that if the optimization is disabled, we directly use multi-part uploads (basically replicating the old behavior). I don't think it makes sense to explicitly issue a HeadBucket request because that will lead to minimum 4 requests with multi-part uploads then. (although we would only have 2 requests for small writes without the optimization compared to current main)
What do you think?
We can do that. I would propose that if the optimization is disabled, we directly use multi-part uploads (basically replicating the old behavior).
That sounds reasonable to me.
Just to note, issuing HeadBucket doesn't guarantee that a write will succeed - there isn't really a good way to check without actually writing. A HeadObject on the key and failing on any 403 is probably ok though? However there are valid cases where you'd want to write to a key that your principal is not able to read from. HeadBucket also requires full s3:ListBucket permissions, policies that restrict listing to specific prefixes would need to be updated.
I think an optimization flag is appropriate as the behaviour is technically changing. Does it make sense to make the flag a somewhat generic one, rather than specific to this case?
There are a few other optimizations that might also fall into the "more performant, slightly different semantics" category. If I was to contribute a PR to improve one of the linked areas, would we want to add a new specific flag for this case or bundle it under a single "optimized" flag?
The upside would be that it becomes more configurable, whereas the downside is that the testing and support matrix explodes. Perhaps it's better to just have a single optimized=True flag, vs receiving bug reports when specifically optimize_put_object=True, optimize_delete_dir=False, optimize_move=True, optimize_delete=False, optimize_ensure_parents_exist=True, optimize_foobar=True are set?
Edit: i guess this is only relevant for higher-level Python bindings, we'd still want internal flags for individual features.
I added a sanitize_bucket_on_open_ flag to the S3Options, adjusted the logic and also instantiated tests with this flag enabled.
I guess the Python bindings can be tackled in a separate PR, right?
A minor question: would single-part only send during closing?
Yes, we only issue the PutObject request if we close the stream.
Sorry for delaying review! Would merge after other committers approve
I also merged main into this branch due to a conflict. Should be free of conflicts now.
Hi @pitrou , I merged main again due to a conflict. Maybe you could give it another review if you have time.
Gental ping @pitrou . This could be in 18.0.0 (next release)
@github-actions crossbow submit -g cpp -g python
Revision: 57ff9921779451b3b92762e35711c9ca82b9f24d
Submitted crossbow builds: ursacomputing/crossbow @ actions-95140b88e7
@github-actions crossbow submit -g cpp -g python
Revision: 670232b77c711b0e124e8d2ad02c2c7f62d16a80
Submitted crossbow builds: ursacomputing/crossbow @ actions-86d9d85a0e
@OliLay thank you for your work on this ❤️
After merging your PR, Conbench analyzed the 0 benchmarking runs that have been run so far on merge-commit 9e6acbe08a0ff5b569763d377aecc824362dd593.
None of the specified runs were found on the Conbench server.
The full Conbench report has more details.