https://arxiv.org/abs/1606.06543
Big Data software systems typically consist of an extensible execution engine (e.g., MapReduce), pluggable distributed storage engines (e.g., Apache Cassandra), and a range of data sources (e.g., Apache Kafka). Each of these frameworks is highly configurable. While configurability has several benefits, it challenges performance tuning. Often, the influence of a configuration option on software performance are difficult to understand, making performance tuning a daunting task. This problem is further complicated by the fact that different parameters may interact with each other and by the exponential size of the configuration space. To tackle this issue, we propose a method for transferring the performance tuning knowledge gained from previous versions of the software system in order to ease the search for an optimal configuration in the current version under test. The method is called Transfer Learning for Configuration Optimization (TL4CO) and leverages Multi-Task Gaussian Processes (MTGPs) to iteratively capture posterior distributions of the configuration spaces. Past experimental measurements are treated as transferable knowledge to bootstrap the configuration tuning process. Validation based on three stream processing systems and a NoSQL benchmark system shows that TL4CO significantly speeds up the optimization process compared to state-of-the-art software configuration approaches.
3. Motivation
0 1 2 3 4 5
average read latency (µs) ×104
0
20
40
60
80
100
120
140
160
observations
1000 1200 1400 1600 1800 2000
average read latency (µs)
0
10
20
30
40
50
60
70
observations
1
1
(a) cass-20 (b) cass-10
Best configurations
Worst configurations
Experiments on
Apache Cassandra:
- 6 parameters, 1024 configurations
- Average read latency
- 10 millions records (cass-10)
- 20 millions records (cass-20)
4. Goal!
is denoted by f(x). Throughout, we assume
ncy, however, other metrics for response may
re consider the problem of finding an optimal
⇤
that globally minimizes f(·) over X:
x⇤
= arg min
x2X
f(x) (1)
esponse function f(·) is usually unknown or
n, i.e., yi = f(xi), xi ⇢ X. In practice, such
may contain noise, i.e., yi = f(xi) + ✏. The
of the optimal configuration is thus a black-
on program subject to noise [27, 33], which
harder than deterministic optimization. A
n is based on sampling that starts with a
pled configurations. The performance of the
sociated to this initial samples can deliver
tanding of f(·) and guide the generation of
of samples. If properly guided, the process
ration-evaluation-feedback-regeneration will
tinuously, (ii) Big Data systems are d
frameworks (e.g., Apache Hadoop, S
on similar platforms (e.g., cloud clust
versions of a system often share a sim
To the best of our knowledge, only
the possibility of transfer learning in
The authors learn a Bayesian network
of a system and reuse this model fo
systems. However, the learning is lim
the Bayesian network. In this paper,
that not only reuse a model that has b
but also the valuable raw data. There
to the accuracy of the learned model
consider Bayesian networks and inste
2.4 Motivation
A motivating example. We now i
points on an example. WordCount (cf.
benchmark [12]. WordCount features
(Xi). In general, Xi may either indicate (i) integer vari-
such as level of parallelism or (ii) categorical variable
as messaging frameworks or Boolean variable such as
ng timeout. We use the terms parameter and factor in-
angeably; also, with the term option we refer to possible
s that can be assigned to a parameter.
assume that each configuration x 2 X in the configura-
pace X = Dom(X1) ⇥ · · · ⇥ Dom(Xd) is valid, i.e., the
m accepts this configuration and the corresponding test
s in a stable performance behavior. The response with
guration x is denoted by f(x). Throughout, we assume
f(·) is latency, however, other metrics for response may
ed. We here consider the problem of finding an optimal
guration x⇤
that globally minimizes f(·) over X:
x⇤
= arg min
x2X
f(x) (1)
fact, the response function f(·) is usually unknown or
ally known, i.e., yi = f(xi), xi ⇢ X. In practice, such
it still requires hundr
per, we propose to ad
with the search e ci
than starting the sear
the learned knowledg
software to accelerate
version. This idea is i
in real software engin
in DevOps di↵erent
tinuously, (ii) Big Da
frameworks (e.g., Ap
on similar platforms (
versions of a system o
To the best of our k
the possibility of tran
The authors learn a B
of a system and reus
systems. However, the
the Bayesian network.
his configuration and the corresponding test
le performance behavior. The response with
is denoted by f(x). Throughout, we assume
ncy, however, other metrics for response may
e consider the problem of finding an optimal
⇤
that globally minimizes f(·) over X:
x⇤
= arg min
x2X
f(x) (1)
esponse function f(·) is usually unknown or
, i.e., yi = f(xi), xi ⇢ X. In practice, such
may contain noise, i.e., yi = f(xi) + ✏. The
of the optimal configuration is thus a black-
n program subject to noise [27, 33], which
harder than deterministic optimization. A
n is based on sampling that starts with a
pled configurations. The performance of the
sociated to this initial samples can deliver
tanding of f(·) and guide the generation of
of samples. If properly guided, the process
ation-evaluation-feedback-regeneration will
erge and the optimal configuration will be
in DevOps di↵erent versions of a system is delivered
tinuously, (ii) Big Data systems are developed using s
frameworks (e.g., Apache Hadoop, Spark, Kafka) an
on similar platforms (e.g., cloud clusters), (iii) and di↵
versions of a system often share a similar business log
To the best of our knowledge, only one study [9] ex
the possibility of transfer learning in system configur
The authors learn a Bayesian network in the tuning p
of a system and reuse this model for tuning other s
systems. However, the learning is limited to the struct
the Bayesian network. In this paper, we introduce a m
that not only reuse a model that has been learned prev
but also the valuable raw data. Therefore, we are not li
to the accuracy of the learned model. Moreover, we d
consider Bayesian networks and instead focus on MTG
2.4 Motivation
A motivating example. We now illustrate the pre
points on an example. WordCount (cf. Figure 1) is a po
benchmark [12]. WordCount features a three-layer arc
ture that counts the number of words in the incoming s
A Processing Element (PE) of type Spout reads the
havior. The response with
). Throughout, we assume
metrics for response may
blem of finding an optimal
nimizes f(·) over X:
f(x) (1)
(·) is usually unknown or
xi ⇢ X. In practice, such
i.e., yi = f(xi) + ✏. The
figuration is thus a black-
t to noise [27, 33], which
ministic optimization. A
mpling that starts with a
. The performance of the
itial samples can deliver
d guide the generation of
perly guided, the process
in DevOps di↵erent versions of a system is delivered con
tinuously, (ii) Big Data systems are developed using simila
frameworks (e.g., Apache Hadoop, Spark, Kafka) and ru
on similar platforms (e.g., cloud clusters), (iii) and di↵eren
versions of a system often share a similar business logic.
To the best of our knowledge, only one study [9] explore
the possibility of transfer learning in system configuration
The authors learn a Bayesian network in the tuning proces
of a system and reuse this model for tuning other simila
systems. However, the learning is limited to the structure o
the Bayesian network. In this paper, we introduce a metho
that not only reuse a model that has been learned previousl
but also the valuable raw data. Therefore, we are not limite
to the accuracy of the learned model. Moreover, we do no
consider Bayesian networks and instead focus on MTGPs.
2.4 Motivation
A motivating example. We now illustrate the previou
points on an example. WordCount (cf. Figure 1) is a popula
benchmark [12]. WordCount features a three-layer architenumber of counters
number of splitters
latency(ms)
100
150
1
200
250
2
300
Cubic Interpolation Over Finer Grid
243 684 10125 14166 18
Partially known
Measurements contain noise
Configuration space
5. Finding optimum configuration is difficult!
0 5 10 15 20
Number of counters
100
120
140
160
180
200
220
240
Latency(ms)
splitters=2
splitters=3
number of counters
number of splitters
latency(ms)
100
150
1
200
250
2
300
Cubic Interpolation Over Finer Grid
243 684 10125 14166 18
ble performance behavior. The response with
x is denoted by f(x). Throughout, we assume
ency, however, other metrics for response may
ere consider the problem of finding an optimal
x⇤
that globally minimizes f(·) over X:
x⇤
= arg min
x2X
f(x) (1)
response function f(·) is usually unknown or
wn, i.e., yi = f(xi), xi ⇢ X. In practice, such
may contain noise, i.e., yi = f(xi) + ✏. The
of the optimal configuration is thus a black-
ion program subject to noise [27, 33], which
y harder than deterministic optimization. A
on is based on sampling that starts with a
mpled configurations. The performance of the
ssociated to this initial samples can deliver
rstanding of f(·) and guide the generation of
d of samples. If properly guided, the process
eration-evaluation-feedback-regeneration will
nverge and the optimal configuration will be
ver, a sampling-based approach of this kind can
y expensive in terms of time or cost (e.g., rental
rces) considering that a function evaluation in
d be costly and the optimization process may
hundreds of samples to converge.
ed work
roaches have attempted to address the above
rsive Random Sampling (RRS) [43] integrates
echanism into the random sampling to achieve
in DevOps di↵erent versions of a system is delivered con-
tinuously, (ii) Big Data systems are developed using similar
frameworks (e.g., Apache Hadoop, Spark, Kafka) and run
on similar platforms (e.g., cloud clusters), (iii) and di↵erent
versions of a system often share a similar business logic.
To the best of our knowledge, only one study [9] explores
the possibility of transfer learning in system configuration.
The authors learn a Bayesian network in the tuning process
of a system and reuse this model for tuning other similar
systems. However, the learning is limited to the structure of
the Bayesian network. In this paper, we introduce a method
that not only reuse a model that has been learned previously
but also the valuable raw data. Therefore, we are not limited
to the accuracy of the learned model. Moreover, we do not
consider Bayesian networks and instead focus on MTGPs.
2.4 Motivation
A motivating example. We now illustrate the previous
points on an example. WordCount (cf. Figure 1) is a popular
benchmark [12]. WordCount features a three-layer architec-
ture that counts the number of words in the incoming stream.
A Processing Element (PE) of type Spout reads the input
messages from a data source and pushes them to the system.
A PE of type Bolt named Splitter is responsible for splitting
sentences, which are then counted by the Counter.
Kafka Spout Splitter Bolt Counter Bolt
(sentence) (word)
[paintings, 3]
[poems, 60]
[letter, 75]
Kafka Topic
Stream to
Kafka
File
(sentence)
(sentence)
(sentence)
figuration parameter, which ranges in a finite domain
m(Xi). In general, Xi may either indicate (i) integer vari-
such as level of parallelism or (ii) categorical variable
as messaging frameworks or Boolean variable such as
ling timeout. We use the terms parameter and factor in-
hangeably; also, with the term option we refer to possible
es that can be assigned to a parameter.
e assume that each configuration x 2 X in the configura-
space X = Dom(X1) ⇥ · · · ⇥ Dom(Xd) is valid, i.e., the
em accepts this configuration and the corresponding test
ts in a stable performance behavior. The response with
guration x is denoted by f(x). Throughout, we assume
f(·) is latency, however, other metrics for response may
sed. We here consider the problem of finding an optimal
figuration x⇤
that globally minimizes f(·) over X:
x⇤
= arg min
x2X
f(x) (1)
fact, the response function f(·) is usually unknown or
ially known, i.e., yi = f(xi), xi ⇢ X. In practice, such
surements may contain noise, i.e., yi = f(xi) + ✏. The
rmination of the optimal configuration is thus a black-
optimization program subject to noise [27, 33], which
nsiderably harder than deterministic optimization. A
ular solution is based on sampling that starts with a
ber of sampled configurations. The performance of the
eriments associated to this initial samples can deliver
tter understanding of f(·) and guide the generation of
next round of samples. If properly guided, the process
ample generation-evaluation-feedback-regeneration will
tually converge and the optimal configuration will be
result, the learning is limited to the current observations and
it still requires hundreds of sample evaluations. In this pa-
per, we propose to adopt a transfer learning method to deal
with the search e ciency in configuration tuning. Rather
than starting the search from scratch, the approach transfers
the learned knowledge coming from similar versions of the
software to accelerate the sampling process in the current
version. This idea is inspired from several observations arise
in real software engineering practice [2, 3]. For instance, (i)
in DevOps di↵erent versions of a system is delivered con-
tinuously, (ii) Big Data systems are developed using similar
frameworks (e.g., Apache Hadoop, Spark, Kafka) and run
on similar platforms (e.g., cloud clusters), (iii) and di↵erent
versions of a system often share a similar business logic.
To the best of our knowledge, only one study [9] explores
the possibility of transfer learning in system configuration.
The authors learn a Bayesian network in the tuning process
of a system and reuse this model for tuning other similar
systems. However, the learning is limited to the structure of
the Bayesian network. In this paper, we introduce a method
that not only reuse a model that has been learned previously
but also the valuable raw data. Therefore, we are not limited
to the accuracy of the learned model. Moreover, we do not
consider Bayesian networks and instead focus on MTGPs.
2.4 Motivation
A motivating example. We now illustrate the previous
points on an example. WordCount (cf. Figure 1) is a popular
benchmark [12]. WordCount features a three-layer architec-
ture that counts the number of words in the incoming stream.
Dom(X1) ⇥ · · · ⇥ Dom(Xd) is valid, i.e., the
this configuration and the corresponding test
ble performance behavior. The response with
x is denoted by f(x). Throughout, we assume
ency, however, other metrics for response may
ere consider the problem of finding an optimal
x⇤
that globally minimizes f(·) over X:
x⇤
= arg min
x2X
f(x) (1)
response function f(·) is usually unknown or
n, i.e., yi = f(xi), xi ⇢ X. In practice, such
may contain noise, i.e., yi = f(xi) + ✏. The
of the optimal configuration is thus a black-
on program subject to noise [27, 33], which
y harder than deterministic optimization. A
on is based on sampling that starts with a
pled configurations. The performance of the
ssociated to this initial samples can deliver
standing of f(·) and guide the generation of
d of samples. If properly guided, the process
ration-evaluation-feedback-regeneration will
verge and the optimal configuration will be
ver, a sampling-based approach of this kind can
y expensive in terms of time or cost (e.g., rental
ces) considering that a function evaluation in
d be costly and the optimization process may
hundreds of samples to converge.
d work
oaches have attempted to address the above
rsive Random Sampling (RRS) [43] integrates
chanism into the random sampling to achieve
ciency. Smart Hill Climbing (SHC) [42] inte-
rtance sampling with Latin Hypercube Design
version. This idea is inspired from several observations arise
in real software engineering practice [2, 3]. For instance, (i)
in DevOps di↵erent versions of a system is delivered con-
tinuously, (ii) Big Data systems are developed using similar
frameworks (e.g., Apache Hadoop, Spark, Kafka) and run
on similar platforms (e.g., cloud clusters), (iii) and di↵erent
versions of a system often share a similar business logic.
To the best of our knowledge, only one study [9] explores
the possibility of transfer learning in system configuration.
The authors learn a Bayesian network in the tuning process
of a system and reuse this model for tuning other similar
systems. However, the learning is limited to the structure of
the Bayesian network. In this paper, we introduce a method
that not only reuse a model that has been learned previously
but also the valuable raw data. Therefore, we are not limited
to the accuracy of the learned model. Moreover, we do not
consider Bayesian networks and instead focus on MTGPs.
2.4 Motivation
A motivating example. We now illustrate the previous
points on an example. WordCount (cf. Figure 1) is a popular
benchmark [12]. WordCount features a three-layer architec-
ture that counts the number of words in the incoming stream.
A Processing Element (PE) of type Spout reads the input
messages from a data source and pushes them to the system.
A PE of type Bolt named Splitter is responsible for splitting
sentences, which are then counted by the Counter.
Kafka Spout Splitter Bolt Counter Bolt
(sentence) (word)
[paintings, 3]
[poems, 60]
[letter, 75]
Kafka Topic
Stream to
Kafka
File
(sentence)
(sentence)
(sentence)
Figure 1: WordCount architecture.
Dom(Xd) is valid, i.e., the
and the corresponding test
ehavior. The response with
x). Throughout, we assume
r metrics for response may
oblem of finding an optimal
nimizes f(·) over X:
n
X
f(x) (1)
f(·) is usually unknown or
xi ⇢ X. In practice, such
e, i.e., yi = f(xi) + ✏. The
nfiguration is thus a black-
ct to noise [27, 33], which
rministic optimization. A
mpling that starts with a
s. The performance of the
nitial samples can deliver
nd guide the generation of
operly guided, the process
feedback-regeneration will
imal configuration will be
ed approach of this kind can
s of time or cost (e.g., rental
at a function evaluation in
optimization process may
les to converge.
pted to address the above
pling (RRS) [43] integrates
andom sampling to achieve
Climbing (SHC) [42] inte-
in real software engineering practice [2, 3]. For instance, (i)
in DevOps di↵erent versions of a system is delivered con-
tinuously, (ii) Big Data systems are developed using similar
frameworks (e.g., Apache Hadoop, Spark, Kafka) and run
on similar platforms (e.g., cloud clusters), (iii) and di↵erent
versions of a system often share a similar business logic.
To the best of our knowledge, only one study [9] explores
the possibility of transfer learning in system configuration.
The authors learn a Bayesian network in the tuning process
of a system and reuse this model for tuning other similar
systems. However, the learning is limited to the structure of
the Bayesian network. In this paper, we introduce a method
that not only reuse a model that has been learned previously
but also the valuable raw data. Therefore, we are not limited
to the accuracy of the learned model. Moreover, we do not
consider Bayesian networks and instead focus on MTGPs.
2.4 Motivation
A motivating example. We now illustrate the previous
points on an example. WordCount (cf. Figure 1) is a popular
benchmark [12]. WordCount features a three-layer architec-
ture that counts the number of words in the incoming stream.
A Processing Element (PE) of type Spout reads the input
messages from a data source and pushes them to the system.
A PE of type Bolt named Splitter is responsible for splitting
sentences, which are then counted by the Counter.
Kafka Spout Splitter Bolt Counter Bolt
(sentence) (word)
[paintings, 3]
[poems, 60]
[letter, 75]
Kafka Topic
Stream to
Kafka
File
(sentence)
(sentence)
(sentence)
Figure 1: WordCount architecture.
Response surface is:
- Non-linear
- Non convex
- Multi-modal
- Measurements subject to noise
7. GP for modeling blackbox response function
true function
GP mean
GP variance
observation
selected point
true
minimum
mposed by its prior mean (µ(·) : X ! R) and a covariance
nction (k(·, ·) : X ⇥ X ! R) [41]:
y = f(x) ⇠ GP(µ(x), k(x, x0
)), (2)
here covariance k(x, x0
) defines the distance between x
d x0
. Let us assume S1:t = {(x1:t, y1:t)|yi := f(xi)} be
e collection of t experimental data (observations). In this
mework, we treat f(x) as a random variable, conditioned
observations S1:t, which is normally distributed with the
lowing posterior mean and variance functions [41]:
µt(x) = µ(x) + k(x)|
(K + 2
I) 1
(y µ) (3)
2
t (x) = k(x, x) + 2
I k(x)|
(K + 2
I) 1
k(x) (4)
here y := y1:t, k(x)|
= [k(x, x1) k(x, x2) . . . k(x, xt)],
:= µ(x1:t), K := k(xi, xj) and I is identity matrix. The
ortcoming of BO4CO is that it cannot exploit the observa-
ns regarding other versions of the system and as therefore
nnot be applied in DevOps.
2 TL4CO: an extension to multi-tasks
TL4CO 1
uses MTGPs that exploit observations from other
evious versions of the system under test. Algorithm 1
fines the internal details of TL4CO. As Figure 4 shows,
4CO is an iterative algorithm that uses the learning from
her system versions. In a high-level overview, TL4CO: (i)
ects the most informative past observations (details in
ction 3.3); (ii) fits a model to existing data based on kernel
arning (details in Section 3.4), and (iii) selects the next
ork are based on tractable linear algebra.
evious work [21], we proposed BO4CO that ex-
task GPs (no transfer learning) for prediction of
tribution of response functions. A GP model is
y its prior mean (µ(·) : X ! R) and a covariance
·, ·) : X ⇥ X ! R) [41]:
y = f(x) ⇠ GP(µ(x), k(x, x0
)), (2)
iance k(x, x0
) defines the distance between x
us assume S1:t = {(x1:t, y1:t)|yi := f(xi)} be
n of t experimental data (observations). In this
we treat f(x) as a random variable, conditioned
ons S1:t, which is normally distributed with the
sterior mean and variance functions [41]:
µ(x) + k(x)|
(K + 2
I) 1
(y µ) (3)
k(x, x) + 2
I k(x)|
(K + 2
I) 1
k(x) (4)
1:t, k(x)|
= [k(x, x1) k(x, x2) . . . k(x, xt)],
, K := k(xi, xj) and I is identity matrix. The
of BO4CO is that it cannot exploit the observa-
ng other versions of the system and as therefore
pplied in DevOps.
CO: an extension to multi-tasks
uses MTGPs that exploit observations from other
Motivations:
1- mean estimates + variance
2- all computations are linear algebra
8. -1.5 -1 -0.5 0 0.5 1 1.5
-1.5
-1
-0.5
0
0.5
1
x1 x2 x3 x4
true function
GP surrogate
mean estimate
observation
Fig. 5: An example of 1D GP model: GPs provide mean esti-
mates as well as the uncertainty in estimations, i.e., variance.
Configuration
Optimisation Tool
performance
repository
Monitoring
Deployment Service
Data Preparation
configuration
parameters
values
configuration
parameters
values
Experimental Suite
Testbed
Doc
Data Broker
Tester
experiment time
polling interval
configuration
parameters
GP model
Kafka
System Under Test
Workload
Generator
Technology Interface
Storm
Cassandra
Spark
Algorithm 1 : BO4CO
Input: Configuration space X, Maximum budget Nmax, Re-
sponse function f, Kernel function K✓, Hyper-parameters
✓, Design sample size n, learning cycle Nl
Output: Optimal configurations x⇤
and learned model M
1: choose an initial sparse design (lhd) to find an initial
design samples D = {x1, . . . , xn}
2: obtain performance measurements of the initial design,
yi f(xi) + ✏i, 8xi 2 D
3: S1:n {(xi, yi)}n
i=1; t n + 1
4: M(x|S1:n, ✓) fit a GP model to the design . Eq.(3)
5: while t Nmax do
6: if (t mod Nl = 0) ✓ learn the kernel hyper-
parameters by maximizing the likelihood
7: find next configuration xt by optimizing the selection
criteria over the estimated response surface given the data,
xt arg maxxu(x|M, S1:t 1) . Eq.(9)
8: obtain performance for the new configuration xt, yt
f(xt) + ✏t
9: Augment the configuration S1:t = {S1:t 1, (xt, yt)}
10: M(x|S1:t, ✓) re-fit a new GP model . Eq.(7)
11: t t + 1
12: end while
13: (x⇤
, y⇤
) = min S1:Nmax
14: M(x)
(x, x0
) defines the distance between x and x0
. Let us
S1:t = {(x1:t, y1:t)|yi := f(xi)} be the collection of
ations. The function values are drawn from a multi-
Gaussian distribution N(µ, K), where µ := µ(x1:t),
K :=
2
6
4
k(x1, x1) . . . k(x1, xt)
...
...
...
k(xt, x1) . . . k(xt, xt)
3
7
5 (4)
e while loop in BO4CO, given the observations we
ated so far, we intend to fit a new GP model:
f1:t
ft+1
⇠ N(µ,
K + 2
I k
k|
k(xt+1, xt+1)
), (5)
(x)|
= [k(x, x1) k(x, x2) . . . k(x, xt)] and I
ty matrix. Given the Eq. (5), the new GP model can
n from this new Gaussian distribution:
Pr(ft+1|S1:t, xt+1) = N(µt(xt+1), 2
t (xt+1)), (6)
) = µ(x) + k(x)|
(K + 2
I) 1
(y µ) (7)
) = k(x, x) + 2
I k(x)|
(K + 2
I) 1
k(x) (8)
osterior functions are used to select the next point xt+1
ed in Section III-C.
figuration selection criteria
election criteria is defined as u : X ! R that selects
X, should f(·) be evaluated next (step 7):
0 2000 4000 6000 8000 10000
Iteration
4
4.5
5
5.5
6
ig. 7: Change of value over time: it begins with a small
alue to exploit the mean estimates and it increases over time
order to explore.
BO4CO uses Lower Confidence Bound (LCB) [25]. LCB
inimizes the distance to optimum by balancing exploitation
f mean and exploration via variance:
uLCB(x|M, S1:n) = argmin
x2X
µt(x) t(x), (10)
here can be set according to the objectives. For instance,
we require to find a near optimal configuration quickly we
et a low value to to take the most out of the initial design
nowledge. However, if we are looking for a globally optimum
onfiguration, we can set a high value in order to skip local
inima. Furthermore, can be adapted over time to benefit
dimensions as suggested in [31], [25], this
Automatic Relevance Determination (ARD)
hyper-parameters (step 6), if the `-th dime
be irrelevant, then ✓` will be a small value,
be discarded. This is particularly helpful in
spaces, where it is difficult to find the opti
2) Prior mean function: While the k
structure of the estimated function, the p
X ! R provides a possible offset for o
default, this function is set to a constant µ
inferred from the observations [25]. Howev
function is a way of incorporating the ex
it is available, then we can use this know
we have collected extensive experimental
based on our datasets (cf. Table I), we obse
for Big Data systems, there is a significan
the minimum and the maximum of each f
2). Therefore, a linear mean function µ(x)
for more flexible structures, and provides
data than a constant mean. We only need
for each dimension and an offset (denoted
3) Learning parameters: marginal likeli
s greater flexibility in modeling such functions [31]. The
ng is a variation of the Mat´ern kernel for ⌫ = 1/2:
k⌫=1/2(xi, xj) = ✓2
0 exp( r), (11)
r2
(xi, xj) = (xi xj)|
⇤(xi xj) for some positive
finite matrix ⇤. For categorical variables, we imple-
the following [12]:
k✓(xi, xj) = exp(⌃d
`=1( ✓` (xi 6= xj))), (12)
From an implementation perspective, B
three major components: (i) an optimizat
left part of Figure 6), (ii) an experimental
of Figure 6) integrated via a (iii) data broke
component implements the model (re-)fitt
optimization (9) steps in Algorithm 1 and i
lab 2015b. The experimental suite compon
facilities for automated deployment of topo
measurements and data preparation and is
Acquisition function:
Kernel function:
14. true function
GP mean
GP variance
observation
selected point
true
minimumX
f(x)
Figure 3: An example of 1-dimensional GP model.
Configuration Optimization
(version j=M)
performance
measurements
Initial Design
Model Fit
Next Experiment
Model Update
Budget Finished
performance
repository
Configuration Optimization
(version j=N)
Initial Design
Model Fit
Next Experiment
Model Update
Budget Finished
select data
for training
GP model hyper-parameters
store filter
Algorithm 1 : TL4CO
Input: Configuration space X, Number of historical con-
figuration optimization datasets T, Maximum budget
Nmax, Response function f, Kernel function K, Hyper-
parameters ✓j
, The current dataset Sj=1
, Datasets be-
longing to other versions Sj=2:T
, Diagonal noise matrix
⌃, Design sample size n, Learning cycle Nl
Output: Optimal configurations x⇤
and learned model M
1: D = {x1, . . . , xn} create an initial sparse design (lhd)
2: Obtain the performance 8xi 2 D, yi f(xi) + ✏i
3: Sj=2:T
select m points from other versions (j = 2 : T)
that reduce entropy . Eq.(8)
4: S1
1:n Sj=2:T
[ {(xi, yi)}n
i=1; t n + 1
5: M(x|S1
1:n, ✓j
) fit a multi-task GP to D . Eq. (6)
6: while t Nmax do
7: If (t mod Nl = 0) then [✓ learn the kernel hyper-
parameters by maximizing the likelihood]
8: Determine the next configuration, xt, by optimizing
LCB over M, xt arg maxxu(x|M, S1
1:t 1) . Eq.(11)
9: Obtain the performance of xt, yt f(xt) + ✏t
10: Augment the configuration S1
1:t = S1
1:t 1
S
{(xt, yt)}
11: M(x|S1
1:t, ✓) re-fit a new GP model . Eq.(6)
12: t t + 1
13: end while
14: (x⇤
, y⇤
) = min[S1
1:Nmax
Sj=2:T
] locating the optimum
configuration by discarding data for other system versions
15: M(x) storing the learned model
:t), where xi are the configurations of di↵erent ver-
or which we observed response yj
i . The version of
stem (task) is defined as j that contains tj
observa-
Without loss of generality, we always assume j = 1
current version under test. In order to associate the
ations (xj
i , yj
i ) to task j a label lj
= j is used. To
r the learning from previous tasks to the current one,
TPG framework allows us to use the multiplication of
dependent kernels [5]:
kT L4CO(l, l0
, x, x0
) = kt(l, l0
) ⇥ kxx(x, x0
), (5)
the kernels kt and kxx represent the correlation be-
di↵erent versions and covariance functions for a partic-
rsion, respectively. Note that kt depends only on the
pointing to the versions for which we have some obser-
s, and kxx depends only on the configuration x. This
exploiting the similarity between measureme
to (3), (4), the mean and variance of MTGP
µt(x) = µ(x) + k|
(K(X, X) + ⌃) 1
(y
2
t (x) = k(x, x) + 2
k|
(K(X, X) +
where y := [f1, . . . , fT ]|
is the measured pe
garding all tasks, X = [X1, . . . , XT ] are the c
configuration and ⌃ = diag[ 2
1, . . . , 2
T ] is a d
matrix where each noise term is repeated as man
number of historical observations represented
and k := k(X, x). This is a conditional esti
sired configuration given the historical dataset
system versions and their respective GP hype
An illustration of a multi-task GP versus a s
and its e↵ect on providing a more accurate mo
4
em versions; (iii) fast learning of the hyper-parameters by
oiting the similarity between measurements. Similarly
3), (4), the mean and variance of MTGP are [34]:
µt(x) = µ(x) + k|
(K(X, X) + ⌃) 1
(y µ) (6)
2
t (x) = k(x, x) + 2
k|
(K(X, X) + ⌃) 1
k, (7)
re y := [f1, . . . , fT ]|
is the measured performance re-
ding all tasks, X = [X1, . . . , XT ] are the corresponding
figuration and ⌃ = diag[ 2
1, . . . , 2
T ] is a diagonal noise
rix where each noise term is repeated as many times as the
mber of historical observations represented by t1
, . . . , tT
k := k(X, x). This is a conditional estimate at a de-
d configuration given the historical datasets for previous
em versions and their respective GP hyper-parameters.
n illustration of a multi-task GP versus a single-task GP
its e↵ect on providing a more accurate model is given in
correlation between
different versions
covariance functions
15. Multi-task GP vs single-task GP
-1.5 -1 -0.5 0 0.5 1 1.5
-4
-3
-2
-1
0
1
2
3
(a) 3 sample response functions
configuration domain
responsevalue
(1)
(2)
(3)
observations
(b) GP fit for (1) ignoring observations for (2),(3)
LCB
not informative
(c) multi-task GP fit for (1) by transfer learning from (2),(3)
highly informative
GP prediction mean
GP prediction variance
probability distribution
of the minimizers
16. Exploitation vs exploration
0 2000 4000 6000 8000 10000
Iteration
4
4.5
5
5.5
6
6.5
7
7.5
8
8.5
κ
κ
TL4CO
[ϵ=1]
κ
BO4CO
[ϵ=1]
κ
TL4CO
[ϵ=0.1]
κ
BO4CO
[ϵ=0.1]
κ
TL4CO
[ϵ=0.01]
κ
BO4CO
[ϵ=0.01]
noise variance of the individual datasets.
figuration selection criteria
uires a selection criterion (step 8 in Algorithm
the next configuration to measure. Intuitively,
elect the minimum response. This is done using
ction u : X ! R that determines xt+1 2 X,
e evaluated next as:
xt+1 = argmax
x2X
u(x|M, S1
1:t) (11)
on criterion depends on the MTGP model M
h its predictive mean µt(xt) and variance 2
t (xt)
on observations S1
1:t. TL4CO uses the Lower
Bound (LCB) [24]:
B(x|M, S1
1:t) = argmin
x2X
µt(x) t(x), (12)
xploitation-exploration parameter. For instance,
to find a near optimal configuration we set a
to take the most out of the predictive mean.
e are looking for a globally optimum one, we can
ue in order to skip local minima. Furthermore,
pted over time [22] to perform more explorations.
decide the next configuration to measure. Intuitively,
ant to select the minimum response. This is done using
ity function u : X ! R that determines xt+1 2 X,
d f(·) be evaluated next as:
xt+1 = argmax
x2X
u(x|M, S1
1:t) (11)
e selection criterion depends on the MTGP model M
through its predictive mean µt(xt) and variance 2
t (xt)
tioned on observations S1
1:t. TL4CO uses the Lower
dence Bound (LCB) [24]:
uLCB(x|M, S1
1:t) = argmin
x2X
µt(x) t(x), (12)
is a exploitation-exploration parameter. For instance,
require to find a near optimal configuration we set a
alue to to take the most out of the predictive mean.
ver, if we are looking for a globally optimum one, we can
high value in order to skip local minima. Furthermore,
be adapted over time [22] to perform more explorations.
e 6 shows that in TL4CO, can start with a relatively
r value at the early iterations comparing to BO4CO
the former provides a better estimate of mean and
ore contains more information at the early stages.
4CO output. Once the N di↵erent configurations of
24. Entropy of the density function of the minimizers
0 20 40 60 80 100
0
1
2
3
4
5
6
7
8
9
10
Entropy
T=1(BO4CO)
T=2,m=100
T=2,m=200
T=2,m=300
T=2,m=400
T=3,m=100
1 2 3 4 5 6 7 8 9
0
2
4
6
8
10
BO4CO
TL4CO
Entropy
Iteration
Branin Hartmann WC(3D) SOL(6D) WC(5D)Dixon WC(6D) RS(6D) cass-20
he knowledge about the location of optimum configura-
is summarized by the approximation of the conditional
bability density function of the response function mini-
ers, i.e., X⇤
= Pr(x⇤
|f(x)), where f(·) is drawn from
MTGP model (cf. solid red line in Figure 5(b,c)). The
opy of the density functions in Figure 5(b,c) are 6.39,
so we know more information about the latter.
he results in Figure 19 confirm that the entropy measure
e minimizers with the models provided by TL4CO for all
datasets (synthetic and real) significantly contains more
mation. The results demonstrate that the main reason
finding quick convergence comparing with the baselines
at TL4CO employs a more e↵ective model. The results
igure 19(b) show the change of entropy of X⇤
over time
WC(5D) dataset. First, it shows that in TL4CO, the
opy decreases sharply. However, the overall decrease of
opy for BO4CO is slow. The second observation is that
TL4CO
variance,
storing K
making th
5. DIS
5.1 Be
TL4CO
experimen
practice. A
than thre
the system
our appro
Knowledge about the location of the minimizer
25. Effect of ARD
0 20 40 60 80 100
10-6
10-5
10-4
10-3
10-2
10
-1
10
0
10
1
AbsoluteError(ms)
TL4CO(ARD on)
TL4CO(ARD off)
0 20 40 60 80 100
10-3
10
-2
10-1
10
0
10
1
AbsoluteError(ms)
TL4CO(ARD on)
TL4CO(ARD off)
Iteration Iteration
(a) (b)
We implemented the following kernel function to support
integer and categorical variables (cf. Section 2.1):
kxx(xi, xj) = exp(⌃d
`=1( ✓` (xi 6= xj))), (9)
where d is the number of dimensions (i.e., the number of
configuration parameters), ✓` adjust the scales along the
function dimensions and is a function gives the distance
between two categorical variables using Kronecker delta [20,
34]. TL4CO uses di↵erent scales {✓`, ` = 1 . . . d} on di↵erent
dimensions as suggested in [41, 34], this technique is called
Automatic Relevance Determination (ARD). After learning
the hyper-parameters (step 7 in Algorithm 1), if the `-th
dimension (parameter) turns out be irrelevant, so the ✓`
will be a small value, and therefore, will be automatically
discarded. This is particularly helpful in high dimensional
spaces, where it is di cult to find the optimal configuration.
3.4.2 Prior mean function
While the kernel controls the structure of the estimated
function, the prior mean µ(x) : X ! R provides a possible
o↵set for our estimation. By default, this function is set to a
constant µ(x) := µ, which is inferred from the observations
29. Acknowledgement: BO4CO and TL4CO are now integrated with
other DevOps tools in the delivery pipeline for Big Data in H2020
DICE project
Big Data Technologies
Cloud (Priv/Pub)
`
DICE IDE
Profile
Plugins
Sim Ver Opt
DPIM
DTSM
DDSM TOSCAMethodology
Deploy Config Test
M
o
n
Anomaly
Trace
Iter. Enh.
Data Intensive Application (DIA)
Cont.Int. Fault Inj.
WP4
WP3
WP2
WP5
WP1 WP6 - Demonstrators
Tool Demo: http://www.slideshare.net/pooyanjamshidi/configuration-optimization-tool