2019-05-22 23:16:55 +02:00
|
|
|
package storage
|
|
|
|
|
|
|
|
import (
|
2021-03-18 13:52:49 +01:00
|
|
|
"bytes"
|
2022-06-19 20:47:35 +02:00
|
|
|
"errors"
|
2019-05-22 23:16:55 +02:00
|
|
|
"fmt"
|
2020-01-30 23:54:28 +01:00
|
|
|
"io"
|
2019-05-22 23:16:55 +02:00
|
|
|
"math"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"regexp"
|
|
|
|
"sort"
|
2021-02-02 23:24:05 +01:00
|
|
|
"strings"
|
2019-05-22 23:16:55 +02:00
|
|
|
"sync"
|
|
|
|
"sync/atomic"
|
|
|
|
"time"
|
|
|
|
"unsafe"
|
|
|
|
|
2021-05-20 13:15:19 +02:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/bloomfilter"
|
2022-07-05 22:47:46 +02:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/bytesutil"
|
2020-12-08 19:49:32 +01:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/cgroup"
|
2021-08-13 11:10:00 +02:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/decimal"
|
2019-05-22 23:16:55 +02:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/encoding"
|
2020-05-14 21:01:51 +02:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/fasttime"
|
2019-05-22 23:16:55 +02:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/fs"
|
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/logger"
|
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/memory"
|
2022-06-01 01:29:19 +02:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/querytracer"
|
2022-05-04 21:12:03 +02:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/snapshot"
|
2020-07-22 23:58:48 +02:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/storagepacelimiter"
|
2019-05-28 16:17:19 +02:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/timerpool"
|
2019-09-24 20:10:22 +02:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/uint64set"
|
2019-08-13 20:35:19 +02:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/workingsetcache"
|
2019-05-22 23:16:55 +02:00
|
|
|
"github.com/VictoriaMetrics/fastcache"
|
|
|
|
)
|
|
|
|
|
2020-10-20 13:29:26 +02:00
|
|
|
const (
|
|
|
|
msecsPerMonth = 31 * 24 * 3600 * 1000
|
|
|
|
maxRetentionMsecs = 100 * 12 * msecsPerMonth
|
|
|
|
)
|
2019-05-22 23:16:55 +02:00
|
|
|
|
|
|
|
// Storage represents TSDB storage.
|
|
|
|
type Storage struct {
|
2019-10-17 17:22:56 +02:00
|
|
|
// Atomic counters must go at the top of the structure in order to properly align by 8 bytes on 32-bit archs.
|
|
|
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/212 .
|
|
|
|
tooSmallTimestampRows uint64
|
|
|
|
tooBigTimestampRows uint64
|
|
|
|
|
|
|
|
addRowsConcurrencyLimitReached uint64
|
|
|
|
addRowsConcurrencyLimitTimeout uint64
|
|
|
|
addRowsConcurrencyDroppedRows uint64
|
|
|
|
|
2020-05-15 12:44:23 +02:00
|
|
|
slowRowInserts uint64
|
|
|
|
slowPerDayIndexInserts uint64
|
2020-05-15 13:11:39 +02:00
|
|
|
slowMetricNameLoads uint64
|
2020-05-15 12:44:23 +02:00
|
|
|
|
2021-05-20 13:15:19 +02:00
|
|
|
hourlySeriesLimitRowsDropped uint64
|
|
|
|
dailySeriesLimitRowsDropped uint64
|
|
|
|
|
2020-10-20 15:10:46 +02:00
|
|
|
path string
|
|
|
|
cachePath string
|
|
|
|
retentionMsecs int64
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2019-05-25 20:51:11 +02:00
|
|
|
// lock file for exclusive access to the storage on the given path.
|
2019-05-22 23:16:55 +02:00
|
|
|
flockF *os.File
|
|
|
|
|
|
|
|
idbCurr atomic.Value
|
|
|
|
|
|
|
|
tb *table
|
|
|
|
|
2021-05-20 13:15:19 +02:00
|
|
|
// Series cardinality limiters.
|
|
|
|
hourlySeriesLimiter *bloomfilter.Limiter
|
|
|
|
dailySeriesLimiter *bloomfilter.Limiter
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
// tsidCache is MetricName -> TSID cache.
|
2019-08-13 20:35:19 +02:00
|
|
|
tsidCache *workingsetcache.Cache
|
2019-05-22 23:16:55 +02:00
|
|
|
|
|
|
|
// metricIDCache is MetricID -> TSID cache.
|
2019-08-13 20:35:19 +02:00
|
|
|
metricIDCache *workingsetcache.Cache
|
2019-05-22 23:16:55 +02:00
|
|
|
|
|
|
|
// metricNameCache is MetricID -> MetricName cache.
|
2019-08-13 20:35:19 +02:00
|
|
|
metricNameCache *workingsetcache.Cache
|
2019-05-22 23:16:55 +02:00
|
|
|
|
|
|
|
// dateMetricIDCache is (Date, MetricID) cache.
|
2019-11-09 22:05:14 +01:00
|
|
|
dateMetricIDCache *dateMetricIDCache
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2019-11-11 23:16:42 +01:00
|
|
|
// Fast cache for MetricID values occurred during the current hour.
|
2019-06-09 18:06:53 +02:00
|
|
|
currHourMetricIDs atomic.Value
|
|
|
|
|
2019-11-11 23:16:42 +01:00
|
|
|
// Fast cache for MetricID values occurred during the previous hour.
|
2019-06-09 18:06:53 +02:00
|
|
|
prevHourMetricIDs atomic.Value
|
|
|
|
|
2020-05-12 00:06:17 +02:00
|
|
|
// Fast cache for pre-populating per-day inverted index for the next day.
|
|
|
|
// This is needed in order to remove CPU usage spikes at 00:00 UTC
|
|
|
|
// due to creation of per-day inverted index for active time series.
|
|
|
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/430 for details.
|
|
|
|
nextDayMetricIDs atomic.Value
|
|
|
|
|
2019-06-09 18:06:53 +02:00
|
|
|
// Pending MetricID values to be added to currHourMetricIDs.
|
2019-11-08 18:37:16 +01:00
|
|
|
pendingHourEntriesLock sync.Mutex
|
2022-11-07 13:04:06 +01:00
|
|
|
pendingHourEntries *uint64set.Set
|
2019-06-02 17:34:08 +02:00
|
|
|
|
2020-05-12 00:06:17 +02:00
|
|
|
// Pending MetricIDs to be added to nextDayMetricIDs.
|
|
|
|
pendingNextDayMetricIDsLock sync.Mutex
|
|
|
|
pendingNextDayMetricIDs *uint64set.Set
|
|
|
|
|
2021-07-07 09:27:47 +02:00
|
|
|
// prefetchedMetricIDs contains metricIDs for pre-fetched metricNames in the prefetchMetricNames function.
|
2020-01-30 00:59:43 +01:00
|
|
|
prefetchedMetricIDs atomic.Value
|
|
|
|
|
2021-07-07 09:27:47 +02:00
|
|
|
// prefetchedMetricIDsDeadline is used for periodic reset of prefetchedMetricIDs in order to limit its size under high rate of creating new series.
|
|
|
|
prefetchedMetricIDsDeadline uint64
|
|
|
|
|
|
|
|
// prefetchedMetricIDsLock is used for serializing updates of prefetchedMetricIDs from concurrent goroutines.
|
|
|
|
prefetchedMetricIDsLock sync.Mutex
|
|
|
|
|
2019-06-02 17:34:08 +02:00
|
|
|
stop chan struct{}
|
|
|
|
|
2020-08-06 15:48:21 +02:00
|
|
|
currHourMetricIDsUpdaterWG sync.WaitGroup
|
|
|
|
nextDayMetricIDsUpdaterWG sync.WaitGroup
|
|
|
|
retentionWatcherWG sync.WaitGroup
|
2021-10-08 13:15:52 +02:00
|
|
|
freeDiskSpaceWatcherWG sync.WaitGroup
|
2020-03-24 21:24:54 +01:00
|
|
|
|
|
|
|
// The snapshotLock prevents from concurrent creation of snapshots,
|
|
|
|
// since this may result in snapshots without recently added data,
|
|
|
|
// which may be in the process of flushing to disk by concurrently running
|
|
|
|
// snapshot process.
|
|
|
|
snapshotLock sync.Mutex
|
2021-02-10 13:37:14 +01:00
|
|
|
|
|
|
|
// The minimum timestamp when composite index search can be used.
|
|
|
|
minTimestampForCompositeIndex int64
|
2021-06-15 13:56:51 +02:00
|
|
|
|
|
|
|
// An inmemory set of deleted metricIDs.
|
|
|
|
//
|
|
|
|
// It is safe to keep the set in memory even for big number of deleted
|
|
|
|
// metricIDs, since it usually requires 1 bit per deleted metricID.
|
|
|
|
deletedMetricIDs atomic.Value
|
|
|
|
deletedMetricIDsUpdateLock sync.Mutex
|
2021-10-08 18:34:38 +02:00
|
|
|
|
|
|
|
isReadOnly uint32
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2020-10-20 13:29:26 +02:00
|
|
|
// OpenStorage opens storage on the given path with the given retentionMsecs.
|
2021-05-20 13:15:19 +02:00
|
|
|
func OpenStorage(path string, retentionMsecs int64, maxHourlySeries, maxDailySeries int) (*Storage, error) {
|
2019-05-22 23:16:55 +02:00
|
|
|
path, err := filepath.Abs(path)
|
|
|
|
if err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return nil, fmt.Errorf("cannot determine absolute path for %q: %w", path, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2020-10-20 13:29:26 +02:00
|
|
|
if retentionMsecs <= 0 {
|
|
|
|
retentionMsecs = maxRetentionMsecs
|
|
|
|
}
|
2021-02-15 13:30:12 +01:00
|
|
|
if retentionMsecs > maxRetentionMsecs {
|
|
|
|
retentionMsecs = maxRetentionMsecs
|
|
|
|
}
|
2019-05-22 23:16:55 +02:00
|
|
|
s := &Storage{
|
2020-10-20 15:10:46 +02:00
|
|
|
path: path,
|
|
|
|
cachePath: path + "/cache",
|
|
|
|
retentionMsecs: retentionMsecs,
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
stop: make(chan struct{}),
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
if err := fs.MkdirAllIfNotExist(path); err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return nil, fmt.Errorf("cannot create a directory for the storage at %q: %w", path, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2021-07-13 16:58:21 +02:00
|
|
|
// Check whether the cache directory must be removed
|
|
|
|
// It is removed if it contains reset_cache_on_startup file.
|
|
|
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1447 for details.
|
|
|
|
if fs.IsPathExist(s.cachePath + "/reset_cache_on_startup") {
|
|
|
|
logger.Infof("removing cache directory at %q, since it contains `reset_cache_on_startup` file...", s.cachePath)
|
2022-09-13 12:30:55 +02:00
|
|
|
// Do not use fs.MustRemoveDirAtomic() here, since the cache directory may be mounted
|
|
|
|
// to a separate filesystem. In this case the fs.MustRemoveDirAtomic() will fail while
|
|
|
|
// trying to remove the mount root.
|
|
|
|
fs.RemoveDirContents(s.cachePath)
|
2021-07-13 16:58:21 +02:00
|
|
|
logger.Infof("cache directory at %q has been successfully removed", s.cachePath)
|
|
|
|
}
|
|
|
|
|
2019-08-13 00:45:22 +02:00
|
|
|
// Protect from concurrent opens.
|
|
|
|
flockF, err := fs.CreateFlockFile(path)
|
2019-05-22 23:16:55 +02:00
|
|
|
if err != nil {
|
2019-08-13 00:45:22 +02:00
|
|
|
return nil, err
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
s.flockF = flockF
|
|
|
|
|
2021-12-22 12:10:15 +01:00
|
|
|
// Check whether restore process finished successfully
|
|
|
|
restoreLockF := path + "/restore-in-progress"
|
|
|
|
if fs.IsPathExist(restoreLockF) {
|
|
|
|
return nil, fmt.Errorf("restore lock file exists, incomplete vmrestore run. Run vmrestore again or remove lock file %q", restoreLockF)
|
|
|
|
}
|
|
|
|
|
2021-02-10 13:37:14 +01:00
|
|
|
// Pre-create snapshots directory if it is missing.
|
|
|
|
snapshotsPath := path + "/snapshots"
|
|
|
|
if err := fs.MkdirAllIfNotExist(snapshotsPath); err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot create %q: %w", snapshotsPath, err)
|
|
|
|
}
|
2022-09-13 12:10:33 +02:00
|
|
|
fs.MustRemoveTemporaryDirs(snapshotsPath)
|
2021-02-10 13:37:14 +01:00
|
|
|
|
2021-05-20 13:15:19 +02:00
|
|
|
// Initialize series cardinality limiter.
|
|
|
|
if maxHourlySeries > 0 {
|
|
|
|
s.hourlySeriesLimiter = bloomfilter.NewLimiter(maxHourlySeries, time.Hour)
|
|
|
|
}
|
|
|
|
if maxDailySeries > 0 {
|
|
|
|
s.dailySeriesLimiter = bloomfilter.NewLimiter(maxDailySeries, 24*time.Hour)
|
|
|
|
}
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
// Load caches.
|
|
|
|
mem := memory.Allowed()
|
2022-02-21 12:50:34 +01:00
|
|
|
s.tsidCache = s.mustLoadCache("MetricName->TSID", "metricName_tsid", getTSIDCacheSize())
|
2019-05-22 23:16:55 +02:00
|
|
|
s.metricIDCache = s.mustLoadCache("MetricID->TSID", "metricID_tsid", mem/16)
|
2021-07-05 14:13:56 +02:00
|
|
|
s.metricNameCache = s.mustLoadCache("MetricID->MetricName", "metricID_metricName", mem/10)
|
2019-11-09 22:05:14 +01:00
|
|
|
s.dateMetricIDCache = newDateMetricIDCache()
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2020-05-14 21:01:51 +02:00
|
|
|
hour := fasttime.UnixHour()
|
2019-06-14 06:52:32 +02:00
|
|
|
hmCurr := s.mustLoadHourMetricIDs(hour, "curr_hour_metric_ids")
|
|
|
|
hmPrev := s.mustLoadHourMetricIDs(hour-1, "prev_hour_metric_ids")
|
|
|
|
s.currHourMetricIDs.Store(hmCurr)
|
|
|
|
s.prevHourMetricIDs.Store(hmPrev)
|
2022-11-07 13:04:06 +01:00
|
|
|
s.pendingHourEntries = &uint64set.Set{}
|
2019-06-14 06:52:32 +02:00
|
|
|
|
2020-05-14 21:01:51 +02:00
|
|
|
date := fasttime.UnixDate()
|
2020-05-12 00:06:17 +02:00
|
|
|
nextDayMetricIDs := s.mustLoadNextDayMetricIDs(date)
|
|
|
|
s.nextDayMetricIDs.Store(nextDayMetricIDs)
|
|
|
|
s.pendingNextDayMetricIDs = &uint64set.Set{}
|
|
|
|
|
2020-01-30 00:59:43 +01:00
|
|
|
s.prefetchedMetricIDs.Store(&uint64set.Set{})
|
|
|
|
|
2021-02-10 16:55:33 +01:00
|
|
|
// Load metadata
|
|
|
|
metadataDir := path + "/metadata"
|
|
|
|
isEmptyDB := !fs.IsPathExist(path + "/indexdb")
|
|
|
|
if err := fs.MkdirAllIfNotExist(metadataDir); err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot create %q: %w", metadataDir, err)
|
|
|
|
}
|
|
|
|
s.minTimestampForCompositeIndex = mustGetMinTimestampForCompositeIndex(metadataDir, isEmptyDB)
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
// Load indexdb
|
|
|
|
idbPath := path + "/indexdb"
|
|
|
|
idbSnapshotsPath := idbPath + "/snapshots"
|
|
|
|
if err := fs.MkdirAllIfNotExist(idbSnapshotsPath); err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return nil, fmt.Errorf("cannot create %q: %w", idbSnapshotsPath, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2022-09-13 12:10:33 +02:00
|
|
|
fs.MustRemoveTemporaryDirs(idbSnapshotsPath)
|
2021-06-11 11:42:26 +02:00
|
|
|
idbCurr, idbPrev, err := s.openIndexDBTables(idbPath)
|
2019-05-22 23:16:55 +02:00
|
|
|
if err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return nil, fmt.Errorf("cannot open indexdb tables at %q: %w", idbPath, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
idbCurr.SetExtDB(idbPrev)
|
|
|
|
s.idbCurr.Store(idbCurr)
|
|
|
|
|
2021-06-15 13:56:51 +02:00
|
|
|
// Load deleted metricIDs from idbCurr and idbPrev
|
|
|
|
dmisCurr, err := idbCurr.loadDeletedMetricIDs()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot load deleted metricIDs for the current indexDB: %w", err)
|
|
|
|
}
|
|
|
|
dmisPrev, err := idbPrev.loadDeletedMetricIDs()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot load deleted metricIDs for the previous indexDB: %w", err)
|
|
|
|
}
|
|
|
|
s.setDeletedMetricIDs(dmisCurr)
|
|
|
|
s.updateDeletedMetricIDs(dmisPrev)
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
// Load data
|
|
|
|
tablePath := path + "/data"
|
2022-10-24 00:30:50 +02:00
|
|
|
tb, err := openTable(tablePath, s)
|
2019-05-22 23:16:55 +02:00
|
|
|
if err != nil {
|
|
|
|
s.idb().MustClose()
|
2020-06-30 21:58:18 +02:00
|
|
|
return nil, fmt.Errorf("cannot open table at %q: %w", tablePath, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
s.tb = tb
|
|
|
|
|
2019-06-09 18:06:53 +02:00
|
|
|
s.startCurrHourMetricIDsUpdater()
|
2020-05-12 00:06:17 +02:00
|
|
|
s.startNextDayMetricIDsUpdater()
|
2019-05-22 23:16:55 +02:00
|
|
|
s.startRetentionWatcher()
|
2021-10-08 11:52:56 +02:00
|
|
|
s.startFreeDiskSpaceWatcher()
|
2019-05-22 23:16:55 +02:00
|
|
|
|
|
|
|
return s, nil
|
|
|
|
}
|
|
|
|
|
2022-02-21 12:50:34 +01:00
|
|
|
var maxTSIDCacheSize int
|
|
|
|
|
2022-06-01 10:07:53 +02:00
|
|
|
// SetTSIDCacheSize overrides the default size of storage/tsid cache
|
2022-02-21 12:50:34 +01:00
|
|
|
func SetTSIDCacheSize(size int) {
|
|
|
|
maxTSIDCacheSize = size
|
|
|
|
}
|
|
|
|
|
|
|
|
func getTSIDCacheSize() int {
|
|
|
|
if maxTSIDCacheSize <= 0 {
|
|
|
|
return int(float64(memory.Allowed()) * 0.37)
|
|
|
|
}
|
|
|
|
return maxTSIDCacheSize
|
|
|
|
}
|
|
|
|
|
2021-06-15 13:56:51 +02:00
|
|
|
func (s *Storage) getDeletedMetricIDs() *uint64set.Set {
|
|
|
|
return s.deletedMetricIDs.Load().(*uint64set.Set)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Storage) setDeletedMetricIDs(dmis *uint64set.Set) {
|
|
|
|
s.deletedMetricIDs.Store(dmis)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Storage) updateDeletedMetricIDs(metricIDs *uint64set.Set) {
|
|
|
|
s.deletedMetricIDsUpdateLock.Lock()
|
|
|
|
dmisOld := s.getDeletedMetricIDs()
|
|
|
|
dmisNew := dmisOld.Clone()
|
|
|
|
dmisNew.Union(metricIDs)
|
|
|
|
s.setDeletedMetricIDs(dmisNew)
|
|
|
|
s.deletedMetricIDsUpdateLock.Unlock()
|
|
|
|
}
|
|
|
|
|
2020-11-11 13:40:27 +01:00
|
|
|
// DebugFlush flushes recently added storage data, so it becomes visible to search.
|
|
|
|
func (s *Storage) DebugFlush() {
|
2022-12-04 07:17:46 +01:00
|
|
|
s.tb.flushPendingRows()
|
2019-05-22 23:16:55 +02:00
|
|
|
s.idb().tb.DebugFlush()
|
|
|
|
}
|
|
|
|
|
|
|
|
// CreateSnapshot creates snapshot for s and returns the snapshot name.
|
|
|
|
func (s *Storage) CreateSnapshot() (string, error) {
|
|
|
|
logger.Infof("creating Storage snapshot for %q...", s.path)
|
|
|
|
startTime := time.Now()
|
|
|
|
|
2020-03-24 21:24:54 +01:00
|
|
|
s.snapshotLock.Lock()
|
|
|
|
defer s.snapshotLock.Unlock()
|
|
|
|
|
2022-05-04 21:12:03 +02:00
|
|
|
snapshotName := snapshot.NewName()
|
2019-05-22 23:16:55 +02:00
|
|
|
srcDir := s.path
|
|
|
|
dstDir := fmt.Sprintf("%s/snapshots/%s", srcDir, snapshotName)
|
|
|
|
if err := fs.MkdirAllFailIfExist(dstDir); err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return "", fmt.Errorf("cannot create dir %q: %w", dstDir, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
dstDataDir := dstDir + "/data"
|
|
|
|
if err := fs.MkdirAllFailIfExist(dstDataDir); err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return "", fmt.Errorf("cannot create dir %q: %w", dstDataDir, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
smallDir, bigDir, err := s.tb.CreateSnapshot(snapshotName)
|
|
|
|
if err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return "", fmt.Errorf("cannot create table snapshot: %w", err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
dstSmallDir := dstDataDir + "/small"
|
|
|
|
if err := fs.SymlinkRelative(smallDir, dstSmallDir); err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return "", fmt.Errorf("cannot create symlink from %q to %q: %w", smallDir, dstSmallDir, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
dstBigDir := dstDataDir + "/big"
|
|
|
|
if err := fs.SymlinkRelative(bigDir, dstBigDir); err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return "", fmt.Errorf("cannot create symlink from %q to %q: %w", bigDir, dstBigDir, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2019-06-11 22:13:04 +02:00
|
|
|
fs.MustSyncPath(dstDataDir)
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2021-02-10 13:37:14 +01:00
|
|
|
idbSnapshot := fmt.Sprintf("%s/indexdb/snapshots/%s", srcDir, snapshotName)
|
2019-05-22 23:16:55 +02:00
|
|
|
idb := s.idb()
|
|
|
|
currSnapshot := idbSnapshot + "/" + idb.name
|
|
|
|
if err := idb.tb.CreateSnapshotAt(currSnapshot); err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return "", fmt.Errorf("cannot create curr indexDB snapshot: %w", err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
ok := idb.doExtDB(func(extDB *indexDB) {
|
|
|
|
prevSnapshot := idbSnapshot + "/" + extDB.name
|
|
|
|
err = extDB.tb.CreateSnapshotAt(prevSnapshot)
|
|
|
|
})
|
|
|
|
if ok && err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return "", fmt.Errorf("cannot create prev indexDB snapshot: %w", err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
dstIdbDir := dstDir + "/indexdb"
|
|
|
|
if err := fs.SymlinkRelative(idbSnapshot, dstIdbDir); err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return "", fmt.Errorf("cannot create symlink from %q to %q: %w", idbSnapshot, dstIdbDir, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2021-02-10 13:37:14 +01:00
|
|
|
srcMetadataDir := srcDir + "/metadata"
|
|
|
|
dstMetadataDir := dstDir + "/metadata"
|
|
|
|
if err := fs.CopyDirectory(srcMetadataDir, dstMetadataDir); err != nil {
|
2022-06-19 20:58:53 +02:00
|
|
|
return "", fmt.Errorf("cannot copy metadata: %w", err)
|
2021-02-10 13:37:14 +01:00
|
|
|
}
|
|
|
|
|
2019-06-11 22:13:04 +02:00
|
|
|
fs.MustSyncPath(dstDir)
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2020-01-22 17:27:44 +01:00
|
|
|
logger.Infof("created Storage snapshot for %q at %q in %.3f seconds", srcDir, dstDir, time.Since(startTime).Seconds())
|
2019-05-22 23:16:55 +02:00
|
|
|
return snapshotName, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ListSnapshots returns sorted list of existing snapshots for s.
|
|
|
|
func (s *Storage) ListSnapshots() ([]string, error) {
|
|
|
|
snapshotsPath := s.path + "/snapshots"
|
|
|
|
d, err := os.Open(snapshotsPath)
|
|
|
|
if err != nil {
|
2022-12-04 08:15:22 +01:00
|
|
|
return nil, fmt.Errorf("cannot open snapshots directory: %w", err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
defer fs.MustClose(d)
|
|
|
|
|
|
|
|
fnames, err := d.Readdirnames(-1)
|
|
|
|
if err != nil {
|
2022-12-04 08:15:22 +01:00
|
|
|
return nil, fmt.Errorf("cannot read snapshots directory at %q: %w", snapshotsPath, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
snapshotNames := make([]string, 0, len(fnames))
|
|
|
|
for _, fname := range fnames {
|
2022-05-04 21:12:03 +02:00
|
|
|
if err := snapshot.Validate(fname); err != nil {
|
2019-05-22 23:16:55 +02:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
snapshotNames = append(snapshotNames, fname)
|
|
|
|
}
|
|
|
|
sort.Strings(snapshotNames)
|
|
|
|
return snapshotNames, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeleteSnapshot deletes the given snapshot.
|
|
|
|
func (s *Storage) DeleteSnapshot(snapshotName string) error {
|
2022-05-04 21:12:03 +02:00
|
|
|
if err := snapshot.Validate(snapshotName); err != nil {
|
|
|
|
return fmt.Errorf("invalid snapshotName %q: %w", snapshotName, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
snapshotPath := s.path + "/snapshots/" + snapshotName
|
|
|
|
|
|
|
|
logger.Infof("deleting snapshot %q...", snapshotPath)
|
|
|
|
startTime := time.Now()
|
|
|
|
|
|
|
|
s.tb.MustDeleteSnapshot(snapshotName)
|
|
|
|
idbPath := fmt.Sprintf("%s/indexdb/snapshots/%s", s.path, snapshotName)
|
2022-09-13 12:10:33 +02:00
|
|
|
fs.MustRemoveDirAtomic(idbPath)
|
|
|
|
fs.MustRemoveDirAtomic(snapshotPath)
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2020-01-22 17:27:44 +01:00
|
|
|
logger.Infof("deleted snapshot %q in %.3f seconds", snapshotPath, time.Since(startTime).Seconds())
|
2019-05-22 23:16:55 +02:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-05-02 10:00:15 +02:00
|
|
|
// DeleteStaleSnapshots deletes snapshot older than given maxAge
|
|
|
|
func (s *Storage) DeleteStaleSnapshots(maxAge time.Duration) error {
|
|
|
|
list, err := s.ListSnapshots()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
expireDeadline := time.Now().UTC().Add(-maxAge)
|
|
|
|
for _, snapshotName := range list {
|
2022-05-04 21:12:03 +02:00
|
|
|
t, err := snapshot.Time(snapshotName)
|
2022-05-02 10:00:15 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot parse snapshot date from %q: %w", snapshotName, err)
|
|
|
|
}
|
|
|
|
if t.Before(expireDeadline) {
|
|
|
|
if err := s.DeleteSnapshot(snapshotName); err != nil {
|
|
|
|
return fmt.Errorf("cannot delete snapshot %q: %w", snapshotName, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
func (s *Storage) idb() *indexDB {
|
|
|
|
return s.idbCurr.Load().(*indexDB)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Metrics contains essential metrics for the Storage.
|
|
|
|
type Metrics struct {
|
2020-10-09 12:35:48 +02:00
|
|
|
RowsAddedTotal uint64
|
2020-02-27 22:47:05 +01:00
|
|
|
DedupsDuringMerge uint64
|
|
|
|
|
2019-07-26 13:10:25 +02:00
|
|
|
TooSmallTimestampRows uint64
|
|
|
|
TooBigTimestampRows uint64
|
|
|
|
|
2019-08-06 13:09:17 +02:00
|
|
|
AddRowsConcurrencyLimitReached uint64
|
|
|
|
AddRowsConcurrencyLimitTimeout uint64
|
|
|
|
AddRowsConcurrencyDroppedRows uint64
|
|
|
|
AddRowsConcurrencyCapacity uint64
|
|
|
|
AddRowsConcurrencyCurrent uint64
|
|
|
|
|
2020-07-05 18:37:38 +02:00
|
|
|
SearchDelays uint64
|
|
|
|
|
2020-05-15 12:44:23 +02:00
|
|
|
SlowRowInserts uint64
|
|
|
|
SlowPerDayIndexInserts uint64
|
2020-05-15 13:11:39 +02:00
|
|
|
SlowMetricNameLoads uint64
|
2020-05-15 12:44:23 +02:00
|
|
|
|
2022-08-24 12:41:53 +02:00
|
|
|
HourlySeriesLimitRowsDropped uint64
|
|
|
|
HourlySeriesLimitMaxSeries uint64
|
|
|
|
HourlySeriesLimitCurrentSeries uint64
|
|
|
|
|
|
|
|
DailySeriesLimitRowsDropped uint64
|
|
|
|
DailySeriesLimitMaxSeries uint64
|
|
|
|
DailySeriesLimitCurrentSeries uint64
|
2021-05-20 13:15:19 +02:00
|
|
|
|
2020-09-09 22:18:32 +02:00
|
|
|
TimestampsBlocksMerged uint64
|
|
|
|
TimestampsBytesSaved uint64
|
|
|
|
|
2021-12-02 09:28:45 +01:00
|
|
|
TSIDCacheSize uint64
|
|
|
|
TSIDCacheSizeBytes uint64
|
|
|
|
TSIDCacheSizeMaxBytes uint64
|
|
|
|
TSIDCacheRequests uint64
|
|
|
|
TSIDCacheMisses uint64
|
|
|
|
TSIDCacheCollisions uint64
|
|
|
|
|
|
|
|
MetricIDCacheSize uint64
|
|
|
|
MetricIDCacheSizeBytes uint64
|
|
|
|
MetricIDCacheSizeMaxBytes uint64
|
|
|
|
MetricIDCacheRequests uint64
|
|
|
|
MetricIDCacheMisses uint64
|
|
|
|
MetricIDCacheCollisions uint64
|
|
|
|
|
|
|
|
MetricNameCacheSize uint64
|
|
|
|
MetricNameCacheSizeBytes uint64
|
|
|
|
MetricNameCacheSizeMaxBytes uint64
|
|
|
|
MetricNameCacheRequests uint64
|
|
|
|
MetricNameCacheMisses uint64
|
|
|
|
MetricNameCacheCollisions uint64
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2019-11-11 12:21:05 +01:00
|
|
|
DateMetricIDCacheSize uint64
|
2019-11-13 16:58:05 +01:00
|
|
|
DateMetricIDCacheSizeBytes uint64
|
2019-11-11 12:21:05 +01:00
|
|
|
DateMetricIDCacheSyncsCount uint64
|
|
|
|
DateMetricIDCacheResetsCount uint64
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2019-11-13 18:00:02 +01:00
|
|
|
HourMetricIDCacheSize uint64
|
|
|
|
HourMetricIDCacheSizeBytes uint64
|
2019-06-19 17:36:47 +02:00
|
|
|
|
2020-05-12 00:06:17 +02:00
|
|
|
NextDayMetricIDCacheSize uint64
|
|
|
|
NextDayMetricIDCacheSizeBytes uint64
|
|
|
|
|
2020-01-30 00:59:43 +01:00
|
|
|
PrefetchedMetricIDsSize uint64
|
|
|
|
PrefetchedMetricIDsSizeBytes uint64
|
|
|
|
|
2022-07-13 11:37:04 +02:00
|
|
|
NextRetentionSeconds uint64
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
IndexDBMetrics IndexDBMetrics
|
|
|
|
TableMetrics TableMetrics
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reset resets m.
|
|
|
|
func (m *Metrics) Reset() {
|
|
|
|
*m = Metrics{}
|
|
|
|
}
|
|
|
|
|
|
|
|
// UpdateMetrics updates m with metrics from s.
|
|
|
|
func (s *Storage) UpdateMetrics(m *Metrics) {
|
2020-10-09 12:35:48 +02:00
|
|
|
m.RowsAddedTotal = atomic.LoadUint64(&rowsAddedTotal)
|
2020-02-27 22:47:05 +01:00
|
|
|
m.DedupsDuringMerge = atomic.LoadUint64(&dedupsDuringMerge)
|
|
|
|
|
2019-07-26 13:10:25 +02:00
|
|
|
m.TooSmallTimestampRows += atomic.LoadUint64(&s.tooSmallTimestampRows)
|
|
|
|
m.TooBigTimestampRows += atomic.LoadUint64(&s.tooBigTimestampRows)
|
|
|
|
|
2019-08-06 13:09:17 +02:00
|
|
|
m.AddRowsConcurrencyLimitReached += atomic.LoadUint64(&s.addRowsConcurrencyLimitReached)
|
|
|
|
m.AddRowsConcurrencyLimitTimeout += atomic.LoadUint64(&s.addRowsConcurrencyLimitTimeout)
|
|
|
|
m.AddRowsConcurrencyDroppedRows += atomic.LoadUint64(&s.addRowsConcurrencyDroppedRows)
|
|
|
|
m.AddRowsConcurrencyCapacity = uint64(cap(addRowsConcurrencyCh))
|
|
|
|
m.AddRowsConcurrencyCurrent = uint64(len(addRowsConcurrencyCh))
|
|
|
|
|
2020-07-22 23:58:48 +02:00
|
|
|
m.SearchDelays = storagepacelimiter.Search.DelaysTotal()
|
2020-07-05 18:37:38 +02:00
|
|
|
|
2020-05-15 12:44:23 +02:00
|
|
|
m.SlowRowInserts += atomic.LoadUint64(&s.slowRowInserts)
|
|
|
|
m.SlowPerDayIndexInserts += atomic.LoadUint64(&s.slowPerDayIndexInserts)
|
2020-05-15 13:11:39 +02:00
|
|
|
m.SlowMetricNameLoads += atomic.LoadUint64(&s.slowMetricNameLoads)
|
2020-05-15 12:44:23 +02:00
|
|
|
|
2022-08-24 12:41:53 +02:00
|
|
|
if sl := s.hourlySeriesLimiter; sl != nil {
|
|
|
|
m.HourlySeriesLimitRowsDropped += atomic.LoadUint64(&s.hourlySeriesLimitRowsDropped)
|
|
|
|
m.HourlySeriesLimitMaxSeries += uint64(sl.MaxItems())
|
|
|
|
m.HourlySeriesLimitCurrentSeries += uint64(sl.CurrentItems())
|
|
|
|
}
|
|
|
|
|
|
|
|
if sl := s.dailySeriesLimiter; sl != nil {
|
|
|
|
m.DailySeriesLimitRowsDropped += atomic.LoadUint64(&s.dailySeriesLimitRowsDropped)
|
|
|
|
m.DailySeriesLimitMaxSeries += uint64(sl.MaxItems())
|
|
|
|
m.DailySeriesLimitCurrentSeries += uint64(sl.CurrentItems())
|
|
|
|
}
|
2021-05-20 13:15:19 +02:00
|
|
|
|
2020-09-09 22:18:32 +02:00
|
|
|
m.TimestampsBlocksMerged = atomic.LoadUint64(×tampsBlocksMerged)
|
|
|
|
m.TimestampsBytesSaved = atomic.LoadUint64(×tampsBytesSaved)
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
var cs fastcache.Stats
|
|
|
|
s.tsidCache.UpdateStats(&cs)
|
|
|
|
m.TSIDCacheSize += cs.EntriesCount
|
2019-07-09 23:47:29 +02:00
|
|
|
m.TSIDCacheSizeBytes += cs.BytesSize
|
2021-12-02 09:28:45 +01:00
|
|
|
m.TSIDCacheSizeMaxBytes += cs.MaxBytesSize
|
2019-05-22 23:16:55 +02:00
|
|
|
m.TSIDCacheRequests += cs.GetCalls
|
|
|
|
m.TSIDCacheMisses += cs.Misses
|
|
|
|
m.TSIDCacheCollisions += cs.Collisions
|
|
|
|
|
|
|
|
cs.Reset()
|
|
|
|
s.metricIDCache.UpdateStats(&cs)
|
|
|
|
m.MetricIDCacheSize += cs.EntriesCount
|
2019-07-09 23:47:29 +02:00
|
|
|
m.MetricIDCacheSizeBytes += cs.BytesSize
|
2021-12-02 09:28:45 +01:00
|
|
|
m.MetricIDCacheSizeMaxBytes += cs.MaxBytesSize
|
2019-05-22 23:16:55 +02:00
|
|
|
m.MetricIDCacheRequests += cs.GetCalls
|
|
|
|
m.MetricIDCacheMisses += cs.Misses
|
|
|
|
m.MetricIDCacheCollisions += cs.Collisions
|
|
|
|
|
|
|
|
cs.Reset()
|
|
|
|
s.metricNameCache.UpdateStats(&cs)
|
|
|
|
m.MetricNameCacheSize += cs.EntriesCount
|
2019-07-09 23:47:29 +02:00
|
|
|
m.MetricNameCacheSizeBytes += cs.BytesSize
|
2021-12-02 09:28:45 +01:00
|
|
|
m.MetricNameCacheSizeMaxBytes += cs.MaxBytesSize
|
2019-05-22 23:16:55 +02:00
|
|
|
m.MetricNameCacheRequests += cs.GetCalls
|
|
|
|
m.MetricNameCacheMisses += cs.Misses
|
|
|
|
m.MetricNameCacheCollisions += cs.Collisions
|
|
|
|
|
2019-11-09 22:05:14 +01:00
|
|
|
m.DateMetricIDCacheSize += uint64(s.dateMetricIDCache.EntriesCount())
|
2019-11-13 16:58:05 +01:00
|
|
|
m.DateMetricIDCacheSizeBytes += uint64(s.dateMetricIDCache.SizeBytes())
|
2019-11-11 12:21:05 +01:00
|
|
|
m.DateMetricIDCacheSyncsCount += atomic.LoadUint64(&s.dateMetricIDCache.syncsCount)
|
|
|
|
m.DateMetricIDCacheResetsCount += atomic.LoadUint64(&s.dateMetricIDCache.resetsCount)
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2019-06-19 17:36:47 +02:00
|
|
|
hmCurr := s.currHourMetricIDs.Load().(*hourMetricIDs)
|
|
|
|
hmPrev := s.prevHourMetricIDs.Load().(*hourMetricIDs)
|
2019-09-24 20:10:22 +02:00
|
|
|
hourMetricIDsLen := hmPrev.m.Len()
|
|
|
|
if hmCurr.m.Len() > hourMetricIDsLen {
|
|
|
|
hourMetricIDsLen = hmCurr.m.Len()
|
2019-06-19 17:36:47 +02:00
|
|
|
}
|
|
|
|
m.HourMetricIDCacheSize += uint64(hourMetricIDsLen)
|
2019-11-13 18:00:02 +01:00
|
|
|
m.HourMetricIDCacheSizeBytes += hmCurr.m.SizeBytes()
|
|
|
|
m.HourMetricIDCacheSizeBytes += hmPrev.m.SizeBytes()
|
2019-06-19 17:36:47 +02:00
|
|
|
|
2020-05-12 00:06:17 +02:00
|
|
|
nextDayMetricIDs := &s.nextDayMetricIDs.Load().(*byDateMetricIDEntry).v
|
|
|
|
m.NextDayMetricIDCacheSize += uint64(nextDayMetricIDs.Len())
|
|
|
|
m.NextDayMetricIDCacheSizeBytes += nextDayMetricIDs.SizeBytes()
|
|
|
|
|
2020-01-30 00:59:43 +01:00
|
|
|
prefetchedMetricIDs := s.prefetchedMetricIDs.Load().(*uint64set.Set)
|
|
|
|
m.PrefetchedMetricIDsSize += uint64(prefetchedMetricIDs.Len())
|
|
|
|
m.PrefetchedMetricIDsSizeBytes += uint64(prefetchedMetricIDs.SizeBytes())
|
|
|
|
|
2022-07-13 11:37:04 +02:00
|
|
|
m.NextRetentionSeconds = uint64(nextRetentionDuration(s.retentionMsecs).Seconds())
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
s.idb().UpdateMetrics(&m.IndexDBMetrics)
|
|
|
|
s.tb.UpdateMetrics(&m.TableMetrics)
|
|
|
|
}
|
|
|
|
|
2021-10-08 11:52:56 +02:00
|
|
|
// SetFreeDiskSpaceLimit sets the minimum free disk space size of current storage path
|
|
|
|
//
|
|
|
|
// The function must be called before opening or creating any storage.
|
2022-12-15 04:26:24 +01:00
|
|
|
func SetFreeDiskSpaceLimit(bytes int64) {
|
2021-10-08 13:15:52 +02:00
|
|
|
freeDiskSpaceLimitBytes = uint64(bytes)
|
2021-10-08 11:52:56 +02:00
|
|
|
}
|
|
|
|
|
2021-10-08 13:15:52 +02:00
|
|
|
var freeDiskSpaceLimitBytes uint64
|
|
|
|
|
2021-10-08 11:52:56 +02:00
|
|
|
// IsReadOnly returns information is storage in read only mode
|
|
|
|
func (s *Storage) IsReadOnly() bool {
|
|
|
|
return atomic.LoadUint32(&s.isReadOnly) == 1
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Storage) startFreeDiskSpaceWatcher() {
|
|
|
|
f := func() {
|
|
|
|
freeSpaceBytes := fs.MustGetFreeSpace(s.path)
|
2021-10-08 13:15:52 +02:00
|
|
|
if freeSpaceBytes < freeDiskSpaceLimitBytes {
|
|
|
|
// Switch the storage to readonly mode if there is no enough free space left at s.path
|
2021-10-19 22:58:05 +02:00
|
|
|
logger.Warnf("switching the storage at %s to read-only mode, since it has less than -storage.minFreeDiskSpaceBytes=%d of free space: %d bytes left",
|
|
|
|
s.path, freeDiskSpaceLimitBytes, freeSpaceBytes)
|
2021-10-08 11:52:56 +02:00
|
|
|
atomic.StoreUint32(&s.isReadOnly, 1)
|
|
|
|
return
|
|
|
|
}
|
2021-10-19 22:58:05 +02:00
|
|
|
if atomic.CompareAndSwapUint32(&s.isReadOnly, 1, 0) {
|
|
|
|
logger.Warnf("enabling writing to the storage at %s, since it has more than -storage.minFreeDiskSpaceBytes=%d of free space: %d bytes left",
|
|
|
|
s.path, freeDiskSpaceLimitBytes, freeSpaceBytes)
|
|
|
|
}
|
2021-10-08 11:52:56 +02:00
|
|
|
}
|
|
|
|
f()
|
2021-10-08 13:15:52 +02:00
|
|
|
s.freeDiskSpaceWatcherWG.Add(1)
|
2021-10-08 11:52:56 +02:00
|
|
|
go func() {
|
2021-10-08 13:15:52 +02:00
|
|
|
defer s.freeDiskSpaceWatcherWG.Done()
|
2022-03-18 15:42:13 +01:00
|
|
|
ticker := time.NewTicker(time.Second)
|
2021-10-08 13:15:52 +02:00
|
|
|
defer ticker.Stop()
|
2021-10-08 11:52:56 +02:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-s.stop:
|
|
|
|
return
|
2021-10-08 13:15:52 +02:00
|
|
|
case <-ticker.C:
|
2021-10-08 11:52:56 +02:00
|
|
|
f()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
func (s *Storage) startRetentionWatcher() {
|
|
|
|
s.retentionWatcherWG.Add(1)
|
|
|
|
go func() {
|
|
|
|
s.retentionWatcher()
|
|
|
|
s.retentionWatcherWG.Done()
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Storage) retentionWatcher() {
|
|
|
|
for {
|
2021-02-15 13:30:12 +01:00
|
|
|
d := nextRetentionDuration(s.retentionMsecs)
|
2019-05-22 23:16:55 +02:00
|
|
|
select {
|
|
|
|
case <-s.stop:
|
|
|
|
return
|
|
|
|
case <-time.After(d):
|
|
|
|
s.mustRotateIndexDB()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-09 18:06:53 +02:00
|
|
|
func (s *Storage) startCurrHourMetricIDsUpdater() {
|
|
|
|
s.currHourMetricIDsUpdaterWG.Add(1)
|
2019-06-02 17:34:08 +02:00
|
|
|
go func() {
|
2019-06-09 18:06:53 +02:00
|
|
|
s.currHourMetricIDsUpdater()
|
|
|
|
s.currHourMetricIDsUpdaterWG.Done()
|
2019-06-02 17:34:08 +02:00
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
2020-05-12 00:06:17 +02:00
|
|
|
func (s *Storage) startNextDayMetricIDsUpdater() {
|
|
|
|
s.nextDayMetricIDsUpdaterWG.Add(1)
|
|
|
|
go func() {
|
|
|
|
s.nextDayMetricIDsUpdater()
|
|
|
|
s.nextDayMetricIDsUpdaterWG.Done()
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
2019-06-09 18:06:53 +02:00
|
|
|
var currHourMetricIDsUpdateInterval = time.Second * 10
|
2019-06-02 20:58:14 +02:00
|
|
|
|
2019-06-09 18:06:53 +02:00
|
|
|
func (s *Storage) currHourMetricIDsUpdater() {
|
2020-02-13 11:55:58 +01:00
|
|
|
ticker := time.NewTicker(currHourMetricIDsUpdateInterval)
|
|
|
|
defer ticker.Stop()
|
2019-06-02 17:34:08 +02:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-s.stop:
|
2022-11-07 12:55:37 +01:00
|
|
|
hour := fasttime.UnixHour()
|
|
|
|
s.updateCurrHourMetricIDs(hour)
|
2019-06-02 17:34:08 +02:00
|
|
|
return
|
2020-02-13 11:55:58 +01:00
|
|
|
case <-ticker.C:
|
2022-11-07 12:55:37 +01:00
|
|
|
hour := fasttime.UnixHour()
|
|
|
|
s.updateCurrHourMetricIDs(hour)
|
2019-06-02 17:34:08 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-12 00:06:17 +02:00
|
|
|
var nextDayMetricIDsUpdateInterval = time.Second * 11
|
|
|
|
|
|
|
|
func (s *Storage) nextDayMetricIDsUpdater() {
|
|
|
|
ticker := time.NewTicker(nextDayMetricIDsUpdateInterval)
|
|
|
|
defer ticker.Stop()
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-s.stop:
|
2022-11-07 13:04:06 +01:00
|
|
|
date := fasttime.UnixDate()
|
|
|
|
s.updateNextDayMetricIDs(date)
|
2020-05-12 00:06:17 +02:00
|
|
|
return
|
|
|
|
case <-ticker.C:
|
2022-11-07 13:04:06 +01:00
|
|
|
date := fasttime.UnixDate()
|
|
|
|
s.updateNextDayMetricIDs(date)
|
2020-05-12 00:06:17 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
func (s *Storage) mustRotateIndexDB() {
|
|
|
|
// Create new indexdb table.
|
|
|
|
newTableName := nextIndexDBTableName()
|
|
|
|
idbNewPath := s.path + "/indexdb/" + newTableName
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
rotationTimestamp := fasttime.UnixTimestamp()
|
2022-06-01 13:21:12 +02:00
|
|
|
idbNew, err := openIndexDB(idbNewPath, s, rotationTimestamp, &s.isReadOnly)
|
2019-05-22 23:16:55 +02:00
|
|
|
if err != nil {
|
|
|
|
logger.Panicf("FATAL: cannot create new indexDB at %q: %s", idbNewPath, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Drop extDB
|
|
|
|
idbCurr := s.idb()
|
|
|
|
idbCurr.doExtDB(func(extDB *indexDB) {
|
|
|
|
extDB.scheduleToDrop()
|
|
|
|
})
|
|
|
|
idbCurr.SetExtDB(nil)
|
|
|
|
|
|
|
|
// Start using idbNew
|
|
|
|
idbNew.SetExtDB(idbCurr)
|
|
|
|
s.idbCurr.Store(idbNew)
|
|
|
|
|
|
|
|
// Persist changes on the file system.
|
2019-06-11 22:13:04 +02:00
|
|
|
fs.MustSyncPath(s.path)
|
2019-05-22 23:16:55 +02:00
|
|
|
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
// Do not flush tsidCache to avoid read/write path slowdown
|
|
|
|
// and slowly re-populate new idb with entries from the cache via maybeCreateIndexes().
|
|
|
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2022-06-19 19:48:42 +02:00
|
|
|
// Flush metric id caches for the current and the previous hour,
|
|
|
|
// since they may contain entries missing in idbNew.
|
|
|
|
// This should prevent from missing data in queries when
|
|
|
|
// the following steps are performed for short -retentionPeriod (e.g. 1 day):
|
|
|
|
//
|
|
|
|
// 1. Add samples for some series between 3-4 UTC. These series are registered in currHourMetricIDs.
|
|
|
|
// 2. The indexdb rotation is performed at 4 UTC. currHourMetricIDs is moved to prevHourMetricIDs.
|
|
|
|
// 3. Continue adding samples for series from step 1 during time range 4-5 UTC.
|
|
|
|
// These series are already registered in prevHourMetricIDs, so VM doesn't add per-day entries to the current indexdb.
|
|
|
|
// 4. Stop adding new samples for these series just before 5 UTC.
|
|
|
|
// 5. The next indexdb rotation is performed at 4 UTC next day.
|
|
|
|
// The information about the series from step 5 disappears from indexdb, since the old indexdb from step 1 is deleted,
|
|
|
|
// while the current indexdb doesn't contain information about the series.
|
|
|
|
// So queries for the last 24 hours stop returning samples added at step 3.
|
|
|
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/2698
|
|
|
|
s.pendingHourEntriesLock.Lock()
|
2022-11-07 13:04:06 +01:00
|
|
|
s.pendingHourEntries = &uint64set.Set{}
|
2022-06-19 19:48:42 +02:00
|
|
|
s.pendingHourEntriesLock.Unlock()
|
|
|
|
s.currHourMetricIDs.Store(&hourMetricIDs{})
|
|
|
|
s.prevHourMetricIDs.Store(&hourMetricIDs{})
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
// Flush dateMetricIDCache, so idbNew can be populated with fresh data.
|
|
|
|
s.dateMetricIDCache.Reset()
|
|
|
|
|
|
|
|
// Do not flush metricIDCache and metricNameCache, since all the metricIDs
|
|
|
|
// from prev idb remain valid after the rotation.
|
2020-05-14 22:45:04 +02:00
|
|
|
|
|
|
|
// There is no need in resetting nextDayMetricIDs, since it should be automatically reset every day.
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2021-06-11 11:42:26 +02:00
|
|
|
func (s *Storage) resetAndSaveTSIDCache() {
|
2022-02-16 17:37:26 +01:00
|
|
|
// Reset cache and then store the reset cache on disk in order to prevent
|
|
|
|
// from inconsistent behaviour after possible unclean shutdown.
|
|
|
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1347
|
2021-06-11 11:42:26 +02:00
|
|
|
s.tsidCache.Reset()
|
|
|
|
s.mustSaveCache(s.tsidCache, "MetricName->TSID", "metricName_tsid")
|
|
|
|
}
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
// MustClose closes the storage.
|
2021-02-17 13:59:04 +01:00
|
|
|
//
|
|
|
|
// It is expected that the s is no longer used during the close.
|
2019-05-22 23:16:55 +02:00
|
|
|
func (s *Storage) MustClose() {
|
|
|
|
close(s.stop)
|
|
|
|
|
2021-10-08 13:15:52 +02:00
|
|
|
s.freeDiskSpaceWatcherWG.Wait()
|
2019-05-22 23:16:55 +02:00
|
|
|
s.retentionWatcherWG.Wait()
|
2019-06-09 18:06:53 +02:00
|
|
|
s.currHourMetricIDsUpdaterWG.Wait()
|
2020-05-12 00:06:17 +02:00
|
|
|
s.nextDayMetricIDsUpdaterWG.Wait()
|
2019-05-22 23:16:55 +02:00
|
|
|
|
|
|
|
s.tb.MustClose()
|
|
|
|
s.idb().MustClose()
|
|
|
|
|
|
|
|
// Save caches.
|
2021-06-11 11:42:26 +02:00
|
|
|
s.mustSaveCache(s.tsidCache, "MetricName->TSID", "metricName_tsid")
|
|
|
|
s.tsidCache.Stop()
|
|
|
|
s.mustSaveCache(s.metricIDCache, "MetricID->TSID", "metricID_tsid")
|
|
|
|
s.metricIDCache.Stop()
|
|
|
|
s.mustSaveCache(s.metricNameCache, "MetricID->MetricName", "metricID_metricName")
|
|
|
|
s.metricNameCache.Stop()
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2019-06-14 06:52:32 +02:00
|
|
|
hmCurr := s.currHourMetricIDs.Load().(*hourMetricIDs)
|
|
|
|
s.mustSaveHourMetricIDs(hmCurr, "curr_hour_metric_ids")
|
|
|
|
hmPrev := s.prevHourMetricIDs.Load().(*hourMetricIDs)
|
|
|
|
s.mustSaveHourMetricIDs(hmPrev, "prev_hour_metric_ids")
|
|
|
|
|
2020-05-12 00:06:17 +02:00
|
|
|
nextDayMetricIDs := s.nextDayMetricIDs.Load().(*byDateMetricIDEntry)
|
|
|
|
s.mustSaveNextDayMetricIDs(nextDayMetricIDs)
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
// Release lock file.
|
|
|
|
if err := s.flockF.Close(); err != nil {
|
|
|
|
logger.Panicf("FATAL: cannot close lock file %q: %s", s.flockF.Name(), err)
|
|
|
|
}
|
2021-09-01 13:14:37 +02:00
|
|
|
|
|
|
|
// Stop series limiters.
|
|
|
|
if sl := s.hourlySeriesLimiter; sl != nil {
|
|
|
|
sl.MustStop()
|
|
|
|
}
|
|
|
|
if sl := s.dailySeriesLimiter; sl != nil {
|
|
|
|
sl.MustStop()
|
|
|
|
}
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2020-05-12 00:06:17 +02:00
|
|
|
func (s *Storage) mustLoadNextDayMetricIDs(date uint64) *byDateMetricIDEntry {
|
|
|
|
e := &byDateMetricIDEntry{
|
|
|
|
date: date,
|
|
|
|
}
|
|
|
|
name := "next_day_metric_ids"
|
|
|
|
path := s.cachePath + "/" + name
|
|
|
|
logger.Infof("loading %s from %q...", name, path)
|
|
|
|
startTime := time.Now()
|
|
|
|
if !fs.IsPathExist(path) {
|
|
|
|
logger.Infof("nothing to load from %q", path)
|
|
|
|
return e
|
|
|
|
}
|
2022-08-21 22:51:13 +02:00
|
|
|
src, err := os.ReadFile(path)
|
2020-05-12 00:06:17 +02:00
|
|
|
if err != nil {
|
|
|
|
logger.Panicf("FATAL: cannot read %s: %s", path, err)
|
|
|
|
}
|
|
|
|
srcOrigLen := len(src)
|
|
|
|
if len(src) < 16 {
|
|
|
|
logger.Errorf("discarding %s, since it has broken header; got %d bytes; want %d bytes", path, len(src), 16)
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unmarshal header
|
|
|
|
dateLoaded := encoding.UnmarshalUint64(src)
|
|
|
|
src = src[8:]
|
|
|
|
if dateLoaded != date {
|
|
|
|
logger.Infof("discarding %s, since it contains data for stale date; got %d; want %d", path, dateLoaded, date)
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unmarshal uint64set
|
|
|
|
m, tail, err := unmarshalUint64Set(src)
|
|
|
|
if err != nil {
|
|
|
|
logger.Infof("discarding %s because cannot load uint64set: %s", path, err)
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
if len(tail) > 0 {
|
|
|
|
logger.Infof("discarding %s because non-empty tail left; len(tail)=%d", path, len(tail))
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
e.v = *m
|
|
|
|
logger.Infof("loaded %s from %q in %.3f seconds; entriesCount: %d; sizeBytes: %d", name, path, time.Since(startTime).Seconds(), m.Len(), srcOrigLen)
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
|
2019-06-14 06:52:32 +02:00
|
|
|
func (s *Storage) mustLoadHourMetricIDs(hour uint64, name string) *hourMetricIDs {
|
2020-05-12 00:06:17 +02:00
|
|
|
hm := &hourMetricIDs{
|
|
|
|
hour: hour,
|
|
|
|
}
|
2019-06-14 06:52:32 +02:00
|
|
|
path := s.cachePath + "/" + name
|
|
|
|
logger.Infof("loading %s from %q...", name, path)
|
|
|
|
startTime := time.Now()
|
|
|
|
if !fs.IsPathExist(path) {
|
|
|
|
logger.Infof("nothing to load from %q", path)
|
2020-05-12 00:06:17 +02:00
|
|
|
return hm
|
2019-06-14 06:52:32 +02:00
|
|
|
}
|
2022-08-21 22:51:13 +02:00
|
|
|
src, err := os.ReadFile(path)
|
2019-06-14 06:52:32 +02:00
|
|
|
if err != nil {
|
|
|
|
logger.Panicf("FATAL: cannot read %s: %s", path, err)
|
|
|
|
}
|
|
|
|
srcOrigLen := len(src)
|
2022-11-07 12:57:56 +01:00
|
|
|
if len(src) < 16 {
|
|
|
|
logger.Errorf("discarding %s, since it has broken header; got %d bytes; want %d bytes", path, len(src), 16)
|
2020-05-12 00:06:17 +02:00
|
|
|
return hm
|
2019-06-14 06:52:32 +02:00
|
|
|
}
|
2019-11-08 18:37:16 +01:00
|
|
|
|
|
|
|
// Unmarshal header
|
2019-06-14 06:52:32 +02:00
|
|
|
hourLoaded := encoding.UnmarshalUint64(src)
|
|
|
|
src = src[8:]
|
|
|
|
if hourLoaded != hour {
|
2020-05-12 00:06:17 +02:00
|
|
|
logger.Infof("discarding %s, since it contains outdated hour; got %d; want %d", path, hourLoaded, hour)
|
|
|
|
return hm
|
2019-06-14 06:52:32 +02:00
|
|
|
}
|
2019-11-08 18:37:16 +01:00
|
|
|
|
2020-05-12 00:06:17 +02:00
|
|
|
// Unmarshal uint64set
|
|
|
|
m, tail, err := unmarshalUint64Set(src)
|
|
|
|
if err != nil {
|
|
|
|
logger.Infof("discarding %s because cannot load uint64set: %s", path, err)
|
|
|
|
return hm
|
2019-06-14 06:52:32 +02:00
|
|
|
}
|
2020-05-12 00:06:17 +02:00
|
|
|
if len(tail) > 0 {
|
|
|
|
logger.Infof("discarding %s because non-empty tail left; len(tail)=%d", path, len(tail))
|
|
|
|
return hm
|
2019-06-14 06:52:32 +02:00
|
|
|
}
|
2020-05-12 00:06:17 +02:00
|
|
|
hm.m = m
|
|
|
|
logger.Infof("loaded %s from %q in %.3f seconds; entriesCount: %d; sizeBytes: %d", name, path, time.Since(startTime).Seconds(), m.Len(), srcOrigLen)
|
|
|
|
return hm
|
|
|
|
}
|
2019-11-13 12:11:02 +01:00
|
|
|
|
2020-05-12 00:06:17 +02:00
|
|
|
func (s *Storage) mustSaveNextDayMetricIDs(e *byDateMetricIDEntry) {
|
|
|
|
name := "next_day_metric_ids"
|
|
|
|
path := s.cachePath + "/" + name
|
|
|
|
logger.Infof("saving %s to %q...", name, path)
|
|
|
|
startTime := time.Now()
|
|
|
|
dst := make([]byte, 0, e.v.Len()*8+16)
|
|
|
|
|
|
|
|
// Marshal header
|
|
|
|
dst = encoding.MarshalUint64(dst, e.date)
|
|
|
|
|
|
|
|
// Marshal e.v
|
|
|
|
dst = marshalUint64Set(dst, &e.v)
|
|
|
|
|
2022-08-21 22:51:13 +02:00
|
|
|
if err := os.WriteFile(path, dst, 0644); err != nil {
|
2020-05-12 00:06:17 +02:00
|
|
|
logger.Panicf("FATAL: cannot write %d bytes to %q: %s", len(dst), path, err)
|
2019-06-14 06:52:32 +02:00
|
|
|
}
|
2020-05-12 00:06:17 +02:00
|
|
|
logger.Infof("saved %s to %q in %.3f seconds; entriesCount: %d; sizeBytes: %d", name, path, time.Since(startTime).Seconds(), e.v.Len(), len(dst))
|
2019-06-14 06:52:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Storage) mustSaveHourMetricIDs(hm *hourMetricIDs, name string) {
|
|
|
|
path := s.cachePath + "/" + name
|
|
|
|
logger.Infof("saving %s to %q...", name, path)
|
|
|
|
startTime := time.Now()
|
2019-09-24 20:10:22 +02:00
|
|
|
dst := make([]byte, 0, hm.m.Len()*8+24)
|
2019-11-08 18:37:16 +01:00
|
|
|
|
|
|
|
// Marshal header
|
2019-06-14 06:52:32 +02:00
|
|
|
dst = encoding.MarshalUint64(dst, hm.hour)
|
2019-11-08 18:37:16 +01:00
|
|
|
|
|
|
|
// Marshal hm.m
|
2020-05-12 00:06:17 +02:00
|
|
|
dst = marshalUint64Set(dst, hm.m)
|
2019-11-13 12:11:02 +01:00
|
|
|
|
2022-08-21 22:51:13 +02:00
|
|
|
if err := os.WriteFile(path, dst, 0644); err != nil {
|
2019-06-14 06:52:32 +02:00
|
|
|
logger.Panicf("FATAL: cannot write %d bytes to %q: %s", len(dst), path, err)
|
|
|
|
}
|
2020-01-22 17:27:44 +01:00
|
|
|
logger.Infof("saved %s to %q in %.3f seconds; entriesCount: %d; sizeBytes: %d", name, path, time.Since(startTime).Seconds(), hm.m.Len(), len(dst))
|
2019-06-14 06:52:32 +02:00
|
|
|
}
|
|
|
|
|
2020-05-12 00:06:17 +02:00
|
|
|
func unmarshalUint64Set(src []byte) (*uint64set.Set, []byte, error) {
|
|
|
|
mLen := encoding.UnmarshalUint64(src)
|
|
|
|
src = src[8:]
|
|
|
|
if uint64(len(src)) < 8*mLen {
|
|
|
|
return nil, nil, fmt.Errorf("cannot unmarshal uint64set; got %d bytes; want at least %d bytes", len(src), 8*mLen)
|
|
|
|
}
|
|
|
|
m := &uint64set.Set{}
|
|
|
|
for i := uint64(0); i < mLen; i++ {
|
|
|
|
metricID := encoding.UnmarshalUint64(src)
|
|
|
|
src = src[8:]
|
|
|
|
m.Add(metricID)
|
|
|
|
}
|
|
|
|
return m, src, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func marshalUint64Set(dst []byte, m *uint64set.Set) []byte {
|
|
|
|
dst = encoding.MarshalUint64(dst, uint64(m.Len()))
|
|
|
|
m.ForEach(func(part []uint64) bool {
|
|
|
|
for _, metricID := range part {
|
|
|
|
dst = encoding.MarshalUint64(dst, metricID)
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
})
|
|
|
|
return dst
|
|
|
|
}
|
|
|
|
|
2021-02-10 13:37:14 +01:00
|
|
|
func mustGetMinTimestampForCompositeIndex(metadataDir string, isEmptyDB bool) int64 {
|
|
|
|
path := metadataDir + "/minTimestampForCompositeIndex"
|
|
|
|
minTimestamp, err := loadMinTimestampForCompositeIndex(path)
|
|
|
|
if err == nil {
|
|
|
|
return minTimestamp
|
|
|
|
}
|
2021-02-10 14:56:07 +01:00
|
|
|
if !os.IsNotExist(err) {
|
|
|
|
logger.Errorf("cannot read minTimestampForCompositeIndex, so trying to re-create it; error: %s", err)
|
|
|
|
}
|
2021-02-10 13:37:14 +01:00
|
|
|
date := time.Now().UnixNano() / 1e6 / msecPerDay
|
|
|
|
if !isEmptyDB {
|
|
|
|
// The current and the next day can already contain non-composite indexes,
|
|
|
|
// so they cannot be queried with composite indexes.
|
|
|
|
date += 2
|
|
|
|
} else {
|
|
|
|
date = 0
|
|
|
|
}
|
|
|
|
minTimestamp = date * msecPerDay
|
|
|
|
dateBuf := encoding.MarshalInt64(nil, minTimestamp)
|
2022-10-26 00:06:20 +02:00
|
|
|
if err := fs.WriteFileAtomically(path, dateBuf, true); err != nil {
|
2021-02-10 13:37:14 +01:00
|
|
|
logger.Fatalf("cannot store minTimestampForCompositeIndex: %s", err)
|
|
|
|
}
|
|
|
|
return minTimestamp
|
|
|
|
}
|
|
|
|
|
|
|
|
func loadMinTimestampForCompositeIndex(path string) (int64, error) {
|
2022-08-21 22:51:13 +02:00
|
|
|
data, err := os.ReadFile(path)
|
2021-02-10 13:37:14 +01:00
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
if len(data) != 8 {
|
|
|
|
return 0, fmt.Errorf("unexpected length of %q; got %d bytes; want 8 bytes", path, len(data))
|
|
|
|
}
|
|
|
|
return encoding.UnmarshalInt64(data), nil
|
|
|
|
}
|
|
|
|
|
2019-08-13 20:35:19 +02:00
|
|
|
func (s *Storage) mustLoadCache(info, name string, sizeBytes int) *workingsetcache.Cache {
|
2019-05-22 23:16:55 +02:00
|
|
|
path := s.cachePath + "/" + name
|
|
|
|
logger.Infof("loading %s cache from %q...", info, path)
|
|
|
|
startTime := time.Now()
|
2022-02-23 12:39:11 +01:00
|
|
|
c := workingsetcache.Load(path, sizeBytes)
|
2019-05-22 23:16:55 +02:00
|
|
|
var cs fastcache.Stats
|
|
|
|
c.UpdateStats(&cs)
|
2020-01-22 17:27:44 +01:00
|
|
|
logger.Infof("loaded %s cache from %q in %.3f seconds; entriesCount: %d; sizeBytes: %d",
|
|
|
|
info, path, time.Since(startTime).Seconds(), cs.EntriesCount, cs.BytesSize)
|
2019-05-22 23:16:55 +02:00
|
|
|
return c
|
|
|
|
}
|
|
|
|
|
2021-06-11 11:42:26 +02:00
|
|
|
func (s *Storage) mustSaveCache(c *workingsetcache.Cache, info, name string) {
|
|
|
|
saveCacheLock.Lock()
|
|
|
|
defer saveCacheLock.Unlock()
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
path := s.cachePath + "/" + name
|
|
|
|
logger.Infof("saving %s cache to %q...", info, path)
|
|
|
|
startTime := time.Now()
|
2019-08-13 20:35:19 +02:00
|
|
|
if err := c.Save(path); err != nil {
|
2019-05-22 23:16:55 +02:00
|
|
|
logger.Panicf("FATAL: cannot save %s cache to %q: %s", info, path, err)
|
|
|
|
}
|
|
|
|
var cs fastcache.Stats
|
|
|
|
c.UpdateStats(&cs)
|
2020-01-22 17:27:44 +01:00
|
|
|
logger.Infof("saved %s cache to %q in %.3f seconds; entriesCount: %d; sizeBytes: %d",
|
|
|
|
info, path, time.Since(startTime).Seconds(), cs.EntriesCount, cs.BytesSize)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2021-06-11 11:42:26 +02:00
|
|
|
// saveCacheLock prevents from data races when multiple concurrent goroutines save the same cache.
|
|
|
|
var saveCacheLock sync.Mutex
|
|
|
|
|
2022-05-25 14:57:01 +02:00
|
|
|
// SetRetentionTimezoneOffset sets the offset, which is used for calculating the time for indexdb rotation.
|
|
|
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/pull/2574
|
|
|
|
func SetRetentionTimezoneOffset(offset time.Duration) {
|
|
|
|
retentionTimezoneOffsetMsecs = offset.Milliseconds()
|
|
|
|
}
|
|
|
|
|
|
|
|
var retentionTimezoneOffsetMsecs int64
|
|
|
|
|
2021-02-15 13:30:12 +01:00
|
|
|
func nextRetentionDuration(retentionMsecs int64) time.Duration {
|
|
|
|
// Round retentionMsecs to days. This guarantees that per-day inverted index works as expected.
|
2021-02-15 13:32:57 +01:00
|
|
|
retentionMsecs = ((retentionMsecs + msecPerDay - 1) / msecPerDay) * msecPerDay
|
2022-05-25 14:57:01 +02:00
|
|
|
t := time.Now().UnixNano() / 1e6
|
2021-02-15 13:32:57 +01:00
|
|
|
deadline := ((t + retentionMsecs - 1) / retentionMsecs) * retentionMsecs
|
2019-12-02 13:42:26 +01:00
|
|
|
// Schedule the deadline to +4 hours from the next retention period start.
|
|
|
|
// This should prevent from possible double deletion of indexdb
|
|
|
|
// due to time drift - see https://github.com/VictoriaMetrics/VictoriaMetrics/issues/248 .
|
2021-02-15 13:30:12 +01:00
|
|
|
deadline += 4 * 3600 * 1000
|
2022-05-25 14:57:01 +02:00
|
|
|
// The effect of time zone on retention period is moved out.
|
|
|
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/pull/2574
|
|
|
|
deadline -= retentionTimezoneOffsetMsecs
|
2021-02-15 13:30:12 +01:00
|
|
|
return time.Duration(deadline-t) * time.Millisecond
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2022-06-28 16:36:27 +02:00
|
|
|
// SearchMetricNames returns marshaled metric names matching the given tfss on the given tr.
|
|
|
|
//
|
|
|
|
// The marshaled metric names must be unmarshaled via MetricName.UnmarshalString().
|
|
|
|
func (s *Storage) SearchMetricNames(qt *querytracer.Tracer, tfss []*TagFilters, tr TimeRange, maxMetrics int, deadline uint64) ([]string, error) {
|
2022-06-09 18:46:26 +02:00
|
|
|
qt = qt.NewChild("search for matching metric names: filters=%s, timeRange=%s", tfss, &tr)
|
2022-06-08 20:05:17 +02:00
|
|
|
defer qt.Done()
|
2022-10-23 11:15:24 +02:00
|
|
|
metricIDs, err := s.idb().searchMetricIDs(qt, tfss, tr, maxMetrics, deadline)
|
2020-11-16 09:55:55 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-10-23 11:15:24 +02:00
|
|
|
if len(metricIDs) == 0 {
|
2022-06-01 01:29:19 +02:00
|
|
|
return nil, nil
|
|
|
|
}
|
2022-10-23 11:15:24 +02:00
|
|
|
if err = s.prefetchMetricNames(qt, metricIDs, deadline); err != nil {
|
2020-11-16 09:55:55 +01:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
idb := s.idb()
|
2022-10-23 11:15:24 +02:00
|
|
|
metricNames := make([]string, 0, len(metricIDs))
|
|
|
|
metricNamesSeen := make(map[string]struct{}, len(metricIDs))
|
2020-11-16 09:55:55 +01:00
|
|
|
var metricName []byte
|
2022-10-23 11:15:24 +02:00
|
|
|
for i, metricID := range metricIDs {
|
2021-03-22 22:02:37 +01:00
|
|
|
if i&paceLimiterSlowIterationsMask == 0 {
|
|
|
|
if err := checkSearchDeadlineAndPace(deadline); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
2020-11-16 09:55:55 +01:00
|
|
|
var err error
|
2021-03-22 21:41:47 +01:00
|
|
|
metricName, err = idb.searchMetricNameWithCache(metricName[:0], metricID)
|
2020-11-16 09:55:55 +01:00
|
|
|
if err != nil {
|
|
|
|
if err == io.EOF {
|
|
|
|
// Skip missing metricName for metricID.
|
|
|
|
// It should be automatically fixed. See indexDB.searchMetricName for details.
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("error when searching metricName for metricID=%d: %w", metricID, err)
|
|
|
|
}
|
2022-06-28 16:36:27 +02:00
|
|
|
if _, ok := metricNamesSeen[string(metricName)]; ok {
|
|
|
|
// The given metric name was already seen; skip it
|
|
|
|
continue
|
2020-11-16 09:55:55 +01:00
|
|
|
}
|
2022-06-28 16:36:27 +02:00
|
|
|
metricNames = append(metricNames, string(metricName))
|
|
|
|
metricNamesSeen[metricNames[len(metricNames)-1]] = struct{}{}
|
2020-11-16 09:55:55 +01:00
|
|
|
}
|
2022-06-28 16:36:27 +02:00
|
|
|
qt.Printf("loaded %d metric names", len(metricNames))
|
|
|
|
return metricNames, nil
|
2020-11-16 09:55:55 +01:00
|
|
|
}
|
|
|
|
|
2022-10-23 11:15:24 +02:00
|
|
|
// prefetchMetricNames pre-fetches metric names for the given metricIDs into metricID->metricName cache.
|
2020-01-30 00:59:43 +01:00
|
|
|
//
|
2022-10-23 11:15:24 +02:00
|
|
|
// This should speed-up further searchMetricNameWithCache calls for srcMetricIDs from tsids.
|
|
|
|
func (s *Storage) prefetchMetricNames(qt *querytracer.Tracer, srcMetricIDs []uint64, deadline uint64) error {
|
|
|
|
qt = qt.NewChild("prefetch metric names for %d metricIDs", len(srcMetricIDs))
|
2022-06-08 20:05:17 +02:00
|
|
|
defer qt.Done()
|
2022-10-23 11:15:24 +02:00
|
|
|
if len(srcMetricIDs) == 0 {
|
2022-06-01 01:29:19 +02:00
|
|
|
qt.Printf("nothing to prefetch")
|
2020-07-23 18:21:49 +02:00
|
|
|
return nil
|
|
|
|
}
|
2020-01-30 00:59:43 +01:00
|
|
|
var metricIDs uint64Sorter
|
|
|
|
prefetchedMetricIDs := s.prefetchedMetricIDs.Load().(*uint64set.Set)
|
2022-10-23 11:15:24 +02:00
|
|
|
for _, metricID := range srcMetricIDs {
|
2020-01-30 00:59:43 +01:00
|
|
|
if prefetchedMetricIDs.Has(metricID) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
metricIDs = append(metricIDs, metricID)
|
|
|
|
}
|
2022-10-23 11:15:24 +02:00
|
|
|
qt.Printf("%d out of %d metric names must be pre-fetched", len(metricIDs), len(srcMetricIDs))
|
2020-01-30 00:59:43 +01:00
|
|
|
if len(metricIDs) < 500 {
|
|
|
|
// It is cheaper to skip pre-fetching and obtain metricNames inline.
|
2022-06-01 01:29:19 +02:00
|
|
|
qt.Printf("skip pre-fetching metric names for low number of metrid ids=%d", len(metricIDs))
|
2020-01-30 00:59:43 +01:00
|
|
|
return nil
|
|
|
|
}
|
2020-05-16 09:21:17 +02:00
|
|
|
atomic.AddUint64(&s.slowMetricNameLoads, uint64(len(metricIDs)))
|
2020-01-30 00:59:43 +01:00
|
|
|
|
|
|
|
// Pre-fetch metricIDs.
|
|
|
|
sort.Sort(metricIDs)
|
2021-03-22 21:41:47 +01:00
|
|
|
var missingMetricIDs []uint64
|
2020-01-30 00:59:43 +01:00
|
|
|
var metricName []byte
|
|
|
|
var err error
|
2020-01-30 23:54:28 +01:00
|
|
|
idb := s.idb()
|
2020-07-23 19:42:57 +02:00
|
|
|
is := idb.getIndexSearch(deadline)
|
2020-01-30 23:54:28 +01:00
|
|
|
defer idb.putIndexSearch(is)
|
2020-07-23 18:21:49 +02:00
|
|
|
for loops, metricID := range metricIDs {
|
2020-08-07 07:37:33 +02:00
|
|
|
if loops&paceLimiterSlowIterationsMask == 0 {
|
2020-07-23 19:42:57 +02:00
|
|
|
if err := checkSearchDeadlineAndPace(is.deadline); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-07-23 18:21:49 +02:00
|
|
|
}
|
2021-03-22 21:41:47 +01:00
|
|
|
metricName, err = is.searchMetricNameWithCache(metricName[:0], metricID)
|
|
|
|
if err != nil {
|
|
|
|
if err == io.EOF {
|
|
|
|
missingMetricIDs = append(missingMetricIDs, metricID)
|
|
|
|
continue
|
|
|
|
}
|
2020-06-30 21:58:18 +02:00
|
|
|
return fmt.Errorf("error in pre-fetching metricName for metricID=%d: %w", metricID, err)
|
2020-01-30 00:59:43 +01:00
|
|
|
}
|
|
|
|
}
|
2021-03-22 21:41:47 +01:00
|
|
|
idb.doExtDB(func(extDB *indexDB) {
|
|
|
|
is := extDB.getIndexSearch(deadline)
|
|
|
|
defer extDB.putIndexSearch(is)
|
|
|
|
for loops, metricID := range missingMetricIDs {
|
|
|
|
if loops&paceLimiterSlowIterationsMask == 0 {
|
|
|
|
if err = checkSearchDeadlineAndPace(is.deadline); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
metricName, err = is.searchMetricNameWithCache(metricName[:0], metricID)
|
|
|
|
if err != nil && err != io.EOF {
|
|
|
|
err = fmt.Errorf("error in pre-fetching metricName for metricID=%d in extDB: %w", metricID, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-06-01 01:29:19 +02:00
|
|
|
qt.Printf("pre-fetch metric names for %d metric ids", len(metricIDs))
|
2020-01-30 00:59:43 +01:00
|
|
|
|
|
|
|
// Store the pre-fetched metricIDs, so they aren't pre-fetched next time.
|
2021-07-07 09:27:47 +02:00
|
|
|
s.prefetchedMetricIDsLock.Lock()
|
|
|
|
var prefetchedMetricIDsNew *uint64set.Set
|
|
|
|
if fasttime.UnixTimestamp() < atomic.LoadUint64(&s.prefetchedMetricIDsDeadline) {
|
|
|
|
// Periodically reset the prefetchedMetricIDs in order to limit its size.
|
|
|
|
prefetchedMetricIDsNew = &uint64set.Set{}
|
|
|
|
atomic.StoreUint64(&s.prefetchedMetricIDsDeadline, fasttime.UnixTimestamp()+73*60)
|
|
|
|
} else {
|
|
|
|
prefetchedMetricIDsNew = prefetchedMetricIDs.Clone()
|
|
|
|
}
|
2020-07-21 19:56:49 +02:00
|
|
|
prefetchedMetricIDsNew.AddMulti(metricIDs)
|
2020-08-06 15:48:21 +02:00
|
|
|
if prefetchedMetricIDsNew.SizeBytes() > uint64(memory.Allowed())/32 {
|
|
|
|
// Reset prefetchedMetricIDsNew if it occupies too much space.
|
|
|
|
prefetchedMetricIDsNew = &uint64set.Set{}
|
|
|
|
}
|
2020-01-30 00:59:43 +01:00
|
|
|
s.prefetchedMetricIDs.Store(prefetchedMetricIDsNew)
|
2021-07-07 09:27:47 +02:00
|
|
|
s.prefetchedMetricIDsLock.Unlock()
|
2022-06-01 01:29:19 +02:00
|
|
|
qt.Printf("cache metric ids for pre-fetched metric names")
|
2020-01-30 00:59:43 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-08-10 12:17:12 +02:00
|
|
|
// ErrDeadlineExceeded is returned when the request times out.
|
|
|
|
var ErrDeadlineExceeded = fmt.Errorf("deadline exceeded")
|
2020-07-23 19:42:57 +02:00
|
|
|
|
2022-07-05 22:56:31 +02:00
|
|
|
// DeleteSeries deletes all the series matching the given tfss.
|
2019-05-22 23:16:55 +02:00
|
|
|
//
|
|
|
|
// Returns the number of metrics deleted.
|
2022-07-05 22:56:31 +02:00
|
|
|
func (s *Storage) DeleteSeries(qt *querytracer.Tracer, tfss []*TagFilters) (int, error) {
|
2022-06-27 11:53:46 +02:00
|
|
|
deletedCount, err := s.idb().DeleteTSIDs(qt, tfss)
|
2019-05-22 23:16:55 +02:00
|
|
|
if err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return deletedCount, fmt.Errorf("cannot delete tsids: %w", err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2020-07-14 13:02:14 +02:00
|
|
|
// Do not reset MetricName->TSID cache in order to prevent from adding new data points
|
|
|
|
// to deleted time series in Storage.add, since it is already reset inside DeleteTSIDs.
|
2020-07-06 20:56:14 +02:00
|
|
|
|
2020-07-14 13:02:14 +02:00
|
|
|
// Do not reset MetricID->MetricName cache, since it must be used only
|
2019-05-22 23:16:55 +02:00
|
|
|
// after filtering out deleted metricIDs.
|
2020-07-06 20:56:14 +02:00
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
return deletedCount, nil
|
|
|
|
}
|
|
|
|
|
2022-06-12 03:32:13 +02:00
|
|
|
// SearchLabelNamesWithFiltersOnTimeRange searches for label names matching the given tfss on tr.
|
|
|
|
func (s *Storage) SearchLabelNamesWithFiltersOnTimeRange(qt *querytracer.Tracer, tfss []*TagFilters, tr TimeRange, maxLabelNames, maxMetrics int, deadline uint64) ([]string, error) {
|
|
|
|
return s.idb().SearchLabelNamesWithFiltersOnTimeRange(qt, tfss, tr, maxLabelNames, maxMetrics, deadline)
|
2020-11-04 23:15:43 +01:00
|
|
|
}
|
|
|
|
|
2022-06-12 03:32:13 +02:00
|
|
|
// SearchLabelValuesWithFiltersOnTimeRange searches for label values for the given labelName, filters and tr.
|
|
|
|
func (s *Storage) SearchLabelValuesWithFiltersOnTimeRange(qt *querytracer.Tracer, labelName string, tfss []*TagFilters,
|
|
|
|
tr TimeRange, maxLabelValues, maxMetrics int, deadline uint64) ([]string, error) {
|
|
|
|
return s.idb().SearchLabelValuesWithFiltersOnTimeRange(qt, labelName, tfss, tr, maxLabelValues, maxMetrics, deadline)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2020-09-10 23:28:19 +02:00
|
|
|
// SearchTagValueSuffixes returns all the tag value suffixes for the given tagKey and tagValuePrefix on the given tr.
|
|
|
|
//
|
|
|
|
// This allows implementing https://graphite-api.readthedocs.io/en/latest/api.html#metrics-find or similar APIs.
|
2021-02-02 23:24:05 +01:00
|
|
|
//
|
|
|
|
// If more than maxTagValueSuffixes suffixes is found, then only the first maxTagValueSuffixes suffixes is returned.
|
2022-07-05 22:47:46 +02:00
|
|
|
func (s *Storage) SearchTagValueSuffixes(qt *querytracer.Tracer, tr TimeRange, tagKey, tagValuePrefix string,
|
2022-06-27 11:53:46 +02:00
|
|
|
delimiter byte, maxTagValueSuffixes int, deadline uint64) ([]string, error) {
|
|
|
|
return s.idb().SearchTagValueSuffixes(qt, tr, tagKey, tagValuePrefix, delimiter, maxTagValueSuffixes, deadline)
|
2020-09-10 23:28:19 +02:00
|
|
|
}
|
|
|
|
|
2021-02-02 23:24:05 +01:00
|
|
|
// SearchGraphitePaths returns all the matching paths for the given graphite query on the given tr.
|
2022-06-27 11:53:46 +02:00
|
|
|
func (s *Storage) SearchGraphitePaths(qt *querytracer.Tracer, tr TimeRange, query []byte, maxPaths int, deadline uint64) ([]string, error) {
|
2021-12-14 18:51:46 +01:00
|
|
|
query = replaceAlternateRegexpsWithGraphiteWildcards(query)
|
2022-06-27 11:53:46 +02:00
|
|
|
return s.searchGraphitePaths(qt, tr, nil, query, maxPaths, deadline)
|
2021-03-18 13:52:49 +01:00
|
|
|
}
|
|
|
|
|
2021-12-14 18:51:46 +01:00
|
|
|
// replaceAlternateRegexpsWithGraphiteWildcards replaces (foo|..|bar) with {foo,...,bar} in b and returns the new value.
|
|
|
|
func replaceAlternateRegexpsWithGraphiteWildcards(b []byte) []byte {
|
|
|
|
var dst []byte
|
|
|
|
for {
|
|
|
|
n := bytes.IndexByte(b, '(')
|
|
|
|
if n < 0 {
|
|
|
|
if len(dst) == 0 {
|
|
|
|
// Fast path - b doesn't contain the openining brace.
|
|
|
|
return b
|
|
|
|
}
|
|
|
|
dst = append(dst, b...)
|
|
|
|
return dst
|
|
|
|
}
|
|
|
|
dst = append(dst, b[:n]...)
|
|
|
|
b = b[n+1:]
|
|
|
|
n = bytes.IndexByte(b, ')')
|
|
|
|
if n < 0 {
|
|
|
|
dst = append(dst, '(')
|
|
|
|
dst = append(dst, b...)
|
|
|
|
return dst
|
|
|
|
}
|
|
|
|
x := b[:n]
|
|
|
|
b = b[n+1:]
|
|
|
|
if string(x) == ".*" {
|
|
|
|
dst = append(dst, '*')
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
dst = append(dst, '{')
|
|
|
|
for len(x) > 0 {
|
|
|
|
n = bytes.IndexByte(x, '|')
|
|
|
|
if n < 0 {
|
|
|
|
dst = append(dst, x...)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
dst = append(dst, x[:n]...)
|
|
|
|
x = x[n+1:]
|
|
|
|
dst = append(dst, ',')
|
|
|
|
}
|
|
|
|
dst = append(dst, '}')
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-27 11:53:46 +02:00
|
|
|
func (s *Storage) searchGraphitePaths(qt *querytracer.Tracer, tr TimeRange, qHead, qTail []byte, maxPaths int, deadline uint64) ([]string, error) {
|
2021-03-18 14:21:13 +01:00
|
|
|
n := bytes.IndexAny(qTail, "*[{")
|
2021-02-02 23:24:05 +01:00
|
|
|
if n < 0 {
|
2021-03-18 13:52:49 +01:00
|
|
|
// Verify that qHead matches a metric name.
|
|
|
|
qHead = append(qHead, qTail...)
|
2022-07-05 22:47:46 +02:00
|
|
|
suffixes, err := s.SearchTagValueSuffixes(qt, tr, "", bytesutil.ToUnsafeString(qHead), '.', 1, deadline)
|
2021-02-02 23:24:05 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if len(suffixes) == 0 {
|
|
|
|
// The query doesn't match anything.
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
if len(suffixes[0]) > 0 {
|
|
|
|
// The query matches a metric name with additional suffix.
|
|
|
|
return nil, nil
|
|
|
|
}
|
2021-03-18 13:52:49 +01:00
|
|
|
return []string{string(qHead)}, nil
|
2021-02-02 23:24:05 +01:00
|
|
|
}
|
2021-03-18 13:52:49 +01:00
|
|
|
qHead = append(qHead, qTail[:n]...)
|
2022-07-05 22:47:46 +02:00
|
|
|
suffixes, err := s.SearchTagValueSuffixes(qt, tr, "", bytesutil.ToUnsafeString(qHead), '.', maxPaths, deadline)
|
2021-02-02 23:24:05 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if len(suffixes) == 0 {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
if len(suffixes) >= maxPaths {
|
|
|
|
return nil, fmt.Errorf("more than maxPaths=%d suffixes found", maxPaths)
|
|
|
|
}
|
2021-03-18 13:52:49 +01:00
|
|
|
qNode := qTail[n:]
|
|
|
|
qTail = nil
|
2021-02-02 23:24:05 +01:00
|
|
|
mustMatchLeafs := true
|
2021-03-18 13:52:49 +01:00
|
|
|
if m := bytes.IndexByte(qNode, '.'); m >= 0 {
|
2021-02-02 23:24:05 +01:00
|
|
|
qTail = qNode[m+1:]
|
2021-02-03 17:45:42 +01:00
|
|
|
qNode = qNode[:m+1]
|
2021-02-02 23:24:05 +01:00
|
|
|
mustMatchLeafs = false
|
|
|
|
}
|
2021-03-18 13:52:49 +01:00
|
|
|
re, err := getRegexpForGraphiteQuery(string(qNode))
|
2021-02-02 23:24:05 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-03-18 13:52:49 +01:00
|
|
|
qHeadLen := len(qHead)
|
2021-02-02 23:24:05 +01:00
|
|
|
var paths []string
|
|
|
|
for _, suffix := range suffixes {
|
|
|
|
if len(paths) > maxPaths {
|
2021-03-18 13:52:49 +01:00
|
|
|
return nil, fmt.Errorf("more than maxPath=%d paths found", maxPaths)
|
2021-02-02 23:24:05 +01:00
|
|
|
}
|
|
|
|
if !re.MatchString(suffix) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if mustMatchLeafs {
|
2021-03-18 13:52:49 +01:00
|
|
|
qHead = append(qHead[:qHeadLen], suffix...)
|
|
|
|
paths = append(paths, string(qHead))
|
2021-02-02 23:24:05 +01:00
|
|
|
continue
|
|
|
|
}
|
2021-03-18 13:52:49 +01:00
|
|
|
qHead = append(qHead[:qHeadLen], suffix...)
|
2022-06-27 11:53:46 +02:00
|
|
|
ps, err := s.searchGraphitePaths(qt, tr, qHead, qTail, maxPaths, deadline)
|
2021-02-02 23:24:05 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
paths = append(paths, ps...)
|
|
|
|
}
|
|
|
|
return paths, nil
|
|
|
|
}
|
|
|
|
|
2021-02-03 19:12:17 +01:00
|
|
|
func getRegexpForGraphiteQuery(q string) (*regexp.Regexp, error) {
|
|
|
|
parts, tail := getRegexpPartsForGraphiteQuery(q)
|
|
|
|
if len(tail) > 0 {
|
|
|
|
return nil, fmt.Errorf("unexpected tail left after parsing %q: %q", q, tail)
|
|
|
|
}
|
2021-02-02 23:24:05 +01:00
|
|
|
reStr := "^" + strings.Join(parts, "") + "$"
|
|
|
|
return regexp.Compile(reStr)
|
|
|
|
}
|
|
|
|
|
2021-02-03 19:12:17 +01:00
|
|
|
func getRegexpPartsForGraphiteQuery(q string) ([]string, string) {
|
2021-02-02 23:24:05 +01:00
|
|
|
var parts []string
|
|
|
|
for {
|
2021-02-03 19:12:17 +01:00
|
|
|
n := strings.IndexAny(q, "*{}[,")
|
2021-02-02 23:24:05 +01:00
|
|
|
if n < 0 {
|
2021-02-03 19:12:17 +01:00
|
|
|
parts = append(parts, regexp.QuoteMeta(q))
|
|
|
|
return parts, ""
|
2021-02-02 23:24:05 +01:00
|
|
|
}
|
|
|
|
parts = append(parts, regexp.QuoteMeta(q[:n]))
|
|
|
|
q = q[n:]
|
|
|
|
switch q[0] {
|
2021-02-03 19:12:17 +01:00
|
|
|
case ',', '}':
|
|
|
|
return parts, q
|
2021-02-02 23:24:05 +01:00
|
|
|
case '*':
|
|
|
|
parts = append(parts, "[^.]*")
|
|
|
|
q = q[1:]
|
|
|
|
case '{':
|
|
|
|
var tmp []string
|
2021-02-03 19:12:17 +01:00
|
|
|
for {
|
|
|
|
a, tail := getRegexpPartsForGraphiteQuery(q[1:])
|
|
|
|
tmp = append(tmp, strings.Join(a, ""))
|
|
|
|
if len(tail) == 0 {
|
|
|
|
parts = append(parts, regexp.QuoteMeta("{"))
|
|
|
|
parts = append(parts, strings.Join(tmp, ","))
|
|
|
|
return parts, ""
|
|
|
|
}
|
|
|
|
if tail[0] == ',' {
|
|
|
|
q = tail
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if tail[0] == '}' {
|
|
|
|
if len(tmp) == 1 {
|
|
|
|
parts = append(parts, tmp[0])
|
|
|
|
} else {
|
|
|
|
parts = append(parts, "(?:"+strings.Join(tmp, "|")+")")
|
|
|
|
}
|
|
|
|
q = tail[1:]
|
|
|
|
break
|
|
|
|
}
|
|
|
|
logger.Panicf("BUG: unexpected first char at tail %q; want `.` or `}`", tail)
|
2021-02-02 23:24:05 +01:00
|
|
|
}
|
|
|
|
case '[':
|
|
|
|
n := strings.IndexByte(q, ']')
|
|
|
|
if n < 0 {
|
2021-02-03 19:12:17 +01:00
|
|
|
parts = append(parts, regexp.QuoteMeta(q))
|
|
|
|
return parts, ""
|
2021-02-02 23:24:05 +01:00
|
|
|
}
|
|
|
|
parts = append(parts, q[:n+1])
|
|
|
|
q = q[n+1:]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
// GetSeriesCount returns the approximate number of unique time series.
|
|
|
|
//
|
|
|
|
// It includes the deleted series too and may count the same series
|
|
|
|
// up to two times - in db and extDB.
|
2020-07-23 19:42:57 +02:00
|
|
|
func (s *Storage) GetSeriesCount(deadline uint64) (uint64, error) {
|
|
|
|
return s.idb().GetSeriesCount(deadline)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2022-06-14 16:46:16 +02:00
|
|
|
// GetTSDBStatus returns TSDB status data for /api/v1/status/tsdb
|
|
|
|
func (s *Storage) GetTSDBStatus(qt *querytracer.Tracer, tfss []*TagFilters, date uint64, focusLabel string, topN, maxMetrics int, deadline uint64) (*TSDBStatus, error) {
|
|
|
|
return s.idb().GetTSDBStatus(qt, tfss, date, focusLabel, topN, maxMetrics, deadline)
|
2021-05-12 14:18:45 +02:00
|
|
|
}
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
// MetricRow is a metric to insert into storage.
|
|
|
|
type MetricRow struct {
|
|
|
|
// MetricNameRaw contains raw metric name, which must be decoded
|
2021-05-08 16:55:44 +02:00
|
|
|
// with MetricName.UnmarshalRaw.
|
2019-05-22 23:16:55 +02:00
|
|
|
MetricNameRaw []byte
|
|
|
|
|
|
|
|
Timestamp int64
|
|
|
|
Value float64
|
|
|
|
}
|
|
|
|
|
|
|
|
// CopyFrom copies src to mr.
|
|
|
|
func (mr *MetricRow) CopyFrom(src *MetricRow) {
|
|
|
|
mr.MetricNameRaw = append(mr.MetricNameRaw[:0], src.MetricNameRaw...)
|
|
|
|
mr.Timestamp = src.Timestamp
|
|
|
|
mr.Value = src.Value
|
|
|
|
}
|
|
|
|
|
|
|
|
// String returns string representation of the mr.
|
|
|
|
func (mr *MetricRow) String() string {
|
|
|
|
metricName := string(mr.MetricNameRaw)
|
|
|
|
var mn MetricName
|
2021-05-08 16:55:44 +02:00
|
|
|
if err := mn.UnmarshalRaw(mr.MetricNameRaw); err == nil {
|
2019-05-22 23:16:55 +02:00
|
|
|
metricName = mn.String()
|
|
|
|
}
|
2021-03-25 20:30:41 +01:00
|
|
|
return fmt.Sprintf("%s (Timestamp=%d, Value=%f)", metricName, mr.Timestamp, mr.Value)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Marshal appends marshaled mr to dst and returns the result.
|
|
|
|
func (mr *MetricRow) Marshal(dst []byte) []byte {
|
|
|
|
dst = encoding.MarshalBytes(dst, mr.MetricNameRaw)
|
|
|
|
dst = encoding.MarshalUint64(dst, uint64(mr.Timestamp))
|
|
|
|
dst = encoding.MarshalUint64(dst, math.Float64bits(mr.Value))
|
|
|
|
return dst
|
|
|
|
}
|
|
|
|
|
2021-05-08 16:55:44 +02:00
|
|
|
// UnmarshalX unmarshals mr from src and returns the remaining tail from src.
|
|
|
|
//
|
|
|
|
// mr refers to src, so it remains valid until src changes.
|
|
|
|
func (mr *MetricRow) UnmarshalX(src []byte) ([]byte, error) {
|
2019-05-22 23:16:55 +02:00
|
|
|
tail, metricNameRaw, err := encoding.UnmarshalBytes(src)
|
|
|
|
if err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return tail, fmt.Errorf("cannot unmarshal MetricName: %w", err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2021-05-08 16:55:44 +02:00
|
|
|
mr.MetricNameRaw = metricNameRaw
|
2019-05-22 23:16:55 +02:00
|
|
|
|
|
|
|
if len(tail) < 8 {
|
|
|
|
return tail, fmt.Errorf("cannot unmarshal Timestamp: want %d bytes; have %d bytes", 8, len(tail))
|
|
|
|
}
|
|
|
|
timestamp := encoding.UnmarshalUint64(tail)
|
|
|
|
mr.Timestamp = int64(timestamp)
|
|
|
|
tail = tail[8:]
|
|
|
|
|
|
|
|
if len(tail) < 8 {
|
|
|
|
return tail, fmt.Errorf("cannot unmarshal Value: want %d bytes; have %d bytes", 8, len(tail))
|
|
|
|
}
|
|
|
|
value := encoding.UnmarshalUint64(tail)
|
|
|
|
mr.Value = math.Float64frombits(value)
|
|
|
|
tail = tail[8:]
|
|
|
|
|
|
|
|
return tail, nil
|
|
|
|
}
|
|
|
|
|
2020-09-17 11:01:53 +02:00
|
|
|
// ForceMergePartitions force-merges partitions in s with names starting from the given partitionNamePrefix.
|
|
|
|
//
|
|
|
|
// Partitions are merged sequentially in order to reduce load on the system.
|
|
|
|
func (s *Storage) ForceMergePartitions(partitionNamePrefix string) error {
|
|
|
|
return s.tb.ForceMergePartitions(partitionNamePrefix)
|
|
|
|
}
|
|
|
|
|
2020-10-09 12:35:48 +02:00
|
|
|
var rowsAddedTotal uint64
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
// AddRows adds the given mrs to s.
|
|
|
|
func (s *Storage) AddRows(mrs []MetricRow, precisionBits uint8) error {
|
|
|
|
if len(mrs) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Limit the number of concurrent goroutines that may add rows to the storage.
|
2022-03-16 12:05:23 +01:00
|
|
|
// This should prevent from out of memory errors and CPU thrashing when too many
|
2019-05-22 23:16:55 +02:00
|
|
|
// goroutines call AddRows.
|
|
|
|
select {
|
|
|
|
case addRowsConcurrencyCh <- struct{}{}:
|
2019-08-06 13:09:17 +02:00
|
|
|
default:
|
|
|
|
// Sleep for a while until giving up
|
|
|
|
atomic.AddUint64(&s.addRowsConcurrencyLimitReached, 1)
|
|
|
|
t := timerpool.Get(addRowsTimeout)
|
2020-08-07 07:47:32 +02:00
|
|
|
|
|
|
|
// Prioritize data ingestion over concurrent searches.
|
|
|
|
storagepacelimiter.Search.Inc()
|
|
|
|
|
2019-08-06 13:09:17 +02:00
|
|
|
select {
|
|
|
|
case addRowsConcurrencyCh <- struct{}{}:
|
|
|
|
timerpool.Put(t)
|
2020-08-07 07:47:32 +02:00
|
|
|
storagepacelimiter.Search.Dec()
|
2019-08-06 13:09:17 +02:00
|
|
|
case <-t.C:
|
|
|
|
timerpool.Put(t)
|
2020-08-07 07:47:32 +02:00
|
|
|
storagepacelimiter.Search.Dec()
|
2019-08-06 13:09:17 +02:00
|
|
|
atomic.AddUint64(&s.addRowsConcurrencyLimitTimeout, 1)
|
|
|
|
atomic.AddUint64(&s.addRowsConcurrencyDroppedRows, uint64(len(mrs)))
|
2020-08-05 17:24:51 +02:00
|
|
|
return fmt.Errorf("cannot add %d rows to storage in %s, since it is overloaded with %d concurrent writers; add more CPUs or reduce load",
|
2019-08-06 13:09:17 +02:00
|
|
|
len(mrs), addRowsTimeout, cap(addRowsConcurrencyCh))
|
|
|
|
}
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2021-05-24 14:24:04 +02:00
|
|
|
// Add rows to the storage in blocks with limited size in order to reduce memory usage.
|
2021-05-24 14:30:39 +02:00
|
|
|
var firstErr error
|
2021-05-24 14:24:04 +02:00
|
|
|
ic := getMetricRowsInsertCtx()
|
|
|
|
maxBlockLen := len(ic.rrs)
|
2021-05-24 14:30:39 +02:00
|
|
|
for len(mrs) > 0 {
|
2021-05-24 14:24:04 +02:00
|
|
|
mrsBlock := mrs
|
|
|
|
if len(mrs) > maxBlockLen {
|
|
|
|
mrsBlock = mrs[:maxBlockLen]
|
|
|
|
mrs = mrs[maxBlockLen:]
|
|
|
|
} else {
|
|
|
|
mrs = nil
|
|
|
|
}
|
2021-05-24 14:30:39 +02:00
|
|
|
if err := s.add(ic.rrs, ic.tmpMrs, mrsBlock, precisionBits); err != nil {
|
|
|
|
if firstErr == nil {
|
|
|
|
firstErr = err
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
2021-05-24 14:24:04 +02:00
|
|
|
atomic.AddUint64(&rowsAddedTotal, uint64(len(mrsBlock)))
|
|
|
|
}
|
|
|
|
putMetricRowsInsertCtx(ic)
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2020-07-05 18:37:38 +02:00
|
|
|
<-addRowsConcurrencyCh
|
|
|
|
|
2021-05-24 14:30:39 +02:00
|
|
|
return firstErr
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2021-05-24 14:24:04 +02:00
|
|
|
type metricRowsInsertCtx struct {
|
|
|
|
rrs []rawRow
|
|
|
|
tmpMrs []*MetricRow
|
|
|
|
}
|
|
|
|
|
|
|
|
func getMetricRowsInsertCtx() *metricRowsInsertCtx {
|
|
|
|
v := metricRowsInsertCtxPool.Get()
|
|
|
|
if v == nil {
|
|
|
|
v = &metricRowsInsertCtx{
|
|
|
|
rrs: make([]rawRow, maxMetricRowsPerBlock),
|
|
|
|
tmpMrs: make([]*MetricRow, maxMetricRowsPerBlock),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return v.(*metricRowsInsertCtx)
|
|
|
|
}
|
|
|
|
|
|
|
|
func putMetricRowsInsertCtx(ic *metricRowsInsertCtx) {
|
|
|
|
tmpMrs := ic.tmpMrs
|
|
|
|
for i := range tmpMrs {
|
|
|
|
tmpMrs[i] = nil
|
|
|
|
}
|
|
|
|
metricRowsInsertCtxPool.Put(ic)
|
|
|
|
}
|
|
|
|
|
|
|
|
var metricRowsInsertCtxPool sync.Pool
|
|
|
|
|
|
|
|
const maxMetricRowsPerBlock = 8000
|
|
|
|
|
2019-05-22 23:16:55 +02:00
|
|
|
var (
|
2020-07-08 16:29:57 +02:00
|
|
|
// Limit the concurrency for data ingestion to GOMAXPROCS, since this operation
|
|
|
|
// is CPU bound, so there is no sense in running more than GOMAXPROCS concurrent
|
|
|
|
// goroutines on data ingestion path.
|
2020-12-08 19:49:32 +01:00
|
|
|
addRowsConcurrencyCh = make(chan struct{}, cgroup.AvailableCPUs())
|
2019-05-22 23:16:55 +02:00
|
|
|
addRowsTimeout = 30 * time.Second
|
|
|
|
)
|
|
|
|
|
2020-11-15 23:42:27 +01:00
|
|
|
// RegisterMetricNames registers all the metric names from mns in the indexdb, so they can be queried later.
|
|
|
|
//
|
|
|
|
// The the MetricRow.Timestamp is used for registering the metric name starting from the given timestamp.
|
|
|
|
// Th MetricRow.Value field is ignored.
|
2022-06-27 11:53:46 +02:00
|
|
|
func (s *Storage) RegisterMetricNames(qt *querytracer.Tracer, mrs []MetricRow) error {
|
|
|
|
qt = qt.NewChild("registering %d series", len(mrs))
|
|
|
|
defer qt.Done()
|
2022-06-19 20:58:53 +02:00
|
|
|
var metricName []byte
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
var genTSID generationTSID
|
2021-05-23 15:39:55 +02:00
|
|
|
mn := GetMetricName()
|
|
|
|
defer PutMetricName(mn)
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
|
2020-11-15 23:42:27 +01:00
|
|
|
idb := s.idb()
|
|
|
|
is := idb.getIndexSearch(noDeadline)
|
|
|
|
defer idb.putIndexSearch(is)
|
|
|
|
for i := range mrs {
|
|
|
|
mr := &mrs[i]
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
if s.getTSIDFromCache(&genTSID, mr.MetricNameRaw) {
|
2022-06-20 12:47:43 +02:00
|
|
|
if err := s.registerSeriesCardinality(genTSID.TSID.MetricID, mr.MetricNameRaw); err != nil {
|
|
|
|
continue
|
|
|
|
}
|
2022-06-19 20:58:53 +02:00
|
|
|
if genTSID.generation == idb.generation {
|
|
|
|
// Fast path - mr.MetricNameRaw has been already registered in the current idb.
|
|
|
|
continue
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
}
|
2020-11-15 23:42:27 +01:00
|
|
|
}
|
|
|
|
// Slow path - register mr.MetricNameRaw.
|
2021-05-08 16:55:44 +02:00
|
|
|
if err := mn.UnmarshalRaw(mr.MetricNameRaw); err != nil {
|
2022-06-19 20:58:53 +02:00
|
|
|
return fmt.Errorf("cannot unmarshal MetricNameRaw %q: %w", mr.MetricNameRaw, err)
|
2020-11-15 23:42:27 +01:00
|
|
|
}
|
|
|
|
mn.sortTags()
|
|
|
|
metricName = mn.Marshal(metricName[:0])
|
2022-06-19 20:58:53 +02:00
|
|
|
date := uint64(mr.Timestamp) / msecPerDay
|
2022-06-20 12:47:43 +02:00
|
|
|
if err := is.GetOrCreateTSIDByName(&genTSID.TSID, metricName, mr.MetricNameRaw, date); err != nil {
|
2022-06-19 20:47:35 +02:00
|
|
|
if errors.Is(err, errSeriesCardinalityExceeded) {
|
|
|
|
continue
|
|
|
|
}
|
2022-06-19 20:58:53 +02:00
|
|
|
return fmt.Errorf("cannot create TSID for metricName %q: %w", metricName, err)
|
2020-11-15 23:42:27 +01:00
|
|
|
}
|
2022-06-19 20:58:53 +02:00
|
|
|
genTSID.generation = idb.generation
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
s.putTSIDToCache(&genTSID, mr.MetricNameRaw)
|
2020-11-15 23:42:27 +01:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-05-24 14:24:04 +02:00
|
|
|
func (s *Storage) add(rows []rawRow, dstMrs []*MetricRow, mrs []MetricRow, precisionBits uint8) error {
|
2019-05-22 23:16:55 +02:00
|
|
|
idb := s.idb()
|
2022-06-19 20:58:53 +02:00
|
|
|
is := idb.getIndexSearch(noDeadline)
|
|
|
|
defer idb.putIndexSearch(is)
|
2019-12-19 14:12:50 +01:00
|
|
|
var (
|
2021-03-09 08:18:19 +01:00
|
|
|
// These vars are used for speeding up bulk imports of multiple adjacent rows for the same metricName.
|
2019-12-19 14:12:50 +01:00
|
|
|
prevTSID TSID
|
|
|
|
prevMetricNameRaw []byte
|
|
|
|
)
|
2020-05-14 22:45:04 +02:00
|
|
|
var pmrs *pendingMetricRows
|
2019-07-11 16:04:56 +02:00
|
|
|
minTimestamp, maxTimestamp := s.tb.getMinMaxTimestamps()
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
|
|
|
|
var genTSID generationTSID
|
|
|
|
|
2020-05-14 22:17:22 +02:00
|
|
|
// Return only the first error, since it has no sense in returning all errors.
|
|
|
|
var firstWarn error
|
2022-06-19 20:58:53 +02:00
|
|
|
j := 0
|
2019-05-22 23:16:55 +02:00
|
|
|
for i := range mrs {
|
|
|
|
mr := &mrs[i]
|
|
|
|
if math.IsNaN(mr.Value) {
|
2021-08-13 11:10:00 +02:00
|
|
|
if !decimal.IsStaleNaN(mr.Value) {
|
|
|
|
// Skip NaNs other than Prometheus staleness marker, since the underlying encoding
|
|
|
|
// doesn't know how to work with them.
|
|
|
|
continue
|
|
|
|
}
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2019-07-26 13:10:25 +02:00
|
|
|
if mr.Timestamp < minTimestamp {
|
|
|
|
// Skip rows with too small timestamps outside the retention.
|
2020-05-14 22:17:22 +02:00
|
|
|
if firstWarn == nil {
|
2020-11-25 13:41:02 +01:00
|
|
|
metricName := getUserReadableMetricName(mr.MetricNameRaw)
|
2020-07-08 12:53:29 +02:00
|
|
|
firstWarn = fmt.Errorf("cannot insert row with too small timestamp %d outside the retention; minimum allowed timestamp is %d; "+
|
2020-11-25 13:41:02 +01:00
|
|
|
"probably you need updating -retentionPeriod command-line flag; metricName: %s",
|
|
|
|
mr.Timestamp, minTimestamp, metricName)
|
2020-05-14 22:17:22 +02:00
|
|
|
}
|
2019-07-26 13:10:25 +02:00
|
|
|
atomic.AddUint64(&s.tooSmallTimestampRows, 1)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if mr.Timestamp > maxTimestamp {
|
|
|
|
// Skip rows with too big timestamps significantly exceeding the current time.
|
2020-05-14 22:17:22 +02:00
|
|
|
if firstWarn == nil {
|
2020-11-25 13:41:02 +01:00
|
|
|
metricName := getUserReadableMetricName(mr.MetricNameRaw)
|
|
|
|
firstWarn = fmt.Errorf("cannot insert row with too big timestamp %d exceeding the current time; maximum allowed timestamp is %d; metricName: %s",
|
|
|
|
mr.Timestamp, maxTimestamp, metricName)
|
2020-05-14 22:17:22 +02:00
|
|
|
}
|
2019-07-26 13:10:25 +02:00
|
|
|
atomic.AddUint64(&s.tooBigTimestampRows, 1)
|
2019-07-11 16:04:56 +02:00
|
|
|
continue
|
|
|
|
}
|
2021-05-23 15:39:55 +02:00
|
|
|
dstMrs[j] = mr
|
|
|
|
r := &rows[j]
|
2019-05-22 23:16:55 +02:00
|
|
|
j++
|
|
|
|
r.Timestamp = mr.Timestamp
|
|
|
|
r.Value = mr.Value
|
|
|
|
r.PrecisionBits = precisionBits
|
2019-12-19 14:12:50 +01:00
|
|
|
if string(mr.MetricNameRaw) == string(prevMetricNameRaw) {
|
|
|
|
// Fast path - the current mr contains the same metric name as the previous mr, so it contains the same TSID.
|
|
|
|
// This path should trigger on bulk imports when many rows contain the same MetricNameRaw.
|
|
|
|
r.TSID = prevTSID
|
|
|
|
continue
|
|
|
|
}
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
if s.getTSIDFromCache(&genTSID, mr.MetricNameRaw) {
|
2022-06-20 12:47:43 +02:00
|
|
|
if err := s.registerSeriesCardinality(r.TSID.MetricID, mr.MetricNameRaw); err != nil {
|
|
|
|
j--
|
|
|
|
continue
|
|
|
|
}
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
r.TSID = genTSID.TSID
|
2021-03-31 20:22:40 +02:00
|
|
|
// Fast path - the TSID for the given MetricNameRaw has been found in cache and isn't deleted.
|
2020-07-08 16:29:57 +02:00
|
|
|
// There is no need in checking whether r.TSID.MetricID is deleted, since tsidCache doesn't
|
|
|
|
// contain MetricName->TSID entries for deleted time series.
|
2022-07-05 22:56:31 +02:00
|
|
|
// See Storage.DeleteSeries code for details.
|
2020-05-14 22:23:39 +02:00
|
|
|
prevTSID = r.TSID
|
|
|
|
prevMetricNameRaw = mr.MetricNameRaw
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
|
|
|
|
if genTSID.generation != idb.generation {
|
2022-06-19 20:58:53 +02:00
|
|
|
// The found entry is from the previous cache generation,
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
// so attempt to re-populate the current generation with this entry.
|
|
|
|
// This is needed for https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
|
2022-06-19 20:58:53 +02:00
|
|
|
date := uint64(r.Timestamp) / msecPerDay
|
|
|
|
created, err := is.maybeCreateIndexes(&genTSID.TSID, mr.MetricNameRaw, date)
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
if err != nil {
|
2022-06-19 20:58:53 +02:00
|
|
|
return fmt.Errorf("cannot create indexes: %w", err)
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
}
|
|
|
|
if created {
|
|
|
|
genTSID.generation = idb.generation
|
|
|
|
s.putTSIDToCache(&genTSID, mr.MetricNameRaw)
|
|
|
|
}
|
|
|
|
}
|
2020-05-14 22:23:39 +02:00
|
|
|
continue
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2020-05-14 22:45:04 +02:00
|
|
|
// Slow path - the TSID is missing in the cache.
|
|
|
|
// Postpone its search in the loop below.
|
|
|
|
j--
|
|
|
|
if pmrs == nil {
|
|
|
|
pmrs = getPendingMetricRows()
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2021-03-31 22:12:56 +02:00
|
|
|
if err := pmrs.addRow(mr); err != nil {
|
|
|
|
// Do not stop adding rows on error - just skip invalid row.
|
|
|
|
// This guarantees that invalid rows don't prevent
|
|
|
|
// from adding valid rows into the storage.
|
|
|
|
if firstWarn == nil {
|
|
|
|
firstWarn = err
|
|
|
|
}
|
|
|
|
continue
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2020-05-14 22:45:04 +02:00
|
|
|
}
|
|
|
|
if pmrs != nil {
|
|
|
|
// Sort pendingMetricRows by canonical metric name in order to speed up search via `is` in the loop below.
|
|
|
|
pendingMetricRows := pmrs.pmrs
|
|
|
|
sort.Slice(pendingMetricRows, func(i, j int) bool {
|
|
|
|
return string(pendingMetricRows[i].MetricName) < string(pendingMetricRows[j].MetricName)
|
|
|
|
})
|
|
|
|
prevMetricNameRaw = nil
|
2020-07-30 15:14:51 +02:00
|
|
|
var slowInsertsCount uint64
|
2020-05-14 22:45:04 +02:00
|
|
|
for i := range pendingMetricRows {
|
|
|
|
pmr := &pendingMetricRows[i]
|
2021-05-23 15:39:55 +02:00
|
|
|
mr := pmr.mr
|
|
|
|
dstMrs[j] = mr
|
|
|
|
r := &rows[j]
|
2020-05-14 22:45:04 +02:00
|
|
|
j++
|
|
|
|
r.Timestamp = mr.Timestamp
|
|
|
|
r.Value = mr.Value
|
|
|
|
r.PrecisionBits = precisionBits
|
|
|
|
if string(mr.MetricNameRaw) == string(prevMetricNameRaw) {
|
|
|
|
// Fast path - the current mr contains the same metric name as the previous mr, so it contains the same TSID.
|
|
|
|
// This path should trigger on bulk imports when many rows contain the same MetricNameRaw.
|
|
|
|
r.TSID = prevTSID
|
|
|
|
continue
|
2020-05-14 22:17:22 +02:00
|
|
|
}
|
2020-07-30 15:14:51 +02:00
|
|
|
slowInsertsCount++
|
2022-06-19 20:58:53 +02:00
|
|
|
date := uint64(r.Timestamp) / msecPerDay
|
2022-06-20 12:47:43 +02:00
|
|
|
if err := is.GetOrCreateTSIDByName(&r.TSID, pmr.MetricName, mr.MetricNameRaw, date); err != nil {
|
2022-06-19 20:47:35 +02:00
|
|
|
j--
|
|
|
|
if errors.Is(err, errSeriesCardinalityExceeded) {
|
|
|
|
continue
|
|
|
|
}
|
2020-05-14 22:45:04 +02:00
|
|
|
// Do not stop adding rows on error - just skip invalid row.
|
|
|
|
// This guarantees that invalid rows don't prevent
|
|
|
|
// from adding valid rows into the storage.
|
|
|
|
if firstWarn == nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
firstWarn = fmt.Errorf("cannot obtain or create TSID for MetricName %q: %w", pmr.MetricName, err)
|
2020-05-14 22:45:04 +02:00
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
genTSID.generation = idb.generation
|
|
|
|
genTSID.TSID = r.TSID
|
|
|
|
s.putTSIDToCache(&genTSID, mr.MetricNameRaw)
|
2022-06-19 20:47:35 +02:00
|
|
|
|
2022-01-21 11:37:57 +01:00
|
|
|
prevTSID = r.TSID
|
|
|
|
prevMetricNameRaw = mr.MetricNameRaw
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2020-05-14 22:45:04 +02:00
|
|
|
putPendingMetricRows(pmrs)
|
2020-07-30 15:14:51 +02:00
|
|
|
atomic.AddUint64(&s.slowRowInserts, slowInsertsCount)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2020-05-14 22:17:22 +02:00
|
|
|
if firstWarn != nil {
|
2022-06-27 11:31:16 +02:00
|
|
|
storageAddRowsLogger.Warnf("warn occurred during rows addition: %s", firstWarn)
|
2019-10-31 13:29:35 +01:00
|
|
|
}
|
2021-05-23 15:39:55 +02:00
|
|
|
dstMrs = dstMrs[:j]
|
|
|
|
rows = rows[:j]
|
2019-05-22 23:16:55 +02:00
|
|
|
|
2022-06-19 20:58:53 +02:00
|
|
|
err := s.updatePerDateData(rows, dstMrs)
|
|
|
|
if err != nil {
|
|
|
|
err = fmt.Errorf("cannot update per-date data: %w", err)
|
|
|
|
} else {
|
|
|
|
err = s.tb.AddRows(rows)
|
|
|
|
if err != nil {
|
|
|
|
err = fmt.Errorf("cannot add rows to table: %w", err)
|
|
|
|
}
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2022-06-19 20:58:53 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error occurred during rows addition: %w", err)
|
2019-10-20 22:38:51 +02:00
|
|
|
}
|
2021-05-24 14:24:04 +02:00
|
|
|
return nil
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2022-06-27 11:31:16 +02:00
|
|
|
var storageAddRowsLogger = logger.WithThrottler("storageAddRows", 5*time.Second)
|
|
|
|
|
2022-06-20 12:47:43 +02:00
|
|
|
func (s *Storage) registerSeriesCardinality(metricID uint64, metricNameRaw []byte) error {
|
2021-05-20 13:15:19 +02:00
|
|
|
if sl := s.hourlySeriesLimiter; sl != nil && !sl.Add(metricID) {
|
|
|
|
atomic.AddUint64(&s.hourlySeriesLimitRowsDropped, 1)
|
2022-06-20 12:47:43 +02:00
|
|
|
logSkippedSeries(metricNameRaw, "-storage.maxHourlySeries", sl.MaxItems())
|
|
|
|
return errSeriesCardinalityExceeded
|
2021-05-20 13:15:19 +02:00
|
|
|
}
|
|
|
|
if sl := s.dailySeriesLimiter; sl != nil && !sl.Add(metricID) {
|
|
|
|
atomic.AddUint64(&s.dailySeriesLimitRowsDropped, 1)
|
2022-06-20 12:47:43 +02:00
|
|
|
logSkippedSeries(metricNameRaw, "-storage.maxDailySeries", sl.MaxItems())
|
|
|
|
return errSeriesCardinalityExceeded
|
2021-05-20 13:15:19 +02:00
|
|
|
}
|
2022-06-20 12:47:43 +02:00
|
|
|
return nil
|
2021-05-20 13:15:19 +02:00
|
|
|
}
|
|
|
|
|
2022-06-20 12:47:43 +02:00
|
|
|
var errSeriesCardinalityExceeded = fmt.Errorf("cannot create series because series cardinality limit exceeded")
|
|
|
|
|
|
|
|
func logSkippedSeries(metricNameRaw []byte, flagName string, flagValue int) {
|
2021-05-20 13:15:19 +02:00
|
|
|
select {
|
|
|
|
case <-logSkippedSeriesTicker.C:
|
2021-12-21 16:03:25 +01:00
|
|
|
// Do not use logger.WithThrottler() here, since this will result in increased CPU load
|
|
|
|
// because of getUserReadableMetricName() calls per each logSkippedSeries call.
|
2022-06-20 12:47:43 +02:00
|
|
|
userReadableMetricName := getUserReadableMetricName(metricNameRaw)
|
|
|
|
logger.Warnf("skip series %s because %s=%d reached", userReadableMetricName, flagName, flagValue)
|
2021-05-20 13:15:19 +02:00
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var logSkippedSeriesTicker = time.NewTicker(5 * time.Second)
|
|
|
|
|
2020-11-25 13:41:02 +01:00
|
|
|
func getUserReadableMetricName(metricNameRaw []byte) string {
|
2021-05-23 15:39:55 +02:00
|
|
|
mn := GetMetricName()
|
|
|
|
defer PutMetricName(mn)
|
2021-05-08 16:55:44 +02:00
|
|
|
if err := mn.UnmarshalRaw(metricNameRaw); err != nil {
|
2020-11-25 13:41:02 +01:00
|
|
|
return fmt.Sprintf("cannot unmarshal metricNameRaw %q: %s", metricNameRaw, err)
|
|
|
|
}
|
|
|
|
return mn.String()
|
|
|
|
}
|
|
|
|
|
2020-05-14 22:45:04 +02:00
|
|
|
type pendingMetricRow struct {
|
|
|
|
MetricName []byte
|
2021-05-23 15:39:55 +02:00
|
|
|
mr *MetricRow
|
2020-05-14 22:45:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
type pendingMetricRows struct {
|
|
|
|
pmrs []pendingMetricRow
|
|
|
|
metricNamesBuf []byte
|
|
|
|
|
|
|
|
lastMetricNameRaw []byte
|
|
|
|
lastMetricName []byte
|
2021-03-31 22:12:56 +02:00
|
|
|
mn MetricName
|
2020-05-14 22:45:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (pmrs *pendingMetricRows) reset() {
|
|
|
|
for _, pmr := range pmrs.pmrs {
|
|
|
|
pmr.MetricName = nil
|
2021-05-23 15:39:55 +02:00
|
|
|
pmr.mr = nil
|
2020-05-14 22:45:04 +02:00
|
|
|
}
|
|
|
|
pmrs.pmrs = pmrs.pmrs[:0]
|
|
|
|
pmrs.metricNamesBuf = pmrs.metricNamesBuf[:0]
|
|
|
|
pmrs.lastMetricNameRaw = nil
|
|
|
|
pmrs.lastMetricName = nil
|
2021-03-31 22:12:56 +02:00
|
|
|
pmrs.mn.Reset()
|
2020-05-14 22:45:04 +02:00
|
|
|
}
|
|
|
|
|
2021-03-31 22:12:56 +02:00
|
|
|
func (pmrs *pendingMetricRows) addRow(mr *MetricRow) error {
|
2020-05-14 22:45:04 +02:00
|
|
|
// Do not spend CPU time on re-calculating canonical metricName during bulk import
|
|
|
|
// of many rows for the same metric.
|
|
|
|
if string(mr.MetricNameRaw) != string(pmrs.lastMetricNameRaw) {
|
2021-05-08 16:55:44 +02:00
|
|
|
if err := pmrs.mn.UnmarshalRaw(mr.MetricNameRaw); err != nil {
|
2021-03-31 22:12:56 +02:00
|
|
|
return fmt.Errorf("cannot unmarshal MetricNameRaw %q: %w", mr.MetricNameRaw, err)
|
|
|
|
}
|
|
|
|
pmrs.mn.sortTags()
|
2020-05-14 22:45:04 +02:00
|
|
|
metricNamesBufLen := len(pmrs.metricNamesBuf)
|
2021-03-31 22:12:56 +02:00
|
|
|
pmrs.metricNamesBuf = pmrs.mn.Marshal(pmrs.metricNamesBuf)
|
2020-05-14 22:45:04 +02:00
|
|
|
pmrs.lastMetricName = pmrs.metricNamesBuf[metricNamesBufLen:]
|
|
|
|
pmrs.lastMetricNameRaw = mr.MetricNameRaw
|
|
|
|
}
|
|
|
|
pmrs.pmrs = append(pmrs.pmrs, pendingMetricRow{
|
|
|
|
MetricName: pmrs.lastMetricName,
|
2021-05-23 15:39:55 +02:00
|
|
|
mr: mr,
|
2020-05-14 22:45:04 +02:00
|
|
|
})
|
2021-03-31 22:12:56 +02:00
|
|
|
return nil
|
2020-05-14 22:45:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func getPendingMetricRows() *pendingMetricRows {
|
|
|
|
v := pendingMetricRowsPool.Get()
|
|
|
|
if v == nil {
|
|
|
|
v = &pendingMetricRows{}
|
|
|
|
}
|
|
|
|
return v.(*pendingMetricRows)
|
|
|
|
}
|
|
|
|
|
|
|
|
func putPendingMetricRows(pmrs *pendingMetricRows) {
|
|
|
|
pmrs.reset()
|
|
|
|
pendingMetricRowsPool.Put(pmrs)
|
|
|
|
}
|
|
|
|
|
|
|
|
var pendingMetricRowsPool sync.Pool
|
|
|
|
|
2021-05-23 15:39:55 +02:00
|
|
|
func (s *Storage) updatePerDateData(rows []rawRow, mrs []*MetricRow) error {
|
2019-05-22 23:16:55 +02:00
|
|
|
var date uint64
|
2019-06-09 18:06:53 +02:00
|
|
|
var hour uint64
|
2019-05-22 23:16:55 +02:00
|
|
|
var prevTimestamp int64
|
2019-12-19 14:12:50 +01:00
|
|
|
var (
|
2021-03-09 08:18:19 +01:00
|
|
|
// These vars are used for speeding up bulk imports when multiple adjacent rows
|
2019-12-19 14:12:50 +01:00
|
|
|
// contain the same (metricID, date) pairs.
|
2020-05-14 22:45:04 +02:00
|
|
|
prevDate uint64
|
|
|
|
prevMetricID uint64
|
2019-12-19 14:12:50 +01:00
|
|
|
)
|
2019-11-08 12:16:40 +01:00
|
|
|
hm := s.currHourMetricIDs.Load().(*hourMetricIDs)
|
2021-02-04 17:46:20 +01:00
|
|
|
hmPrev := s.prevHourMetricIDs.Load().(*hourMetricIDs)
|
|
|
|
hmPrevDate := hmPrev.hour / 24
|
2020-05-12 00:06:17 +02:00
|
|
|
nextDayMetricIDs := &s.nextDayMetricIDs.Load().(*byDateMetricIDEntry).v
|
2022-02-12 15:28:46 +01:00
|
|
|
ts := fasttime.UnixTimestamp()
|
|
|
|
// Start pre-populating the next per-day inverted index during the last hour of the current day.
|
|
|
|
// pMin linearly increases from 0 to 1 during the last hour of the day.
|
|
|
|
pMin := (float64(ts%(3600*24)) / 3600) - 23
|
2020-05-14 22:45:04 +02:00
|
|
|
type pendingDateMetricID struct {
|
|
|
|
date uint64
|
|
|
|
metricID uint64
|
2021-05-23 15:39:55 +02:00
|
|
|
mr *MetricRow
|
2020-05-14 22:45:04 +02:00
|
|
|
}
|
|
|
|
var pendingDateMetricIDs []pendingDateMetricID
|
2021-02-08 11:00:44 +01:00
|
|
|
var pendingNextDayMetricIDs []uint64
|
|
|
|
var pendingHourEntries []uint64
|
2019-05-22 23:16:55 +02:00
|
|
|
for i := range rows {
|
|
|
|
r := &rows[i]
|
|
|
|
if r.Timestamp != prevTimestamp {
|
|
|
|
date = uint64(r.Timestamp) / msecPerDay
|
2019-06-09 18:06:53 +02:00
|
|
|
hour = uint64(r.Timestamp) / msecPerHour
|
2019-05-22 23:16:55 +02:00
|
|
|
prevTimestamp = r.Timestamp
|
|
|
|
}
|
|
|
|
metricID := r.TSID.MetricID
|
2021-02-09 01:51:40 +01:00
|
|
|
if metricID == prevMetricID && date == prevDate {
|
|
|
|
// Fast path for bulk import of multiple rows with the same (date, metricID) pairs.
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
prevDate = date
|
|
|
|
prevMetricID = metricID
|
2019-06-09 18:06:53 +02:00
|
|
|
if hour == hm.hour {
|
|
|
|
// The r belongs to the current hour. Check for the current hour cache.
|
2019-09-24 20:10:22 +02:00
|
|
|
if hm.m.Has(metricID) {
|
2019-06-09 18:06:53 +02:00
|
|
|
// Fast path: the metricID is in the current hour cache.
|
2019-11-09 22:17:42 +01:00
|
|
|
// This means the metricID has been already added to per-day inverted index.
|
2020-05-12 00:06:17 +02:00
|
|
|
|
2022-02-12 15:28:46 +01:00
|
|
|
// Gradually pre-populate per-day inverted index for the next day during the last hour of the current day.
|
2020-05-12 00:06:17 +02:00
|
|
|
// This should reduce CPU usage spike and slowdown at the beginning of the next day
|
|
|
|
// when entries for all the active time series must be added to the index.
|
|
|
|
// This should address https://github.com/VictoriaMetrics/VictoriaMetrics/issues/430 .
|
2022-02-12 15:28:46 +01:00
|
|
|
if pMin > 0 {
|
|
|
|
p := float64(uint32(fastHashUint64(metricID))) / (1 << 32)
|
|
|
|
if p < pMin && !nextDayMetricIDs.Has(metricID) {
|
|
|
|
pendingDateMetricIDs = append(pendingDateMetricIDs, pendingDateMetricID{
|
|
|
|
date: date + 1,
|
|
|
|
metricID: metricID,
|
|
|
|
mr: mrs[i],
|
|
|
|
})
|
|
|
|
pendingNextDayMetricIDs = append(pendingNextDayMetricIDs, metricID)
|
|
|
|
}
|
2020-05-12 00:06:17 +02:00
|
|
|
}
|
2019-06-02 17:34:08 +02:00
|
|
|
continue
|
|
|
|
}
|
2021-02-08 11:00:44 +01:00
|
|
|
pendingHourEntries = append(pendingHourEntries, metricID)
|
2021-02-04 17:46:20 +01:00
|
|
|
if date == hmPrevDate && hmPrev.m.Has(metricID) {
|
|
|
|
// The metricID is already registered for the current day on the previous hour.
|
|
|
|
continue
|
|
|
|
}
|
2019-06-02 17:34:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Slower path: check global cache for (date, metricID) entry.
|
2021-02-09 01:51:40 +01:00
|
|
|
if s.dateMetricIDCache.Has(date, metricID) {
|
2019-12-19 14:12:50 +01:00
|
|
|
continue
|
|
|
|
}
|
2021-02-09 01:51:40 +01:00
|
|
|
// Slow path: store the (date, metricID) entry in the indexDB.
|
|
|
|
pendingDateMetricIDs = append(pendingDateMetricIDs, pendingDateMetricID{
|
|
|
|
date: date,
|
|
|
|
metricID: metricID,
|
2021-05-23 15:39:55 +02:00
|
|
|
mr: mrs[i],
|
2021-02-09 01:51:40 +01:00
|
|
|
})
|
2020-05-14 22:45:04 +02:00
|
|
|
}
|
2021-02-08 11:00:44 +01:00
|
|
|
if len(pendingNextDayMetricIDs) > 0 {
|
|
|
|
s.pendingNextDayMetricIDsLock.Lock()
|
|
|
|
s.pendingNextDayMetricIDs.AddMulti(pendingNextDayMetricIDs)
|
|
|
|
s.pendingNextDayMetricIDsLock.Unlock()
|
|
|
|
}
|
|
|
|
if len(pendingHourEntries) > 0 {
|
|
|
|
s.pendingHourEntriesLock.Lock()
|
2022-11-07 13:04:06 +01:00
|
|
|
s.pendingHourEntries.AddMulti(pendingHourEntries)
|
2021-02-08 11:00:44 +01:00
|
|
|
s.pendingHourEntriesLock.Unlock()
|
|
|
|
}
|
2020-05-14 22:45:04 +02:00
|
|
|
if len(pendingDateMetricIDs) == 0 {
|
|
|
|
// Fast path - there are no new (date, metricID) entires in rows.
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Slow path - add new (date, metricID) entries to indexDB.
|
|
|
|
|
2020-05-15 12:44:23 +02:00
|
|
|
atomic.AddUint64(&s.slowPerDayIndexInserts, uint64(len(pendingDateMetricIDs)))
|
2020-05-14 22:45:04 +02:00
|
|
|
// Sort pendingDateMetricIDs by (date, metricID) in order to speed up `is` search in the loop below.
|
|
|
|
sort.Slice(pendingDateMetricIDs, func(i, j int) bool {
|
|
|
|
a := pendingDateMetricIDs[i]
|
|
|
|
b := pendingDateMetricIDs[j]
|
|
|
|
if a.date != b.date {
|
|
|
|
return a.date < b.date
|
|
|
|
}
|
|
|
|
return a.metricID < b.metricID
|
|
|
|
})
|
|
|
|
idb := s.idb()
|
2020-07-23 19:42:57 +02:00
|
|
|
is := idb.getIndexSearch(noDeadline)
|
2020-05-14 22:45:04 +02:00
|
|
|
defer idb.putIndexSearch(is)
|
|
|
|
var firstError error
|
2021-02-09 22:59:14 +01:00
|
|
|
dateMetricIDsForCache := make([]dateMetricID, 0, len(pendingDateMetricIDs))
|
2021-05-23 15:39:55 +02:00
|
|
|
mn := GetMetricName()
|
2021-02-09 22:59:14 +01:00
|
|
|
for _, dmid := range pendingDateMetricIDs {
|
|
|
|
date := dmid.date
|
|
|
|
metricID := dmid.metricID
|
2020-05-14 22:45:04 +02:00
|
|
|
ok, err := is.hasDateMetricID(date, metricID)
|
|
|
|
if err != nil {
|
2020-05-14 22:17:22 +02:00
|
|
|
if firstError == nil {
|
2022-06-30 17:17:07 +02:00
|
|
|
firstError = fmt.Errorf("error when locating (date=%s, metricID=%d) in database: %w", dateToString(date), metricID, err)
|
2020-05-14 22:17:22 +02:00
|
|
|
}
|
2019-05-22 23:16:55 +02:00
|
|
|
continue
|
|
|
|
}
|
2020-05-14 22:45:04 +02:00
|
|
|
if !ok {
|
2022-06-19 20:58:53 +02:00
|
|
|
// The (date, metricID) entry is missing in the indexDB. Add it there together with per-day indexes.
|
2021-02-09 01:51:40 +01:00
|
|
|
// It is OK if the (date, metricID) entry is added multiple times to db
|
|
|
|
// by concurrent goroutines.
|
2021-05-23 15:39:55 +02:00
|
|
|
if err := mn.UnmarshalRaw(dmid.mr.MetricNameRaw); err != nil {
|
|
|
|
if firstError == nil {
|
|
|
|
firstError = fmt.Errorf("cannot unmarshal MetricNameRaw %q: %w", dmid.mr.MetricNameRaw, err)
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
mn.sortTags()
|
2022-12-04 08:30:31 +01:00
|
|
|
is.createPerDayIndexes(date, metricID, mn)
|
2020-05-14 22:45:04 +02:00
|
|
|
}
|
2021-02-09 22:59:14 +01:00
|
|
|
dateMetricIDsForCache = append(dateMetricIDsForCache, dateMetricID{
|
|
|
|
date: date,
|
|
|
|
metricID: metricID,
|
|
|
|
})
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2021-05-23 15:39:55 +02:00
|
|
|
PutMetricName(mn)
|
2021-02-09 22:59:14 +01:00
|
|
|
// The (date, metricID) entries must be added to cache only after they have been successfully added to indexDB.
|
|
|
|
s.dateMetricIDCache.Store(dateMetricIDsForCache)
|
2020-05-14 22:17:22 +02:00
|
|
|
return firstError
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
2022-02-12 15:28:46 +01:00
|
|
|
func fastHashUint64(x uint64) uint64 {
|
|
|
|
x ^= x >> 12 // a
|
|
|
|
x ^= x << 25 // b
|
|
|
|
x ^= x >> 27 // c
|
|
|
|
return x * 2685821657736338717
|
|
|
|
}
|
|
|
|
|
2019-11-09 22:05:14 +01:00
|
|
|
// dateMetricIDCache is fast cache for holding (date, metricID) entries.
|
|
|
|
//
|
|
|
|
// It should be faster than map[date]*uint64set.Set on multicore systems.
|
|
|
|
type dateMetricIDCache struct {
|
2019-11-11 12:21:05 +01:00
|
|
|
// 64-bit counters must be at the top of the structure to be properly aligned on 32-bit arches.
|
|
|
|
syncsCount uint64
|
|
|
|
resetsCount uint64
|
|
|
|
|
2019-11-09 22:05:14 +01:00
|
|
|
// Contains immutable map
|
|
|
|
byDate atomic.Value
|
|
|
|
|
|
|
|
// Contains mutable map protected by mu
|
2021-06-03 15:19:58 +02:00
|
|
|
byDateMutable *byDateMetricIDMap
|
|
|
|
nextSyncDeadline uint64
|
|
|
|
mu sync.Mutex
|
2019-11-09 22:05:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func newDateMetricIDCache() *dateMetricIDCache {
|
|
|
|
var dmc dateMetricIDCache
|
2021-06-03 15:19:58 +02:00
|
|
|
dmc.resetLocked()
|
2019-11-09 22:05:14 +01:00
|
|
|
return &dmc
|
|
|
|
}
|
|
|
|
|
|
|
|
func (dmc *dateMetricIDCache) Reset() {
|
|
|
|
dmc.mu.Lock()
|
2021-06-03 15:19:58 +02:00
|
|
|
dmc.resetLocked()
|
|
|
|
dmc.mu.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (dmc *dateMetricIDCache) resetLocked() {
|
2019-11-11 12:21:05 +01:00
|
|
|
// Do not reset syncsCount and resetsCount
|
2019-11-09 22:05:14 +01:00
|
|
|
dmc.byDate.Store(newByDateMetricIDMap())
|
|
|
|
dmc.byDateMutable = newByDateMetricIDMap()
|
2021-06-03 15:19:58 +02:00
|
|
|
dmc.nextSyncDeadline = 10 + fasttime.UnixTimestamp()
|
2019-11-11 12:21:05 +01:00
|
|
|
|
|
|
|
atomic.AddUint64(&dmc.resetsCount, 1)
|
2019-11-09 22:05:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (dmc *dateMetricIDCache) EntriesCount() int {
|
|
|
|
byDate := dmc.byDate.Load().(*byDateMetricIDMap)
|
|
|
|
n := 0
|
|
|
|
for _, e := range byDate.m {
|
|
|
|
n += e.v.Len()
|
|
|
|
}
|
|
|
|
return n
|
|
|
|
}
|
|
|
|
|
2019-11-13 16:58:05 +01:00
|
|
|
func (dmc *dateMetricIDCache) SizeBytes() uint64 {
|
|
|
|
byDate := dmc.byDate.Load().(*byDateMetricIDMap)
|
|
|
|
n := uint64(0)
|
|
|
|
for _, e := range byDate.m {
|
|
|
|
n += e.v.SizeBytes()
|
|
|
|
}
|
|
|
|
return n
|
|
|
|
}
|
|
|
|
|
2019-11-09 22:05:14 +01:00
|
|
|
func (dmc *dateMetricIDCache) Has(date, metricID uint64) bool {
|
|
|
|
byDate := dmc.byDate.Load().(*byDateMetricIDMap)
|
|
|
|
v := byDate.get(date)
|
|
|
|
if v.Has(metricID) {
|
|
|
|
// Fast path.
|
|
|
|
// The majority of calls must go here.
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Slow path. Check mutable map.
|
2019-11-10 21:03:46 +01:00
|
|
|
dmc.mu.Lock()
|
2019-11-09 22:05:14 +01:00
|
|
|
v = dmc.byDateMutable.get(date)
|
|
|
|
ok := v.Has(metricID)
|
2021-06-03 15:19:58 +02:00
|
|
|
dmc.syncLockedIfNeeded()
|
2019-11-10 21:03:46 +01:00
|
|
|
dmc.mu.Unlock()
|
2019-11-09 22:05:14 +01:00
|
|
|
|
|
|
|
return ok
|
|
|
|
}
|
|
|
|
|
2021-02-09 22:59:14 +01:00
|
|
|
type dateMetricID struct {
|
|
|
|
date uint64
|
|
|
|
metricID uint64
|
|
|
|
}
|
|
|
|
|
|
|
|
func (dmc *dateMetricIDCache) Store(dmids []dateMetricID) {
|
|
|
|
var prevDate uint64
|
|
|
|
metricIDs := make([]uint64, 0, len(dmids))
|
|
|
|
dmc.mu.Lock()
|
|
|
|
for _, dmid := range dmids {
|
|
|
|
if prevDate == dmid.date {
|
|
|
|
metricIDs = append(metricIDs, dmid.metricID)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if len(metricIDs) > 0 {
|
|
|
|
v := dmc.byDateMutable.getOrCreate(prevDate)
|
|
|
|
v.AddMulti(metricIDs)
|
|
|
|
}
|
|
|
|
metricIDs = append(metricIDs[:0], dmid.metricID)
|
|
|
|
prevDate = dmid.date
|
|
|
|
}
|
|
|
|
if len(metricIDs) > 0 {
|
|
|
|
v := dmc.byDateMutable.getOrCreate(prevDate)
|
|
|
|
v.AddMulti(metricIDs)
|
|
|
|
}
|
|
|
|
dmc.mu.Unlock()
|
|
|
|
}
|
|
|
|
|
2019-11-09 22:05:14 +01:00
|
|
|
func (dmc *dateMetricIDCache) Set(date, metricID uint64) {
|
|
|
|
dmc.mu.Lock()
|
|
|
|
v := dmc.byDateMutable.getOrCreate(date)
|
|
|
|
v.Add(metricID)
|
|
|
|
dmc.mu.Unlock()
|
|
|
|
}
|
|
|
|
|
2021-06-03 15:19:58 +02:00
|
|
|
func (dmc *dateMetricIDCache) syncLockedIfNeeded() {
|
|
|
|
currentTime := fasttime.UnixTimestamp()
|
|
|
|
if currentTime >= dmc.nextSyncDeadline {
|
|
|
|
dmc.nextSyncDeadline = currentTime + 10
|
|
|
|
dmc.syncLocked()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (dmc *dateMetricIDCache) syncLocked() {
|
|
|
|
if len(dmc.byDateMutable.m) == 0 {
|
|
|
|
// Nothing to sync.
|
|
|
|
return
|
|
|
|
}
|
2019-11-09 22:05:14 +01:00
|
|
|
byDate := dmc.byDate.Load().(*byDateMetricIDMap)
|
2021-06-03 15:19:58 +02:00
|
|
|
byDateMutable := dmc.byDateMutable
|
|
|
|
for date, e := range byDateMutable.m {
|
2019-11-09 22:05:14 +01:00
|
|
|
v := byDate.get(date)
|
2021-06-03 15:19:58 +02:00
|
|
|
if v == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
v = v.Clone()
|
|
|
|
v.Union(&e.v)
|
|
|
|
byDateMutable.m[date] = &byDateMetricIDEntry{
|
|
|
|
date: date,
|
|
|
|
v: *v,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for date, e := range byDate.m {
|
|
|
|
v := byDateMutable.get(date)
|
|
|
|
if v != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
byDateMutable.m[date] = e
|
2019-11-09 22:05:14 +01:00
|
|
|
}
|
|
|
|
dmc.byDate.Store(dmc.byDateMutable)
|
2019-11-11 12:21:05 +01:00
|
|
|
dmc.byDateMutable = newByDateMetricIDMap()
|
2019-11-09 22:05:14 +01:00
|
|
|
|
2019-11-11 12:21:05 +01:00
|
|
|
atomic.AddUint64(&dmc.syncsCount, 1)
|
|
|
|
|
2021-07-12 13:25:14 +02:00
|
|
|
if dmc.SizeBytes() > uint64(memory.Allowed())/256 {
|
2021-06-03 15:19:58 +02:00
|
|
|
dmc.resetLocked()
|
2019-11-09 22:05:14 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type byDateMetricIDMap struct {
|
|
|
|
hotEntry atomic.Value
|
|
|
|
m map[uint64]*byDateMetricIDEntry
|
|
|
|
}
|
|
|
|
|
|
|
|
func newByDateMetricIDMap() *byDateMetricIDMap {
|
|
|
|
dmm := &byDateMetricIDMap{
|
|
|
|
m: make(map[uint64]*byDateMetricIDEntry),
|
|
|
|
}
|
|
|
|
dmm.hotEntry.Store(&byDateMetricIDEntry{})
|
|
|
|
return dmm
|
|
|
|
}
|
|
|
|
|
|
|
|
func (dmm *byDateMetricIDMap) get(date uint64) *uint64set.Set {
|
|
|
|
hotEntry := dmm.hotEntry.Load().(*byDateMetricIDEntry)
|
|
|
|
if hotEntry.date == date {
|
|
|
|
// Fast path
|
|
|
|
return &hotEntry.v
|
|
|
|
}
|
|
|
|
// Slow path
|
|
|
|
e := dmm.m[date]
|
|
|
|
if e == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
dmm.hotEntry.Store(e)
|
|
|
|
return &e.v
|
|
|
|
}
|
|
|
|
|
|
|
|
func (dmm *byDateMetricIDMap) getOrCreate(date uint64) *uint64set.Set {
|
|
|
|
v := dmm.get(date)
|
|
|
|
if v != nil {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
e := &byDateMetricIDEntry{
|
|
|
|
date: date,
|
|
|
|
}
|
|
|
|
dmm.m[date] = e
|
|
|
|
return &e.v
|
|
|
|
}
|
|
|
|
|
|
|
|
type byDateMetricIDEntry struct {
|
|
|
|
date uint64
|
|
|
|
v uint64set.Set
|
|
|
|
}
|
|
|
|
|
2022-11-07 13:04:06 +01:00
|
|
|
func (s *Storage) updateNextDayMetricIDs(date uint64) {
|
2020-05-12 00:06:17 +02:00
|
|
|
e := s.nextDayMetricIDs.Load().(*byDateMetricIDEntry)
|
|
|
|
s.pendingNextDayMetricIDsLock.Lock()
|
|
|
|
pendingMetricIDs := s.pendingNextDayMetricIDs
|
|
|
|
s.pendingNextDayMetricIDs = &uint64set.Set{}
|
|
|
|
s.pendingNextDayMetricIDsLock.Unlock()
|
|
|
|
if pendingMetricIDs.Len() == 0 && e.date == date {
|
|
|
|
// Fast path: nothing to update.
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Slow path: union pendingMetricIDs with e.v
|
|
|
|
if e.date == date {
|
|
|
|
pendingMetricIDs.Union(&e.v)
|
2022-11-07 13:04:06 +01:00
|
|
|
} else {
|
2022-12-03 02:07:13 +01:00
|
|
|
// Do not add pendingMetricIDs from the previous day to the current day,
|
2022-11-07 13:04:06 +01:00
|
|
|
// since this may result in missing registration of the metricIDs in the per-day inverted index.
|
|
|
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/3309
|
|
|
|
pendingMetricIDs = &uint64set.Set{}
|
2020-05-12 00:06:17 +02:00
|
|
|
}
|
|
|
|
eNew := &byDateMetricIDEntry{
|
|
|
|
date: date,
|
|
|
|
v: *pendingMetricIDs,
|
|
|
|
}
|
|
|
|
s.nextDayMetricIDs.Store(eNew)
|
|
|
|
}
|
|
|
|
|
2022-11-07 12:55:37 +01:00
|
|
|
func (s *Storage) updateCurrHourMetricIDs(hour uint64) {
|
2019-06-09 18:06:53 +02:00
|
|
|
hm := s.currHourMetricIDs.Load().(*hourMetricIDs)
|
2019-11-08 18:37:16 +01:00
|
|
|
s.pendingHourEntriesLock.Lock()
|
|
|
|
newMetricIDs := s.pendingHourEntries
|
2022-11-07 13:04:06 +01:00
|
|
|
s.pendingHourEntries = &uint64set.Set{}
|
2019-11-08 18:37:16 +01:00
|
|
|
s.pendingHourEntriesLock.Unlock()
|
2022-06-19 19:48:42 +02:00
|
|
|
|
2022-11-07 13:04:06 +01:00
|
|
|
if newMetricIDs.Len() == 0 && hm.hour == hour {
|
2019-06-09 18:06:53 +02:00
|
|
|
// Fast path: nothing to update.
|
2019-06-02 17:34:08 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-11-08 18:37:16 +01:00
|
|
|
// Slow path: hm.m must be updated with non-empty s.pendingHourEntries.
|
2019-09-24 20:10:22 +02:00
|
|
|
var m *uint64set.Set
|
2019-06-09 18:06:53 +02:00
|
|
|
if hm.hour == hour {
|
2019-09-24 20:10:22 +02:00
|
|
|
m = hm.m.Clone()
|
2022-11-07 13:04:06 +01:00
|
|
|
m.Union(newMetricIDs)
|
2022-12-03 02:07:13 +01:00
|
|
|
} else {
|
|
|
|
m = newMetricIDs
|
|
|
|
if hour%24 == 0 {
|
|
|
|
// Do not add pending metricIDs from the previous hour to the current hour on the next day,
|
|
|
|
// since this may result in missing registration of the metricIDs in the per-day inverted index.
|
|
|
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/3309
|
|
|
|
m = &uint64set.Set{}
|
|
|
|
}
|
2022-11-07 13:04:06 +01:00
|
|
|
}
|
2019-06-09 18:06:53 +02:00
|
|
|
hmNew := &hourMetricIDs{
|
2022-11-07 12:06:50 +01:00
|
|
|
m: m,
|
|
|
|
hour: hour,
|
2019-06-09 18:06:53 +02:00
|
|
|
}
|
|
|
|
s.currHourMetricIDs.Store(hmNew)
|
|
|
|
if hm.hour != hour {
|
|
|
|
s.prevHourMetricIDs.Store(hm)
|
2019-06-02 17:34:08 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-09 18:06:53 +02:00
|
|
|
type hourMetricIDs struct {
|
2022-11-07 12:06:50 +01:00
|
|
|
m *uint64set.Set
|
|
|
|
hour uint64
|
2019-06-02 17:34:08 +02:00
|
|
|
}
|
|
|
|
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
type generationTSID struct {
|
|
|
|
TSID TSID
|
|
|
|
|
|
|
|
// generation stores the indexdb.generation value to identify to which indexdb belongs this TSID
|
|
|
|
generation uint64
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Storage) getTSIDFromCache(dst *generationTSID, metricName []byte) bool {
|
2019-05-22 23:16:55 +02:00
|
|
|
buf := (*[unsafe.Sizeof(*dst)]byte)(unsafe.Pointer(dst))[:]
|
|
|
|
buf = s.tsidCache.Get(buf[:0], metricName)
|
|
|
|
return uintptr(len(buf)) == unsafe.Sizeof(*dst)
|
|
|
|
}
|
|
|
|
|
lib/index: reduce read/write load after indexDB rotation (#2177)
* lib/index: reduce read/write load after indexDB rotation
IndexDB in VM is responsible for storing TSID - ID's used for identifying
time series. The index is stored on disk and used by both ingestion and read path.
IndexDB is stored separately to data parts and is global for all stored data.
It can't be deleted partially as VM deletes data parts. Instead, indexDB is
rotated once in `retention` interval.
The rotation procedure means that `current` indexDB becomes `previous`,
and new freshly created indexDB struct becomes `current`. So in any time,
VM holds indexDB for current and previous retention periods.
When time series is ingested or queried, VM checks if its TSID is present
in `current` indexDB. If it is missing, it checks the `previous` indexDB.
If TSID was found, it gets copied to the `current` indexDB. In this way
`current` indexDB stores only series which were active during the retention
period.
To improve indexDB lookups, VM uses a cache layer called `tsidCache`. Both
write and read path consult `tsidCache` and on miss the relad lookup happens.
When rotation happens, VM resets the `tsidCache`. This is needed for ingestion
path to trigger `current` indexDB re-population. Since index re-population
requires additional resources, every index rotation event may cause some extra
load on CPU and disk. While it may be unnoticeable for most of the cases,
for systems with very high number of unique series each rotation may lead
to performance degradation for some period of time.
This PR makes an attempt to smooth out resource usage after the rotation.
The changes are following:
1. `tsidCache` is no longer reset after the rotation;
2. Instead, each entry in `tsidCache` gains a notion of indexDB to which
they belong;
3. On ingestion path after the rotation we check if requested TSID was
found in `tsidCache`. Then we have 3 branches:
3.1 Fast path. It was found, and belongs to the `current` indexDB. Return TSID.
3.2 Slow path. It wasn't found, so we generate it from scratch,
add to `current` indexDB, add it to `tsidCache`.
3.3 Smooth path. It was found but does not belong to the `current` indexDB.
In this case, we add it to the `current` indexDB with some probability.
The probability is based on time passed since the last rotation with some threshold.
The more time has passed since rotation the higher is chance to re-populate `current` indexDB.
The default re-population interval in this PR is set to `1h`, during which entries from
`previous` index supposed to slowly re-populate `current` index.
The new metric `vm_timeseries_repopulated_total` was added to identify how many TSIDs
were moved from `previous` indexDB to the `current` indexDB. This metric supposed to
grow only during the first `1h` after the last rotation.
https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1401
Signed-off-by: hagen1778 <roman@victoriametrics.com>
* wip
* wip
Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
2022-02-11 23:30:08 +01:00
|
|
|
func (s *Storage) putTSIDToCache(tsid *generationTSID, metricName []byte) {
|
2019-05-22 23:16:55 +02:00
|
|
|
buf := (*[unsafe.Sizeof(*tsid)]byte)(unsafe.Pointer(tsid))[:]
|
|
|
|
s.tsidCache.Set(metricName, buf)
|
|
|
|
}
|
|
|
|
|
2021-06-11 11:42:26 +02:00
|
|
|
func (s *Storage) openIndexDBTables(path string) (curr, prev *indexDB, err error) {
|
2019-05-22 23:16:55 +02:00
|
|
|
if err := fs.MkdirAllIfNotExist(path); err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return nil, nil, fmt.Errorf("cannot create directory %q: %w", path, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
2022-09-13 12:10:33 +02:00
|
|
|
fs.MustRemoveTemporaryDirs(path)
|
2019-05-22 23:16:55 +02:00
|
|
|
|
|
|
|
d, err := os.Open(path)
|
|
|
|
if err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return nil, nil, fmt.Errorf("cannot open directory: %w", err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
defer fs.MustClose(d)
|
|
|
|
|
|
|
|
// Search for the two most recent tables - the last one is active,
|
|
|
|
// the previous one contains backup data.
|
|
|
|
fis, err := d.Readdir(-1)
|
|
|
|
if err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return nil, nil, fmt.Errorf("cannot read directory: %w", err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
var tableNames []string
|
|
|
|
for _, fi := range fis {
|
|
|
|
if !fs.IsDirOrSymlink(fi) {
|
|
|
|
// Skip non-directories.
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
tableName := fi.Name()
|
|
|
|
if !indexDBTableNameRegexp.MatchString(tableName) {
|
|
|
|
// Skip invalid directories.
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
tableNames = append(tableNames, tableName)
|
|
|
|
}
|
|
|
|
sort.Slice(tableNames, func(i, j int) bool {
|
|
|
|
return tableNames[i] < tableNames[j]
|
|
|
|
})
|
|
|
|
if len(tableNames) < 2 {
|
|
|
|
// Create missing tables
|
|
|
|
if len(tableNames) == 0 {
|
|
|
|
prevName := nextIndexDBTableName()
|
|
|
|
tableNames = append(tableNames, prevName)
|
|
|
|
}
|
|
|
|
currName := nextIndexDBTableName()
|
|
|
|
tableNames = append(tableNames, currName)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Invariant: len(tableNames) >= 2
|
|
|
|
|
|
|
|
// Remove all the tables except two last tables.
|
|
|
|
for _, tn := range tableNames[:len(tableNames)-2] {
|
|
|
|
pathToRemove := path + "/" + tn
|
|
|
|
logger.Infof("removing obsolete indexdb dir %q...", pathToRemove)
|
2022-09-13 12:10:33 +02:00
|
|
|
fs.MustRemoveDirAtomic(pathToRemove)
|
2019-05-22 23:16:55 +02:00
|
|
|
logger.Infof("removed obsolete indexdb dir %q", pathToRemove)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Persist changes on the file system.
|
2019-06-11 22:13:04 +02:00
|
|
|
fs.MustSyncPath(path)
|
2019-05-22 23:16:55 +02:00
|
|
|
|
|
|
|
// Open the last two tables.
|
|
|
|
currPath := path + "/" + tableNames[len(tableNames)-1]
|
|
|
|
|
2022-06-01 13:21:12 +02:00
|
|
|
curr, err = openIndexDB(currPath, s, 0, &s.isReadOnly)
|
2019-05-22 23:16:55 +02:00
|
|
|
if err != nil {
|
2020-06-30 21:58:18 +02:00
|
|
|
return nil, nil, fmt.Errorf("cannot open curr indexdb table at %q: %w", currPath, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
prevPath := path + "/" + tableNames[len(tableNames)-2]
|
2022-06-01 13:21:12 +02:00
|
|
|
prev, err = openIndexDB(prevPath, s, 0, &s.isReadOnly)
|
2019-05-22 23:16:55 +02:00
|
|
|
if err != nil {
|
|
|
|
curr.MustClose()
|
2020-06-30 21:58:18 +02:00
|
|
|
return nil, nil, fmt.Errorf("cannot open prev indexdb table at %q: %w", prevPath, err)
|
2019-05-22 23:16:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return curr, prev, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var indexDBTableNameRegexp = regexp.MustCompile("^[0-9A-F]{16}$")
|
|
|
|
|
|
|
|
func nextIndexDBTableName() string {
|
|
|
|
n := atomic.AddUint64(&indexDBTableIdx, 1)
|
|
|
|
return fmt.Sprintf("%016X", n)
|
|
|
|
}
|
|
|
|
|
|
|
|
var indexDBTableIdx = uint64(time.Now().UnixNano())
|