1414 lines
38 KiB
Go
1414 lines
38 KiB
Go
package tsm1
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"math"
|
|
"os"
|
|
"path/filepath"
|
|
"runtime"
|
|
"sort"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"sync/atomic"
|
|
"time"
|
|
|
|
"github.com/influxdata/influxdb/pkg/metrics"
|
|
"github.com/influxdata/influxdb/query"
|
|
"github.com/influxdata/platform/models"
|
|
"github.com/influxdata/platform/pkg/file"
|
|
"github.com/influxdata/platform/pkg/limiter"
|
|
"github.com/influxdata/platform/tsdb"
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
const (
|
|
// The extension used to describe temporary snapshot files.
|
|
TmpTSMFileExtension = "tmp"
|
|
|
|
// The extension used to describe corrupt snapshot files.
|
|
BadTSMFileExtension = "bad"
|
|
)
|
|
|
|
// TSMFile represents an on-disk TSM file.
|
|
type TSMFile interface {
|
|
// Path returns the underlying file path for the TSMFile. If the file
|
|
// has not be written or loaded from disk, the zero value is returned.
|
|
Path() string
|
|
|
|
// Read returns all the values in the block where time t resides.
|
|
Read(key []byte, t int64) ([]Value, error)
|
|
|
|
// ReadAt returns all the values in the block identified by entry.
|
|
ReadAt(entry *IndexEntry, values []Value) ([]Value, error)
|
|
ReadFloatBlockAt(entry *IndexEntry, values *[]FloatValue) ([]FloatValue, error)
|
|
ReadFloatArrayBlockAt(entry *IndexEntry, values *tsdb.FloatArray) error
|
|
ReadIntegerBlockAt(entry *IndexEntry, values *[]IntegerValue) ([]IntegerValue, error)
|
|
ReadIntegerArrayBlockAt(entry *IndexEntry, values *tsdb.IntegerArray) error
|
|
ReadUnsignedBlockAt(entry *IndexEntry, values *[]UnsignedValue) ([]UnsignedValue, error)
|
|
ReadUnsignedArrayBlockAt(entry *IndexEntry, values *tsdb.UnsignedArray) error
|
|
ReadStringBlockAt(entry *IndexEntry, values *[]StringValue) ([]StringValue, error)
|
|
ReadStringArrayBlockAt(entry *IndexEntry, values *tsdb.StringArray) error
|
|
ReadBooleanBlockAt(entry *IndexEntry, values *[]BooleanValue) ([]BooleanValue, error)
|
|
ReadBooleanArrayBlockAt(entry *IndexEntry, values *tsdb.BooleanArray) error
|
|
|
|
// Entries returns the index entries for all blocks for the given key.
|
|
Entries(key []byte) []IndexEntry
|
|
ReadEntries(key []byte, entries *[]IndexEntry) []IndexEntry
|
|
|
|
// Returns true if the TSMFile may contain a value with the specified
|
|
// key and time.
|
|
ContainsValue(key []byte, t int64) bool
|
|
|
|
// Contains returns true if the file contains any values for the given
|
|
// key.
|
|
Contains(key []byte) bool
|
|
|
|
// OverlapsTimeRange returns true if the time range of the file intersect min and max.
|
|
OverlapsTimeRange(min, max int64) bool
|
|
|
|
// OverlapsKeyRange returns true if the key range of the file intersects min and max.
|
|
OverlapsKeyRange(min, max []byte) bool
|
|
|
|
// TimeRange returns the min and max time across all keys in the file.
|
|
TimeRange() (int64, int64)
|
|
|
|
// TombstoneRange returns ranges of time that are deleted for the given key.
|
|
TombstoneRange(key []byte) []TimeRange
|
|
|
|
// KeyRange returns the min and max keys in the file.
|
|
KeyRange() ([]byte, []byte)
|
|
|
|
// KeyCount returns the number of distinct keys in the file.
|
|
KeyCount() int
|
|
|
|
// Seek returns the position in the index with the key <= key.
|
|
Seek(key []byte) int
|
|
|
|
// KeyAt returns the key located at index position idx.
|
|
KeyAt(idx int) ([]byte, byte)
|
|
|
|
// Type returns the block type of the values stored for the key. Returns one of
|
|
// BlockFloat64, BlockInt64, BlockBoolean, BlockString. If key does not exist,
|
|
// an error is returned.
|
|
Type(key []byte) (byte, error)
|
|
|
|
// BatchDelete return a BatchDeleter that allows for multiple deletes in batches
|
|
// and group commit or rollback.
|
|
BatchDelete() BatchDeleter
|
|
|
|
// Delete removes the keys from the set of keys available in this file.
|
|
Delete(keys [][]byte) error
|
|
|
|
// DeleteRange removes the values for keys between timestamps min and max.
|
|
DeleteRange(keys [][]byte, min, max int64) error
|
|
|
|
// HasTombstones returns true if file contains values that have been deleted.
|
|
HasTombstones() bool
|
|
|
|
// TombstoneFiles returns the tombstone filestats if there are any tombstones
|
|
// written for this file.
|
|
TombstoneFiles() []FileStat
|
|
|
|
// Close closes the underlying file resources.
|
|
Close() error
|
|
|
|
// Size returns the size of the file on disk in bytes.
|
|
Size() uint32
|
|
|
|
// Rename renames the existing TSM file to a new name and replaces the mmap backing slice using the new
|
|
// file name. Index and Reader state are not re-initialized.
|
|
Rename(path string) error
|
|
|
|
// Remove deletes the file from the filesystem.
|
|
Remove() error
|
|
|
|
// InUse returns true if the file is currently in use by queries.
|
|
InUse() bool
|
|
|
|
// Ref records that this file is actively in use.
|
|
Ref()
|
|
|
|
// Unref records that this file is no longer in use.
|
|
Unref()
|
|
|
|
// Stats returns summary information about the TSM file.
|
|
Stats() FileStat
|
|
|
|
// BlockIterator returns an iterator pointing to the first block in the file and
|
|
// allows sequential iteration to each and every block.
|
|
BlockIterator() *BlockIterator
|
|
|
|
// Free releases any resources held by the FileStore to free up system resources.
|
|
Free() error
|
|
|
|
// Stats returns the statistics for the file.
|
|
MeasurementStats() (MeasurementStats, error)
|
|
}
|
|
|
|
// Statistics gathered by the FileStore.
|
|
const (
|
|
statFileStoreBytes = "diskBytes"
|
|
statFileStoreCount = "numFiles"
|
|
)
|
|
|
|
var (
|
|
floatBlocksDecodedCounter = metrics.MustRegisterCounter("float_blocks_decoded", metrics.WithGroup(tsmGroup))
|
|
floatBlocksSizeCounter = metrics.MustRegisterCounter("float_blocks_size_bytes", metrics.WithGroup(tsmGroup))
|
|
integerBlocksDecodedCounter = metrics.MustRegisterCounter("integer_blocks_decoded", metrics.WithGroup(tsmGroup))
|
|
integerBlocksSizeCounter = metrics.MustRegisterCounter("integer_blocks_size_bytes", metrics.WithGroup(tsmGroup))
|
|
unsignedBlocksDecodedCounter = metrics.MustRegisterCounter("unsigned_blocks_decoded", metrics.WithGroup(tsmGroup))
|
|
unsignedBlocksSizeCounter = metrics.MustRegisterCounter("unsigned_blocks_size_bytes", metrics.WithGroup(tsmGroup))
|
|
stringBlocksDecodedCounter = metrics.MustRegisterCounter("string_blocks_decoded", metrics.WithGroup(tsmGroup))
|
|
stringBlocksSizeCounter = metrics.MustRegisterCounter("string_blocks_size_bytes", metrics.WithGroup(tsmGroup))
|
|
booleanBlocksDecodedCounter = metrics.MustRegisterCounter("boolean_blocks_decoded", metrics.WithGroup(tsmGroup))
|
|
booleanBlocksSizeCounter = metrics.MustRegisterCounter("boolean_blocks_size_bytes", metrics.WithGroup(tsmGroup))
|
|
)
|
|
|
|
// FileStore is an abstraction around multiple TSM files.
|
|
type FileStore struct {
|
|
mu sync.RWMutex
|
|
lastModified time.Time
|
|
// Most recently known file stats. If nil then stats will need to be
|
|
// recalculated
|
|
lastFileStats []FileStat
|
|
|
|
currentGeneration int
|
|
dir string
|
|
|
|
files []TSMFile
|
|
tsmMMAPWillNeed bool // If true then the kernel will be advised MMAP_WILLNEED for TSM files.
|
|
openLimiter limiter.Fixed // limit the number of concurrent opening TSM files.
|
|
|
|
logger *zap.Logger // Logger to be used for important messages
|
|
traceLogger *zap.Logger // Logger to be used when trace-logging is on.
|
|
traceLogging bool
|
|
|
|
stats *FileStoreStatistics
|
|
purger *purger
|
|
|
|
currentTempDirID int
|
|
|
|
parseFileName ParseFileNameFunc
|
|
|
|
obs tsdb.FileStoreObserver
|
|
}
|
|
|
|
// FileStat holds information about a TSM file on disk.
|
|
type FileStat struct {
|
|
Path string
|
|
HasTombstone bool
|
|
Size uint32
|
|
LastModified int64
|
|
MinTime, MaxTime int64
|
|
MinKey, MaxKey []byte
|
|
}
|
|
|
|
// OverlapsTimeRange returns true if the time range of the file intersect min and max.
|
|
func (f FileStat) OverlapsTimeRange(min, max int64) bool {
|
|
return f.MinTime <= max && f.MaxTime >= min
|
|
}
|
|
|
|
// OverlapsKeyRange returns true if the min and max keys of the file overlap the arguments min and max.
|
|
func (f FileStat) OverlapsKeyRange(min, max []byte) bool {
|
|
return len(min) != 0 && len(max) != 0 && bytes.Compare(f.MinKey, max) <= 0 && bytes.Compare(f.MaxKey, min) >= 0
|
|
}
|
|
|
|
// ContainsKey returns true if the min and max keys of the file overlap the arguments min and max.
|
|
func (f FileStat) ContainsKey(key []byte) bool {
|
|
return bytes.Compare(f.MinKey, key) >= 0 || bytes.Compare(key, f.MaxKey) <= 0
|
|
}
|
|
|
|
// NewFileStore returns a new instance of FileStore based on the given directory.
|
|
func NewFileStore(dir string) *FileStore {
|
|
logger := zap.NewNop()
|
|
fs := &FileStore{
|
|
dir: dir,
|
|
lastModified: time.Time{},
|
|
logger: logger,
|
|
traceLogger: logger,
|
|
openLimiter: limiter.NewFixed(runtime.GOMAXPROCS(0)),
|
|
stats: &FileStoreStatistics{},
|
|
purger: &purger{
|
|
files: map[string]TSMFile{},
|
|
logger: logger,
|
|
},
|
|
obs: noFileStoreObserver{},
|
|
parseFileName: DefaultParseFileName,
|
|
}
|
|
fs.purger.fileStore = fs
|
|
return fs
|
|
}
|
|
|
|
// WithObserver sets the observer for the file store.
|
|
func (f *FileStore) WithObserver(obs tsdb.FileStoreObserver) {
|
|
f.obs = obs
|
|
}
|
|
|
|
func (f *FileStore) WithParseFileNameFunc(parseFileNameFunc ParseFileNameFunc) {
|
|
f.parseFileName = parseFileNameFunc
|
|
}
|
|
|
|
func (f *FileStore) ParseFileName(path string) (int, int, error) {
|
|
return f.parseFileName(path)
|
|
}
|
|
|
|
// enableTraceLogging must be called before the FileStore is opened.
|
|
func (f *FileStore) enableTraceLogging(enabled bool) {
|
|
f.traceLogging = enabled
|
|
if enabled {
|
|
f.traceLogger = f.logger
|
|
}
|
|
}
|
|
|
|
// WithLogger sets the logger on the file store.
|
|
func (f *FileStore) WithLogger(log *zap.Logger) {
|
|
f.logger = log.With(zap.String("service", "filestore"))
|
|
f.purger.logger = f.logger
|
|
|
|
if f.traceLogging {
|
|
f.traceLogger = f.logger
|
|
}
|
|
}
|
|
|
|
// FileStoreStatistics keeps statistics about the file store.
|
|
type FileStoreStatistics struct {
|
|
DiskBytes int64
|
|
FileCount int64
|
|
}
|
|
|
|
// Statistics returns statistics for periodic monitoring.
|
|
func (f *FileStore) Statistics(tags map[string]string) []models.Statistic {
|
|
return []models.Statistic{{
|
|
Name: "tsm1_filestore",
|
|
Tags: tags,
|
|
Values: map[string]interface{}{
|
|
statFileStoreBytes: atomic.LoadInt64(&f.stats.DiskBytes),
|
|
statFileStoreCount: atomic.LoadInt64(&f.stats.FileCount),
|
|
},
|
|
}}
|
|
}
|
|
|
|
// Count returns the number of TSM files currently loaded.
|
|
func (f *FileStore) Count() int {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
return len(f.files)
|
|
}
|
|
|
|
// Files returns the slice of TSM files currently loaded. This is only used for
|
|
// tests, and the files aren't guaranteed to stay valid in the presense of compactions.
|
|
func (f *FileStore) Files() []TSMFile {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
return f.files
|
|
}
|
|
|
|
// Free releases any resources held by the FileStore. The resources will be re-acquired
|
|
// if necessary if they are needed after freeing them.
|
|
func (f *FileStore) Free() error {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
for _, f := range f.files {
|
|
if err := f.Free(); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CurrentGeneration returns the current generation of the TSM files.
|
|
func (f *FileStore) CurrentGeneration() int {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
return f.currentGeneration
|
|
}
|
|
|
|
// NextGeneration increments the max file ID and returns the new value.
|
|
func (f *FileStore) NextGeneration() int {
|
|
f.mu.Lock()
|
|
defer f.mu.Unlock()
|
|
f.currentGeneration++
|
|
return f.currentGeneration
|
|
}
|
|
|
|
// WalkKeys calls fn for every key in every TSM file known to the FileStore. If the key
|
|
// exists in multiple files, it will be invoked for each file.
|
|
func (f *FileStore) WalkKeys(seek []byte, fn func(key []byte, typ byte) error) error {
|
|
f.mu.RLock()
|
|
if len(f.files) == 0 {
|
|
f.mu.RUnlock()
|
|
return nil
|
|
}
|
|
|
|
// Ensure files are not unmapped while we're iterating over them.
|
|
for _, r := range f.files {
|
|
r.Ref()
|
|
defer r.Unref()
|
|
}
|
|
|
|
ki := newMergeKeyIterator(f.files, seek)
|
|
f.mu.RUnlock()
|
|
for ki.Next() {
|
|
key, typ := ki.Read()
|
|
if err := fn(key, typ); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Keys returns all keys and types for all files in the file store.
|
|
func (f *FileStore) Keys() map[string]byte {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
|
|
uniqueKeys := map[string]byte{}
|
|
if err := f.WalkKeys(nil, func(key []byte, typ byte) error {
|
|
uniqueKeys[string(key)] = typ
|
|
return nil
|
|
}); err != nil {
|
|
return nil
|
|
}
|
|
|
|
return uniqueKeys
|
|
}
|
|
|
|
// Type returns the type of values store at the block for key.
|
|
func (f *FileStore) Type(key []byte) (byte, error) {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
|
|
for _, f := range f.files {
|
|
if f.Contains(key) {
|
|
return f.Type(key)
|
|
}
|
|
}
|
|
return 0, fmt.Errorf("unknown type for %v", key)
|
|
}
|
|
|
|
// Delete removes the keys from the set of keys available in this file.
|
|
func (f *FileStore) Delete(keys [][]byte) error {
|
|
return f.DeleteRange(keys, math.MinInt64, math.MaxInt64)
|
|
}
|
|
|
|
func (f *FileStore) Apply(fn func(r TSMFile) error) error {
|
|
// Limit apply fn to number of cores
|
|
limiter := limiter.NewFixed(runtime.GOMAXPROCS(0))
|
|
|
|
f.mu.RLock()
|
|
errC := make(chan error, len(f.files))
|
|
|
|
for _, f := range f.files {
|
|
go func(r TSMFile) {
|
|
limiter.Take()
|
|
defer limiter.Release()
|
|
|
|
r.Ref()
|
|
defer r.Unref()
|
|
errC <- fn(r)
|
|
}(f)
|
|
}
|
|
|
|
var applyErr error
|
|
for i := 0; i < cap(errC); i++ {
|
|
if err := <-errC; err != nil {
|
|
applyErr = err
|
|
}
|
|
}
|
|
f.mu.RUnlock()
|
|
|
|
f.mu.Lock()
|
|
f.lastModified = time.Now().UTC()
|
|
f.lastFileStats = nil
|
|
f.mu.Unlock()
|
|
|
|
return applyErr
|
|
}
|
|
|
|
// DeleteRange removes the values for keys between timestamps min and max. This should only
|
|
// be used with smaller batches of series keys.
|
|
func (f *FileStore) DeleteRange(keys [][]byte, min, max int64) error {
|
|
var batches BatchDeleters
|
|
f.mu.RLock()
|
|
for _, f := range f.files {
|
|
if f.OverlapsTimeRange(min, max) {
|
|
batches = append(batches, f.BatchDelete())
|
|
}
|
|
}
|
|
f.mu.RUnlock()
|
|
|
|
if len(batches) == 0 {
|
|
return nil
|
|
}
|
|
|
|
if err := func() error {
|
|
if err := batches.DeleteRange(keys, min, max); err != nil {
|
|
return err
|
|
}
|
|
|
|
return batches.Commit()
|
|
}(); err != nil {
|
|
// Rollback the deletes
|
|
_ = batches.Rollback()
|
|
return err
|
|
}
|
|
|
|
f.mu.Lock()
|
|
f.lastModified = time.Now().UTC()
|
|
f.lastFileStats = nil
|
|
f.mu.Unlock()
|
|
return nil
|
|
}
|
|
|
|
// Open loads all the TSM files in the configured directory.
|
|
func (f *FileStore) Open() error {
|
|
f.mu.Lock()
|
|
defer f.mu.Unlock()
|
|
|
|
// Not loading files from disk so nothing to do
|
|
if f.dir == "" {
|
|
return nil
|
|
}
|
|
|
|
if f.openLimiter == nil {
|
|
return errors.New("cannot open FileStore without an OpenLimiter (is EngineOptions.OpenLimiter set?)")
|
|
}
|
|
|
|
// find the current max ID for temp directories
|
|
tmpfiles, err := ioutil.ReadDir(f.dir)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ext := fmt.Sprintf(".%s", TmpTSMFileExtension)
|
|
for _, fi := range tmpfiles {
|
|
if fi.IsDir() && strings.HasSuffix(fi.Name(), ext) {
|
|
ss := strings.Split(filepath.Base(fi.Name()), ".")
|
|
if len(ss) == 2 {
|
|
if i, err := strconv.Atoi(ss[0]); err != nil {
|
|
if i > f.currentTempDirID {
|
|
f.currentTempDirID = i
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
files, err := filepath.Glob(filepath.Join(f.dir, fmt.Sprintf("*.%s", TSMFileExtension)))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// struct to hold the result of opening each reader in a goroutine
|
|
type res struct {
|
|
r *TSMReader
|
|
err error
|
|
}
|
|
|
|
readerC := make(chan *res)
|
|
for i, fn := range files {
|
|
// Keep track of the latest ID
|
|
generation, _, err := f.parseFileName(fn)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if generation >= f.currentGeneration {
|
|
f.currentGeneration = generation + 1
|
|
}
|
|
|
|
file, err := os.OpenFile(fn, os.O_RDONLY, 0666)
|
|
if err != nil {
|
|
return fmt.Errorf("error opening file %s: %v", fn, err)
|
|
}
|
|
|
|
go func(idx int, file *os.File) {
|
|
// Ensure a limited number of TSM files are loaded at once.
|
|
// Systems which have very large datasets (1TB+) can have thousands
|
|
// of TSM files which can cause extremely long load times.
|
|
f.openLimiter.Take()
|
|
defer f.openLimiter.Release()
|
|
|
|
start := time.Now()
|
|
df, err := NewTSMReader(file, WithMadviseWillNeed(f.tsmMMAPWillNeed))
|
|
f.logger.Info("Opened file",
|
|
zap.String("path", file.Name()),
|
|
zap.Int("id", idx),
|
|
zap.Duration("duration", time.Since(start)))
|
|
|
|
// If we are unable to read a TSM file then log the error, rename
|
|
// the file, and continue loading the shard without it.
|
|
if err != nil {
|
|
f.logger.Error("Cannot read corrupt tsm file, renaming", zap.String("path", file.Name()), zap.Int("id", idx), zap.Error(err))
|
|
if e := os.Rename(file.Name(), file.Name()+"."+BadTSMFileExtension); e != nil {
|
|
f.logger.Error("Cannot rename corrupt tsm file", zap.String("path", file.Name()), zap.Int("id", idx), zap.Error(e))
|
|
readerC <- &res{r: df, err: fmt.Errorf("cannot rename corrupt file %s: %v", file.Name(), e)}
|
|
return
|
|
}
|
|
}
|
|
|
|
df.WithObserver(f.obs)
|
|
readerC <- &res{r: df}
|
|
}(i, file)
|
|
}
|
|
|
|
var lm int64
|
|
for range files {
|
|
res := <-readerC
|
|
if res.err != nil {
|
|
return res.err
|
|
} else if res.r == nil {
|
|
continue
|
|
}
|
|
f.files = append(f.files, res.r)
|
|
|
|
// Accumulate file store size stats
|
|
atomic.AddInt64(&f.stats.DiskBytes, int64(res.r.Size()))
|
|
for _, ts := range res.r.TombstoneFiles() {
|
|
atomic.AddInt64(&f.stats.DiskBytes, int64(ts.Size))
|
|
}
|
|
|
|
// Re-initialize the lastModified time for the file store
|
|
if res.r.LastModified() > lm {
|
|
lm = res.r.LastModified()
|
|
}
|
|
|
|
}
|
|
f.lastModified = time.Unix(0, lm).UTC()
|
|
close(readerC)
|
|
|
|
sort.Sort(tsmReaders(f.files))
|
|
atomic.StoreInt64(&f.stats.FileCount, int64(len(f.files)))
|
|
return nil
|
|
}
|
|
|
|
// Close closes the file store.
|
|
func (f *FileStore) Close() error {
|
|
// Make the object appear closed to other method calls.
|
|
f.mu.Lock()
|
|
|
|
files := f.files
|
|
|
|
f.lastFileStats = nil
|
|
f.files = nil
|
|
atomic.StoreInt64(&f.stats.FileCount, 0)
|
|
|
|
// Let other methods access this closed object while we do the actual closing.
|
|
f.mu.Unlock()
|
|
|
|
for _, file := range files {
|
|
err := file.Close()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (f *FileStore) DiskSizeBytes() int64 {
|
|
return atomic.LoadInt64(&f.stats.DiskBytes)
|
|
}
|
|
|
|
// Read returns the slice of values for the given key and the given timestamp,
|
|
// if any file matches those constraints.
|
|
func (f *FileStore) Read(key []byte, t int64) ([]Value, error) {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
|
|
for _, f := range f.files {
|
|
// Can this file possibly contain this key and timestamp?
|
|
if !f.Contains(key) {
|
|
continue
|
|
}
|
|
|
|
// May have the key and time we are looking for so try to find
|
|
v, err := f.Read(key, t)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if len(v) > 0 {
|
|
return v, nil
|
|
}
|
|
}
|
|
return nil, nil
|
|
}
|
|
|
|
func (f *FileStore) Cost(key []byte, min, max int64) query.IteratorCost {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
return f.cost(key, min, max)
|
|
}
|
|
|
|
// Reader returns a TSMReader for path if one is currently managed by the FileStore.
|
|
// Otherwise it returns nil. If it returns a file, you must call Unref on it when
|
|
// you are done, and never use it after that.
|
|
func (f *FileStore) TSMReader(path string) *TSMReader {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
for _, r := range f.files {
|
|
if r.Path() == path {
|
|
r.Ref()
|
|
return r.(*TSMReader)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// KeyCursor returns a KeyCursor for key and t across the files in the FileStore.
|
|
func (f *FileStore) KeyCursor(ctx context.Context, key []byte, t int64, ascending bool) *KeyCursor {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
return newKeyCursor(ctx, f, key, t, ascending)
|
|
}
|
|
|
|
// Stats returns the stats of the underlying files, preferring the cached version if it is still valid.
|
|
func (f *FileStore) Stats() []FileStat {
|
|
f.mu.RLock()
|
|
if len(f.lastFileStats) > 0 {
|
|
defer f.mu.RUnlock()
|
|
return f.lastFileStats
|
|
}
|
|
f.mu.RUnlock()
|
|
|
|
// The file stats cache is invalid due to changes to files. Need to
|
|
// recalculate.
|
|
f.mu.Lock()
|
|
defer f.mu.Unlock()
|
|
|
|
if len(f.lastFileStats) > 0 {
|
|
return f.lastFileStats
|
|
}
|
|
|
|
// If lastFileStats's capacity is far away from the number of entries
|
|
// we need to add, then we'll reallocate.
|
|
if cap(f.lastFileStats) < len(f.files)/2 {
|
|
f.lastFileStats = make([]FileStat, 0, len(f.files))
|
|
}
|
|
|
|
for _, fd := range f.files {
|
|
f.lastFileStats = append(f.lastFileStats, fd.Stats())
|
|
}
|
|
return f.lastFileStats
|
|
}
|
|
|
|
// ReplaceWithCallback replaces oldFiles with newFiles and calls updatedFn with the files to be added the FileStore.
|
|
func (f *FileStore) ReplaceWithCallback(oldFiles, newFiles []string, updatedFn func(r []TSMFile)) error {
|
|
return f.replace(oldFiles, newFiles, updatedFn)
|
|
}
|
|
|
|
// Replace replaces oldFiles with newFiles.
|
|
func (f *FileStore) Replace(oldFiles, newFiles []string) error {
|
|
return f.replace(oldFiles, newFiles, nil)
|
|
}
|
|
|
|
func (f *FileStore) replace(oldFiles, newFiles []string, updatedFn func(r []TSMFile)) error {
|
|
if len(oldFiles) == 0 && len(newFiles) == 0 {
|
|
return nil
|
|
}
|
|
|
|
f.mu.RLock()
|
|
maxTime := f.lastModified
|
|
f.mu.RUnlock()
|
|
|
|
updated := make([]TSMFile, 0, len(newFiles))
|
|
tsmTmpExt := fmt.Sprintf("%s.%s", TSMFileExtension, TmpTSMFileExtension)
|
|
|
|
// Rename all the new files to make them live on restart
|
|
for _, file := range newFiles {
|
|
if !strings.HasSuffix(file, tsmTmpExt) && !strings.HasSuffix(file, TSMFileExtension) {
|
|
// This isn't a .tsm or .tsm.tmp file.
|
|
continue
|
|
}
|
|
|
|
// give the observer a chance to process the file first.
|
|
if err := f.obs.FileFinishing(file); err != nil {
|
|
return err
|
|
}
|
|
|
|
var newName = file
|
|
if strings.HasSuffix(file, tsmTmpExt) {
|
|
// The new TSM files have a tmp extension. First rename them.
|
|
newName = file[:len(file)-4]
|
|
if err := os.Rename(file, newName); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
fd, err := os.Open(newName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Keep track of the new mod time
|
|
if stat, err := fd.Stat(); err == nil {
|
|
if maxTime.IsZero() || stat.ModTime().UTC().After(maxTime) {
|
|
maxTime = stat.ModTime().UTC()
|
|
}
|
|
}
|
|
|
|
tsm, err := NewTSMReader(fd, WithMadviseWillNeed(f.tsmMMAPWillNeed))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
tsm.WithObserver(f.obs)
|
|
|
|
updated = append(updated, tsm)
|
|
}
|
|
|
|
if updatedFn != nil {
|
|
updatedFn(updated)
|
|
}
|
|
|
|
f.mu.Lock()
|
|
defer f.mu.Unlock()
|
|
|
|
// Copy the current set of active files while we rename
|
|
// and load the new files. We copy the pointers here to minimize
|
|
// the time that locks are held as well as to ensure that the replacement
|
|
// is atomic.©
|
|
|
|
updated = append(updated, f.files...)
|
|
|
|
// We need to prune our set of active files now
|
|
var active, inuse []TSMFile
|
|
for _, file := range updated {
|
|
keep := true
|
|
for _, remove := range oldFiles {
|
|
if remove == file.Path() {
|
|
keep = false
|
|
|
|
// give the observer a chance to process the file first.
|
|
if err := f.obs.FileUnlinking(file.Path()); err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, t := range file.TombstoneFiles() {
|
|
if err := f.obs.FileUnlinking(t.Path); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// If queries are running against this file, then we need to move it out of the
|
|
// way and let them complete. We'll then delete the original file to avoid
|
|
// blocking callers upstream. If the process crashes, the temp file is
|
|
// cleaned up at startup automatically.
|
|
//
|
|
// In order to ensure that there are no races with this (file held externally calls Ref
|
|
// after we check InUse), we need to maintain the invariant that every handle to a file
|
|
// is handed out in use (Ref'd), and handlers only ever relinquish the file once (call Unref
|
|
// exactly once, and never use it again). InUse is only valid during a write lock, since
|
|
// we allow calls to Ref and Unref under the read lock and no lock at all respectively.
|
|
if file.InUse() {
|
|
// Copy all the tombstones related to this TSM file
|
|
var deletes []string
|
|
for _, t := range file.TombstoneFiles() {
|
|
deletes = append(deletes, t.Path)
|
|
}
|
|
|
|
// Rename the TSM file used by this reader
|
|
tempPath := fmt.Sprintf("%s.%s", file.Path(), TmpTSMFileExtension)
|
|
if err := file.Rename(tempPath); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Remove the old file and tombstones. We can't use the normal TSMReader.Remove()
|
|
// because it now refers to our temp file which we can't remove.
|
|
for _, f := range deletes {
|
|
if err := os.Remove(f); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
inuse = append(inuse, file)
|
|
continue
|
|
}
|
|
|
|
if err := file.Close(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := file.Remove(); err != nil {
|
|
return err
|
|
}
|
|
break
|
|
}
|
|
}
|
|
|
|
if keep {
|
|
active = append(active, file)
|
|
}
|
|
}
|
|
|
|
if err := file.SyncDir(f.dir); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Tell the purger about our in-use files we need to remove
|
|
f.purger.add(inuse)
|
|
|
|
// If times didn't change (which can happen since file mod times are second level),
|
|
// then add a ns to the time to ensure that lastModified changes since files on disk
|
|
// actually did change
|
|
if maxTime.Equal(f.lastModified) || maxTime.Before(f.lastModified) {
|
|
maxTime = f.lastModified.UTC().Add(1)
|
|
}
|
|
|
|
f.lastModified = maxTime.UTC()
|
|
|
|
f.lastFileStats = nil
|
|
f.files = active
|
|
sort.Sort(tsmReaders(f.files))
|
|
atomic.StoreInt64(&f.stats.FileCount, int64(len(f.files)))
|
|
|
|
// Recalculate the disk size stat
|
|
var totalSize int64
|
|
for _, file := range f.files {
|
|
totalSize += int64(file.Size())
|
|
for _, ts := range file.TombstoneFiles() {
|
|
totalSize += int64(ts.Size)
|
|
}
|
|
|
|
}
|
|
atomic.StoreInt64(&f.stats.DiskBytes, totalSize)
|
|
|
|
return nil
|
|
}
|
|
|
|
// LastModified returns the last time the file store was updated with new
|
|
// TSM files or a delete.
|
|
func (f *FileStore) LastModified() time.Time {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
|
|
return f.lastModified
|
|
}
|
|
|
|
// BlockCount returns number of values stored in the block at location idx
|
|
// in the file at path. If path does not match any file in the store, 0 is
|
|
// returned. If idx is out of range for the number of blocks in the file,
|
|
// 0 is returned.
|
|
func (f *FileStore) BlockCount(path string, idx int) int {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
|
|
if idx < 0 {
|
|
return 0
|
|
}
|
|
|
|
for _, fd := range f.files {
|
|
if fd.Path() == path {
|
|
iter := fd.BlockIterator()
|
|
for i := 0; i < idx; i++ {
|
|
if !iter.Next() {
|
|
return 0
|
|
}
|
|
}
|
|
_, _, _, _, _, block, _ := iter.Read()
|
|
return BlockCount(block)
|
|
}
|
|
}
|
|
return 0
|
|
}
|
|
|
|
// We need to determine the possible files that may be accessed by this query given
|
|
// the time range.
|
|
func (f *FileStore) cost(key []byte, min, max int64) query.IteratorCost {
|
|
var cache []IndexEntry
|
|
cost := query.IteratorCost{}
|
|
for _, fd := range f.files {
|
|
minTime, maxTime := fd.TimeRange()
|
|
if !(maxTime > min && minTime < max) {
|
|
continue
|
|
}
|
|
skipped := true
|
|
tombstones := fd.TombstoneRange(key)
|
|
|
|
entries := fd.ReadEntries(key, &cache)
|
|
ENTRIES:
|
|
for i := 0; i < len(entries); i++ {
|
|
ie := entries[i]
|
|
|
|
if !(ie.MaxTime > min && ie.MinTime < max) {
|
|
continue
|
|
}
|
|
|
|
// Skip any blocks only contain values that are tombstoned.
|
|
for _, t := range tombstones {
|
|
if t.Min <= ie.MinTime && t.Max >= ie.MaxTime {
|
|
continue ENTRIES
|
|
}
|
|
}
|
|
|
|
cost.BlocksRead++
|
|
cost.BlockSize += int64(ie.Size)
|
|
skipped = false
|
|
}
|
|
|
|
if !skipped {
|
|
cost.NumFiles++
|
|
}
|
|
}
|
|
return cost
|
|
}
|
|
|
|
// locations returns the files and index blocks for a key and time. ascending indicates
|
|
// whether the key will be scan in ascending time order or descenging time order.
|
|
// This function assumes the read-lock has been taken.
|
|
func (f *FileStore) locations(key []byte, t int64, ascending bool) []*location {
|
|
var cache []IndexEntry
|
|
locations := make([]*location, 0, len(f.files))
|
|
for _, fd := range f.files {
|
|
minTime, maxTime := fd.TimeRange()
|
|
|
|
// If we ascending and the max time of the file is before where we want to start
|
|
// skip it.
|
|
if ascending && maxTime < t {
|
|
continue
|
|
// If we are descending and the min time of the file is after where we want to start,
|
|
// then skip it.
|
|
} else if !ascending && minTime > t {
|
|
continue
|
|
}
|
|
tombstones := fd.TombstoneRange(key)
|
|
|
|
// This file could potential contain points we are looking for so find the blocks for
|
|
// the given key.
|
|
entries := fd.ReadEntries(key, &cache)
|
|
LOOP:
|
|
for i := 0; i < len(entries); i++ {
|
|
ie := entries[i]
|
|
|
|
// Skip any blocks only contain values that are tombstoned.
|
|
for _, t := range tombstones {
|
|
if t.Min <= ie.MinTime && t.Max >= ie.MaxTime {
|
|
continue LOOP
|
|
}
|
|
}
|
|
|
|
// If we ascending and the max time of a block is before where we are looking, skip
|
|
// it since the data is out of our range
|
|
if ascending && ie.MaxTime < t {
|
|
continue
|
|
// If we descending and the min time of a block is after where we are looking, skip
|
|
// it since the data is out of our range
|
|
} else if !ascending && ie.MinTime > t {
|
|
continue
|
|
}
|
|
|
|
location := &location{
|
|
r: fd,
|
|
entry: ie,
|
|
}
|
|
|
|
if ascending {
|
|
// For an ascending cursor, mark everything before the seek time as read
|
|
// so we can filter it out at query time
|
|
location.readMin = math.MinInt64
|
|
location.readMax = t - 1
|
|
} else {
|
|
// For an ascending cursort, mark everything after the seek time as read
|
|
// so we can filter it out at query time
|
|
location.readMin = t + 1
|
|
location.readMax = math.MaxInt64
|
|
}
|
|
// Otherwise, add this file and block location
|
|
locations = append(locations, location)
|
|
}
|
|
}
|
|
return locations
|
|
}
|
|
|
|
// CreateSnapshot creates hardlinks for all tsm and tombstone files
|
|
// in the path provided.
|
|
func (f *FileStore) CreateSnapshot() (string, error) {
|
|
f.traceLogger.Info("Creating snapshot", zap.String("dir", f.dir))
|
|
|
|
f.mu.Lock()
|
|
// create a copy of the files slice and ensure they aren't closed out from
|
|
// under us, nor the slice mutated.
|
|
files := make([]TSMFile, len(f.files))
|
|
copy(files, f.files)
|
|
|
|
for _, tsmf := range files {
|
|
tsmf.Ref()
|
|
defer tsmf.Unref()
|
|
}
|
|
|
|
// increment and keep track of the current temp dir for when we drop the lock.
|
|
// this ensures we are the only writer to the directory.
|
|
f.currentTempDirID += 1
|
|
tmpPath := fmt.Sprintf("%d.%s", f.currentTempDirID, TmpTSMFileExtension)
|
|
tmpPath = filepath.Join(f.dir, tmpPath)
|
|
f.mu.Unlock()
|
|
|
|
// create the tmp directory and add the hard links. there is no longer any shared
|
|
// mutable state.
|
|
err := os.Mkdir(tmpPath, 0777)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
for _, tsmf := range files {
|
|
newpath := filepath.Join(tmpPath, filepath.Base(tsmf.Path()))
|
|
if err := os.Link(tsmf.Path(), newpath); err != nil {
|
|
return "", fmt.Errorf("error creating tsm hard link: %q", err)
|
|
}
|
|
for _, tf := range tsmf.TombstoneFiles() {
|
|
newpath := filepath.Join(tmpPath, filepath.Base(tf.Path))
|
|
if err := os.Link(tf.Path, newpath); err != nil {
|
|
return "", fmt.Errorf("error creating tombstone hard link: %q", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
return tmpPath, nil
|
|
}
|
|
|
|
// MeasurementStats returns the sum of all measurement stats within the store.
|
|
func (f *FileStore) MeasurementStats() (MeasurementStats, error) {
|
|
f.mu.RLock()
|
|
defer f.mu.RUnlock()
|
|
|
|
stats := NewMeasurementStats()
|
|
for _, file := range f.files {
|
|
s, err := file.MeasurementStats()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
stats.Add(s)
|
|
}
|
|
return stats, nil
|
|
}
|
|
|
|
// FormatFileNameFunc is executed when generating a new TSM filename.
|
|
// Source filenames are provided via src.
|
|
type FormatFileNameFunc func(generation, sequence int) string
|
|
|
|
// DefaultFormatFileName is the default implementation to format TSM filenames.
|
|
func DefaultFormatFileName(generation, sequence int) string {
|
|
return fmt.Sprintf("%09d-%09d", generation, sequence)
|
|
}
|
|
|
|
// ParseFileNameFunc is executed when parsing a TSM filename into generation & sequence.
|
|
type ParseFileNameFunc func(name string) (generation, sequence int, err error)
|
|
|
|
// DefaultParseFileName is used to parse the filenames of TSM files.
|
|
func DefaultParseFileName(name string) (int, int, error) {
|
|
base := filepath.Base(name)
|
|
idx := strings.Index(base, ".")
|
|
if idx == -1 {
|
|
return 0, 0, fmt.Errorf("file %s is named incorrectly", name)
|
|
}
|
|
|
|
id := base[:idx]
|
|
|
|
idx = strings.Index(id, "-")
|
|
if idx == -1 {
|
|
return 0, 0, fmt.Errorf("file %s is named incorrectly", name)
|
|
}
|
|
|
|
generation, err := strconv.ParseUint(id[:idx], 10, 32)
|
|
if err != nil {
|
|
return 0, 0, fmt.Errorf("file %s is named incorrectly", name)
|
|
}
|
|
|
|
sequence, err := strconv.ParseUint(id[idx+1:], 10, 32)
|
|
if err != nil {
|
|
return 0, 0, fmt.Errorf("file %s is named incorrectly", name)
|
|
}
|
|
|
|
return int(generation), int(sequence), nil
|
|
}
|
|
|
|
// KeyCursor allows iteration through keys in a set of files within a FileStore.
|
|
type KeyCursor struct {
|
|
key []byte
|
|
|
|
// seeks is all the file locations that we need to return during iteration.
|
|
seeks []*location
|
|
|
|
// current is the set of blocks possibly containing the next set of points.
|
|
// Normally this is just one entry, but there may be multiple if points have
|
|
// been overwritten.
|
|
current []*location
|
|
buf []Value
|
|
|
|
ctx context.Context
|
|
col *metrics.Group
|
|
|
|
// pos is the index within seeks. Based on ascending, it will increment or
|
|
// decrement through the size of seeks slice.
|
|
pos int
|
|
ascending bool
|
|
}
|
|
|
|
type location struct {
|
|
r TSMFile
|
|
entry IndexEntry
|
|
|
|
readMin, readMax int64
|
|
}
|
|
|
|
func (l *location) read() bool {
|
|
return l.readMin <= l.entry.MinTime && l.readMax >= l.entry.MaxTime
|
|
}
|
|
|
|
func (l *location) markRead(min, max int64) {
|
|
if min < l.readMin {
|
|
l.readMin = min
|
|
}
|
|
|
|
if max > l.readMax {
|
|
l.readMax = max
|
|
}
|
|
}
|
|
|
|
type descLocations []*location
|
|
|
|
// Sort methods
|
|
func (a descLocations) Len() int { return len(a) }
|
|
func (a descLocations) Swap(i, j int) { a[i], a[j] = a[j], a[i] }
|
|
func (a descLocations) Less(i, j int) bool {
|
|
if a[i].entry.OverlapsTimeRange(a[j].entry.MinTime, a[j].entry.MaxTime) {
|
|
return a[i].r.Path() < a[j].r.Path()
|
|
}
|
|
return a[i].entry.MaxTime < a[j].entry.MaxTime
|
|
}
|
|
|
|
type ascLocations []*location
|
|
|
|
// Sort methods
|
|
func (a ascLocations) Len() int { return len(a) }
|
|
func (a ascLocations) Swap(i, j int) { a[i], a[j] = a[j], a[i] }
|
|
func (a ascLocations) Less(i, j int) bool {
|
|
if a[i].entry.OverlapsTimeRange(a[j].entry.MinTime, a[j].entry.MaxTime) {
|
|
return a[i].r.Path() < a[j].r.Path()
|
|
}
|
|
return a[i].entry.MinTime < a[j].entry.MinTime
|
|
}
|
|
|
|
// newKeyCursor returns a new instance of KeyCursor.
|
|
// This function assumes the read-lock has been taken.
|
|
func newKeyCursor(ctx context.Context, fs *FileStore, key []byte, t int64, ascending bool) *KeyCursor {
|
|
c := &KeyCursor{
|
|
key: key,
|
|
seeks: fs.locations(key, t, ascending),
|
|
ctx: ctx,
|
|
col: metrics.GroupFromContext(ctx),
|
|
ascending: ascending,
|
|
}
|
|
|
|
if ascending {
|
|
sort.Sort(ascLocations(c.seeks))
|
|
} else {
|
|
sort.Sort(descLocations(c.seeks))
|
|
}
|
|
|
|
// Determine the distinct set of TSM files in use and mark then as in-use
|
|
for _, f := range c.seeks {
|
|
f.r.Ref()
|
|
}
|
|
|
|
c.seek(t)
|
|
return c
|
|
}
|
|
|
|
// Close removes all references on the cursor.
|
|
func (c *KeyCursor) Close() {
|
|
// Remove all of our in-use references since we're done
|
|
for _, f := range c.seeks {
|
|
f.r.Unref()
|
|
}
|
|
|
|
c.buf = nil
|
|
c.seeks = nil
|
|
c.current = nil
|
|
}
|
|
|
|
// seek positions the cursor at the given time.
|
|
func (c *KeyCursor) seek(t int64) {
|
|
if len(c.seeks) == 0 {
|
|
return
|
|
}
|
|
c.current = nil
|
|
|
|
if c.ascending {
|
|
c.seekAscending(t)
|
|
} else {
|
|
c.seekDescending(t)
|
|
}
|
|
}
|
|
|
|
func (c *KeyCursor) seekAscending(t int64) {
|
|
for i, e := range c.seeks {
|
|
if t < e.entry.MinTime || e.entry.Contains(t) {
|
|
// Record the position of the first block matching our seek time
|
|
if len(c.current) == 0 {
|
|
c.pos = i
|
|
}
|
|
|
|
c.current = append(c.current, e)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (c *KeyCursor) seekDescending(t int64) {
|
|
for i := len(c.seeks) - 1; i >= 0; i-- {
|
|
e := c.seeks[i]
|
|
if t > e.entry.MaxTime || e.entry.Contains(t) {
|
|
// Record the position of the first block matching our seek time
|
|
if len(c.current) == 0 {
|
|
c.pos = i
|
|
}
|
|
c.current = append(c.current, e)
|
|
}
|
|
}
|
|
}
|
|
|
|
// Next moves the cursor to the next position.
|
|
// Data should be read by the ReadBlock functions.
|
|
func (c *KeyCursor) Next() {
|
|
if len(c.current) == 0 {
|
|
return
|
|
}
|
|
// Do we still have unread values in the current block
|
|
if !c.current[0].read() {
|
|
return
|
|
}
|
|
c.current = c.current[:0]
|
|
if c.ascending {
|
|
c.nextAscending()
|
|
} else {
|
|
c.nextDescending()
|
|
}
|
|
}
|
|
|
|
func (c *KeyCursor) nextAscending() {
|
|
for {
|
|
c.pos++
|
|
if c.pos >= len(c.seeks) {
|
|
return
|
|
} else if !c.seeks[c.pos].read() {
|
|
break
|
|
}
|
|
}
|
|
|
|
// Append the first matching block
|
|
if len(c.current) == 0 {
|
|
c.current = append(c.current, nil)
|
|
} else {
|
|
c.current = c.current[:1]
|
|
}
|
|
c.current[0] = c.seeks[c.pos]
|
|
|
|
// If we have ovelapping blocks, append all their values so we can dedup
|
|
for i := c.pos + 1; i < len(c.seeks); i++ {
|
|
if c.seeks[i].read() {
|
|
continue
|
|
}
|
|
|
|
c.current = append(c.current, c.seeks[i])
|
|
}
|
|
}
|
|
|
|
func (c *KeyCursor) nextDescending() {
|
|
for {
|
|
c.pos--
|
|
if c.pos < 0 {
|
|
return
|
|
} else if !c.seeks[c.pos].read() {
|
|
break
|
|
}
|
|
}
|
|
|
|
// Append the first matching block
|
|
if len(c.current) == 0 {
|
|
c.current = make([]*location, 1)
|
|
} else {
|
|
c.current = c.current[:1]
|
|
}
|
|
c.current[0] = c.seeks[c.pos]
|
|
|
|
// If we have ovelapping blocks, append all their values so we can dedup
|
|
for i := c.pos; i >= 0; i-- {
|
|
if c.seeks[i].read() {
|
|
continue
|
|
}
|
|
c.current = append(c.current, c.seeks[i])
|
|
}
|
|
}
|
|
|
|
type purger struct {
|
|
mu sync.RWMutex
|
|
fileStore *FileStore
|
|
files map[string]TSMFile
|
|
running bool
|
|
|
|
logger *zap.Logger
|
|
}
|
|
|
|
func (p *purger) add(files []TSMFile) {
|
|
p.mu.Lock()
|
|
for _, f := range files {
|
|
p.files[f.Path()] = f
|
|
}
|
|
p.mu.Unlock()
|
|
p.purge()
|
|
}
|
|
|
|
func (p *purger) purge() {
|
|
p.mu.Lock()
|
|
if p.running {
|
|
p.mu.Unlock()
|
|
return
|
|
}
|
|
p.running = true
|
|
p.mu.Unlock()
|
|
|
|
go func() {
|
|
for {
|
|
p.mu.Lock()
|
|
for k, v := range p.files {
|
|
// In order to ensure that there are no races with this (file held externally calls Ref
|
|
// after we check InUse), we need to maintain the invariant that every handle to a file
|
|
// is handed out in use (Ref'd), and handlers only ever relinquish the file once (call Unref
|
|
// exactly once, and never use it again). InUse is only valid during a write lock, since
|
|
// we allow calls to Ref and Unref under the read lock and no lock at all respectively.
|
|
if !v.InUse() {
|
|
if err := v.Close(); err != nil {
|
|
p.logger.Info("Purge: close file", zap.Error(err))
|
|
continue
|
|
}
|
|
|
|
if err := v.Remove(); err != nil {
|
|
p.logger.Info("Purge: remove file", zap.Error(err))
|
|
continue
|
|
}
|
|
delete(p.files, k)
|
|
}
|
|
}
|
|
|
|
if len(p.files) == 0 {
|
|
p.running = false
|
|
p.mu.Unlock()
|
|
return
|
|
}
|
|
|
|
p.mu.Unlock()
|
|
time.Sleep(time.Second)
|
|
}
|
|
}()
|
|
}
|
|
|
|
type tsmReaders []TSMFile
|
|
|
|
func (a tsmReaders) Len() int { return len(a) }
|
|
func (a tsmReaders) Less(i, j int) bool { return a[i].Path() < a[j].Path() }
|
|
func (a tsmReaders) Swap(i, j int) { a[i], a[j] = a[j], a[i] }
|