579 lines
16 KiB
Go
579 lines
16 KiB
Go
package storage
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"math"
|
|
"sync"
|
|
"time"
|
|
|
|
platform "github.com/influxdata/influxdb"
|
|
"github.com/influxdata/influxdb/kit/tracing"
|
|
"github.com/influxdata/influxdb/logger"
|
|
"github.com/influxdata/influxdb/models"
|
|
"github.com/influxdata/influxdb/storage/wal"
|
|
"github.com/influxdata/influxdb/tsdb"
|
|
"github.com/influxdata/influxdb/tsdb/tsi1"
|
|
"github.com/influxdata/influxdb/tsdb/tsm1"
|
|
"github.com/influxdata/influxdb/tsdb/value"
|
|
"github.com/influxdata/influxql"
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
// Static objects to prevent small allocs.
|
|
var timeBytes = []byte("time")
|
|
|
|
// ErrEngineClosed is returned when a caller attempts to use the engine while
|
|
// it's closed.
|
|
var ErrEngineClosed = errors.New("engine is closed")
|
|
|
|
type Engine struct {
|
|
config Config
|
|
path string
|
|
engineID *int // Not used by default.
|
|
nodeID *int // Not used by default.
|
|
|
|
mu sync.RWMutex
|
|
closing chan struct{} //closing returns the zero value when the engine is shutting down.
|
|
index *tsi1.Index
|
|
sfile *tsdb.SeriesFile
|
|
engine *tsm1.Engine
|
|
wal *wal.WAL
|
|
retentionEnforcer *retentionEnforcer
|
|
|
|
defaultMetricLabels prometheus.Labels
|
|
|
|
// Tracks all goroutines started by the Engine.
|
|
wg sync.WaitGroup
|
|
|
|
logger *zap.Logger
|
|
}
|
|
|
|
// Option provides a set
|
|
type Option func(*Engine)
|
|
|
|
// WithTSMFilenameFormatter sets a function on the underlying tsm1.Engine to specify
|
|
// how TSM files are named.
|
|
func WithTSMFilenameFormatter(fn tsm1.FormatFileNameFunc) Option {
|
|
return func(e *Engine) {
|
|
e.engine.WithFormatFileNameFunc(fn)
|
|
}
|
|
}
|
|
|
|
// WithEngineID sets an engine id, which can be useful for logging when multiple
|
|
// engines are in use.
|
|
func WithEngineID(id int) Option {
|
|
return func(e *Engine) {
|
|
e.engineID = &id
|
|
e.defaultMetricLabels["engine_id"] = fmt.Sprint(*e.engineID)
|
|
}
|
|
}
|
|
|
|
// WithNodeID sets a node id on the engine, which can be useful for logging
|
|
// when a system has engines running on multiple nodes.
|
|
func WithNodeID(id int) Option {
|
|
return func(e *Engine) {
|
|
e.nodeID = &id
|
|
e.defaultMetricLabels["node_id"] = fmt.Sprint(*e.nodeID)
|
|
}
|
|
}
|
|
|
|
// WithRetentionEnforcer initialises a retention enforcer on the engine.
|
|
// WithRetentionEnforcer must be called after other options to ensure that all
|
|
// metrics are labelled correctly.
|
|
func WithRetentionEnforcer(finder BucketFinder) Option {
|
|
return func(e *Engine) {
|
|
e.retentionEnforcer = newRetentionEnforcer(e, finder)
|
|
}
|
|
}
|
|
|
|
// WithFileStoreObserver makes the engine have the provided file store observer.
|
|
func WithFileStoreObserver(obs tsm1.FileStoreObserver) Option {
|
|
return func(e *Engine) {
|
|
e.engine.WithFileStoreObserver(obs)
|
|
}
|
|
}
|
|
|
|
// WithCompactionPlanner makes the engine have the provided compaction planner.
|
|
func WithCompactionPlanner(planner tsm1.CompactionPlanner) Option {
|
|
return func(e *Engine) {
|
|
e.engine.WithCompactionPlanner(planner)
|
|
}
|
|
}
|
|
|
|
// NewEngine initialises a new storage engine, including a series file, index and
|
|
// TSM engine.
|
|
func NewEngine(path string, c Config, options ...Option) *Engine {
|
|
e := &Engine{
|
|
config: c,
|
|
path: path,
|
|
defaultMetricLabels: prometheus.Labels{},
|
|
logger: zap.NewNop(),
|
|
}
|
|
|
|
// Initialize series file.
|
|
e.sfile = tsdb.NewSeriesFile(c.GetSeriesFilePath(path))
|
|
|
|
// Initialise index.
|
|
e.index = tsi1.NewIndex(e.sfile, c.Index,
|
|
tsi1.WithPath(c.GetIndexPath(path)))
|
|
|
|
// Initialize WAL
|
|
e.wal = wal.NewWAL(c.GetWALPath(path))
|
|
e.wal.WithFsyncDelay(time.Duration(c.WAL.FsyncDelay))
|
|
e.wal.SetEnabled(c.WAL.Enabled)
|
|
|
|
// Initialise Engine
|
|
e.engine = tsm1.NewEngine(c.GetEnginePath(path), e.index, c.Engine,
|
|
tsm1.WithSnapshotter(e))
|
|
|
|
// Apply options.
|
|
for _, option := range options {
|
|
option(e)
|
|
}
|
|
|
|
// Set default metrics labels.
|
|
e.engine.SetDefaultMetricLabels(e.defaultMetricLabels)
|
|
e.sfile.SetDefaultMetricLabels(e.defaultMetricLabels)
|
|
e.index.SetDefaultMetricLabels(e.defaultMetricLabels)
|
|
if e.wal != nil {
|
|
e.wal.SetDefaultMetricLabels(e.defaultMetricLabels)
|
|
}
|
|
|
|
return e
|
|
}
|
|
|
|
// WithLogger sets the logger on the Store. It must be called before Open.
|
|
func (e *Engine) WithLogger(log *zap.Logger) {
|
|
fields := []zap.Field{}
|
|
if e.nodeID != nil {
|
|
fields = append(fields, zap.Int("node_id", *e.nodeID))
|
|
}
|
|
|
|
if e.engineID != nil {
|
|
fields = append(fields, zap.Int("engine_id", *e.engineID))
|
|
}
|
|
fields = append(fields, zap.String("service", "storage-engine"))
|
|
|
|
e.logger = log.With(fields...)
|
|
e.sfile.WithLogger(e.logger)
|
|
e.index.WithLogger(e.logger)
|
|
e.engine.WithLogger(e.logger)
|
|
e.wal.WithLogger(e.logger)
|
|
e.retentionEnforcer.WithLogger(e.logger)
|
|
}
|
|
|
|
// PrometheusCollectors returns all the prometheus collectors associated with
|
|
// the engine and its components.
|
|
func (e *Engine) PrometheusCollectors() []prometheus.Collector {
|
|
var metrics []prometheus.Collector
|
|
metrics = append(metrics, tsdb.PrometheusCollectors()...)
|
|
metrics = append(metrics, tsi1.PrometheusCollectors()...)
|
|
metrics = append(metrics, tsm1.PrometheusCollectors()...)
|
|
metrics = append(metrics, wal.PrometheusCollectors()...)
|
|
metrics = append(metrics, e.retentionEnforcer.PrometheusCollectors()...)
|
|
return metrics
|
|
}
|
|
|
|
// Open opens the store and all underlying resources. It returns an error if
|
|
// any of the underlying systems fail to open.
|
|
func (e *Engine) Open(ctx context.Context) (err error) {
|
|
e.mu.Lock()
|
|
defer e.mu.Unlock()
|
|
|
|
if e.closing != nil {
|
|
return nil // Already open
|
|
}
|
|
|
|
span, ctx := tracing.StartSpanFromContext(ctx)
|
|
defer span.Finish()
|
|
|
|
// Open the services in order and clean up if any fail.
|
|
var oh openHelper
|
|
oh.Open(ctx, e.sfile)
|
|
oh.Open(ctx, e.index)
|
|
oh.Open(ctx, e.wal)
|
|
oh.Open(ctx, e.engine)
|
|
if err := oh.Done(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := e.replayWAL(); err != nil {
|
|
return err
|
|
}
|
|
|
|
e.closing = make(chan struct{})
|
|
|
|
// TODO(edd) background tasks will be run in priority order via a scheduler.
|
|
// For now we will just run on an interval as we only have the retention
|
|
// policy enforcer.
|
|
e.runRetentionEnforcer()
|
|
|
|
return nil
|
|
}
|
|
|
|
// replayWAL reads the WAL segment files and replays them.
|
|
func (e *Engine) replayWAL() error {
|
|
if !e.config.WAL.Enabled {
|
|
return nil
|
|
}
|
|
now := time.Now()
|
|
|
|
walPaths, err := wal.SegmentFileNames(e.wal.Path())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// TODO(jeff): we should just do snapshots and wait for them so that we don't hit
|
|
// OOM situations when reloading huge WALs.
|
|
|
|
// Disable the max size during loading
|
|
limit := e.engine.Cache.MaxSize()
|
|
defer func() { e.engine.Cache.SetMaxSize(limit) }()
|
|
e.engine.Cache.SetMaxSize(0)
|
|
|
|
// Execute all the entries in the WAL again
|
|
reader := wal.NewWALReader(walPaths)
|
|
reader.WithLogger(e.logger)
|
|
err = reader.Read(func(entry wal.WALEntry) error {
|
|
switch en := entry.(type) {
|
|
case *wal.WriteWALEntry:
|
|
points := tsm1.ValuesToPoints(en.Values)
|
|
err := e.writePointsLocked(context.Background(), tsdb.NewSeriesCollection(points), en.Values)
|
|
if _, ok := err.(tsdb.PartialWriteError); ok {
|
|
err = nil
|
|
}
|
|
return err
|
|
|
|
case *wal.DeleteBucketRangeWALEntry:
|
|
return e.deleteBucketRangeLocked(en.OrgID, en.BucketID, en.Min, en.Max)
|
|
}
|
|
|
|
return nil
|
|
})
|
|
|
|
e.logger.Info("Reloaded WAL",
|
|
zap.String("path", e.wal.Path()),
|
|
zap.Duration("duration", time.Since(now)),
|
|
zap.Error(err))
|
|
|
|
return err
|
|
}
|
|
|
|
// runRetentionEnforcer runs the retention enforcer in a separate goroutine.
|
|
//
|
|
// Currently this just runs on an interval, but in the future we will add the
|
|
// ability to reschedule the retention enforcement if there are not enough
|
|
// resources available.
|
|
func (e *Engine) runRetentionEnforcer() {
|
|
interval := time.Duration(e.config.RetentionInterval)
|
|
|
|
if interval == 0 {
|
|
e.logger.Info("Retention enforcer disabled")
|
|
return // Enforcer disabled.
|
|
} else if interval < 0 {
|
|
e.logger.Error("Negative retention interval", logger.DurationLiteral("check_interval", interval))
|
|
return
|
|
}
|
|
|
|
if e.retentionEnforcer != nil {
|
|
// Set default metric labels on retention enforcer.
|
|
e.retentionEnforcer.metrics = newRetentionMetrics(e.defaultMetricLabels)
|
|
}
|
|
|
|
l := e.logger.With(zap.String("component", "retention_enforcer"), logger.DurationLiteral("check_interval", interval))
|
|
l.Info("Starting")
|
|
|
|
ticker := time.NewTicker(interval)
|
|
e.wg.Add(1)
|
|
go func() {
|
|
defer e.wg.Done()
|
|
for {
|
|
// It's safe to read closing without a lock because it's never
|
|
// modified if this goroutine is active.
|
|
select {
|
|
case <-e.closing:
|
|
l.Info("Stopping")
|
|
return
|
|
case <-ticker.C:
|
|
e.retentionEnforcer.run()
|
|
}
|
|
}
|
|
}()
|
|
}
|
|
|
|
// Close closes the store and all underlying resources. It returns an error if
|
|
// any of the underlying systems fail to close.
|
|
func (e *Engine) Close() error {
|
|
e.mu.RLock()
|
|
if e.closing == nil {
|
|
return nil // Already closed
|
|
}
|
|
|
|
close(e.closing)
|
|
e.mu.RUnlock()
|
|
|
|
// Wait for any other goroutines to finish.
|
|
e.wg.Wait()
|
|
|
|
e.mu.Lock()
|
|
defer e.mu.Unlock()
|
|
e.closing = nil
|
|
|
|
var ch closeHelper
|
|
ch.Close(e.engine)
|
|
ch.Close(e.wal)
|
|
ch.Close(e.index)
|
|
ch.Close(e.sfile)
|
|
return ch.Done()
|
|
}
|
|
|
|
// CreateSeriesCursor creates a SeriesCursor for usage with the read service.
|
|
func (e *Engine) CreateSeriesCursor(ctx context.Context, req SeriesCursorRequest, cond influxql.Expr) (SeriesCursor, error) {
|
|
e.mu.RLock()
|
|
defer e.mu.RUnlock()
|
|
if e.closing == nil {
|
|
return nil, ErrEngineClosed
|
|
}
|
|
|
|
return newSeriesCursor(req, e.index, e.sfile, cond)
|
|
}
|
|
|
|
// CreateCursorIterator creates a CursorIterator for usage with the read service.
|
|
func (e *Engine) CreateCursorIterator(ctx context.Context) (tsdb.CursorIterator, error) {
|
|
e.mu.RLock()
|
|
defer e.mu.RUnlock()
|
|
if e.closing == nil {
|
|
return nil, ErrEngineClosed
|
|
}
|
|
return e.engine.CreateCursorIterator(ctx)
|
|
}
|
|
|
|
// WritePoints writes the provided points to the engine.
|
|
//
|
|
// The Engine expects all points to have been correctly validated by the caller.
|
|
// However, WritePoints will determine if any tag key-pairs are missing, or if
|
|
// there are any field type conflicts.
|
|
//
|
|
// Appropriate errors are returned in those cases.
|
|
func (e *Engine) WritePoints(ctx context.Context, points []models.Point) error {
|
|
span, ctx := tracing.StartSpanFromContext(ctx)
|
|
defer span.Finish()
|
|
|
|
collection, j := tsdb.NewSeriesCollection(points), 0
|
|
|
|
// dropPoint should be called whenever there is reason to drop a point from
|
|
// the batch.
|
|
dropPoint := func(key []byte, reason string) {
|
|
if collection.Reason == "" {
|
|
collection.Reason = reason
|
|
}
|
|
collection.Dropped++
|
|
collection.DroppedKeys = append(collection.DroppedKeys, key)
|
|
}
|
|
|
|
for iter := collection.Iterator(); iter.Next(); {
|
|
tags := iter.Tags()
|
|
|
|
// Not enough tags present.
|
|
if tags.Len() < 2 {
|
|
dropPoint(iter.Key(), fmt.Sprintf("missing required tags: parsed tags: %q", tags))
|
|
continue
|
|
}
|
|
|
|
// First tag key is not measurement tag.
|
|
if !bytes.Equal(tags[0].Key, models.MeasurementTagKeyBytes) {
|
|
dropPoint(iter.Key(), fmt.Sprintf("missing required measurement tag as first tag, got: %q", tags[0].Key))
|
|
continue
|
|
}
|
|
|
|
fkey, fval := tags[len(tags)-1].Key, tags[len(tags)-1].Value
|
|
|
|
// Last tag key is not field tag.
|
|
if !bytes.Equal(fkey, models.FieldKeyTagKeyBytes) {
|
|
dropPoint(iter.Key(), fmt.Sprintf("missing required field key tag as last tag, got: %q", tags[0].Key))
|
|
continue
|
|
}
|
|
|
|
// The value representing the underlying field key is invalid if it's "time".
|
|
if bytes.Equal(fval, timeBytes) {
|
|
dropPoint(iter.Key(), fmt.Sprintf("invalid field key: input field %q is invalid", timeBytes))
|
|
continue
|
|
}
|
|
|
|
// Filter out any tags with key equal to "time": they are invalid.
|
|
if tags.Get(timeBytes) != nil {
|
|
dropPoint(iter.Key(), fmt.Sprintf("invalid tag key: input tag %q on measurement %q is invalid", timeBytes, iter.Name()))
|
|
continue
|
|
}
|
|
|
|
// Drop any point with invalid unicode characters in any of the tag keys or values.
|
|
// This will also cover validating the value used to represent the field key.
|
|
if !models.ValidTagTokens(tags) {
|
|
dropPoint(iter.Key(), fmt.Sprintf("key contains invalid unicode: %q", iter.Key()))
|
|
continue
|
|
}
|
|
|
|
collection.Copy(j, iter.Index())
|
|
j++
|
|
}
|
|
collection.Truncate(j)
|
|
|
|
e.mu.RLock()
|
|
defer e.mu.RUnlock()
|
|
|
|
if e.closing == nil {
|
|
return ErrEngineClosed
|
|
}
|
|
|
|
// Convert the collection to values for adding to the WAL/Cache.
|
|
values, err := tsm1.CollectionToValues(collection)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Add the write to the WAL to be replayed if there is a crash or shutdown.
|
|
if _, err := e.wal.WriteMulti(ctx, values); err != nil {
|
|
return err
|
|
}
|
|
|
|
return e.writePointsLocked(ctx, collection, values)
|
|
}
|
|
|
|
// writePointsLocked does the work of writing points and must be called under some sort of lock.
|
|
func (e *Engine) writePointsLocked(ctx context.Context, collection *tsdb.SeriesCollection, values map[string][]value.Value) error {
|
|
span, _ := tracing.StartSpanFromContext(ctx)
|
|
defer span.Finish()
|
|
|
|
// TODO(jeff): keep track of the values in the collection so that partial write
|
|
// errors get tracked all the way. Right now, the engine doesn't drop any values
|
|
// but if it ever did, the errors could end up missing some data.
|
|
|
|
// Add new series to the index and series file.
|
|
if err := e.index.CreateSeriesListIfNotExists(collection); err != nil {
|
|
return err
|
|
}
|
|
|
|
// If there was a PartialWriteError, that means the passed in values may contain
|
|
// more than the points so we need to recreate them.
|
|
if collection.PartialWriteError() != nil {
|
|
var err error
|
|
values, err = tsm1.CollectionToValues(collection)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// Write the values to the engine.
|
|
if err := e.engine.WriteValues(values); err != nil {
|
|
return err
|
|
}
|
|
|
|
return collection.PartialWriteError()
|
|
}
|
|
|
|
// AcquireSegments closes the current WAL segment, gets the set of all the currently closed
|
|
// segments, and calls the callback. It does all of this under the lock on the engine.
|
|
func (e *Engine) AcquireSegments(ctx context.Context, fn func(segs []string) error) error {
|
|
span, _ := tracing.StartSpanFromContext(ctx)
|
|
defer span.Finish()
|
|
|
|
e.mu.Lock()
|
|
defer e.mu.Unlock()
|
|
|
|
if err := e.wal.CloseSegment(); err != nil {
|
|
return err
|
|
}
|
|
|
|
segments, err := e.wal.ClosedSegments()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return fn(segments)
|
|
}
|
|
|
|
// CommitSegments calls the callback and if that does not return an error, removes the segment
|
|
// files from the WAL. It does all of this under the lock on the engine.
|
|
func (e *Engine) CommitSegments(ctx context.Context, segs []string, fn func() error) error {
|
|
e.mu.Lock()
|
|
defer e.mu.Unlock()
|
|
|
|
if err := fn(); err != nil {
|
|
return err
|
|
}
|
|
|
|
return e.wal.Remove(ctx, segs)
|
|
}
|
|
|
|
// DeleteBucket deletes an entire bucket from the storage engine.
|
|
func (e *Engine) DeleteBucket(orgID, bucketID platform.ID) error {
|
|
return e.DeleteBucketRange(orgID, bucketID, math.MinInt64, math.MaxInt64)
|
|
}
|
|
|
|
// DeleteBucketRange deletes an entire bucket from the storage engine.
|
|
func (e *Engine) DeleteBucketRange(orgID, bucketID platform.ID, min, max int64) error {
|
|
e.mu.RLock()
|
|
defer e.mu.RUnlock()
|
|
if e.closing == nil {
|
|
return ErrEngineClosed
|
|
}
|
|
|
|
// Add the delete to the WAL to be replayed if there is a crash or shutdown.
|
|
if _, err := e.wal.DeleteBucketRange(orgID, bucketID, min, max); err != nil {
|
|
return err
|
|
}
|
|
|
|
return e.deleteBucketRangeLocked(orgID, bucketID, min, max)
|
|
}
|
|
|
|
// deleteBucketRangeLocked does the work of deleting a bucket range and must be called under
|
|
// some sort of lock.
|
|
func (e *Engine) deleteBucketRangeLocked(orgID, bucketID platform.ID, min, max int64) error {
|
|
// TODO(edd): we need to clean up how we're encoding the prefix so that we
|
|
// don't have to remember to get it right everywhere we need to touch TSM data.
|
|
encoded := tsdb.EncodeName(orgID, bucketID)
|
|
name := models.EscapeMeasurement(encoded[:])
|
|
|
|
return e.engine.DeleteBucketRange(name, min, max)
|
|
}
|
|
|
|
// SeriesCardinality returns the number of series in the engine.
|
|
func (e *Engine) SeriesCardinality() int64 {
|
|
e.mu.RLock()
|
|
defer e.mu.RUnlock()
|
|
if e.closing == nil {
|
|
return 0
|
|
}
|
|
return e.index.SeriesN()
|
|
}
|
|
|
|
// Path returns the path of the engine's base directory.
|
|
func (e *Engine) Path() string {
|
|
return e.path
|
|
}
|
|
|
|
// ApplyFnToSeriesIDSet allows the caller to apply fn to the SeriesIDSet held
|
|
// within the engine's index.
|
|
func (e *Engine) ApplyFnToSeriesIDSet(fn func(*tsdb.SeriesIDSet)) {
|
|
e.mu.RLock()
|
|
defer e.mu.RUnlock()
|
|
if e.closing == nil {
|
|
return
|
|
}
|
|
fn(e.index.SeriesIDSet())
|
|
}
|
|
|
|
// MeasurementCardinalityStats returns cardinality stats for all measurements.
|
|
func (e *Engine) MeasurementCardinalityStats() tsi1.MeasurementCardinalityStats {
|
|
return e.index.MeasurementCardinalityStats()
|
|
}
|
|
|
|
// MeasurementStats returns the current measurement stats for the engine.
|
|
func (e *Engine) MeasurementStats() (tsm1.MeasurementStats, error) {
|
|
return e.engine.MeasurementStats()
|
|
}
|