2019-11-13 05:01:29 +08:00
|
|
|
/*
|
|
|
|
* StorageCache.actor.cpp
|
|
|
|
*
|
|
|
|
* This source file is part of the FoundationDB open source project
|
|
|
|
*
|
|
|
|
* Copyright 2013-2019 Apple Inc. and the FoundationDB project authors
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2020-02-26 02:45:02 +08:00
|
|
|
#include "flow/Arena.h"
|
|
|
|
#include "fdbclient/FDBOptions.g.h"
|
|
|
|
#include "fdbclient/NativeAPI.actor.h"
|
|
|
|
#include "fdbclient/SystemData.h"
|
2019-11-13 05:01:29 +08:00
|
|
|
#include "fdbserver/Knobs.h"
|
|
|
|
#include "fdbserver/ServerDBInfo.h"
|
|
|
|
#include "fdbclient/StorageServerInterface.h"
|
|
|
|
#include "fdbclient/VersionedMap.h"
|
|
|
|
#include "fdbclient/KeyRangeMap.h"
|
|
|
|
#include "fdbclient/Atomic.h"
|
|
|
|
#include "fdbclient/Notified.h"
|
2020-01-08 05:06:58 +08:00
|
|
|
#include "fdbserver/LogProtocolMessage.h"
|
2019-11-13 05:01:29 +08:00
|
|
|
#include "fdbserver/LogSystem.h"
|
Clean up and rework the debugMutation API.
As a relatively unknown debugging tool for simulation tests, one could
have simulation print when a particular key is handled in various stages
of the commit process. This functionality was enabled by changing a 0
to a 1 in an #if, and changing a constant to the key in question.
As a proxy and storage server handle mutations, they call debugMutation
or debugKeyRange, which then checks against the mutation against the key
in question, and logs if they match. A mixture of printfs and
TraceEvents would then be emitted, and for this to actually be usable,
one also needs to comment out some particularly spammy debugKeyRange()
calls.
This PR reworks the API of debugMutation/debugKeyRange, pulls it out
into its own file, and trims what is logged by default into something
useful and understandable:
* debugMutation() now returns a TraceEvent, that one can add more details to before it is logged.
* Data distribution and storage server cleanup operations are no longer logged by default
2020-03-27 16:35:26 +08:00
|
|
|
#include "fdbserver/MutationTracking.h"
|
2019-11-13 05:01:29 +08:00
|
|
|
#include "fdbserver/WaitFailure.h"
|
|
|
|
#include "fdbserver/WorkerInterface.actor.h"
|
2020-01-08 05:06:58 +08:00
|
|
|
#include "fdbclient/DatabaseContext.h"
|
|
|
|
#include "fdbclient/NativeAPI.actor.h"
|
|
|
|
#include "flow/Trace.h"
|
2021-03-11 02:06:03 +08:00
|
|
|
#include "flow/actorcompiler.h" // This must be the last #include.
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// TODO storageCache server shares quite a bit of storageServer functionality, although simplified
|
2019-11-13 05:01:29 +08:00
|
|
|
// Need to look into refactoring common code out for better code readability and to avoid duplication
|
|
|
|
|
2021-04-20 04:32:49 +08:00
|
|
|
namespace {
|
2021-03-11 02:06:03 +08:00
|
|
|
// TODO rename wrong_shard_server error to wrong_cache_server
|
2021-04-20 04:32:49 +08:00
|
|
|
bool canReplyWith(Error e) {
|
2021-03-11 02:06:03 +08:00
|
|
|
switch (e.code()) {
|
|
|
|
case error_code_transaction_too_old:
|
|
|
|
case error_code_future_version:
|
|
|
|
case error_code_wrong_shard_server:
|
|
|
|
case error_code_cold_cache_server:
|
|
|
|
case error_code_process_behind:
|
|
|
|
// case error_code_all_alternatives_failed:
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
2019-11-13 05:01:29 +08:00
|
|
|
};
|
|
|
|
}
|
2021-04-20 04:32:49 +08:00
|
|
|
} // namespace
|
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
class StorageCacheUpdater;
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2019-12-06 09:10:32 +08:00
|
|
|
struct AddingCacheRange : NonCopyable {
|
|
|
|
KeyRange keys;
|
2021-03-11 02:06:03 +08:00
|
|
|
Future<Void> fetchClient; // holds FetchKeys() actor
|
2019-12-06 09:10:32 +08:00
|
|
|
Promise<Void> fetchComplete;
|
|
|
|
Promise<Void> readWrite;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
std::deque<Standalone<VerUpdateRef>>
|
|
|
|
updates; // during the Fetching phase, mutations with key in keys and version>=(fetchClient's) fetchVersion;
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
struct StorageCacheData* server;
|
|
|
|
Version transferredVersion;
|
|
|
|
|
|
|
|
enum Phase { WaitPrevious, Fetching, Waiting };
|
|
|
|
|
|
|
|
Phase phase;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
AddingCacheRange(StorageCacheData* server, KeyRangeRef const& keys);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
~AddingCacheRange() {
|
2021-03-11 02:06:03 +08:00
|
|
|
if (!fetchComplete.isSet())
|
2019-12-06 09:10:32 +08:00
|
|
|
fetchComplete.send(Void());
|
2021-03-11 02:06:03 +08:00
|
|
|
if (!readWrite.isSet())
|
2019-12-06 09:10:32 +08:00
|
|
|
readWrite.send(Void());
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
void addMutation(Version version, MutationRef const& mutation);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
bool isTransferred() const { return phase == Waiting; }
|
|
|
|
};
|
|
|
|
|
2020-12-27 10:34:46 +08:00
|
|
|
class CacheRangeInfo : public ReferenceCounted<CacheRangeInfo>, NonCopyable {
|
2021-03-11 02:06:03 +08:00
|
|
|
CacheRangeInfo(KeyRange keys, std::unique_ptr<AddingCacheRange>&& adding, StorageCacheData* readWrite)
|
|
|
|
: adding(std::move(adding)), readWrite(readWrite), keys(keys) {}
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-12-27 10:34:46 +08:00
|
|
|
public:
|
|
|
|
std::unique_ptr<AddingCacheRange> adding;
|
|
|
|
struct StorageCacheData* readWrite;
|
|
|
|
KeyRange keys;
|
|
|
|
uint64_t changeCounter;
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-08-19 05:18:50 +08:00
|
|
|
static CacheRangeInfo* newNotAssigned(KeyRange keys) { return new CacheRangeInfo(keys, nullptr, nullptr); }
|
2021-03-11 02:06:03 +08:00
|
|
|
static CacheRangeInfo* newReadWrite(KeyRange keys, StorageCacheData* data) {
|
|
|
|
return new CacheRangeInfo(keys, nullptr, data);
|
|
|
|
}
|
|
|
|
static CacheRangeInfo* newAdding(StorageCacheData* data, KeyRange keys) {
|
|
|
|
return new CacheRangeInfo(keys, std::make_unique<AddingCacheRange>(data, keys), nullptr);
|
|
|
|
}
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
bool isReadable() const { return readWrite != nullptr; }
|
|
|
|
bool isAdding() const { return adding != nullptr; }
|
2019-12-06 09:10:32 +08:00
|
|
|
bool notAssigned() const { return !readWrite && !adding; }
|
|
|
|
bool assigned() const { return readWrite || adding; }
|
|
|
|
bool isInVersionedData() const { return readWrite || (adding && adding->isTransferred()); }
|
2021-03-11 02:06:03 +08:00
|
|
|
void addMutation(Version version, MutationRef const& mutation);
|
|
|
|
bool isFetched() const { return readWrite || (adding && adding->fetchComplete.isSet()); }
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
const char* debugDescribeState() const {
|
2021-03-11 02:06:03 +08:00
|
|
|
if (notAssigned())
|
|
|
|
return "NotAssigned";
|
|
|
|
else if (adding && !adding->isTransferred())
|
|
|
|
return "AddingFetching";
|
|
|
|
else if (adding)
|
|
|
|
return "AddingTransferred";
|
|
|
|
else
|
|
|
|
return "ReadWrite";
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
};
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2020-05-13 05:27:11 +08:00
|
|
|
const int VERSION_OVERHEAD =
|
|
|
|
64 + sizeof(Version) + sizeof(Standalone<VerUpdateRef>) + // mutationLog, 64b overhead for map
|
|
|
|
2 * (64 + sizeof(Version) +
|
|
|
|
sizeof(
|
|
|
|
Reference<VersionedMap<KeyRef,
|
|
|
|
ValueOrClearToRef>::PTreeT>)); // versioned map [ x2 for createNewVersion(version+1)
|
|
|
|
// ], 64b overhead for map
|
2021-03-11 02:06:03 +08:00
|
|
|
static int mvccStorageBytes(MutationRef const& m) {
|
|
|
|
return VersionedMap<KeyRef, ValueOrClearToRef>::overheadPerItem * 2 +
|
|
|
|
(MutationRef::OVERHEAD_BYTES + m.param1.size() + m.param2.size()) * 2;
|
|
|
|
}
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2019-12-06 09:10:32 +08:00
|
|
|
struct FetchInjectionInfo {
|
|
|
|
Arena arena;
|
2021-09-17 08:42:34 +08:00
|
|
|
std::vector<VerUpdateRef> changes;
|
2019-12-06 09:10:32 +08:00
|
|
|
};
|
|
|
|
|
2019-11-13 05:01:29 +08:00
|
|
|
struct StorageCacheData {
|
|
|
|
typedef VersionedMap<KeyRef, ValueOrClearToRef> VersionedData;
|
2021-03-11 02:06:03 +08:00
|
|
|
// typedef VersionedMap<KeyRef, ValueOrClearToRef, FastAllocPTree<KeyRef>> VersionedData;
|
2019-11-13 05:01:29 +08:00
|
|
|
private:
|
|
|
|
// in-memory versioned struct (PTree as of now. Subject to change)
|
|
|
|
VersionedData versionedData;
|
|
|
|
// in-memory mutationLog that the versionedData contains references to
|
|
|
|
// TODO change it to a deque, already contains mutations in version order
|
2020-05-13 05:27:11 +08:00
|
|
|
std::map<Version, Standalone<VerUpdateRef>> mutationLog; // versions (durableVersion, version]
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
public:
|
|
|
|
UID thisServerID; // unique id
|
|
|
|
uint16_t index; // server index
|
2020-03-27 03:39:07 +08:00
|
|
|
ProtocolVersion logProtocol;
|
2020-01-08 05:06:58 +08:00
|
|
|
Reference<ILogSystem> logSystem;
|
2021-03-11 02:06:03 +08:00
|
|
|
Key ck; // cacheKey
|
2021-07-12 12:18:09 +08:00
|
|
|
Reference<AsyncVar<ServerDBInfo> const> db;
|
2020-05-07 09:56:42 +08:00
|
|
|
Database cx;
|
2021-03-11 02:06:03 +08:00
|
|
|
StorageCacheUpdater* updater;
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// KeyRangeMap <bool> cachedRangeMap; // map of cached key-ranges
|
|
|
|
KeyRangeMap<Reference<CacheRangeInfo>> cachedRangeMap; // map of cached key-ranges
|
|
|
|
uint64_t cacheRangeChangeCounter; // Max( CacheRangeInfo->changecounter )
|
2020-01-08 05:06:58 +08:00
|
|
|
|
|
|
|
// TODO Add cache metrics, such as available memory/in-use memory etc to help dat adistributor assign cached ranges
|
2021-03-11 02:06:03 +08:00
|
|
|
// StorageCacheMetrics metrics;
|
2020-01-08 05:06:58 +08:00
|
|
|
|
|
|
|
// newestAvailableVersion[k]
|
|
|
|
// == invalidVersion -> k is unavailable at all versions
|
|
|
|
// <= compactVersion -> k is unavailable at all versions
|
2021-03-11 02:06:03 +08:00
|
|
|
// == v -> k is readable (from versionedData) @ (oldestVersion,v], and not being updated when version
|
|
|
|
// increases
|
|
|
|
// == latestVersion -> k is readable (from versionedData) @ (oldestVersion,version.get()], and thus stays
|
|
|
|
// available when version increases
|
|
|
|
CoalescedKeyRangeMap<Version> newestAvailableVersion;
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
CoalescedKeyRangeMap<Version> newestDirtyVersion; // Similar to newestAvailableVersion, but includes (only) keys
|
|
|
|
// that were only partly available (due to cancelled fetchKeys)
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
// The following are in rough order from newest to oldest
|
|
|
|
// TODO double check which ones we need for storageCache servers
|
|
|
|
Version lastTLogVersion, lastVersionWithData;
|
2021-03-11 02:06:03 +08:00
|
|
|
Version peekVersion; // version to peek the log at
|
|
|
|
NotifiedVersion version; // current version i.e. the max version that can be read from the cache
|
|
|
|
NotifiedVersion desiredOldestVersion; // oldestVersion can be increased to this after compaction
|
|
|
|
NotifiedVersion oldestVersion; // Min version that might be read from the cache
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
// TODO not really in use as of now. may need in some failure cases. Revisit and remove if no plausible use
|
|
|
|
Future<Void> compactionInProgress;
|
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
FlowLock updateVersionLock;
|
2019-12-06 09:10:32 +08:00
|
|
|
FlowLock fetchKeysParallelismLock;
|
2021-09-17 08:42:34 +08:00
|
|
|
std::vector<Promise<FetchInjectionInfo*>> readyFetchKeys;
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// TODO do we need otherError here?
|
2019-11-13 05:01:29 +08:00
|
|
|
Promise<Void> otherError;
|
2020-01-08 05:06:58 +08:00
|
|
|
Promise<Void> coreStarted;
|
|
|
|
|
|
|
|
bool debug_inApplyUpdate;
|
|
|
|
double debug_lastValidateTime;
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
int64_t versionLag; // An estimate for how many versions it takes for the data to move from the logs to this cache
|
|
|
|
// server
|
2019-11-13 05:01:29 +08:00
|
|
|
bool behind;
|
|
|
|
|
|
|
|
// TODO double check which ones we need for storageCache servers
|
|
|
|
struct Counters {
|
|
|
|
CounterCollection cc;
|
2020-01-08 05:06:58 +08:00
|
|
|
Counter allQueries, getKeyQueries, getValueQueries, getRangeQueries, finishedQueries, rowsQueried, bytesQueried;
|
2021-03-11 02:06:03 +08:00
|
|
|
Counter bytesInput, bytesFetched, mutationBytes; // Like bytesInput but without MVCC accounting
|
2019-11-13 05:01:29 +08:00
|
|
|
Counter mutations, setMutations, clearRangeMutations, atomicMutations;
|
|
|
|
Counter updateBatches, updateVersions;
|
|
|
|
Counter loops;
|
|
|
|
Counter readsRejected;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// LatencyBands readLatencyBands;
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
Counters(StorageCacheData* self)
|
2021-07-25 02:20:51 +08:00
|
|
|
: cc("StorageCacheServer", self->thisServerID.toString()), allQueries("QueryQueue", cc),
|
|
|
|
getKeyQueries("GetKeyQueries", cc), getValueQueries("GetValueQueries", cc),
|
|
|
|
getRangeQueries("GetRangeQueries", cc), finishedQueries("FinishedQueries", cc),
|
|
|
|
rowsQueried("RowsQueried", cc), bytesQueried("BytesQueried", cc), bytesInput("BytesInput", cc),
|
|
|
|
bytesFetched("BytesFetched", cc), mutationBytes("MutationBytes", cc), mutations("Mutations", cc),
|
|
|
|
setMutations("SetMutations", cc), clearRangeMutations("ClearRangeMutations", cc),
|
|
|
|
atomicMutations("AtomicMutations", cc), updateBatches("UpdateBatches", cc),
|
|
|
|
updateVersions("UpdateVersions", cc), loops("Loops", cc), readsRejected("ReadsRejected", cc) {
|
2021-03-11 02:06:03 +08:00
|
|
|
specialCounter(cc, "LastTLogVersion", [self]() { return self->lastTLogVersion; });
|
|
|
|
specialCounter(cc, "Version", [self]() { return self->version.get(); });
|
|
|
|
specialCounter(cc, "VersionLag", [self]() { return self->versionLag; });
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
} counters;
|
|
|
|
|
2021-07-12 12:18:09 +08:00
|
|
|
explicit StorageCacheData(UID thisServerID, uint16_t index, Reference<AsyncVar<ServerDBInfo> const> const& db)
|
2021-03-11 02:06:03 +08:00
|
|
|
: /*versionedData(FastAllocPTree<KeyRef>{std::make_shared<int>(0)}), */
|
|
|
|
thisServerID(thisServerID), index(index), logProtocol(0), db(db), cacheRangeChangeCounter(0),
|
|
|
|
lastTLogVersion(0), lastVersionWithData(0), peekVersion(0), compactionInProgress(Void()),
|
|
|
|
fetchKeysParallelismLock(SERVER_KNOBS->FETCH_KEYS_PARALLELISM_BYTES), debug_inApplyUpdate(false),
|
|
|
|
debug_lastValidateTime(0), versionLag(0), behind(false), counters(this) {
|
2019-11-13 05:01:29 +08:00
|
|
|
version.initMetric(LiteralStringRef("StorageCacheData.Version"), counters.cc.id);
|
|
|
|
desiredOldestVersion.initMetric(LiteralStringRef("StorageCacheData.DesriedOldestVersion"), counters.cc.id);
|
|
|
|
oldestVersion.initMetric(LiteralStringRef("StorageCacheData.OldestVersion"), counters.cc.id);
|
2019-12-07 05:28:44 +08:00
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
newestAvailableVersion.insert(allKeys, invalidVersion);
|
|
|
|
newestDirtyVersion.insert(allKeys, invalidVersion);
|
2021-03-11 02:06:03 +08:00
|
|
|
addCacheRange(CacheRangeInfo::newNotAssigned(allKeys));
|
2021-07-17 15:11:40 +08:00
|
|
|
cx = openDBOnServer(db, TaskPriority::DefaultEndpoint, LockAware::True);
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
// Puts the given cacheRange into cachedRangeMap. The caller is responsible for adding cacheRanges
|
|
|
|
// for all ranges in cachedRangeMap.getAffectedRangesAfterInsertion(newCacheRange->keys)), because these
|
|
|
|
// cacheRanges are invalidated by the call.
|
2021-03-11 02:06:03 +08:00
|
|
|
void addCacheRange(CacheRangeInfo* newCacheRange) {
|
|
|
|
ASSERT(!newCacheRange->keys.empty());
|
2020-01-08 05:06:58 +08:00
|
|
|
newCacheRange->changeCounter = ++cacheRangeChangeCounter;
|
2020-02-26 09:32:24 +08:00
|
|
|
//TraceEvent(SevDebug, "AddCacheRange", this->thisServerID).detail("KeyBegin", newCacheRange->keys.begin).detail("KeyEnd", newCacheRange->keys.end).
|
2021-03-11 02:06:03 +08:00
|
|
|
// detail("State", newCacheRange->isReadable() ? "Readable" : newCacheRange->notAssigned() ? "NotAssigned" :
|
|
|
|
// "Adding").detail("Version", this->version.get());
|
|
|
|
cachedRangeMap.insert(newCacheRange->keys, Reference<CacheRangeInfo>(newCacheRange));
|
2020-01-08 05:06:58 +08:00
|
|
|
}
|
2019-11-13 05:01:29 +08:00
|
|
|
void addMutation(KeyRangeRef const& cachedKeyRange, Version version, MutationRef const& mutation);
|
2021-03-11 02:06:03 +08:00
|
|
|
void applyMutation(MutationRef const& m, Arena& arena, VersionedData& data);
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
bool isReadable(KeyRangeRef const& keys) {
|
2019-11-13 05:01:29 +08:00
|
|
|
auto cr = cachedRangeMap.intersectingRanges(keys);
|
2021-03-11 02:06:03 +08:00
|
|
|
for (auto i = cr.begin(); i != cr.end(); ++i)
|
2019-12-06 09:10:32 +08:00
|
|
|
if (!i->value()->isReadable())
|
2019-11-13 05:01:29 +08:00
|
|
|
return false;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
void checkChangeCounter(uint64_t oldCacheRangeChangeCounter, KeyRef const& key) {
|
2020-01-08 05:06:58 +08:00
|
|
|
if (oldCacheRangeChangeCounter != cacheRangeChangeCounter &&
|
2021-03-11 02:06:03 +08:00
|
|
|
cachedRangeMap[key]->changeCounter > oldCacheRangeChangeCounter) {
|
2020-01-08 05:06:58 +08:00
|
|
|
TEST(true); // CacheRange change during getValueQ
|
2020-01-15 04:33:17 +08:00
|
|
|
// TODO: should we throw the cold_cache_server() error here instead?
|
2020-01-08 05:06:58 +08:00
|
|
|
throw wrong_shard_server();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
void checkChangeCounter(uint64_t oldCacheRangeChangeCounter, KeyRangeRef const& keys) {
|
2020-01-08 05:06:58 +08:00
|
|
|
if (oldCacheRangeChangeCounter != cacheRangeChangeCounter) {
|
|
|
|
auto sh = cachedRangeMap.intersectingRanges(keys);
|
2021-03-11 02:06:03 +08:00
|
|
|
for (auto i = sh.begin(); i != sh.end(); ++i)
|
2020-01-08 05:06:58 +08:00
|
|
|
if (i->value()->changeCounter > oldCacheRangeChangeCounter) {
|
|
|
|
TEST(true); // CacheRange change during range operation
|
2020-01-15 04:33:17 +08:00
|
|
|
// TODO: should we throw the cold_cache_server() error here instead?
|
2020-01-08 05:06:58 +08:00
|
|
|
throw wrong_shard_server();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-13 05:01:29 +08:00
|
|
|
Arena lastArena;
|
2020-07-29 15:31:55 +08:00
|
|
|
std::map<Version, Standalone<VerUpdateRef>> const& getMutationLog() const { return mutationLog; }
|
2020-05-13 05:27:11 +08:00
|
|
|
std::map<Version, Standalone<VerUpdateRef>>& getMutableMutationLog() { return mutationLog; }
|
2019-11-13 05:01:29 +08:00
|
|
|
VersionedData const& data() const { return versionedData; }
|
|
|
|
VersionedData& mutableData() { return versionedData; }
|
|
|
|
|
2020-05-13 05:27:11 +08:00
|
|
|
Standalone<VerUpdateRef>& addVersionToMutationLog(Version v) {
|
2019-11-13 05:01:29 +08:00
|
|
|
// return existing version...
|
|
|
|
auto m = mutationLog.find(v);
|
|
|
|
if (m != mutationLog.end())
|
|
|
|
return m->second;
|
|
|
|
|
|
|
|
// ...or create a new one
|
|
|
|
auto& u = mutationLog[v];
|
|
|
|
u.version = v;
|
2021-03-11 02:06:03 +08:00
|
|
|
if (lastArena.getSize() >= 65536)
|
|
|
|
lastArena = Arena(4096);
|
2019-11-13 05:01:29 +08:00
|
|
|
u.arena() = lastArena;
|
|
|
|
counters.bytesInput += VERSION_OVERHEAD;
|
|
|
|
return u;
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
MutationRef addMutationToMutationLog(Standalone<VerUpdateRef>& mLV, MutationRef const& m) {
|
|
|
|
// TODO find out more
|
|
|
|
// byteSampleApplyMutation(m, mLV.version);
|
2019-11-13 05:01:29 +08:00
|
|
|
counters.bytesInput += mvccStorageBytes(m);
|
2020-05-13 05:27:11 +08:00
|
|
|
return mLV.push_back_deep(mLV.arena(), m);
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
};
|
2021-03-11 02:06:03 +08:00
|
|
|
void applyMutation(StorageCacheUpdater* updater, StorageCacheData* data, MutationRef const& mutation, Version version);
|
2020-01-08 05:06:58 +08:00
|
|
|
|
|
|
|
/////////////////////////////////// Validation ///////////////////////////////////////
|
|
|
|
#pragma region Validation
|
2021-03-11 02:06:03 +08:00
|
|
|
bool validateCacheRange(StorageCacheData::VersionedData::ViewAtVersion const& view,
|
|
|
|
KeyRangeRef range,
|
|
|
|
Version version,
|
|
|
|
UID id,
|
|
|
|
Version minInsertVersion) {
|
2020-01-08 05:06:58 +08:00
|
|
|
// * Nonoverlapping: No clear overlaps a set or another clear, or adjoins another clear.
|
|
|
|
// * Old mutations are erased: All items in versionedData.atLatest() have insertVersion() > oldestVersion()
|
|
|
|
|
2020-02-26 09:32:24 +08:00
|
|
|
//TraceEvent(SevDebug, "ValidateRange", id).detail("KeyBegin", range.begin).detail("KeyEnd", range.end).detail("Version", version);
|
2020-01-08 05:06:58 +08:00
|
|
|
KeyRef k;
|
|
|
|
bool ok = true;
|
|
|
|
bool kIsClear = false;
|
|
|
|
auto i = view.lower_bound(range.begin);
|
2021-03-11 02:06:03 +08:00
|
|
|
if (i != view.begin())
|
|
|
|
--i;
|
|
|
|
for (; i != view.end() && i.key() < range.end; ++i) {
|
|
|
|
// TODO revisit this check. there could be nodes in PTree that were inserted, but never updated. their
|
|
|
|
// insertVersion thus maybe lower than the current oldest version of the versioned map
|
|
|
|
// if (i.insertVersion() <= minInsertVersion)
|
|
|
|
// TraceEvent(SevError,"SCValidateCacheRange",id).detail("IKey", i.key()).detail("Version",
|
|
|
|
// version).detail("InsertVersion", i.insertVersion()).detail("MinInsertVersion", minInsertVersion); ASSERT(
|
|
|
|
// i.insertVersion() > minInsertVersion );
|
2020-01-08 05:06:58 +08:00
|
|
|
if (kIsClear && i->isClearTo() ? i.key() <= k : i.key() < k) {
|
2021-03-11 02:06:03 +08:00
|
|
|
TraceEvent(SevError, "SCInvalidRange", id)
|
|
|
|
.detail("Key1", k)
|
|
|
|
.detail("Key2", i.key())
|
|
|
|
.detail("Version", version);
|
2020-01-08 05:06:58 +08:00
|
|
|
ok = false;
|
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
// ASSERT( i.key() >= k );
|
2020-01-08 05:06:58 +08:00
|
|
|
kIsClear = i->isClearTo();
|
|
|
|
k = kIsClear ? i->getEndKey() : i.key();
|
|
|
|
}
|
|
|
|
return ok;
|
|
|
|
}
|
|
|
|
|
|
|
|
void validate(StorageCacheData* data, bool force = false) {
|
|
|
|
try {
|
|
|
|
if (force || (EXPENSIVE_VALIDATION)) {
|
|
|
|
data->newestAvailableVersion.validateCoalesced();
|
|
|
|
data->newestDirtyVersion.validateCoalesced();
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
for (auto range = data->cachedRangeMap.ranges().begin(); range != data->cachedRangeMap.ranges().end();
|
|
|
|
++range) {
|
|
|
|
ASSERT(range->value()->keys == range->range());
|
|
|
|
ASSERT(!range->value()->keys.empty());
|
2020-01-08 05:06:58 +08:00
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
for (auto range = data->cachedRangeMap.ranges().begin(); range != data->cachedRangeMap.ranges().end();
|
|
|
|
++range)
|
2020-01-08 05:06:58 +08:00
|
|
|
if (range->value()->isReadable()) {
|
|
|
|
auto ar = data->newestAvailableVersion.intersectingRanges(range->range());
|
2021-03-11 02:06:03 +08:00
|
|
|
for (auto a = ar.begin(); a != ar.end(); ++a)
|
|
|
|
ASSERT(a->value() == latestVersion);
|
2020-01-08 05:06:58 +08:00
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// * versionedData contains versions [oldestVersion.get(), version.get()]. It might also contain later
|
|
|
|
// versions if applyUpdate is on the stack.
|
|
|
|
ASSERT(data->data().getOldestVersion() == data->oldestVersion.get());
|
|
|
|
ASSERT(data->data().getLatestVersion() == data->version.get() ||
|
|
|
|
data->data().getLatestVersion() == data->version.get() + 1 ||
|
|
|
|
(data->debug_inApplyUpdate && data->data().getLatestVersion() > data->version.get()));
|
2020-01-08 05:06:58 +08:00
|
|
|
|
|
|
|
auto latest = data->data().atLatest();
|
|
|
|
|
|
|
|
latest.validate();
|
|
|
|
validateCacheRange(latest, allKeys, data->version.get(), data->thisServerID, data->oldestVersion.get());
|
|
|
|
|
|
|
|
data->debug_lastValidateTime = now();
|
2020-03-05 07:18:49 +08:00
|
|
|
//TraceEvent(SevDebug, "SCValidationDone", data->thisServerID).detail("LastValidTime", data->debug_lastValidateTime);
|
2020-01-08 05:06:58 +08:00
|
|
|
}
|
|
|
|
} catch (...) {
|
2021-03-11 02:06:03 +08:00
|
|
|
TraceEvent(SevError, "SCValidationFailure", data->thisServerID)
|
|
|
|
.detail("LastValidTime", data->debug_lastValidateTime);
|
2020-01-08 05:06:58 +08:00
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#pragma endregion
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
///////////////////////////////////// Queries /////////////////////////////////
|
|
|
|
#pragma region Queries
|
2021-03-11 02:06:03 +08:00
|
|
|
ACTOR Future<Version> waitForVersion(StorageCacheData* data, Version version) {
|
2019-11-13 05:01:29 +08:00
|
|
|
// This could become an Actor transparently, but for now it just does the lookup
|
|
|
|
if (version == latestVersion)
|
|
|
|
version = std::max(Version(1), data->version.get());
|
2021-03-11 02:06:03 +08:00
|
|
|
if (version < data->oldestVersion.get() || version <= 0)
|
|
|
|
throw transaction_too_old();
|
2019-11-13 05:01:29 +08:00
|
|
|
else if (version <= data->version.get())
|
|
|
|
return version;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (data->behind && version > data->version.get()) {
|
2019-11-13 05:01:29 +08:00
|
|
|
throw process_behind();
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (deterministicRandom()->random01() < 0.001)
|
2021-07-27 10:55:10 +08:00
|
|
|
TraceEvent("WaitForVersion1000x").log();
|
2019-11-13 05:01:29 +08:00
|
|
|
choose {
|
2021-03-11 02:06:03 +08:00
|
|
|
when(wait(data->version.whenAtLeast(version))) {
|
|
|
|
// FIXME: A bunch of these can block with or without the following delay 0.
|
|
|
|
// wait( delay(0) ); // don't do a whole bunch of these at once
|
|
|
|
if (version < data->oldestVersion.get())
|
|
|
|
throw transaction_too_old();
|
2019-11-13 05:01:29 +08:00
|
|
|
return version;
|
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
when(wait(delay(SERVER_KNOBS->FUTURE_VERSION_DELAY))) {
|
|
|
|
if (deterministicRandom()->random01() < 0.001)
|
2019-11-13 05:01:29 +08:00
|
|
|
TraceEvent(SevWarn, "CacheServerFutureVersion1000x", data->thisServerID)
|
2021-03-11 02:06:03 +08:00
|
|
|
.detail("Version", version)
|
|
|
|
.detail("MyVersion", data->version.get())
|
|
|
|
.detail("ServerID", data->thisServerID);
|
2019-11-13 05:01:29 +08:00
|
|
|
throw future_version();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
ACTOR Future<Version> waitForVersionNoTooOld(StorageCacheData* data, Version version) {
|
2019-11-13 05:01:29 +08:00
|
|
|
// This could become an Actor transparently, but for now it just does the lookup
|
|
|
|
if (version == latestVersion)
|
|
|
|
version = std::max(Version(1), data->version.get());
|
|
|
|
if (version <= data->version.get())
|
|
|
|
return version;
|
|
|
|
choose {
|
2021-03-11 02:06:03 +08:00
|
|
|
when(wait(data->version.whenAtLeast(version))) { return version; }
|
|
|
|
when(wait(delay(SERVER_KNOBS->FUTURE_VERSION_DELAY))) {
|
|
|
|
if (deterministicRandom()->random01() < 0.001)
|
2019-11-13 05:01:29 +08:00
|
|
|
TraceEvent(SevWarn, "CacheServerFutureVersion1000x", data->thisServerID)
|
2021-03-11 02:06:03 +08:00
|
|
|
.detail("Version", version)
|
|
|
|
.detail("MyVersion", data->version.get())
|
|
|
|
.detail("ServerID", data->thisServerID);
|
2019-11-13 05:01:29 +08:00
|
|
|
throw future_version();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
ACTOR Future<Void> getValueQ(StorageCacheData* data, GetValueRequest req) {
|
2019-11-13 05:01:29 +08:00
|
|
|
state int64_t resultSize = 0;
|
|
|
|
try {
|
|
|
|
++data->counters.getValueQueries;
|
|
|
|
++data->counters.allQueries;
|
|
|
|
//++data->readQueueSizeMetric;
|
2021-03-11 02:06:03 +08:00
|
|
|
// TODO later
|
|
|
|
// data->maxQueryQueue = std::max<int>( data->maxQueryQueue, data->counters.allQueries.getValue() -
|
|
|
|
// data->counters.finishedQueries.getValue());
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
// Active load balancing runs at a very high priority (to obtain accurate queue lengths)
|
|
|
|
// so we need to downgrade here
|
2021-03-11 02:06:03 +08:00
|
|
|
// TODO what's this?
|
|
|
|
wait(delay(0, TaskPriority::DefaultEndpoint));
|
|
|
|
|
|
|
|
if (req.debugID.present()) {
|
|
|
|
g_traceBatch.addEvent("GetValueDebug",
|
|
|
|
req.debugID.get().first(),
|
|
|
|
"getValueQ.DoRead"); //.detail("TaskID", g_network->getCurrentTask());
|
|
|
|
// FIXME
|
2020-07-08 00:06:13 +08:00
|
|
|
}
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
state Optional<Value> v;
|
2021-03-11 02:06:03 +08:00
|
|
|
state Version version = wait(waitForVersion(data, req.version));
|
|
|
|
if (req.debugID.present())
|
|
|
|
g_traceBatch.addEvent("GetValueDebug",
|
|
|
|
req.debugID.get().first(),
|
|
|
|
"getValueQ.AfterVersion"); //.detail("TaskID", g_network->getCurrentTask());
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
state uint64_t changeCounter = data->cacheRangeChangeCounter;
|
|
|
|
|
2020-01-15 04:33:17 +08:00
|
|
|
if (data->cachedRangeMap[req.key]->notAssigned()) {
|
2020-03-05 07:18:49 +08:00
|
|
|
//TraceEvent(SevWarn, "WrongCacheServer", data->thisServerID).detail("Key", req.key).detail("ReqVersion", req.version).detail("DataVersion", data->version.get()).detail("In", "getValueQ");
|
2019-11-13 05:01:29 +08:00
|
|
|
throw wrong_shard_server();
|
2020-01-15 04:33:17 +08:00
|
|
|
} else if (!data->cachedRangeMap[req.key]->isReadable()) {
|
2020-03-05 07:18:49 +08:00
|
|
|
//TraceEvent(SevWarn, "ColdCacheServer", data->thisServerID).detail("Key", req.key).detail("IsAdding", data->cachedRangeMap[req.key]->isAdding())
|
|
|
|
// .detail("ReqVersion", req.version).detail("DataVersion", data->version.get()).detail("In", "getValueQ");
|
2020-01-15 06:29:41 +08:00
|
|
|
throw future_version();
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
state int path = 0;
|
|
|
|
auto i = data->data().at(version).lastLessOrEqual(req.key);
|
|
|
|
if (i && i->isValue() && i.key() == req.key) {
|
|
|
|
v = (Value)i->getValue();
|
|
|
|
path = 1;
|
2020-01-08 05:06:58 +08:00
|
|
|
// TODO: do we need to check changeCounter here?
|
|
|
|
data->checkChangeCounter(changeCounter, req.key);
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// DEBUG_MUTATION("CacheGetValue", version, MutationRef(MutationRef::DebugKey, req.key,
|
|
|
|
// v.present()?v.get():LiteralStringRef("<null>"))); DEBUG_MUTATION("CacheGetPath", version,
|
|
|
|
// MutationRef(MutationRef::DebugKey, req.key,
|
|
|
|
// path==0?LiteralStringRef("0"):path==1?LiteralStringRef("1"):LiteralStringRef("2")));
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
if (v.present()) {
|
|
|
|
++data->counters.rowsQueried;
|
|
|
|
resultSize = v.get().size();
|
|
|
|
data->counters.bytesQueried += resultSize;
|
2020-03-14 09:52:34 +08:00
|
|
|
//TraceEvent(SevDebug, "SCGetValueQPresent", data->thisServerID).detail("ResultSize",resultSize).detail("Version", version).detail("ReqKey",req.key).detail("Value",v);
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (req.debugID.present())
|
|
|
|
g_traceBatch.addEvent("GetValueDebug",
|
|
|
|
req.debugID.get().first(),
|
|
|
|
"getValueQ.AfterRead"); //.detail("TaskID", g_network->getCurrentTask());
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2020-01-15 04:33:17 +08:00
|
|
|
GetValueReply reply(v, true);
|
2019-11-13 05:01:29 +08:00
|
|
|
req.reply.send(reply);
|
|
|
|
} catch (Error& e) {
|
2020-03-05 07:18:49 +08:00
|
|
|
//TraceEvent(SevWarn, "SCGetValueQError", data->thisServerID).detail("Code",e.code()).detail("ReqKey",req.key)
|
|
|
|
// .detail("ReqVersion", req.version).detail("DataVersion", data->version.get());
|
2021-03-11 02:06:03 +08:00
|
|
|
if (!canReplyWith(e))
|
2019-11-13 05:01:29 +08:00
|
|
|
throw;
|
|
|
|
req.reply.sendError(e);
|
|
|
|
}
|
|
|
|
|
|
|
|
++data->counters.finishedQueries;
|
|
|
|
//--data->readQueueSizeMetric;
|
2021-03-11 02:06:03 +08:00
|
|
|
// if(data->latencyBandConfig.present()) {
|
|
|
|
// int maxReadBytes =
|
|
|
|
// data->latencyBandConfig.get().readConfig.maxReadBytes.orDefault(std::numeric_limits<int>::max());
|
2019-11-13 05:01:29 +08:00
|
|
|
// data->counters.readLatencyBands.addMeasurement(timer() - req.requestTime(), resultSize > maxReadBytes);
|
|
|
|
//}
|
|
|
|
|
|
|
|
return Void();
|
|
|
|
};
|
|
|
|
|
|
|
|
GetKeyValuesReply readRange(StorageCacheData* data, Version version, KeyRangeRef range, int limit, int* pLimitBytes) {
|
|
|
|
GetKeyValuesReply result;
|
|
|
|
StorageCacheData::VersionedData::ViewAtVersion view = data->data().at(version);
|
|
|
|
StorageCacheData::VersionedData::iterator vCurrent = view.end();
|
|
|
|
KeyRef readBegin;
|
2020-04-15 09:21:43 +08:00
|
|
|
KeyRef readEnd;
|
2019-11-13 05:01:29 +08:00
|
|
|
KeyRef rangeBegin = range.begin;
|
|
|
|
KeyRef rangeEnd = range.end;
|
2020-04-15 09:21:43 +08:00
|
|
|
int accumulatedBytes = 0;
|
2021-03-11 02:06:03 +08:00
|
|
|
// printf("\nSCReadRange\n");
|
2020-04-15 08:45:34 +08:00
|
|
|
|
|
|
|
// if (limit >= 0) we are reading forward, else backward
|
|
|
|
if (limit >= 0) {
|
2021-03-11 02:06:03 +08:00
|
|
|
// We might care about a clear beginning before start that runs into range
|
2020-04-15 08:45:34 +08:00
|
|
|
vCurrent = view.lastLessOrEqual(rangeBegin);
|
|
|
|
if (vCurrent && vCurrent->isClearTo() && vCurrent->getEndKey() > rangeBegin)
|
|
|
|
readBegin = vCurrent->getEndKey();
|
|
|
|
else
|
|
|
|
readBegin = rangeBegin;
|
|
|
|
|
|
|
|
vCurrent = view.lower_bound(readBegin);
|
|
|
|
ASSERT(!vCurrent || vCurrent.key() >= readBegin);
|
|
|
|
if (vCurrent) {
|
|
|
|
auto b = vCurrent;
|
|
|
|
--b;
|
|
|
|
ASSERT(!b || b.key() < readBegin);
|
|
|
|
}
|
2020-04-15 09:21:43 +08:00
|
|
|
accumulatedBytes = 0;
|
2020-04-15 08:45:34 +08:00
|
|
|
while (vCurrent && vCurrent.key() < rangeEnd && limit > 0 && accumulatedBytes < *pLimitBytes) {
|
|
|
|
if (!vCurrent->isClearTo()) {
|
|
|
|
result.data.push_back_deep(result.arena, KeyValueRef(vCurrent.key(), vCurrent->getValue()));
|
|
|
|
accumulatedBytes += sizeof(KeyValueRef) + result.data.end()[-1].expectedSize();
|
|
|
|
--limit;
|
|
|
|
}
|
|
|
|
++vCurrent;
|
|
|
|
}
|
|
|
|
} else { // reverse readRange
|
|
|
|
vCurrent = view.lastLess(rangeEnd);
|
|
|
|
|
|
|
|
// A clear might extend all the way to range.end
|
|
|
|
if (vCurrent && vCurrent->isClearTo() && vCurrent->getEndKey() >= rangeEnd) {
|
|
|
|
readEnd = vCurrent.key();
|
|
|
|
--vCurrent;
|
|
|
|
} else {
|
|
|
|
readEnd = rangeEnd;
|
|
|
|
}
|
|
|
|
ASSERT(!vCurrent || vCurrent.key() < readEnd);
|
|
|
|
if (vCurrent) {
|
|
|
|
auto b = vCurrent;
|
|
|
|
--b;
|
|
|
|
ASSERT(!b || b.key() >= readEnd);
|
|
|
|
}
|
2020-04-15 09:21:43 +08:00
|
|
|
accumulatedBytes = 0;
|
2020-04-15 08:45:34 +08:00
|
|
|
while (vCurrent && vCurrent.key() >= rangeEnd && limit > 0 && accumulatedBytes < *pLimitBytes) {
|
|
|
|
if (!vCurrent->isClearTo()) {
|
|
|
|
result.data.push_back_deep(result.arena, KeyValueRef(vCurrent.key(), vCurrent->getValue()));
|
|
|
|
accumulatedBytes += sizeof(KeyValueRef) + result.data.end()[-1].expectedSize();
|
|
|
|
--limit;
|
|
|
|
}
|
|
|
|
--vCurrent;
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
*pLimitBytes -= accumulatedBytes;
|
|
|
|
ASSERT(result.data.size() == 0 || *pLimitBytes + result.data.end()[-1].expectedSize() + sizeof(KeyValueRef) > 0);
|
|
|
|
result.more = limit == 0 || *pLimitBytes <= 0; // FIXME: Does this have to be exact?
|
|
|
|
result.version = version;
|
2020-01-15 04:33:17 +08:00
|
|
|
result.cached = true;
|
2019-11-13 05:01:29 +08:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
Key findKey(StorageCacheData* data, KeySelectorRef sel, Version version, KeyRange range, int* pOffset)
|
2019-11-13 05:01:29 +08:00
|
|
|
// Attempts to find the key indicated by sel in the data at version, within range.
|
|
|
|
// Precondition: selectorInRange(sel, range)
|
|
|
|
// If it is found, offset is set to 0 and a key is returned which falls inside range.
|
2021-03-11 02:06:03 +08:00
|
|
|
// If the search would depend on any key outside range OR if the key selector offset is too large (range read returns
|
|
|
|
// too many bytes), it returns either
|
|
|
|
// a negative offset and a key in [range.begin, sel.getKey()], indicating the key is (the first key <= returned key) +
|
|
|
|
// offset, or a positive offset and a key in (sel.getKey(), range.end], indicating the key is (the first key >=
|
|
|
|
// returned key) + offset-1
|
|
|
|
// The range passed in to this function should specify a cacheRange. If range.begin is repeatedly not the beginning of
|
|
|
|
// a cacheRange, then it is possible to get stuck looping here
|
2019-11-13 05:01:29 +08:00
|
|
|
{
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(version != latestVersion);
|
|
|
|
ASSERT(selectorInRange(sel, range) && version >= data->oldestVersion.get());
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
// Count forward or backward distance items, skipping the first one if it == key and skipEqualKey
|
2021-03-11 02:06:03 +08:00
|
|
|
bool forward = sel.offset > 0; // If forward, result >= sel.getKey(); else result <= sel.getKey()
|
2019-11-13 05:01:29 +08:00
|
|
|
int sign = forward ? +1 : -1;
|
|
|
|
bool skipEqualKey = sel.orEqual == forward;
|
2021-03-11 02:06:03 +08:00
|
|
|
int distance = forward ? sel.offset : 1 - sel.offset;
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// Don't limit the number of bytes if this is a trivial key selector (there will be at most two items returned from
|
|
|
|
// the read range in this case)
|
2019-11-13 05:01:29 +08:00
|
|
|
int maxBytes;
|
|
|
|
if (sel.offset <= 1 && sel.offset >= 0)
|
|
|
|
maxBytes = std::numeric_limits<int>::max();
|
|
|
|
else
|
|
|
|
maxBytes = BUGGIFY ? SERVER_KNOBS->BUGGIFY_LIMIT_BYTES : SERVER_KNOBS->STORAGE_LIMIT_BYTES;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
GetKeyValuesReply rep =
|
|
|
|
readRange(data,
|
|
|
|
version,
|
|
|
|
forward ? KeyRangeRef(sel.getKey(), range.end) : KeyRangeRef(range.begin, keyAfter(sel.getKey())),
|
|
|
|
(distance + skipEqualKey) * sign,
|
|
|
|
&maxBytes);
|
2019-11-13 05:01:29 +08:00
|
|
|
bool more = rep.more && rep.data.size() != distance + skipEqualKey;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// If we get only one result in the reverse direction as a result of the data being too large, we could get stuck in
|
|
|
|
// a loop
|
|
|
|
if (more && !forward && rep.data.size() == 1) {
|
|
|
|
TEST(true); // Reverse key selector returned only one result in range read
|
2019-11-13 05:01:29 +08:00
|
|
|
maxBytes = std::numeric_limits<int>::max();
|
2021-03-11 02:06:03 +08:00
|
|
|
GetKeyValuesReply rep2 =
|
|
|
|
readRange(data, version, KeyRangeRef(range.begin, keyAfter(sel.getKey())), -2, &maxBytes);
|
2019-11-13 05:01:29 +08:00
|
|
|
rep = rep2;
|
|
|
|
more = rep.more && rep.data.size() != distance + skipEqualKey;
|
|
|
|
ASSERT(rep.data.size() == 2 || !more);
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
int index = distance - 1;
|
|
|
|
if (skipEqualKey && rep.data.size() && rep.data[0].key == sel.getKey())
|
2019-11-13 05:01:29 +08:00
|
|
|
++index;
|
|
|
|
|
|
|
|
if (index < rep.data.size()) {
|
|
|
|
*pOffset = 0;
|
2021-03-11 02:06:03 +08:00
|
|
|
return rep.data[index].key;
|
2019-11-13 05:01:29 +08:00
|
|
|
} else {
|
|
|
|
// FIXME: If range.begin=="" && !forward, return success?
|
|
|
|
*pOffset = index - rep.data.size() + 1;
|
2021-03-11 02:06:03 +08:00
|
|
|
if (!forward)
|
|
|
|
*pOffset = -*pOffset;
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
if (more) {
|
|
|
|
TEST(true); // Key selector read range had more results
|
|
|
|
|
|
|
|
ASSERT(rep.data.size());
|
|
|
|
Key returnKey = forward ? keyAfter(rep.data.back().key) : rep.data.back().key;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// This is possible if key/value pairs are very large and only one result is returned on a last less than
|
|
|
|
// query SOMEDAY: graceful handling of exceptionally sized values
|
2019-11-13 05:01:29 +08:00
|
|
|
ASSERT(returnKey != sel.getKey());
|
|
|
|
|
|
|
|
return returnKey;
|
|
|
|
} else
|
|
|
|
return forward ? range.end : range.begin;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
KeyRange getCachedKeyRange(StorageCacheData* data, const KeySelectorRef& sel)
|
|
|
|
// Returns largest range that is cached on this server and selectorInRange(sel, range) or wrong_shard_server if no such
|
|
|
|
// range exists
|
2019-11-13 05:01:29 +08:00
|
|
|
{
|
2021-03-11 02:06:03 +08:00
|
|
|
auto i = sel.isBackward() ? data->cachedRangeMap.rangeContainingKeyBefore(sel.getKey())
|
|
|
|
: data->cachedRangeMap.rangeContaining(sel.getKey());
|
2020-02-15 03:42:47 +08:00
|
|
|
|
2020-01-15 04:33:17 +08:00
|
|
|
if (i->value()->notAssigned())
|
|
|
|
throw wrong_shard_server();
|
|
|
|
else if (!i->value()->isReadable())
|
2020-01-15 06:29:41 +08:00
|
|
|
throw future_version();
|
2020-01-15 04:33:17 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(selectorInRange(sel, i->range()));
|
2019-11-13 05:01:29 +08:00
|
|
|
return i->range();
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
ACTOR Future<Void> getKeyValues(StorageCacheData* data, GetKeyValuesRequest req)
|
|
|
|
// Throws a wrong_shard_server if the keys in the request or result depend on data outside this server OR if a large
|
|
|
|
// selector offset prevents all data from being read in one range read
|
2019-11-13 05:01:29 +08:00
|
|
|
{
|
|
|
|
state int64_t resultSize = 0;
|
|
|
|
|
|
|
|
++data->counters.getRangeQueries;
|
|
|
|
++data->counters.allQueries;
|
2021-03-11 02:06:03 +08:00
|
|
|
// printf("\nSCGetKeyValues\n");
|
2019-11-13 05:01:29 +08:00
|
|
|
//++data->readQueueSizeMetric;
|
2021-03-11 02:06:03 +08:00
|
|
|
// data->maxQueryQueue = std::max<int>( data->maxQueryQueue, data->counters.allQueries.getValue() -
|
|
|
|
// data->counters.finishedQueries.getValue());
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
// Active load balancing runs at a very high priority (to obtain accurate queue lengths)
|
|
|
|
// so we need to downgrade here
|
|
|
|
TaskPriority taskType = TaskPriority::DefaultEndpoint;
|
|
|
|
if (SERVER_KNOBS->FETCH_KEYS_LOWER_PRIORITY && req.isFetchKeys) {
|
|
|
|
taskType = TaskPriority::FetchKeys;
|
2021-03-11 02:06:03 +08:00
|
|
|
// } else if (false) {
|
|
|
|
// // Placeholder for up-prioritizing fetches for important requests
|
|
|
|
// taskType = TaskPriority::DefaultDelay;
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
wait(delay(0, taskType));
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
try {
|
2021-03-11 02:06:03 +08:00
|
|
|
if (req.debugID.present())
|
2019-11-13 05:01:29 +08:00
|
|
|
g_traceBatch.addEvent("TransactionDebug", req.debugID.get().first(), "storagecache.getKeyValues.Before");
|
2021-03-11 02:06:03 +08:00
|
|
|
state Version version = wait(waitForVersion(data, req.version));
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
state uint64_t changeCounter = data->cacheRangeChangeCounter;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
state KeyRange cachedKeyRange = getCachedKeyRange(data, req.begin);
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (req.debugID.present())
|
|
|
|
g_traceBatch.addEvent(
|
|
|
|
"TransactionDebug", req.debugID.get().first(), "storagecache.getKeyValues.AfterVersion");
|
2020-01-08 05:06:58 +08:00
|
|
|
//.detail("CacheRangeBegin", cachedKeyRange.begin).detail("CacheRangeEnd", cachedKeyRange.end);
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (!selectorInRange(req.end, cachedKeyRange) &&
|
|
|
|
!(req.end.isFirstGreaterOrEqual() && req.end.getKey() == cachedKeyRange.end)) {
|
2020-05-05 08:29:43 +08:00
|
|
|
//TraceEvent(SevDebug, "WrongCacheRangeServer1", data->thisServerID).detail("Begin", req.begin.toString()).detail("End", req.end.toString()).detail("Version", version).
|
2021-03-11 02:06:03 +08:00
|
|
|
// detail("CacheRangeBegin", cachedKeyRange.begin).detail("CacheRangeEnd", cachedKeyRange.end).detail("In",
|
|
|
|
// "getKeyValues>checkShardExtents");
|
2019-11-13 05:01:29 +08:00
|
|
|
throw wrong_shard_server();
|
|
|
|
}
|
|
|
|
|
|
|
|
state int offset1;
|
|
|
|
state int offset2;
|
2021-03-11 02:06:03 +08:00
|
|
|
state Key begin = req.begin.isFirstGreaterOrEqual()
|
|
|
|
? req.begin.getKey()
|
|
|
|
: findKey(data, req.begin, version, cachedKeyRange, &offset1);
|
|
|
|
state Key end = req.end.isFirstGreaterOrEqual() ? req.end.getKey()
|
|
|
|
: findKey(data, req.end, version, cachedKeyRange, &offset2);
|
|
|
|
if (req.debugID.present())
|
2019-11-13 05:01:29 +08:00
|
|
|
g_traceBatch.addEvent("TransactionDebug", req.debugID.get().first(), "storagecache.getKeyValues.AfterKeys");
|
|
|
|
//.detail("Off1",offset1).detail("Off2",offset2).detail("ReqBegin",req.begin.getKey()).detail("ReqEnd",req.end.getKey());
|
|
|
|
|
|
|
|
// Offsets of zero indicate begin/end keys in this cachedKeyRange, which obviously means we can answer the query
|
2021-03-11 02:06:03 +08:00
|
|
|
// An end offset of 1 is also OK because the end key is exclusive, so if the first key of the next
|
|
|
|
// cachedKeyRange is the end the last actual key returned must be from this cachedKeyRange. A begin offset of 1
|
|
|
|
// is also OK because then either begin is past end or equal to end (so the result is definitely empty)
|
|
|
|
if ((offset1 && offset1 != 1) || (offset2 && offset2 != 1)) {
|
|
|
|
TEST(true); // wrong_cache_server due to offset
|
|
|
|
// We could detect when offset1 takes us off the beginning of the database or offset2 takes us off the end,
|
|
|
|
// and return a clipped range rather than an error (since that is what the NativeAPI.getRange will do anyway
|
|
|
|
// via its "slow path"), but we would have to add some flags to the response to encode whether we went off
|
|
|
|
// the beginning and the end, since it needs that information.
|
2020-05-05 08:29:43 +08:00
|
|
|
//TraceEvent(SevDebug, "WrongCacheRangeServer2", data->thisServerID).detail("Begin", req.begin.toString()).detail("End", req.end.toString()).detail("Version", version).
|
2021-03-11 02:06:03 +08:00
|
|
|
// detail("CacheRangeBegin", cachedKeyRange.begin).detail("CacheRangeEnd", cachedKeyRange.end).detail("In",
|
|
|
|
// "getKeyValues>checkOffsets"). detail("BeginKey", begin).detail("EndKey", end).detail("BeginOffset",
|
|
|
|
// offset1).detail("EndOffset", offset2);
|
2019-11-13 05:01:29 +08:00
|
|
|
throw wrong_shard_server();
|
|
|
|
}
|
2020-02-26 09:32:24 +08:00
|
|
|
//TraceEvent(SevDebug, "SCGetKeyValues", data->thisServerID).detail("Begin", req.begin.toString()).detail("End", req.end.toString()).detail("Version", version).
|
2021-03-11 02:06:03 +08:00
|
|
|
// detail("CacheRangeBegin", cachedKeyRange.begin).detail("CacheRangeEnd", cachedKeyRange.end).detail("In",
|
|
|
|
//"getKeyValues>checkOffsets"). detail("BeginKey", begin).detail("EndKey", end).detail("BeginOffset",
|
|
|
|
// offset1).detail("EndOffset", offset2);
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
if (begin >= end) {
|
2021-03-11 02:06:03 +08:00
|
|
|
if (req.debugID.present())
|
2019-11-13 05:01:29 +08:00
|
|
|
g_traceBatch.addEvent("TransactionDebug", req.debugID.get().first(), "storagecache.getKeyValues.Send");
|
|
|
|
//.detail("Begin",begin).detail("End",end);
|
|
|
|
|
|
|
|
GetKeyValuesReply none;
|
|
|
|
none.version = version;
|
|
|
|
none.more = false;
|
2021-03-11 02:06:03 +08:00
|
|
|
data->checkChangeCounter(changeCounter,
|
|
|
|
KeyRangeRef(std::min<KeyRef>(req.begin.getKey(), req.end.getKey()),
|
|
|
|
std::max<KeyRef>(req.begin.getKey(), req.end.getKey())));
|
|
|
|
req.reply.send(none);
|
2019-11-13 05:01:29 +08:00
|
|
|
} else {
|
|
|
|
state int remainingLimitBytes = req.limitBytes;
|
|
|
|
|
|
|
|
GetKeyValuesReply _r = readRange(data, version, KeyRangeRef(begin, end), req.limit, &remainingLimitBytes);
|
|
|
|
GetKeyValuesReply r = _r;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (req.debugID.present())
|
|
|
|
g_traceBatch.addEvent(
|
|
|
|
"TransactionDebug", req.debugID.get().first(), "storagecache.getKeyValues.AfterReadRange");
|
|
|
|
data->checkChangeCounter(
|
|
|
|
changeCounter,
|
|
|
|
KeyRangeRef(std::min<KeyRef>(begin, std::min<KeyRef>(req.begin.getKey(), req.end.getKey())),
|
|
|
|
std::max<KeyRef>(end, std::max<KeyRef>(req.begin.getKey(), req.end.getKey()))));
|
2019-11-13 05:01:29 +08:00
|
|
|
//.detail("Begin",begin).detail("End",end).detail("SizeOf",r.data.size());
|
|
|
|
if (EXPENSIVE_VALIDATION) {
|
|
|
|
for (int i = 0; i < r.data.size(); i++)
|
|
|
|
ASSERT(r.data[i].key >= begin && r.data[i].key < end);
|
|
|
|
ASSERT(r.data.size() <= std::abs(req.limit));
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
req.reply.send(r);
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
resultSize = req.limitBytes - remainingLimitBytes;
|
|
|
|
data->counters.bytesQueried += resultSize;
|
|
|
|
data->counters.rowsQueried += r.data.size();
|
|
|
|
}
|
|
|
|
} catch (Error& e) {
|
2021-03-11 02:06:03 +08:00
|
|
|
TraceEvent(SevWarn, "SCGetKeyValuesError", data->thisServerID)
|
|
|
|
.detail("Code", e.code())
|
|
|
|
.detail("ReqBegin", req.begin.getKey())
|
|
|
|
.detail("ReqEnd", req.end.getKey())
|
|
|
|
.detail("ReqVersion", req.version)
|
|
|
|
.detail("DataVersion", data->version.get());
|
|
|
|
if (!canReplyWith(e))
|
2019-11-13 05:01:29 +08:00
|
|
|
throw;
|
|
|
|
req.reply.sendError(e);
|
|
|
|
}
|
|
|
|
|
|
|
|
++data->counters.finishedQueries;
|
|
|
|
|
|
|
|
return Void();
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
ACTOR Future<Void> getKey(StorageCacheData* data, GetKeyRequest req) {
|
2019-11-13 05:01:29 +08:00
|
|
|
state int64_t resultSize = 0;
|
|
|
|
|
|
|
|
++data->counters.getKeyQueries;
|
|
|
|
++data->counters.allQueries;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// printf("\nSCGetKey\n");
|
2019-11-13 05:01:29 +08:00
|
|
|
// Active load balancing runs at a very high priority (to obtain accurate queue lengths)
|
|
|
|
// so we need to downgrade here
|
2021-03-11 02:06:03 +08:00
|
|
|
wait(delay(0, TaskPriority::DefaultEndpoint));
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
try {
|
2021-03-11 02:06:03 +08:00
|
|
|
state Version version = wait(waitForVersion(data, req.version));
|
2020-01-08 05:06:58 +08:00
|
|
|
state uint64_t changeCounter = data->cacheRangeChangeCounter;
|
2021-03-11 02:06:03 +08:00
|
|
|
state KeyRange cachedKeyRange = getCachedKeyRange(data, req.sel);
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
state int offset;
|
2021-03-11 02:06:03 +08:00
|
|
|
Key k = findKey(data, req.sel, version, cachedKeyRange, &offset);
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
data->checkChangeCounter(
|
|
|
|
changeCounter, KeyRangeRef(std::min<KeyRef>(req.sel.getKey(), k), std::max<KeyRef>(req.sel.getKey(), k)));
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2019-11-13 05:01:29 +08:00
|
|
|
KeySelector updated;
|
|
|
|
if (offset < 0)
|
2021-03-11 02:06:03 +08:00
|
|
|
updated =
|
|
|
|
firstGreaterOrEqual(k) +
|
|
|
|
offset; // first thing on this cacheRange OR (large offset case) smallest key retrieved in range read
|
2019-11-13 05:01:29 +08:00
|
|
|
else if (offset > 0)
|
2021-03-11 02:06:03 +08:00
|
|
|
updated =
|
|
|
|
firstGreaterOrEqual(k) + offset -
|
|
|
|
1; // first thing on next cacheRange OR (large offset case) keyAfter largest key retrieved in range read
|
2019-11-13 05:01:29 +08:00
|
|
|
else
|
2021-03-11 02:06:03 +08:00
|
|
|
updated = KeySelectorRef(k, true, 0); // found
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
resultSize = k.size();
|
|
|
|
data->counters.bytesQueried += resultSize;
|
|
|
|
++data->counters.rowsQueried;
|
|
|
|
|
2020-01-15 04:33:17 +08:00
|
|
|
GetKeyReply reply(updated, true);
|
2019-11-13 05:01:29 +08:00
|
|
|
req.reply.send(reply);
|
2021-03-11 02:06:03 +08:00
|
|
|
} catch (Error& e) {
|
|
|
|
// if (e.code() == error_code_wrong_shard_server) TraceEvent("SCWrongCacheRangeServer").detail("In","getKey");
|
|
|
|
// if (e.code() == error_code_future_version) TraceEvent("SCColdCacheRangeServer").detail("In","getKey");
|
|
|
|
if (!canReplyWith(e))
|
2019-11-13 05:01:29 +08:00
|
|
|
throw;
|
|
|
|
req.reply.sendError(e);
|
|
|
|
}
|
|
|
|
|
|
|
|
++data->counters.finishedQueries;
|
|
|
|
|
|
|
|
return Void();
|
|
|
|
}
|
|
|
|
|
|
|
|
#pragma endregion
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
bool expandMutation(MutationRef& m, StorageCacheData::VersionedData const& data, KeyRef eagerTrustedEnd, Arena& ar) {
|
|
|
|
// After this function call, m should be copied into an arena immediately (before modifying data, cacheRanges, or
|
|
|
|
// eager)
|
2019-11-13 05:01:29 +08:00
|
|
|
if (m.type == MutationRef::ClearRange) {
|
|
|
|
// Expand the clear
|
|
|
|
const auto& d = data.atLatest();
|
|
|
|
|
|
|
|
// If another clear overlaps the beginning of this one, engulf it
|
|
|
|
auto i = d.lastLess(m.param1);
|
|
|
|
if (i && i->isClearTo() && i->getEndKey() >= m.param1)
|
|
|
|
m.param1 = i.key();
|
|
|
|
|
|
|
|
// If another clear overlaps the end of this one, engulf it; otherwise expand
|
|
|
|
i = d.lastLessOrEqual(m.param2);
|
|
|
|
if (i && i->isClearTo() && i->getEndKey() >= m.param2) {
|
|
|
|
m.param2 = i->getEndKey();
|
|
|
|
} else {
|
|
|
|
// Expand to the next set or clear (from storage or latestVersion), and if it
|
|
|
|
// is a clear, engulf it as well
|
|
|
|
i = d.lower_bound(m.param2);
|
|
|
|
// TODO check if the following is correct
|
2020-01-15 04:33:17 +08:00
|
|
|
KeyRef endKey = eagerTrustedEnd;
|
2020-01-15 06:29:41 +08:00
|
|
|
if (!i || endKey < i.key())
|
2020-01-15 04:33:17 +08:00
|
|
|
m.param2 = endKey;
|
2019-11-13 05:01:29 +08:00
|
|
|
else if (i->isClearTo())
|
|
|
|
m.param2 = i->getEndKey();
|
|
|
|
else
|
|
|
|
m.param2 = i.key();
|
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
} else if (m.type != MutationRef::SetValue && (m.type)) {
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
Optional<StringRef> oldVal;
|
|
|
|
auto it = data.atLatest().lastLessOrEqual(m.param1);
|
|
|
|
if (it != data.atLatest().end() && it->isValue() && it.key() == m.param1)
|
|
|
|
oldVal = it->getValue();
|
|
|
|
else if (it != data.atLatest().end() && it->isClearTo() && it->getEndKey() > m.param1) {
|
|
|
|
TEST(true); // Atomic op right after a clear.
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
switch (m.type) {
|
2019-11-13 05:01:29 +08:00
|
|
|
case MutationRef::AddValue:
|
|
|
|
m.param2 = doLittleEndianAdd(oldVal, m.param2, ar);
|
|
|
|
break;
|
|
|
|
case MutationRef::And:
|
|
|
|
m.param2 = doAnd(oldVal, m.param2, ar);
|
|
|
|
break;
|
|
|
|
case MutationRef::Or:
|
|
|
|
m.param2 = doOr(oldVal, m.param2, ar);
|
|
|
|
break;
|
|
|
|
case MutationRef::Xor:
|
|
|
|
m.param2 = doXor(oldVal, m.param2, ar);
|
|
|
|
break;
|
|
|
|
case MutationRef::AppendIfFits:
|
|
|
|
m.param2 = doAppendIfFits(oldVal, m.param2, ar);
|
|
|
|
break;
|
|
|
|
case MutationRef::Max:
|
|
|
|
m.param2 = doMax(oldVal, m.param2, ar);
|
|
|
|
break;
|
|
|
|
case MutationRef::Min:
|
|
|
|
m.param2 = doMin(oldVal, m.param2, ar);
|
|
|
|
break;
|
|
|
|
case MutationRef::ByteMin:
|
|
|
|
m.param2 = doByteMin(oldVal, m.param2, ar);
|
|
|
|
break;
|
|
|
|
case MutationRef::ByteMax:
|
|
|
|
m.param2 = doByteMax(oldVal, m.param2, ar);
|
|
|
|
break;
|
|
|
|
case MutationRef::MinV2:
|
|
|
|
m.param2 = doMinV2(oldVal, m.param2, ar);
|
|
|
|
break;
|
|
|
|
case MutationRef::AndV2:
|
|
|
|
m.param2 = doAndV2(oldVal, m.param2, ar);
|
|
|
|
break;
|
|
|
|
case MutationRef::CompareAndClear:
|
|
|
|
if (oldVal.present() && m.param2 == oldVal.get()) {
|
|
|
|
m.type = MutationRef::ClearRange;
|
|
|
|
m.param2 = keyAfter(m.param1, ar);
|
|
|
|
return expandMutation(m, data, eagerTrustedEnd, ar);
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
m.type = MutationRef::SetValue;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Applies a write mutation (SetValue or ClearRange) to the in-memory versioned data structure
|
2021-03-11 02:06:03 +08:00
|
|
|
void StorageCacheData::applyMutation(MutationRef const& m, Arena& arena, StorageCacheData::VersionedData& data) {
|
2019-11-13 05:01:29 +08:00
|
|
|
// m is expected to be in arena already
|
|
|
|
// Clear split keys are added to arena
|
|
|
|
|
|
|
|
if (m.type == MutationRef::SetValue) {
|
|
|
|
auto prev = data.atLatest().lastLessOrEqual(m.param1);
|
|
|
|
if (prev && prev->isClearTo() && prev->getEndKey() > m.param1) {
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(prev.key() <= m.param1);
|
2019-11-13 05:01:29 +08:00
|
|
|
KeyRef end = prev->getEndKey();
|
|
|
|
// TODO double check if the insert version of the previous clear needs to be preserved for the "left half",
|
|
|
|
// insert() invalidates prev, so prev.key() is not safe to pass to it by reference
|
2021-03-11 02:06:03 +08:00
|
|
|
data.insert(KeyRef(prev.key()),
|
|
|
|
ValueOrClearToRef::clearTo(m.param1),
|
|
|
|
prev.insertVersion()); // overwritten by below insert if empty
|
2020-03-14 09:52:34 +08:00
|
|
|
//TraceEvent(SevDebug, "ApplyMutationClearTo")
|
|
|
|
//.detail("Key1", prev.key())
|
|
|
|
//.detail("Key2",m.param1)
|
|
|
|
//.detail("Version1", prev.insertVersion());
|
2019-11-13 05:01:29 +08:00
|
|
|
KeyRef nextKey = keyAfter(m.param1, arena);
|
2021-03-11 02:06:03 +08:00
|
|
|
if (end != nextKey) {
|
|
|
|
ASSERT(end > nextKey);
|
2019-11-13 05:01:29 +08:00
|
|
|
// TODO double check if it's okay to let go of the the insert version of the "right half"
|
2021-03-11 02:06:03 +08:00
|
|
|
// FIXME: This copy is technically an asymptotic problem, definitely a waste of memory (copy of keyAfter
|
|
|
|
// is a waste, but not asymptotic)
|
|
|
|
data.insert(nextKey, ValueOrClearToRef::clearTo(KeyRef(arena, end)));
|
2020-03-14 09:52:34 +08:00
|
|
|
//TraceEvent(SevDebug, "ApplyMutationClearTo2")
|
|
|
|
//.detail("K1", nextKey)
|
|
|
|
//.detail("K2", end)
|
|
|
|
//.detail("V", data.latestVersion);
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
data.insert(m.param1, ValueOrClearToRef::value(m.param2));
|
2020-03-14 09:52:34 +08:00
|
|
|
//TraceEvent(SevDebug, "ApplyMutation")
|
|
|
|
// .detail("Key", m.param1)
|
|
|
|
// .detail("Value",m.param2)
|
|
|
|
// .detail("Version", data.latestVersion);
|
2019-11-13 05:01:29 +08:00
|
|
|
} else if (m.type == MutationRef::ClearRange) {
|
2021-03-11 02:06:03 +08:00
|
|
|
data.erase(m.param1, m.param2);
|
|
|
|
ASSERT(m.param2 > m.param1);
|
|
|
|
ASSERT(!data.isClearContaining(data.atLatest(), m.param1));
|
|
|
|
data.insert(m.param1, ValueOrClearToRef::clearTo(m.param2));
|
2020-03-14 09:52:34 +08:00
|
|
|
//TraceEvent(SevDebug, "ApplyMutationClearTo3")
|
|
|
|
// .detail("Key21", m.param1)
|
|
|
|
// .detail("Key22", m.param2)
|
|
|
|
// .detail("V2", data.latestVersion);
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-06 09:10:32 +08:00
|
|
|
template <class T>
|
2021-03-11 02:06:03 +08:00
|
|
|
void addMutation(T& target, Version version, MutationRef const& mutation) {
|
|
|
|
target.addMutation(version, mutation);
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
template <class T>
|
2021-03-11 02:06:03 +08:00
|
|
|
void addMutation(Reference<T>& target, Version version, MutationRef const& mutation) {
|
2019-12-06 09:10:32 +08:00
|
|
|
addMutation(*target, version, mutation);
|
|
|
|
}
|
|
|
|
|
2019-11-13 05:01:29 +08:00
|
|
|
template <class T>
|
|
|
|
void splitMutation(StorageCacheData* data, KeyRangeMap<T>& map, MutationRef const& m, Version ver) {
|
2021-03-11 02:06:03 +08:00
|
|
|
if (isSingleKeyMutation((MutationRef::Type)m.type)) {
|
2019-11-13 05:01:29 +08:00
|
|
|
auto i = map.rangeContaining(m.param1);
|
|
|
|
if (i->value()) // If this key lies in the cached key-range on this server
|
2021-03-11 02:06:03 +08:00
|
|
|
data->addMutation(i->range(), ver, m);
|
|
|
|
} else if (m.type == MutationRef::ClearRange) {
|
|
|
|
KeyRangeRef mKeys(m.param1, m.param2);
|
|
|
|
auto r = map.intersectingRanges(mKeys);
|
|
|
|
for (auto i = r.begin(); i != r.end(); ++i) {
|
2019-11-13 05:01:29 +08:00
|
|
|
if (i->value()) { // if this sub-range exists on this cache server
|
|
|
|
KeyRangeRef k = mKeys & i->range();
|
2021-03-11 02:06:03 +08:00
|
|
|
data->addMutation(i->range(), ver, MutationRef((MutationRef::Type)m.type, k.begin, k.end));
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} else
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(false); // Unknown mutation type in splitMutations
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
void rollback(StorageCacheData* data, Version rollbackVersion, Version nextVersion) {
|
2020-01-08 05:06:58 +08:00
|
|
|
TEST(true); // call to cacheRange rollback
|
|
|
|
// FIXME: enable when debugKeyRange is active
|
2021-03-11 02:06:03 +08:00
|
|
|
// debugKeyRange("Rollback", rollbackVersion, allKeys);
|
2020-01-08 05:06:58 +08:00
|
|
|
|
|
|
|
// FIXME: It's not straightforward to rollback certain versions from the VersionedMap.
|
|
|
|
// It's doable. But for now, we choose to just throw away this cache role
|
|
|
|
|
|
|
|
throw please_reboot();
|
|
|
|
}
|
|
|
|
|
2019-11-13 05:01:29 +08:00
|
|
|
void StorageCacheData::addMutation(KeyRangeRef const& cachedKeyRange, Version version, MutationRef const& mutation) {
|
|
|
|
MutationRef expanded = mutation;
|
|
|
|
auto& mLog = addVersionToMutationLog(version);
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (!expandMutation(expanded, data(), cachedKeyRange.end, mLog.arena())) {
|
2019-11-13 05:01:29 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
expanded = addMutationToMutationLog(mLog, expanded);
|
2020-06-10 06:09:58 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
DEBUG_MUTATION("expandedMutation", version, expanded)
|
|
|
|
.detail("Begin", cachedKeyRange.begin)
|
|
|
|
.detail("End", cachedKeyRange.end);
|
|
|
|
applyMutation(expanded, mLog.arena(), mutableData());
|
|
|
|
// printf("\nSCUpdate: Printing versioned tree after applying mutation\n");
|
|
|
|
// mutableData().printTree(version);
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
void removeDataRange(StorageCacheData* sc,
|
|
|
|
Standalone<VerUpdateRef>& mLV,
|
|
|
|
KeyRangeMap<Reference<CacheRangeInfo>>& cacheRanges,
|
|
|
|
KeyRangeRef range) {
|
2020-01-08 05:06:58 +08:00
|
|
|
// modify the latest version of data to remove all sets and trim all clears to exclude range.
|
2021-03-11 02:06:03 +08:00
|
|
|
// Add a clear to mLV (mutationLog[data.getLatestVersion()]) that ensures all keys in range are removed from the
|
|
|
|
// disk when this latest version becomes durable mLV is also modified if necessary to ensure that split clears can
|
|
|
|
// be forgotten
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
MutationRef clearRange(MutationRef::ClearRange, range.begin, range.end);
|
|
|
|
clearRange = sc->addMutationToMutationLog(mLV, clearRange);
|
2020-01-08 05:06:58 +08:00
|
|
|
|
|
|
|
auto& data = sc->mutableData();
|
|
|
|
|
|
|
|
// Expand the range to the right to include other cacheRanges not in versionedData
|
2021-03-11 02:06:03 +08:00
|
|
|
for (auto r = cacheRanges.rangeContaining(range.end);
|
|
|
|
r != cacheRanges.ranges().end() && !r->value()->isInVersionedData();
|
|
|
|
++r)
|
2020-01-08 05:06:58 +08:00
|
|
|
range = KeyRangeRef(range.begin, r->end());
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
auto endClear = data.atLatest().lastLess(range.end);
|
|
|
|
if (endClear && endClear->isClearTo() && endClear->getEndKey() > range.end) {
|
|
|
|
// This clear has been bumped up to insertVersion==data.getLatestVersion and needs a corresponding mutation log
|
|
|
|
// entry to forget
|
|
|
|
MutationRef m(MutationRef::ClearRange, range.end, endClear->getEndKey());
|
|
|
|
m = sc->addMutationToMutationLog(mLV, m);
|
|
|
|
data.insert(m.param1, ValueOrClearToRef::clearTo(m.param2));
|
2020-01-08 05:06:58 +08:00
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
auto beginClear = data.atLatest().lastLess(range.begin);
|
|
|
|
if (beginClear && beginClear->isClearTo() && beginClear->getEndKey() > range.begin) {
|
|
|
|
// We don't need any special mutationLog entry - because the begin key and insert version are unchanged the
|
|
|
|
// original clear
|
2020-01-08 05:06:58 +08:00
|
|
|
// mutation works to forget this one - but we need range.begin in the right arena
|
2021-03-11 02:06:03 +08:00
|
|
|
KeyRef rb(mLV.arena(), range.begin);
|
2020-01-08 05:06:58 +08:00
|
|
|
// insert() invalidates beginClear, so beginClear.key() is not safe to pass to it by reference
|
2021-03-11 02:06:03 +08:00
|
|
|
data.insert(KeyRef(beginClear.key()), ValueOrClearToRef::clearTo(rb), beginClear.insertVersion());
|
2020-01-08 05:06:58 +08:00
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
data.erase(range.begin, range.end);
|
2020-01-08 05:06:58 +08:00
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// void setAvailableStatus( StorageServer* self, KeyRangeRef keys, bool available );
|
|
|
|
// void setAssignedStatus( StorageServer* self, KeyRangeRef keys, bool nowAssigned );
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
void coalesceCacheRanges(StorageCacheData* data, KeyRangeRef keys) {
|
2019-12-06 09:10:32 +08:00
|
|
|
auto cacheRanges = data->cachedRangeMap.intersectingRanges(keys);
|
|
|
|
auto fullRange = data->cachedRangeMap.ranges();
|
|
|
|
|
|
|
|
auto iter = cacheRanges.begin();
|
2021-03-11 02:06:03 +08:00
|
|
|
if (iter != fullRange.begin())
|
|
|
|
--iter;
|
2019-12-06 09:10:32 +08:00
|
|
|
auto iterEnd = cacheRanges.end();
|
2021-03-11 02:06:03 +08:00
|
|
|
if (iterEnd != fullRange.end())
|
|
|
|
++iterEnd;
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
bool lastReadable = false;
|
|
|
|
bool lastNotAssigned = false;
|
2020-07-11 01:43:33 +08:00
|
|
|
KeyRangeMap<Reference<CacheRangeInfo>>::iterator lastRange;
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
for (; iter != iterEnd; ++iter) {
|
|
|
|
if (lastReadable && iter->value()->isReadable()) {
|
|
|
|
KeyRange range = KeyRangeRef(lastRange->begin(), iter->end());
|
|
|
|
data->addCacheRange(CacheRangeInfo::newReadWrite(range, data));
|
2019-12-06 09:10:32 +08:00
|
|
|
iter = data->cachedRangeMap.rangeContaining(range.begin);
|
2021-03-11 02:06:03 +08:00
|
|
|
} else if (lastNotAssigned && iter->value()->notAssigned()) {
|
|
|
|
KeyRange range = KeyRangeRef(lastRange->begin(), iter->end());
|
|
|
|
data->addCacheRange(CacheRangeInfo::newNotAssigned(range));
|
2019-12-06 09:10:32 +08:00
|
|
|
iter = data->cachedRangeMap.rangeContaining(range.begin);
|
|
|
|
}
|
|
|
|
|
|
|
|
lastReadable = iter->value()->isReadable();
|
|
|
|
lastNotAssigned = iter->value()->notAssigned();
|
|
|
|
lastRange = iter;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-04 04:14:16 +08:00
|
|
|
ACTOR Future<RangeResult> tryFetchRange(Database cx,
|
|
|
|
Version version,
|
|
|
|
KeyRangeRef keys,
|
|
|
|
GetRangeLimits limits,
|
|
|
|
bool* isTooOld) {
|
2021-03-11 02:06:03 +08:00
|
|
|
state Transaction tr(cx);
|
2021-05-04 04:14:16 +08:00
|
|
|
state RangeResult output;
|
2021-03-11 02:06:03 +08:00
|
|
|
state KeySelectorRef begin = firstGreaterOrEqual(keys.begin);
|
|
|
|
state KeySelectorRef end = firstGreaterOrEqual(keys.end);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (*isTooOld)
|
2019-12-06 09:10:32 +08:00
|
|
|
throw transaction_too_old();
|
|
|
|
|
|
|
|
ASSERT(!cx->switchable);
|
2021-03-11 02:06:03 +08:00
|
|
|
tr.setVersion(version);
|
2021-12-18 03:57:39 +08:00
|
|
|
tr.trState->taskID = TaskPriority::FetchKeys;
|
2019-12-06 09:10:32 +08:00
|
|
|
limits.minRows = 0;
|
|
|
|
|
|
|
|
try {
|
|
|
|
loop {
|
2021-07-17 15:11:40 +08:00
|
|
|
RangeResult rep = wait(tr.getRange(begin, end, limits, Snapshot::True));
|
2021-03-11 02:06:03 +08:00
|
|
|
limits.decrement(rep);
|
|
|
|
|
|
|
|
if (limits.isReached() || !rep.more) {
|
|
|
|
if (output.size()) {
|
|
|
|
output.arena().dependsOn(rep.arena());
|
|
|
|
output.append(output.arena(), rep.begin(), rep.size());
|
|
|
|
if (limits.isReached() && rep.readThrough.present())
|
2019-12-06 09:10:32 +08:00
|
|
|
output.readThrough = rep.readThrough.get();
|
|
|
|
} else {
|
|
|
|
output = rep;
|
|
|
|
}
|
|
|
|
|
|
|
|
output.more = limits.isReached();
|
|
|
|
|
|
|
|
return output;
|
2021-03-11 02:06:03 +08:00
|
|
|
} else if (rep.readThrough.present()) {
|
|
|
|
output.arena().dependsOn(rep.arena());
|
|
|
|
if (rep.size()) {
|
|
|
|
output.append(output.arena(), rep.begin(), rep.size());
|
|
|
|
ASSERT(rep.readThrough.get() > rep.end()[-1].key);
|
2019-12-06 09:10:32 +08:00
|
|
|
} else {
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(rep.readThrough.get() > keys.begin);
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
begin = firstGreaterOrEqual(rep.readThrough.get());
|
2019-12-06 09:10:32 +08:00
|
|
|
} else {
|
2021-03-11 02:06:03 +08:00
|
|
|
output.arena().dependsOn(rep.arena());
|
|
|
|
output.append(output.arena(), rep.begin(), rep.size());
|
|
|
|
begin = firstGreaterThan(output.end()[-1].key);
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
} catch (Error& e) {
|
|
|
|
if (begin.getKey() != keys.begin &&
|
|
|
|
(e.code() == error_code_transaction_too_old || e.code() == error_code_future_version ||
|
|
|
|
e.code() == error_code_process_behind)) {
|
|
|
|
if (e.code() == error_code_transaction_too_old)
|
2019-12-06 09:10:32 +08:00
|
|
|
*isTooOld = true;
|
|
|
|
output.more = true;
|
2021-03-11 02:06:03 +08:00
|
|
|
if (begin.isFirstGreaterOrEqual())
|
2019-12-06 09:10:32 +08:00
|
|
|
output.readThrough = begin.getKey();
|
|
|
|
return output;
|
|
|
|
}
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
ACTOR Future<Void> fetchKeys(StorageCacheData* data, AddingCacheRange* cacheRange) {
|
2020-01-08 05:06:58 +08:00
|
|
|
state TraceInterval interval("SCFetchKeys");
|
2019-12-06 09:10:32 +08:00
|
|
|
state KeyRange keys = cacheRange->keys;
|
2021-03-11 02:06:03 +08:00
|
|
|
// state Future<Void> warningLogger = logFetchKeysWarning(cacheRange);
|
2019-12-06 09:10:32 +08:00
|
|
|
state double startt = now();
|
2020-01-15 04:33:17 +08:00
|
|
|
// TODO we should probably change this for cache server
|
2019-12-06 09:10:32 +08:00
|
|
|
state int fetchBlockBytes = BUGGIFY ? SERVER_KNOBS->BUGGIFY_BLOCK_BYTES : SERVER_KNOBS->FETCH_BLOCK_BYTES;
|
|
|
|
|
|
|
|
// delay(0) to force a return to the run loop before the work of fetchKeys is started.
|
|
|
|
// This allows adding->start() to be called inline with CSK.
|
2021-03-11 02:06:03 +08:00
|
|
|
wait(data->coreStarted.getFuture() && delay(0));
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
try {
|
2020-01-08 05:06:58 +08:00
|
|
|
// FIXME: enable when debugKeyRange is active
|
2021-03-11 02:06:03 +08:00
|
|
|
// debugKeyRange("fetchKeysBegin", data->version.get(), cacheRange->keys);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-06-06 07:27:04 +08:00
|
|
|
//TraceEvent(SevDebug, interval.begin(), data->thisServerID)
|
|
|
|
// .detail("KeyBegin", cacheRange->keys.begin)
|
|
|
|
// .detail("KeyEnd",cacheRange->keys.end);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
validate(data);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
// TODO: double check the following block of code!!
|
2021-03-11 02:06:03 +08:00
|
|
|
// We want to make sure that we can't query below lastAvailable, by waiting for the oldestVersion to become
|
|
|
|
// lastAvaialble
|
|
|
|
auto navr = data->newestAvailableVersion.intersectingRanges(keys);
|
2019-12-06 09:10:32 +08:00
|
|
|
Version lastAvailable = invalidVersion;
|
2021-03-11 02:06:03 +08:00
|
|
|
for (auto r = navr.begin(); r != navr.end(); ++r) {
|
|
|
|
ASSERT(r->value() != latestVersion);
|
2019-12-06 09:10:32 +08:00
|
|
|
lastAvailable = std::max(lastAvailable, r->value());
|
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
auto ndvr = data->newestDirtyVersion.intersectingRanges(keys);
|
|
|
|
for (auto r = ndvr.begin(); r != ndvr.end(); ++r)
|
2019-12-06 09:10:32 +08:00
|
|
|
lastAvailable = std::max(lastAvailable, r->value());
|
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
if (lastAvailable != invalidVersion && lastAvailable >= data->oldestVersion.get()) {
|
2020-11-12 05:07:54 +08:00
|
|
|
TEST(true); // wait for oldest version
|
2021-03-11 02:06:03 +08:00
|
|
|
wait(data->oldestVersion.whenAtLeast(lastAvailable + 1));
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
TraceEvent(SevDebug, "SCFetchKeysVersionSatisfied", data->thisServerID).detail("FKID", interval.pairID);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
wait(data->fetchKeysParallelismLock.take(TaskPriority::DefaultYield, fetchBlockBytes));
|
|
|
|
state FlowLock::Releaser holdingFKPL(data->fetchKeysParallelismLock, fetchBlockBytes);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// state double executeStart = now();
|
2019-12-06 09:10:32 +08:00
|
|
|
//++data->counters.fetchWaitingCount;
|
2021-03-11 02:06:03 +08:00
|
|
|
// data->counters.fetchWaitingMS += 1000*(executeStart - startt);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// Fetch keys gets called while the update actor is processing mutations. data->version will not be updated
|
|
|
|
// until all mutations for a version have been processed. We need to take the updateVersionLock to ensure
|
|
|
|
// data->version is greater than the version of the mutation which caused the fetch to be initiated.
|
|
|
|
wait(data->updateVersionLock.take());
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
cacheRange->phase = AddingCacheRange::Fetching;
|
|
|
|
state Version fetchVersion = data->version.get();
|
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
data->updateVersionLock.release();
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
wait(delay(0));
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
TraceEvent(SevDebug, "SCFetchKeysUnblocked", data->thisServerID)
|
|
|
|
.detail("FKID", interval.pairID)
|
|
|
|
.detail("Version", fetchVersion);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
// Get the history
|
|
|
|
state int debug_getRangeRetries = 0;
|
|
|
|
state int debug_nextRetryToLog = 1;
|
|
|
|
state bool isTooOld = false;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// FIXME: this should invalidate the location cache for cacheServers
|
|
|
|
// data->cx->invalidateCache(keys);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
loop {
|
|
|
|
try {
|
2021-03-11 02:06:03 +08:00
|
|
|
TEST(true); // Fetching keys for transferred cacheRange
|
|
|
|
|
2021-05-04 04:14:16 +08:00
|
|
|
state RangeResult this_block =
|
2021-03-11 02:06:03 +08:00
|
|
|
wait(tryFetchRange(data->cx,
|
|
|
|
fetchVersion,
|
|
|
|
keys,
|
|
|
|
GetRangeLimits(GetRangeLimits::ROW_LIMIT_UNLIMITED, fetchBlockBytes),
|
|
|
|
&isTooOld));
|
|
|
|
|
|
|
|
state int expectedSize =
|
|
|
|
(int)this_block.expectedSize() + (8 - (int)sizeof(KeyValueRef)) * this_block.size();
|
|
|
|
|
|
|
|
TraceEvent(SevDebug, "SCFetchKeysBlock", data->thisServerID)
|
|
|
|
.detail("FKID", interval.pairID)
|
|
|
|
.detail("BlockRows", this_block.size())
|
|
|
|
.detail("BlockBytes", expectedSize)
|
|
|
|
.detail("KeyBegin", keys.begin)
|
|
|
|
.detail("KeyEnd", keys.end)
|
|
|
|
.detail("Last", this_block.size() ? this_block.end()[-1].key : std::string())
|
|
|
|
.detail("Version", fetchVersion)
|
|
|
|
.detail("More", this_block.more);
|
2020-01-08 05:06:58 +08:00
|
|
|
// FIXME: enable when debugKeyRange is active
|
2021-03-11 02:06:03 +08:00
|
|
|
// debugKeyRange("fetchRange", fetchVersion, keys);
|
2020-01-08 05:06:58 +08:00
|
|
|
|
|
|
|
// FIXME: enable when debugMutation is active
|
2021-03-11 02:06:03 +08:00
|
|
|
// for(auto k = this_block.begin(); k != this_block.end(); ++k) debugMutation("fetch", fetchVersion,
|
|
|
|
// MutationRef(MutationRef::SetValue, k->key, k->value));
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
data->counters.bytesFetched += expectedSize;
|
2021-03-11 02:06:03 +08:00
|
|
|
if (fetchBlockBytes > expectedSize) {
|
|
|
|
holdingFKPL.release(fetchBlockBytes - expectedSize);
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// Write this_block to mutationLog and versionedMap
|
|
|
|
state KeyValueRef* kvItr = this_block.begin();
|
|
|
|
for (; kvItr != this_block.end(); ++kvItr) {
|
|
|
|
applyMutation(data->updater,
|
|
|
|
data,
|
|
|
|
MutationRef(MutationRef::SetValue, kvItr->key, kvItr->value),
|
|
|
|
fetchVersion);
|
2020-01-08 05:06:58 +08:00
|
|
|
data->counters.bytesFetched += expectedSize;
|
2019-12-06 09:10:32 +08:00
|
|
|
wait(yield());
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// TODO: If there was more to be fetched and we hit the limit before - possibly a case where data
|
|
|
|
// doesn't fit on this cache. For now, we can just fail this cache role. In future, we should think
|
|
|
|
// about evicting some data to make room for the remaining keys
|
2019-12-06 09:10:32 +08:00
|
|
|
if (this_block.more) {
|
2021-07-27 10:55:10 +08:00
|
|
|
TraceEvent(SevDebug, "CacheWarmupMoreDataThanLimit", data->thisServerID).log();
|
2020-01-08 05:06:58 +08:00
|
|
|
throw please_reboot();
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
|
2021-05-04 04:14:16 +08:00
|
|
|
this_block = RangeResult();
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (BUGGIFY)
|
|
|
|
wait(delay(1));
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
break;
|
|
|
|
} catch (Error& e) {
|
2021-03-11 02:06:03 +08:00
|
|
|
TraceEvent("SCFKBlockFail", data->thisServerID)
|
|
|
|
.error(e, true)
|
|
|
|
.suppressFor(1.0)
|
|
|
|
.detail("FKID", interval.pairID);
|
|
|
|
if (e.code() == error_code_transaction_too_old) {
|
2019-12-06 09:10:32 +08:00
|
|
|
TEST(true); // A storage server has forgotten the history data we are fetching
|
|
|
|
Version lastFV = fetchVersion;
|
|
|
|
fetchVersion = data->version.get();
|
|
|
|
isTooOld = false;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// Throw away deferred updates from before fetchVersion, since we don't need them to use blocks
|
|
|
|
// fetched at that version
|
|
|
|
while (!cacheRange->updates.empty() && cacheRange->updates[0].version <= fetchVersion)
|
|
|
|
cacheRange->updates.pop_front();
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
// TODO: NEELAM: what's this for?
|
2021-03-11 02:06:03 +08:00
|
|
|
// FIXME: remove when we no longer support upgrades from 5.X
|
|
|
|
if (debug_getRangeRetries >= 100) {
|
2021-07-17 15:11:40 +08:00
|
|
|
data->cx->enableLocalityLoadBalance = EnableLocalityLoadBalance::False;
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
debug_getRangeRetries++;
|
2021-03-11 02:06:03 +08:00
|
|
|
if (debug_nextRetryToLog == debug_getRangeRetries) {
|
2019-12-06 09:10:32 +08:00
|
|
|
debug_nextRetryToLog += std::min(debug_nextRetryToLog, 1024);
|
2021-03-11 02:06:03 +08:00
|
|
|
TraceEvent(SevWarn, "SCFetchPast", data->thisServerID)
|
|
|
|
.detail("TotalAttempts", debug_getRangeRetries)
|
|
|
|
.detail("FKID", interval.pairID)
|
|
|
|
.detail("V", lastFV)
|
|
|
|
.detail("N", fetchVersion)
|
|
|
|
.detail("E", data->version.get());
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
} else if (e.code() == error_code_future_version || e.code() == error_code_process_behind) {
|
2021-03-11 02:06:03 +08:00
|
|
|
TEST(true); // fetchKeys got future_version or process_behind, so there must be a huge storage lag
|
|
|
|
// somewhere. Keep trying.
|
2019-12-06 09:10:32 +08:00
|
|
|
} else {
|
|
|
|
throw;
|
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
wait(delayJittered(FLOW_KNOBS->PREVENT_FAST_SPIN_DELAY));
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// We have completed the fetch and write of the data, now we wait for MVCC window to pass.
|
2020-01-08 05:06:58 +08:00
|
|
|
// As we have finished this work, we will allow more work to start...
|
2019-12-06 09:10:32 +08:00
|
|
|
cacheRange->fetchComplete.send(Void());
|
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
// TODO revisit the following block of code
|
|
|
|
//TraceEvent(SevDebug, "SCFKBeforeFinalCommit", data->thisServerID).detail("FKID", interval.pairID).detail("SV", data->storageVersion()).detail("DV", data->durableVersion.get());
|
2021-03-11 02:06:03 +08:00
|
|
|
// Directly commit()ing the IKVS would interfere with updateStorage, possibly resulting in an incomplete version
|
|
|
|
// being recovered. Instead we wait for the updateStorage loop to commit something (and consequently also what
|
|
|
|
// we have written)
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// TODO: do we need this kind of wait? we are not going to make anything durable and hence no fear of wrong
|
|
|
|
// recovery
|
|
|
|
// wait( data->durableVersion.whenAtLeast( data->storageVersion()+1 ) );
|
2019-12-06 09:10:32 +08:00
|
|
|
holdingFKPL.release();
|
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
//TraceEvent(SevDebug, "SCFKAfterFinalCommit", data->thisServerID).detail("FKID", interval.pairID).detail("SV", data->storageVersion()).detail("DV", data->durableVersion.get());
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-04-14 03:00:30 +08:00
|
|
|
// Wait to run during pullAsyncData, after a new batch of versions is received from the tlog
|
2019-12-06 09:10:32 +08:00
|
|
|
Promise<FetchInjectionInfo*> p;
|
2021-03-11 02:06:03 +08:00
|
|
|
data->readyFetchKeys.push_back(p);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
FetchInjectionInfo* batch = wait(p.getFuture());
|
2020-01-08 05:06:58 +08:00
|
|
|
TraceEvent(SevDebug, "SCFKUpdateBatch", data->thisServerID).detail("FKID", interval.pairID);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
cacheRange->phase = AddingCacheRange::Waiting;
|
|
|
|
|
|
|
|
// Choose a transferredVersion. This choice and timing ensure that
|
|
|
|
// * The transferredVersion can be mutated in versionedData
|
|
|
|
// * The transferredVersion isn't yet committed to storage (so we can write the availability status change)
|
|
|
|
// * The transferredVersion is <= the version of any of the updates in batch, and if there is an equal version
|
|
|
|
// its mutations haven't been processed yet
|
|
|
|
cacheRange->transferredVersion = data->version.get() + 1;
|
2021-03-11 02:06:03 +08:00
|
|
|
data->mutableData().createNewVersion(cacheRange->transferredVersion);
|
|
|
|
ASSERT(cacheRange->transferredVersion > data->oldestVersion.get());
|
|
|
|
ASSERT(cacheRange->transferredVersion == data->data().getLatestVersion());
|
|
|
|
|
|
|
|
TraceEvent(SevDebug, "SCFetchKeysHaveData", data->thisServerID)
|
|
|
|
.detail("FKID", interval.pairID)
|
|
|
|
.detail("Version", cacheRange->transferredVersion)
|
|
|
|
.detail("OldestVersion", data->oldestVersion.get());
|
2019-12-06 09:10:32 +08:00
|
|
|
validate(data);
|
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
// Put the updates that were collected during the FinalCommit phase into the batch at the transferredVersion.
|
2021-03-11 02:06:03 +08:00
|
|
|
// The mutations will come back through AddingCacheRange::addMutations and be applied to versionedMap and
|
|
|
|
// mutationLog as normal. The lie about their version is acceptable because this cacheRange will never be read
|
|
|
|
// at versions < transferredVersion
|
|
|
|
for (auto i = cacheRange->updates.begin(); i != cacheRange->updates.end(); ++i) {
|
2019-12-06 09:10:32 +08:00
|
|
|
i->version = cacheRange->transferredVersion;
|
|
|
|
batch->arena.dependsOn(i->arena());
|
|
|
|
}
|
|
|
|
|
|
|
|
int startSize = batch->changes.size();
|
2021-03-11 02:06:03 +08:00
|
|
|
TEST(startSize); // Adding fetch data to a batch which already has changes
|
|
|
|
batch->changes.resize(batch->changes.size() + cacheRange->updates.size());
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// FIXME: pass the deque back rather than copy the data
|
|
|
|
std::copy(cacheRange->updates.begin(), cacheRange->updates.end(), batch->changes.begin() + startSize);
|
2019-12-06 09:10:32 +08:00
|
|
|
Version checkv = cacheRange->transferredVersion;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
for (auto b = batch->changes.begin() + startSize; b != batch->changes.end(); ++b) {
|
|
|
|
ASSERT(b->version >= checkv);
|
2019-12-06 09:10:32 +08:00
|
|
|
checkv = b->version;
|
2020-01-08 05:06:58 +08:00
|
|
|
// FIXME: enable when debugMutation is active
|
2021-03-11 02:06:03 +08:00
|
|
|
// for(auto& m : b->mutations)
|
2020-01-08 05:06:58 +08:00
|
|
|
// debugMutation("fetchKeysFinalCommitInject", batch->changes[0].version, m);
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
cacheRange->updates.clear();
|
|
|
|
|
2020-01-15 04:33:17 +08:00
|
|
|
// TODO: NEELAM: what exactly does it do? Writing some mutations to log. Do we need it for caches?
|
2021-03-11 02:06:03 +08:00
|
|
|
// setAvailableStatus(data, keys, true); // keys will be available when getLatestVersion()==transferredVersion
|
|
|
|
// is durable
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
// Wait for the transferredVersion (and therefore the cacheRange data) to be committed and compacted.
|
|
|
|
// TODO: double check.
|
2021-03-11 02:06:03 +08:00
|
|
|
wait(data->oldestVersion.whenAtLeast(cacheRange->transferredVersion));
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(data->cachedRangeMap[cacheRange->keys.begin]->assigned() &&
|
|
|
|
data->cachedRangeMap[cacheRange->keys.begin]->keys ==
|
|
|
|
cacheRange->keys); // We aren't changing whether the cacheRange is assigned
|
2019-12-06 09:10:32 +08:00
|
|
|
data->newestAvailableVersion.insert(cacheRange->keys, latestVersion);
|
|
|
|
cacheRange->readWrite.send(Void());
|
2021-03-11 02:06:03 +08:00
|
|
|
data->addCacheRange(CacheRangeInfo::newReadWrite(cacheRange->keys, data)); // invalidates cacheRange!
|
2019-12-06 09:10:32 +08:00
|
|
|
coalesceCacheRanges(data, keys);
|
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
validate(data);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
//++data->counters.fetchExecutingCount;
|
2021-03-11 02:06:03 +08:00
|
|
|
// data->counters.fetchExecutingMS += 1000*(now() - executeStart);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-11-04 06:06:25 +08:00
|
|
|
// TraceEvent(SevDebug, interval.end(), data->thisServerID);
|
2021-03-11 02:06:03 +08:00
|
|
|
} catch (Error& e) {
|
2020-11-04 06:06:25 +08:00
|
|
|
// TraceEvent(SevDebug, interval.end(), data->thisServerID).error(e, true).detail("Version", data->version.get());
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
// TODO define the shuttingDown state of cache server
|
2021-03-11 02:06:03 +08:00
|
|
|
if (e.code() == error_code_actor_cancelled &&
|
|
|
|
/* !data->shuttingDown &&*/ cacheRange->phase >= AddingCacheRange::Fetching) {
|
2020-01-08 05:06:58 +08:00
|
|
|
if (cacheRange->phase < AddingCacheRange::Waiting) {
|
|
|
|
// TODO Not sure if it's okay to do this here!!
|
2021-03-11 02:06:03 +08:00
|
|
|
removeDataRange(
|
|
|
|
data, data->addVersionToMutationLog(data->data().getLatestVersion()), data->cachedRangeMap, keys);
|
|
|
|
// data->storage.clearRange( keys );
|
2019-12-06 09:10:32 +08:00
|
|
|
} else {
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(data->data().getLatestVersion() > data->version.get());
|
|
|
|
removeDataRange(
|
|
|
|
data, data->addVersionToMutationLog(data->data().getLatestVersion()), data->cachedRangeMap, keys);
|
|
|
|
// setAvailableStatus(data, keys, false);
|
|
|
|
// Prevent another, overlapping fetchKeys from entering the Fetching phase until
|
|
|
|
// data->data().getLatestVersion() is durable
|
|
|
|
data->newestDirtyVersion.insert(keys, data->data().getLatestVersion());
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
TraceEvent(SevError, "SCFetchKeysError", data->thisServerID)
|
2021-03-11 02:06:03 +08:00
|
|
|
.error(e)
|
|
|
|
.detail("Elapsed", now() - startt)
|
|
|
|
.detail("KeyBegin", keys.begin)
|
|
|
|
.detail("KeyEnd", keys.end);
|
2019-12-06 09:10:32 +08:00
|
|
|
if (e.code() != error_code_actor_cancelled)
|
2021-03-11 02:06:03 +08:00
|
|
|
data->otherError.sendError(e); // Kill the cache server. Are there any recoverable errors?
|
2019-12-06 09:10:32 +08:00
|
|
|
throw; // goes nowhere
|
|
|
|
}
|
|
|
|
|
|
|
|
return Void();
|
|
|
|
};
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
AddingCacheRange::AddingCacheRange(StorageCacheData* server, KeyRangeRef const& keys)
|
2021-07-25 02:20:51 +08:00
|
|
|
: keys(keys), server(server), transferredVersion(invalidVersion), phase(WaitPrevious) {
|
2020-05-07 09:56:42 +08:00
|
|
|
fetchClient = fetchKeys(server, this);
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
void AddingCacheRange::addMutation(Version version, MutationRef const& mutation) {
|
2019-12-06 09:10:32 +08:00
|
|
|
if (mutation.type == mutation.ClearRange) {
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(keys.begin <= mutation.param1 && mutation.param2 <= keys.end);
|
|
|
|
} else if (isSingleKeyMutation((MutationRef::Type)mutation.type)) {
|
|
|
|
ASSERT(keys.contains(mutation.param1));
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (phase == WaitPrevious) {
|
|
|
|
// Updates can be discarded
|
|
|
|
} else if (phase == Fetching) {
|
|
|
|
if (!updates.size() || version > updates.end()[-1].version) {
|
|
|
|
VerUpdateRef v;
|
|
|
|
v.version = version;
|
|
|
|
v.isPrivateData = false;
|
|
|
|
updates.push_back(v);
|
|
|
|
} else {
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(version == updates.end()[-1].version);
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
updates.back().mutations.push_back_deep(updates.back().arena(), mutation);
|
2019-12-06 09:10:32 +08:00
|
|
|
} else if (phase == Waiting) {
|
2020-01-08 05:06:58 +08:00
|
|
|
server->addMutation(keys, version, mutation);
|
2021-03-11 02:06:03 +08:00
|
|
|
} else
|
|
|
|
ASSERT(false);
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void CacheRangeInfo::addMutation(Version version, MutationRef const& mutation) {
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT((void*)this);
|
|
|
|
ASSERT(keys.contains(mutation.param1));
|
2019-12-06 09:10:32 +08:00
|
|
|
if (adding)
|
|
|
|
adding->addMutation(version, mutation);
|
|
|
|
else if (readWrite)
|
2020-01-08 05:06:58 +08:00
|
|
|
readWrite->addMutation(this->keys, version, mutation);
|
2021-03-11 02:06:03 +08:00
|
|
|
else if (mutation.type != MutationRef::ClearRange) { // TODO NEELAM: ClearRange mutations are ignored (why do we
|
|
|
|
// even allow them on un-assigned range?)
|
2021-08-28 08:07:47 +08:00
|
|
|
TraceEvent(SevError, "DeliveredToNotAssigned").detail("Version", version).detail("Mutation", mutation);
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(false); // Mutation delivered to notAssigned cacheRange!
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
void cacheWarmup(StorageCacheData* data, const KeyRangeRef& keys, bool nowAssigned, Version version) {
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(!keys.empty());
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
validate(data);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
// FIXME: enable when debugKeyRange is active
|
2021-03-11 02:06:03 +08:00
|
|
|
// debugKeyRange( nowAssigned ? "KeysAssigned" : "KeysUnassigned", version, keys );
|
2019-12-06 09:10:32 +08:00
|
|
|
|
|
|
|
bool isDifferent = false;
|
|
|
|
auto existingCacheRanges = data->cachedRangeMap.intersectingRanges(keys);
|
2021-03-11 02:06:03 +08:00
|
|
|
for (auto it = existingCacheRanges.begin(); it != existingCacheRanges.end(); ++it) {
|
|
|
|
if (nowAssigned != it->value()->assigned()) {
|
2019-12-06 09:10:32 +08:00
|
|
|
isDifferent = true;
|
2020-02-26 09:32:24 +08:00
|
|
|
TraceEvent("SCWRangeDifferent", data->thisServerID)
|
2021-03-11 02:06:03 +08:00
|
|
|
.detail("KeyBegin", it->range().begin)
|
|
|
|
.detail("KeyEnd", it->range().end);
|
2019-12-06 09:10:32 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
if (!isDifferent) {
|
|
|
|
TraceEvent("SCWShortCircuit", data->thisServerID).detail("KeyBegin", keys.begin).detail("KeyEnd", keys.end);
|
2019-12-06 09:10:32 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// Save a backup of the CacheRangeInfo references before we start messing with cacheRanges, in order to defer
|
|
|
|
// fetchKeys cancellation (and its potential call to removeDataRange()) until cacheRanges is again valid
|
2021-09-17 08:42:34 +08:00
|
|
|
std::vector<Reference<CacheRangeInfo>> oldCacheRanges;
|
2019-12-06 09:10:32 +08:00
|
|
|
auto ocr = data->cachedRangeMap.intersectingRanges(keys);
|
2021-03-11 02:06:03 +08:00
|
|
|
for (auto r = ocr.begin(); r != ocr.end(); ++r)
|
|
|
|
oldCacheRanges.push_back(r->value());
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
// As addCacheRange (called below)'s documentation requires, reinitialize any overlapping range(s)
|
2021-03-11 02:06:03 +08:00
|
|
|
auto ranges = data->cachedRangeMap.getAffectedRangesAfterInsertion(
|
|
|
|
keys, Reference<CacheRangeInfo>()); // null reference indicates the range being changed
|
|
|
|
for (int i = 0; i < ranges.size(); i++) {
|
2019-12-06 09:10:32 +08:00
|
|
|
if (!ranges[i].value) {
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT((KeyRangeRef&)ranges[i] == keys); // there shouldn't be any nulls except for the range being inserted
|
2019-12-06 09:10:32 +08:00
|
|
|
} else if (ranges[i].value->notAssigned())
|
2021-03-11 02:06:03 +08:00
|
|
|
data->addCacheRange(CacheRangeInfo::newNotAssigned(ranges[i]));
|
2019-12-06 09:10:32 +08:00
|
|
|
else if (ranges[i].value->isReadable())
|
2021-03-11 02:06:03 +08:00
|
|
|
data->addCacheRange(CacheRangeInfo::newReadWrite(ranges[i], data));
|
2019-12-06 09:10:32 +08:00
|
|
|
else {
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(ranges[i].value->adding);
|
|
|
|
data->addCacheRange(CacheRangeInfo::newAdding(data, ranges[i]));
|
|
|
|
TEST(true); // cacheWarmup reFetchKeys
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// CacheRange state depends on nowAssigned and whether the data is available (actually assigned in memory or on the
|
|
|
|
// disk) up to the given version. The latter depends on data->newestAvailableVersion, so loop over the ranges of
|
|
|
|
// that. SOMEDAY: Could this just use cacheRanges? Then we could explicitly do the removeDataRange here when an
|
|
|
|
// adding/transferred cacheRange is cancelled
|
2019-12-06 09:10:32 +08:00
|
|
|
auto vr = data->newestAvailableVersion.intersectingRanges(keys);
|
2021-03-11 02:06:03 +08:00
|
|
|
std::vector<std::pair<KeyRange, Version>> changeNewestAvailable;
|
2019-12-06 09:10:32 +08:00
|
|
|
std::vector<KeyRange> removeRanges;
|
|
|
|
for (auto r = vr.begin(); r != vr.end(); ++r) {
|
|
|
|
KeyRangeRef range = keys & r->range();
|
2021-03-11 02:06:03 +08:00
|
|
|
bool dataAvailable = r->value() == latestVersion || r->value() >= version;
|
2019-12-06 09:10:32 +08:00
|
|
|
/*TraceEvent("CSKRange", data->thisServerID)
|
2021-03-11 02:06:03 +08:00
|
|
|
.detail("KeyBegin", range.begin)
|
|
|
|
.detail("KeyEnd", range.end)
|
|
|
|
.detail("Available", dataAvailable)
|
|
|
|
.detail("NowAssigned", nowAssigned)
|
|
|
|
.detail("NewestAvailable", r->value())
|
|
|
|
.detail("CacheRangeState0", data->cachedRangeMap[range.begin]->debugDescribeState());*/
|
2019-12-06 09:10:32 +08:00
|
|
|
if (!nowAssigned) {
|
|
|
|
if (dataAvailable) {
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(r->value() ==
|
|
|
|
latestVersion); // Not that we care, but this used to be checked instead of dataAvailable
|
|
|
|
ASSERT(data->mutableData().getLatestVersion() > version);
|
2019-12-06 09:10:32 +08:00
|
|
|
changeNewestAvailable.emplace_back(range, version);
|
2021-03-11 02:06:03 +08:00
|
|
|
removeRanges.push_back(range);
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
data->addCacheRange(CacheRangeInfo::newNotAssigned(range));
|
2019-12-06 09:10:32 +08:00
|
|
|
} else if (!dataAvailable) {
|
2020-01-08 05:06:58 +08:00
|
|
|
// SOMEDAY: Avoid restarting adding/transferred cacheRanges
|
2021-03-11 02:06:03 +08:00
|
|
|
if (version == 0) { // bypass fetchkeys; cacheRange is known empty at version 0
|
2019-12-06 09:10:32 +08:00
|
|
|
changeNewestAvailable.emplace_back(range, latestVersion);
|
2021-03-11 02:06:03 +08:00
|
|
|
data->addCacheRange(CacheRangeInfo::newReadWrite(range, data));
|
|
|
|
// setAvailableStatus(data, range, true);
|
2019-12-06 09:10:32 +08:00
|
|
|
} else {
|
2020-01-08 05:06:58 +08:00
|
|
|
auto& cacheRange = data->cachedRangeMap[range.begin];
|
2021-03-11 02:06:03 +08:00
|
|
|
if (!cacheRange->assigned() || cacheRange->keys != range)
|
|
|
|
data->addCacheRange(CacheRangeInfo::newAdding(data, range));
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
changeNewestAvailable.emplace_back(range, latestVersion);
|
2021-03-11 02:06:03 +08:00
|
|
|
data->addCacheRange(CacheRangeInfo::newReadWrite(range, data));
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
// Update newestAvailableVersion when a cacheRange becomes (un)available (in a separate loop to avoid invalidating
|
|
|
|
// vr above)
|
|
|
|
for (auto r = changeNewestAvailable.begin(); r != changeNewestAvailable.end(); ++r)
|
|
|
|
data->newestAvailableVersion.insert(r->first, r->second);
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2020-01-08 05:06:58 +08:00
|
|
|
// TODO
|
2021-03-11 02:06:03 +08:00
|
|
|
// if (!nowAssigned)
|
2020-01-08 05:06:58 +08:00
|
|
|
// data->metrics.notifyNotReadable( keys );
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
coalesceCacheRanges(data, KeyRangeRef(ranges[0].begin, ranges[ranges.size() - 1].end));
|
2019-12-06 09:10:32 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// Now it is OK to do removeDataRanges, directly and through fetchKeys cancellation (and we have to do so before
|
|
|
|
// validate())
|
2019-12-06 09:10:32 +08:00
|
|
|
oldCacheRanges.clear();
|
|
|
|
ranges.clear();
|
2021-03-11 02:06:03 +08:00
|
|
|
for (auto r = removeRanges.begin(); r != removeRanges.end(); ++r) {
|
|
|
|
removeDataRange(data, data->addVersionToMutationLog(data->data().getLatestVersion()), data->cachedRangeMap, *r);
|
|
|
|
// setAvailableStatus(data, *r, false);
|
2019-12-06 09:10:32 +08:00
|
|
|
}
|
|
|
|
validate(data);
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Helper class for updating the storage cache (i.e. applying mutations)
|
|
|
|
class StorageCacheUpdater {
|
|
|
|
public:
|
2021-03-11 02:06:03 +08:00
|
|
|
StorageCacheUpdater()
|
2021-07-25 02:20:51 +08:00
|
|
|
: currentVersion(invalidVersion), fromVersion(invalidVersion), processedCacheStartKey(false) {}
|
2021-03-11 02:06:03 +08:00
|
|
|
StorageCacheUpdater(Version currentVersion)
|
2021-07-25 02:20:51 +08:00
|
|
|
: currentVersion(invalidVersion), fromVersion(currentVersion), processedCacheStartKey(false) {}
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
void applyMutation(StorageCacheData* data, MutationRef const& m, Version ver) {
|
2020-01-08 08:51:40 +08:00
|
|
|
//TraceEvent("SCNewVersion", data->thisServerID).detail("VerWas", data->mutableData().latestVersion).detail("ChVer", ver);
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (currentVersion != ver) {
|
2020-01-08 05:06:58 +08:00
|
|
|
fromVersion = currentVersion;
|
2019-11-13 05:01:29 +08:00
|
|
|
currentVersion = ver;
|
|
|
|
data->mutableData().createNewVersion(ver);
|
|
|
|
}
|
|
|
|
|
2020-05-14 05:28:04 +08:00
|
|
|
DEBUG_MUTATION("SCUpdateMutation", ver, m);
|
2021-03-11 02:06:03 +08:00
|
|
|
if (m.param1.startsWith(systemKeys.end)) {
|
2021-08-10 14:29:09 +08:00
|
|
|
//TraceEvent("SCPrivateData", data->thisServerID).detail("Mutation", m).detail("Version", ver);
|
2021-03-11 02:06:03 +08:00
|
|
|
applyPrivateCacheData(data, m);
|
2019-11-13 05:01:29 +08:00
|
|
|
} else {
|
|
|
|
splitMutation(data, data->cachedRangeMap, m, ver);
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// TODO
|
|
|
|
if (data->otherError.getFuture().isReady())
|
|
|
|
data->otherError.getFuture().get();
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
Version currentVersion;
|
2021-03-11 02:06:03 +08:00
|
|
|
|
2019-11-13 05:01:29 +08:00
|
|
|
private:
|
2020-01-08 05:06:58 +08:00
|
|
|
Version fromVersion;
|
2019-11-13 05:01:29 +08:00
|
|
|
KeyRef cacheStartKey;
|
2020-08-01 06:46:46 +08:00
|
|
|
bool nowAssigned;
|
2019-11-13 05:01:29 +08:00
|
|
|
bool processedCacheStartKey;
|
|
|
|
|
2019-12-06 09:10:32 +08:00
|
|
|
// Applies private mutations, as the name suggests. It basically establishes the key-ranges
|
|
|
|
// that this cache server is responsible for
|
2019-11-13 05:01:29 +08:00
|
|
|
// TODO Revisit during failure handling. Might we loose some private mutations?
|
2021-03-11 02:06:03 +08:00
|
|
|
void applyPrivateCacheData(StorageCacheData* data, MutationRef const& m) {
|
|
|
|
|
2020-06-10 06:09:58 +08:00
|
|
|
//TraceEvent(SevDebug, "SCPrivateCacheMutation", data->thisServerID).detail("Mutation", m);
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
if (processedCacheStartKey) {
|
|
|
|
// we expect changes in pairs, [begin,end). This mutation is for end key of the range
|
2021-03-11 02:06:03 +08:00
|
|
|
ASSERT(m.type == MutationRef::SetValue && m.param1.startsWith(data->ck));
|
|
|
|
KeyRangeRef keys(cacheStartKey.removePrefix(data->ck), m.param1.removePrefix(data->ck));
|
|
|
|
// setAssignedStatus( data, keys, nowAssigned );
|
|
|
|
// data->cachedRangeMap.insert(keys, true);
|
|
|
|
// fprintf(stderr, "SCPrivateCacheMutation: begin: %s, end: %s\n", printable(keys.begin).c_str(),
|
|
|
|
// printable(keys.end).c_str());
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2019-12-06 09:10:32 +08:00
|
|
|
// Warmup the cache for the newly added key-range
|
2021-03-11 02:06:03 +08:00
|
|
|
cacheWarmup(data, /*this,*/ keys, nowAssigned, currentVersion - 1);
|
2019-11-13 05:01:29 +08:00
|
|
|
processedCacheStartKey = false;
|
2021-03-11 02:06:03 +08:00
|
|
|
} else if (m.type == MutationRef::SetValue && m.param1.startsWith(data->ck)) {
|
2019-11-13 05:01:29 +08:00
|
|
|
// We expect changes in pairs, [begin,end), This mutation is for start key of the range
|
|
|
|
cacheStartKey = m.param1;
|
2019-12-06 09:10:32 +08:00
|
|
|
nowAssigned = m.param2 != serverKeysFalse;
|
2019-11-13 05:01:29 +08:00
|
|
|
processedCacheStartKey = true;
|
2020-01-08 05:06:58 +08:00
|
|
|
} else if (m.type == MutationRef::SetValue && m.param1 == lastEpochEndPrivateKey) {
|
|
|
|
// lastEpochEnd transactions are guaranteed by the master to be alone in their own batch (version)
|
|
|
|
// That means we don't have to worry about the impact on changeServerKeys
|
|
|
|
|
|
|
|
Version rollbackVersion;
|
|
|
|
BinaryReader br(m.param2, Unversioned());
|
|
|
|
br >> rollbackVersion;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (rollbackVersion < fromVersion && rollbackVersion > data->oldestVersion.get()) {
|
|
|
|
TEST(true); // CacheRangeApplyPrivateData cacheRange rollback
|
2020-01-08 05:06:58 +08:00
|
|
|
TraceEvent(SevWarn, "Rollback", data->thisServerID)
|
2021-03-11 02:06:03 +08:00
|
|
|
.detail("FromVersion", fromVersion)
|
|
|
|
.detail("ToVersion", rollbackVersion)
|
|
|
|
.detail("AtVersion", currentVersion)
|
|
|
|
.detail("OldestVersion", data->oldestVersion.get());
|
|
|
|
rollback(data, rollbackVersion, currentVersion);
|
2020-01-08 05:06:58 +08:00
|
|
|
}
|
2019-11-13 05:01:29 +08:00
|
|
|
} else {
|
2021-07-27 10:55:10 +08:00
|
|
|
TraceEvent(SevWarn, "SCPrivateCacheMutation: Unknown private mutation").log();
|
2021-03-11 02:06:03 +08:00
|
|
|
// ASSERT(false); // Unknown private mutation
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
void applyMutation(StorageCacheUpdater* updater, StorageCacheData* data, MutationRef const& mutation, Version version) {
|
|
|
|
updater->applyMutation(data, mutation, version);
|
2020-01-08 05:06:58 +08:00
|
|
|
}
|
|
|
|
|
2019-11-13 05:01:29 +08:00
|
|
|
// Compacts the in-memory VersionedMap, i.e. removes versions below the desiredOldestVersion
|
2020-01-08 05:06:58 +08:00
|
|
|
// TODO revisit if we change the data structure of the VersionedMap
|
2019-11-13 05:01:29 +08:00
|
|
|
ACTOR Future<Void> compactCache(StorageCacheData* data) {
|
|
|
|
loop {
|
2021-03-11 02:06:03 +08:00
|
|
|
// TODO understand this, should we add delay here?
|
|
|
|
// if (g_network->isSimulated()) {
|
|
|
|
// double endTime = g_simulator.checkDisabled(format("%s/compactCache",
|
|
|
|
// data->thisServerID.toString().c_str())); if(endTime > now()) { wait(delay(endTime - now(),
|
|
|
|
// TaskPriority::CompactCache));
|
2019-11-13 05:01:29 +08:00
|
|
|
// }
|
|
|
|
//}
|
|
|
|
|
|
|
|
// Wait until the desiredOldestVersion is greater than the current oldestVersion
|
2021-03-11 02:06:03 +08:00
|
|
|
wait(data->desiredOldestVersion.whenAtLeast(data->oldestVersion.get() + 1));
|
|
|
|
wait(delay(0, TaskPriority::CompactCache));
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// TODO not really in use as of now. may need in some failure cases. Revisit and remove if no plausible use
|
2019-11-13 05:01:29 +08:00
|
|
|
state Promise<Void> compactionInProgress;
|
|
|
|
data->compactionInProgress = compactionInProgress.getFuture();
|
2021-03-11 02:06:03 +08:00
|
|
|
// state Version oldestVersion = data->oldestVersion.get();
|
2019-11-13 05:01:29 +08:00
|
|
|
state Version desiredVersion = data->desiredOldestVersion.get();
|
|
|
|
// Call the compaction routine that does the actual work,
|
2020-03-05 07:18:49 +08:00
|
|
|
//TraceEvent(SevDebug, "SCCompactCache", data->thisServerID).detail("DesiredVersion", desiredVersion);
|
2019-11-13 05:01:29 +08:00
|
|
|
// TODO It's a synchronous function call as of now. Should it asynch?
|
|
|
|
data->mutableData().compact(desiredVersion);
|
2021-03-11 02:06:03 +08:00
|
|
|
Future<Void> finishedForgetting =
|
|
|
|
data->mutableData().forgetVersionsBeforeAsync(desiredVersion, TaskPriority::CompactCache);
|
|
|
|
data->oldestVersion.set(desiredVersion);
|
|
|
|
wait(finishedForgetting);
|
2019-11-13 05:01:29 +08:00
|
|
|
// TODO how do we yield here? This may not be enough, because compact() does the heavy lifting
|
|
|
|
// of compating the VersionedMap. We should probably look into per version compaction and then
|
|
|
|
// we can yield after compacting one version
|
2021-03-11 02:06:03 +08:00
|
|
|
wait(yield(TaskPriority::CompactCache));
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
// TODO what flowlock to acquire during compaction?
|
|
|
|
compactionInProgress.send(Void());
|
2020-03-05 07:18:49 +08:00
|
|
|
wait(delay(2.0)); // we want to wait at least some small amount of time before
|
2021-03-11 02:06:03 +08:00
|
|
|
// wait( delay(0, TaskPriority::CompactCache) ); //Setting compactionInProgess could cause the cache server to
|
|
|
|
// shut down, so delay to check for cancellation
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
ACTOR Future<Void> pullAsyncData(StorageCacheData* data) {
|
2019-11-13 05:01:29 +08:00
|
|
|
state Future<Void> dbInfoChange = Void();
|
2020-01-08 05:06:58 +08:00
|
|
|
state Reference<ILogSystem::IPeekCursor> cursor;
|
2019-11-13 05:01:29 +08:00
|
|
|
state Version tagAt = 0;
|
2020-05-30 04:07:38 +08:00
|
|
|
state double start = now();
|
2019-11-13 05:01:29 +08:00
|
|
|
state Version ver = invalidVersion;
|
|
|
|
++data->counters.updateBatches;
|
|
|
|
|
|
|
|
loop {
|
|
|
|
loop {
|
|
|
|
choose {
|
2021-03-11 02:06:03 +08:00
|
|
|
when(wait(cursor ? cursor->getMore(TaskPriority::TLogCommit) : Never())) { break; }
|
|
|
|
when(wait(dbInfoChange)) {
|
|
|
|
if (data->logSystem) {
|
|
|
|
cursor = data->logSystem->peekSingle(
|
|
|
|
data->thisServerID, data->peekVersion, cacheTag, std::vector<std::pair<Version, Tag>>());
|
2020-05-07 09:56:42 +08:00
|
|
|
} else
|
2020-01-08 05:06:58 +08:00
|
|
|
cursor = Reference<ILogSystem::IPeekCursor>();
|
|
|
|
dbInfoChange = data->db->onChange();
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-03-03 09:11:23 +08:00
|
|
|
try {
|
2020-03-27 03:39:07 +08:00
|
|
|
// If the popped version is greater than our last version, we need to clear the cache
|
|
|
|
if (cursor->version().version <= cursor->popped())
|
|
|
|
throw please_reboot();
|
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
data->lastTLogVersion = cursor->getMaxKnownVersion();
|
|
|
|
data->versionLag = std::max<int64_t>(0, data->lastTLogVersion - data->version.get());
|
|
|
|
|
2020-05-30 04:07:38 +08:00
|
|
|
start = now();
|
2021-03-11 02:06:03 +08:00
|
|
|
wait(data->updateVersionLock.take(TaskPriority::TLogPeekReply, 1));
|
|
|
|
state FlowLock::Releaser holdingDVL(data->updateVersionLock);
|
|
|
|
if (now() - start > 0.1)
|
|
|
|
TraceEvent("SCSlowTakeLock1", data->thisServerID)
|
|
|
|
.detailf("From", "%016llx", debug_lastLoadBalanceResultEndpointToken)
|
|
|
|
.detail("Duration", now() - start)
|
|
|
|
.detail("Version", data->version.get());
|
2020-05-30 04:07:38 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
state FetchInjectionInfo fii;
|
|
|
|
state Reference<ILogSystem::IPeekCursor> cloneCursor2;
|
2021-03-11 02:06:03 +08:00
|
|
|
loop {
|
2020-03-03 09:11:23 +08:00
|
|
|
state uint64_t changeCounter = data->cacheRangeChangeCounter;
|
|
|
|
bool epochEnd = false;
|
2020-03-27 03:39:07 +08:00
|
|
|
bool hasPrivateData = false;
|
2020-03-03 09:11:23 +08:00
|
|
|
bool firstMutation = true;
|
|
|
|
bool dbgLastMessageWasProtocol = false;
|
|
|
|
|
|
|
|
Reference<ILogSystem::IPeekCursor> cloneCursor1 = cursor->cloneNoMore();
|
|
|
|
cloneCursor2 = cursor->cloneNoMore();
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// TODO cache servers should write the LogProtocolMessage when they are created
|
|
|
|
// cloneCursor1->setProtocolVersion(data->logProtocol);
|
2020-09-29 01:58:49 +08:00
|
|
|
cloneCursor1->setProtocolVersion(g_network->protocolVersion());
|
2020-03-03 09:11:23 +08:00
|
|
|
|
|
|
|
for (; cloneCursor1->hasMessage(); cloneCursor1->nextMessage()) {
|
|
|
|
ArenaReader& cloneReader = *cloneCursor1->reader();
|
|
|
|
|
|
|
|
if (LogProtocolMessage::isNextIn(cloneReader)) {
|
|
|
|
LogProtocolMessage lpm;
|
|
|
|
cloneReader >> lpm;
|
|
|
|
dbgLastMessageWasProtocol = true;
|
|
|
|
cloneCursor1->setProtocolVersion(cloneReader.protocolVersion());
|
2021-03-11 02:06:03 +08:00
|
|
|
} else if (cloneReader.protocolVersion().hasSpanContext() &&
|
|
|
|
SpanContextMessage::isNextIn(cloneReader)) {
|
2020-08-28 06:11:16 +08:00
|
|
|
SpanContextMessage scm;
|
|
|
|
cloneReader >> scm;
|
2021-03-11 02:06:03 +08:00
|
|
|
} else {
|
2020-03-03 09:11:23 +08:00
|
|
|
MutationRef msg;
|
|
|
|
cloneReader >> msg;
|
|
|
|
|
2020-03-27 03:39:07 +08:00
|
|
|
if (firstMutation && msg.param1.startsWith(systemKeys.end))
|
|
|
|
hasPrivateData = true;
|
2020-03-14 09:52:34 +08:00
|
|
|
firstMutation = false;
|
2020-03-27 03:39:07 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
if (msg.param1 == lastEpochEndPrivateKey) {
|
|
|
|
epochEnd = true;
|
2021-03-11 02:06:03 +08:00
|
|
|
// ASSERT(firstMutation);
|
2020-03-03 09:11:23 +08:00
|
|
|
ASSERT(dbgLastMessageWasProtocol);
|
|
|
|
}
|
|
|
|
|
|
|
|
dbgLastMessageWasProtocol = false;
|
|
|
|
}
|
|
|
|
}
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// Any fetchKeys which are ready to transition their cacheRanges to the adding,transferred state do so
|
|
|
|
// now. If there is an epoch end we skip this step, to increase testability and to prevent inserting a
|
|
|
|
// version in the middle of a rolled back version range.
|
|
|
|
while (!hasPrivateData && !epochEnd && !data->readyFetchKeys.empty()) {
|
2020-03-03 09:11:23 +08:00
|
|
|
auto fk = data->readyFetchKeys.back();
|
|
|
|
data->readyFetchKeys.pop_back();
|
2021-03-11 02:06:03 +08:00
|
|
|
fk.send(&fii);
|
2020-03-03 09:11:23 +08:00
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
if (data->cacheRangeChangeCounter == changeCounter)
|
|
|
|
break;
|
|
|
|
// TEST(true); // A fetchKeys completed while we were doing this, so eager might be outdated. Read it
|
|
|
|
// again.
|
2020-03-03 09:11:23 +08:00
|
|
|
}
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
data->debug_inApplyUpdate = true;
|
2021-03-11 02:06:03 +08:00
|
|
|
if (EXPENSIVE_VALIDATION)
|
|
|
|
data->data().atLatest().validate();
|
2020-03-03 09:11:23 +08:00
|
|
|
validate(data);
|
|
|
|
|
|
|
|
state bool injectedChanges = false;
|
|
|
|
state int changeNum = 0;
|
|
|
|
state int mutationBytes = 0;
|
2021-03-11 02:06:03 +08:00
|
|
|
for (; changeNum < fii.changes.size(); changeNum++) {
|
2020-03-03 09:11:23 +08:00
|
|
|
state int mutationNum = 0;
|
|
|
|
state VerUpdateRef* pUpdate = &fii.changes[changeNum];
|
2021-03-11 02:06:03 +08:00
|
|
|
for (; mutationNum < pUpdate->mutations.size(); mutationNum++) {
|
2020-05-30 04:07:38 +08:00
|
|
|
TraceEvent("SCInjectedChanges", data->thisServerID).detail("Version", pUpdate->version);
|
2020-05-07 09:56:42 +08:00
|
|
|
applyMutation(data->updater, data, pUpdate->mutations[mutationNum], pUpdate->version);
|
2020-03-03 09:11:23 +08:00
|
|
|
mutationBytes += pUpdate->mutations[mutationNum].totalSize();
|
|
|
|
injectedChanges = true;
|
2021-03-11 02:06:03 +08:00
|
|
|
if (false && mutationBytes > SERVER_KNOBS->DESIRED_UPDATE_BYTES) {
|
2020-03-03 09:11:23 +08:00
|
|
|
mutationBytes = 0;
|
|
|
|
wait(delay(SERVER_KNOBS->UPDATE_DELAY));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// FIXME: ensure this can only read data from the current version
|
|
|
|
// cloneCursor2->setProtocolVersion(data->logProtocol);
|
2020-09-29 01:58:49 +08:00
|
|
|
cloneCursor2->setProtocolVersion(g_network->protocolVersion());
|
2020-03-03 09:11:23 +08:00
|
|
|
ver = invalidVersion;
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
// Now process the mutations
|
|
|
|
for (; cloneCursor2->hasMessage(); cloneCursor2->nextMessage()) {
|
|
|
|
ArenaReader& reader = *cloneCursor2->reader();
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
if (cloneCursor2->version().version > ver && cloneCursor2->version().version > data->version.get()) {
|
|
|
|
++data->counters.updateVersions;
|
|
|
|
ver = cloneCursor2->version().version;
|
|
|
|
}
|
|
|
|
if (LogProtocolMessage::isNextIn(reader)) {
|
2020-01-08 05:06:58 +08:00
|
|
|
LogProtocolMessage lpm;
|
2020-03-03 09:11:23 +08:00
|
|
|
reader >> lpm;
|
|
|
|
|
|
|
|
// TODO should we store the logProtocol?
|
2020-03-27 03:39:07 +08:00
|
|
|
data->logProtocol = reader.protocolVersion();
|
|
|
|
cloneCursor2->setProtocolVersion(data->logProtocol);
|
2021-03-11 02:06:03 +08:00
|
|
|
} else if (reader.protocolVersion().hasSpanContext() && SpanContextMessage::isNextIn(reader)) {
|
2020-08-28 06:11:16 +08:00
|
|
|
SpanContextMessage scm;
|
|
|
|
reader >> scm;
|
2021-03-11 02:06:03 +08:00
|
|
|
} else {
|
2020-01-08 05:06:58 +08:00
|
|
|
MutationRef msg;
|
2020-03-03 09:11:23 +08:00
|
|
|
reader >> msg;
|
|
|
|
|
|
|
|
if (ver != invalidVersion) // This change belongs to a version < minVersion
|
|
|
|
{
|
2020-05-07 09:56:42 +08:00
|
|
|
applyMutation(data->updater, data, msg, ver);
|
2020-03-03 09:11:23 +08:00
|
|
|
data->counters.mutationBytes += msg.totalSize();
|
|
|
|
++data->counters.mutations;
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
switch (msg.type) {
|
|
|
|
case MutationRef::SetValue:
|
|
|
|
++data->counters.setMutations;
|
|
|
|
break;
|
|
|
|
case MutationRef::ClearRange:
|
|
|
|
++data->counters.clearRangeMutations;
|
|
|
|
break;
|
|
|
|
case MutationRef::AddValue:
|
|
|
|
case MutationRef::And:
|
|
|
|
case MutationRef::AndV2:
|
|
|
|
case MutationRef::AppendIfFits:
|
|
|
|
case MutationRef::ByteMax:
|
|
|
|
case MutationRef::ByteMin:
|
|
|
|
case MutationRef::Max:
|
|
|
|
case MutationRef::Min:
|
|
|
|
case MutationRef::MinV2:
|
|
|
|
case MutationRef::Or:
|
|
|
|
case MutationRef::Xor:
|
|
|
|
case MutationRef::CompareAndClear:
|
|
|
|
++data->counters.atomicMutations;
|
|
|
|
break;
|
2020-03-03 09:11:23 +08:00
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
} else {
|
|
|
|
TraceEvent(SevError, "DiscardingPeekedData", data->thisServerID)
|
2021-08-10 14:29:09 +08:00
|
|
|
.detail("Mutation", msg)
|
2021-03-11 02:06:03 +08:00
|
|
|
.detail("CursorVersion", cloneCursor2->version().version)
|
|
|
|
.detail("DataVersion", data->version.get());
|
2020-05-08 03:33:14 +08:00
|
|
|
}
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
tagAt = cursor->version().version + 1;
|
2020-01-08 05:06:58 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (ver != invalidVersion) {
|
2020-03-03 09:11:23 +08:00
|
|
|
data->lastVersionWithData = ver;
|
|
|
|
} else {
|
|
|
|
ver = cloneCursor2->version().version - 1;
|
2020-01-08 05:06:58 +08:00
|
|
|
}
|
2021-03-11 02:06:03 +08:00
|
|
|
if (injectedChanges)
|
|
|
|
data->lastVersionWithData = ver;
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
data->debug_inApplyUpdate = false;
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
if (ver != invalidVersion && ver > data->version.get()) {
|
|
|
|
DEBUG_KEY_RANGE("SCUpdate", ver, allKeys);
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
data->mutableData().createNewVersion(ver);
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
// TODO what about otherError
|
2021-03-11 02:06:03 +08:00
|
|
|
if (data->otherError.getFuture().isReady())
|
|
|
|
data->otherError.getFuture().get();
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
// TODO may enable these later
|
2021-03-11 02:06:03 +08:00
|
|
|
// data->noRecentUpdates.set(false);
|
|
|
|
// data->lastUpdate = now();
|
|
|
|
data->version.set(ver); // Triggers replies to waiting gets for new version(s)
|
2020-05-08 03:33:14 +08:00
|
|
|
data->peekVersion = ver + 1;
|
2020-03-03 09:11:23 +08:00
|
|
|
// TODO double check
|
2021-03-11 02:06:03 +08:00
|
|
|
// setDataVersion(data->thisServerID, data->version.get());
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
// TODO what about otherError
|
2021-03-11 02:06:03 +08:00
|
|
|
if (data->otherError.getFuture().isReady())
|
|
|
|
data->otherError.getFuture().get();
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
// we can get rid of versions beyond maxVerionsInMemory at any point. Update the
|
2021-03-11 02:06:03 +08:00
|
|
|
// desiredOldestVersion and that may invoke the compaction actor
|
2020-03-03 09:11:23 +08:00
|
|
|
Version maxVersionsInMemory = SERVER_KNOBS->MAX_READ_TRANSACTION_LIFE_VERSIONS;
|
|
|
|
Version proposedOldestVersion = data->version.get() - maxVersionsInMemory;
|
|
|
|
proposedOldestVersion = std::max(proposedOldestVersion, data->oldestVersion.get());
|
|
|
|
data->desiredOldestVersion.set(proposedOldestVersion);
|
2020-01-08 05:06:58 +08:00
|
|
|
}
|
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
validate(data);
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2020-03-03 09:11:23 +08:00
|
|
|
data->lastTLogVersion = cloneCursor2->getMaxKnownVersion();
|
2021-03-11 02:06:03 +08:00
|
|
|
cursor->advanceTo(cloneCursor2->version());
|
2020-03-03 09:11:23 +08:00
|
|
|
data->versionLag = std::max<int64_t>(0, data->lastTLogVersion - data->version.get());
|
2021-03-11 02:06:03 +08:00
|
|
|
if (cursor->version().version >= data->lastTLogVersion) {
|
|
|
|
if (data->behind) {
|
|
|
|
TraceEvent("StorageCacheNoLongerBehind", data->thisServerID)
|
|
|
|
.detail("CursorVersion", cursor->version().version)
|
|
|
|
.detail("TLogVersion", data->lastTLogVersion);
|
2020-03-03 09:11:23 +08:00
|
|
|
}
|
|
|
|
data->behind = false;
|
|
|
|
}
|
|
|
|
} catch (Error& err) {
|
|
|
|
state Error e = err;
|
|
|
|
TraceEvent(SevDebug, "SCUpdateError", data->thisServerID).error(e).backtrace();
|
|
|
|
if (e.code() == error_code_worker_removed) {
|
|
|
|
throw please_reboot();
|
|
|
|
} else {
|
|
|
|
throw e;
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
tagAt = std::max(tagAt, cursor->version().version);
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-08 03:33:14 +08:00
|
|
|
// Fetch metadata mutation from the database to establish cache ranges and apply them
|
|
|
|
ACTOR Future<Void> storageCacheStartUpWarmup(StorageCacheData* self) {
|
|
|
|
state Transaction tr(self->cx);
|
|
|
|
state Value trueValue = storageCacheValue(std::vector<uint16_t>{ 0 });
|
|
|
|
state Value falseValue = storageCacheValue(std::vector<uint16_t>{});
|
2020-11-20 02:40:24 +08:00
|
|
|
state Standalone<MutationRef> privatized;
|
2020-06-06 07:27:04 +08:00
|
|
|
privatized.type = MutationRef::SetValue;
|
2020-05-08 03:33:14 +08:00
|
|
|
state Version readVersion;
|
|
|
|
try {
|
|
|
|
loop {
|
|
|
|
tr.setOption(FDBTransactionOptions::READ_LOCK_AWARE);
|
|
|
|
tr.setOption(FDBTransactionOptions::ACCESS_SYSTEM_KEYS);
|
|
|
|
try {
|
2021-05-04 04:14:16 +08:00
|
|
|
RangeResult range = wait(tr.getRange(storageCacheKeys, CLIENT_KNOBS->TOO_MANY));
|
2020-05-08 03:33:14 +08:00
|
|
|
ASSERT(!range.more);
|
|
|
|
readVersion = tr.getReadVersion().get();
|
|
|
|
bool currCached = false;
|
|
|
|
KeyRef begin, end;
|
|
|
|
for (const auto& kv : range) {
|
|
|
|
// These booleans have to flip consistently
|
|
|
|
ASSERT(currCached == (kv.value == falseValue));
|
|
|
|
if (kv.value == trueValue) {
|
|
|
|
begin = kv.key;
|
2020-11-20 04:48:34 +08:00
|
|
|
privatized.param1 = begin.withPrefix(systemKeys.begin, privatized.arena());
|
2020-05-08 03:33:14 +08:00
|
|
|
privatized.param2 = serverKeysTrue;
|
2020-05-30 04:07:38 +08:00
|
|
|
//TraceEvent(SevDebug, "SCStartupFetch", self->thisServerID).
|
|
|
|
// detail("BeginKey", begin.substr(storageCacheKeys.begin.size())).
|
|
|
|
// detail("ReadVersion", readVersion).detail("DataVersion", self->version.get());
|
2020-05-08 03:33:14 +08:00
|
|
|
applyMutation(self->updater, self, privatized, readVersion);
|
|
|
|
currCached = true;
|
|
|
|
} else {
|
|
|
|
currCached = false;
|
|
|
|
end = kv.key;
|
2020-11-20 04:48:34 +08:00
|
|
|
privatized.param1 = begin.withPrefix(systemKeys.begin, privatized.arena());
|
2020-05-08 03:33:14 +08:00
|
|
|
privatized.param2 = serverKeysFalse;
|
2020-05-30 04:07:38 +08:00
|
|
|
//TraceEvent(SevDebug, "SCStartupFetch", self->thisServerID).detail("EndKey", end.substr(storageCacheKeys.begin.size())).
|
|
|
|
// detail("ReadVersion", readVersion).detail("DataVersion", self->version.get());
|
2020-05-08 03:33:14 +08:00
|
|
|
applyMutation(self->updater, self, privatized, readVersion);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
self->peekVersion = readVersion + 1;
|
|
|
|
break;
|
|
|
|
} catch (Error& e) {
|
|
|
|
wait(tr.onError(e));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} catch (Error& e) {
|
|
|
|
TraceEvent(SevError, "SCStartUpFailed").error(e);
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
return Void();
|
|
|
|
}
|
|
|
|
|
2019-12-07 05:28:44 +08:00
|
|
|
ACTOR Future<Void> watchInterface(StorageCacheData* self, StorageServerInterface ssi) {
|
|
|
|
state Transaction tr(self->cx);
|
|
|
|
state Key storageKey = storageCacheServerKey(ssi.id());
|
|
|
|
loop {
|
2020-04-15 08:45:34 +08:00
|
|
|
loop {
|
|
|
|
tr.setOption(FDBTransactionOptions::LOCK_AWARE);
|
|
|
|
tr.setOption(FDBTransactionOptions::ACCESS_SYSTEM_KEYS);
|
|
|
|
try {
|
|
|
|
Optional<Value> val = wait(tr.get(storageKey));
|
|
|
|
// This could race with the data distributor trying to remove
|
|
|
|
// the interface - but this is ok, as we don't need to kill
|
|
|
|
// ourselves if FailureMonitor marks us as down (this might save
|
|
|
|
// from unnecessary cache refreshes).
|
|
|
|
if (!val.present()) {
|
|
|
|
tr.set(storageKey, storageCacheServerValue(ssi));
|
|
|
|
wait(tr.commit());
|
|
|
|
}
|
2021-07-27 02:43:07 +08:00
|
|
|
tr.reset();
|
2020-04-15 08:45:34 +08:00
|
|
|
break;
|
|
|
|
} catch (Error& e) {
|
|
|
|
wait(tr.onError(e));
|
2019-12-07 05:28:44 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
wait(delay(5.0));
|
|
|
|
}
|
|
|
|
}
|
2020-04-15 08:45:34 +08:00
|
|
|
|
2021-07-12 12:18:09 +08:00
|
|
|
ACTOR Future<Void> storageCacheServer(StorageServerInterface ssi,
|
|
|
|
uint16_t id,
|
|
|
|
Reference<AsyncVar<ServerDBInfo> const> db) {
|
2019-12-07 05:28:44 +08:00
|
|
|
state StorageCacheData self(ssi.id(), id, db);
|
2019-11-13 05:01:29 +08:00
|
|
|
state ActorCollection actors(false);
|
|
|
|
state Future<Void> dbInfoChange = Void();
|
2020-05-07 09:56:42 +08:00
|
|
|
state StorageCacheUpdater updater(self.lastVersionWithData);
|
|
|
|
self.updater = &updater;
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2020-06-12 09:35:48 +08:00
|
|
|
//TraceEvent("StorageCache_CacheServerInterface", self.thisServerID).detail("UID", ssi.uniqueID);
|
2020-05-07 09:56:42 +08:00
|
|
|
|
2019-11-13 05:01:29 +08:00
|
|
|
// This helps identify the private mutations meant for this cache server
|
2021-03-11 02:06:03 +08:00
|
|
|
self.ck = cacheKeysPrefixFor(id).withPrefix(systemKeys.begin); // FFFF/02cacheKeys/[this server]/
|
2019-11-13 05:01:29 +08:00
|
|
|
|
|
|
|
actors.add(waitFailureServer(ssi.waitFailure.getFuture()));
|
2021-03-11 02:06:03 +08:00
|
|
|
actors.add(traceCounters("CacheMetrics",
|
|
|
|
self.thisServerID,
|
|
|
|
SERVER_KNOBS->STORAGE_LOGGING_DELAY,
|
|
|
|
&self.counters.cc,
|
|
|
|
self.thisServerID.toString() + "/CacheMetrics"));
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2020-05-08 03:33:14 +08:00
|
|
|
// fetch already cached ranges from the database and apply them before proceeding
|
2021-03-11 02:06:03 +08:00
|
|
|
wait(storageCacheStartUpWarmup(&self));
|
2020-05-07 09:56:42 +08:00
|
|
|
|
2021-03-11 02:06:03 +08:00
|
|
|
// compactCache actor will periodically compact the cache when certain version condition is met
|
2019-11-13 05:01:29 +08:00
|
|
|
actors.add(compactCache(&self));
|
|
|
|
|
|
|
|
// pullAsyncData actor pulls mutations from the TLog and also applies them.
|
|
|
|
actors.add(pullAsyncData(&self));
|
2019-12-07 05:28:44 +08:00
|
|
|
actors.add(watchInterface(&self, ssi));
|
2019-11-13 05:01:29 +08:00
|
|
|
|
2020-05-09 07:27:57 +08:00
|
|
|
actors.add(traceRole(Role::STORAGE_CACHE, ssi.id()));
|
2021-03-11 02:06:03 +08:00
|
|
|
self.coreStarted.send(Void());
|
2020-01-08 05:06:58 +08:00
|
|
|
|
2019-11-13 05:01:29 +08:00
|
|
|
loop {
|
|
|
|
++self.counters.loops;
|
|
|
|
choose {
|
2021-03-11 02:06:03 +08:00
|
|
|
when(wait(dbInfoChange)) {
|
|
|
|
dbInfoChange = db->onChange();
|
|
|
|
self.logSystem = ILogSystem::fromServerDBInfo(self.thisServerID, self.db->get());
|
|
|
|
}
|
|
|
|
when(GetValueRequest req = waitNext(ssi.getValue.getFuture())) {
|
|
|
|
// TODO do we need to add throttling for cache servers? Probably not
|
|
|
|
// actors.add(self->readGuard(req , getValueQ));
|
|
|
|
actors.add(getValueQ(&self, req));
|
|
|
|
}
|
|
|
|
when(WatchValueRequest req = waitNext(ssi.watchValue.getFuture())) { ASSERT(false); }
|
|
|
|
when(GetKeyRequest req = waitNext(ssi.getKey.getFuture())) { actors.add(getKey(&self, req)); }
|
|
|
|
when(GetKeyValuesRequest req = waitNext(ssi.getKeyValues.getFuture())) {
|
|
|
|
actors.add(getKeyValues(&self, req));
|
|
|
|
}
|
|
|
|
when(GetShardStateRequest req = waitNext(ssi.getShardState.getFuture())) { ASSERT(false); }
|
|
|
|
when(StorageQueuingMetricsRequest req = waitNext(ssi.getQueuingMetrics.getFuture())) { ASSERT(false); }
|
|
|
|
// when( ReplyPromise<Version> reply = waitNext(ssi.getVersion.getFuture()) ) {
|
|
|
|
// ASSERT(false);
|
|
|
|
//}
|
|
|
|
when(ReplyPromise<KeyValueStoreType> reply = waitNext(ssi.getKeyValueStoreType.getFuture())) {
|
|
|
|
ASSERT(false);
|
|
|
|
}
|
|
|
|
when(wait(actors.getResult())) {}
|
2019-11-13 05:01:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|