1use std::path::PathBuf;
16use std::sync::Arc;
17use std::time::Instant;
18
19use clap::Parser;
20use colored::Colorize;
21use datanode::config::RegionEngineConfig;
22use datanode::store;
23use futures::stream;
24use mito2::access_layer::{
25 AccessLayer, AccessLayerRef, Metrics, OperationType, SstWriteRequest, WriteType,
26};
27use mito2::cache::{CacheManager, CacheManagerRef};
28use mito2::config::{FulltextIndexConfig, MitoConfig, Mode};
29use mito2::read::FlatSource;
30use mito2::sst::FormatType;
31use mito2::sst::file::{FileHandle, FileMeta};
32use mito2::sst::file_purger::{FilePurger, FilePurgerRef};
33use mito2::sst::index::intermediate::IntermediateManager;
34use mito2::sst::index::puffin_manager::PuffinManagerFactory;
35use mito2::sst::parquet::reader::ParquetReaderBuilder;
36use mito2::sst::parquet::{PARQUET_METADATA_KEY, WriteOptions};
37use mito2::worker::write_cache_from_config;
38use object_store::ObjectStore;
39use parquet::file::metadata::{FooterTail, KeyValue};
40use regex::Regex;
41use snafu::OptionExt;
42use store_api::metadata::{RegionMetadata, RegionMetadataRef};
43use store_api::path_utils::region_name;
44use store_api::region_request::PathType;
45use store_api::storage::FileId;
46
47use crate::datanode::{StorageConfig, StorageConfigWrapper};
48use crate::error;
49
50#[derive(Debug, Parser)]
52pub struct ObjbenchCommand {
53 #[clap(long, value_name = "FILE")]
55 pub config: PathBuf,
56
57 #[clap(long, value_name = "PATH")]
59 pub source: String,
60
61 #[clap(short, long, default_value_t = false)]
63 pub verbose: bool,
64
65 #[clap(long, value_name = "FILE")]
67 pub pprof_file: Option<PathBuf>,
68}
69
70pub(super) fn parse_config(
71 config_path: &PathBuf,
72) -> error::Result<(
73 StorageConfig,
74 MitoConfig,
75 common_wal::config::DatanodeWalConfig,
76)> {
77 let cfg_str = std::fs::read_to_string(config_path).map_err(|e| {
78 error::IllegalConfigSnafu {
79 msg: format!("failed to read config {}: {e}", config_path.display()),
80 }
81 .build()
82 })?;
83
84 let store_cfg: StorageConfigWrapper = toml::from_str(&cfg_str).map_err(|e| {
85 error::IllegalConfigSnafu {
86 msg: format!("failed to parse config {}: {e}", config_path.display()),
87 }
88 .build()
89 })?;
90
91 let wal_config = store_cfg.wal;
92 let storage_config = store_cfg.storage;
93 let mito_engine_config = store_cfg
94 .region_engine
95 .into_iter()
96 .filter_map(|c| {
97 if let RegionEngineConfig::Mito(mito) = c {
98 Some(mito)
99 } else {
100 None
101 }
102 })
103 .next()
104 .with_context(|| error::IllegalConfigSnafu {
105 msg: format!("Engine config not found in {:?}", config_path),
106 })?;
107 Ok((storage_config, mito_engine_config, wal_config))
108}
109
110impl ObjbenchCommand {
111 pub async fn run(&self) -> error::Result<()> {
112 if self.verbose {
113 common_telemetry::init_default_ut_logging();
114 }
115
116 println!("{}", "Starting objbench with config:".cyan().bold());
117
118 let (store_cfg, mut mito_engine_config, _wal_config) = parse_config(&self.config)?;
120
121 let object_store = build_object_store(&store_cfg).await?;
122 println!("{} Object store initialized", "✓".green());
123
124 let components = parse_file_dir_components(&self.source)?;
126 println!(
127 "{} Source path parsed: {}, components: {:?}",
128 "✓".green(),
129 self.source,
130 components
131 );
132
133 println!("{}", "Loading parquet metadata...".yellow());
135 let file_size = object_store
136 .stat(&self.source)
137 .await
138 .map_err(|e| {
139 error::IllegalConfigSnafu {
140 msg: format!("stat failed: {e}"),
141 }
142 .build()
143 })?
144 .content_length();
145 let parquet_meta = load_parquet_metadata(object_store.clone(), &self.source, file_size)
146 .await
147 .map_err(|e| {
148 error::IllegalConfigSnafu {
149 msg: format!("read parquet metadata failed: {e}"),
150 }
151 .build()
152 })?;
153
154 let region_meta = extract_region_metadata(&self.source, &parquet_meta)?;
155 let num_rows = parquet_meta.file_metadata().num_rows() as u64;
156 let num_row_groups = parquet_meta.num_row_groups() as u64;
157 let max_row_group_uncompressed_size: u64 = parquet_meta
158 .row_groups()
159 .iter()
160 .map(|rg| {
161 rg.columns()
162 .iter()
163 .map(|c| c.uncompressed_size() as u64)
164 .sum::<u64>()
165 })
166 .max()
167 .unwrap_or(0);
168
169 println!(
170 "{} Metadata loaded - rows: {}, size: {} bytes",
171 "✓".green(),
172 num_rows,
173 file_size
174 );
175
176 let file_meta = FileMeta {
178 region_id: region_meta.region_id,
179 file_id: components.file_id,
180 time_range: Default::default(),
181 level: 0,
182 file_size,
183 max_row_group_uncompressed_size,
184 available_indexes: Default::default(),
185 indexes: Default::default(),
186 index_file_size: 0,
187 index_version: 0,
188 num_rows,
189 num_row_groups,
190 sequence: None,
191 partition_expr: None,
192 num_series: 0,
193 };
194 let src_handle = FileHandle::new(file_meta, new_noop_file_purger());
195
196 let table_dir = components.table_dir();
198 let (src_access_layer, cache_manager) = build_access_layer_simple(
199 &components,
200 object_store.clone(),
201 &mut mito_engine_config,
202 &store_cfg.data_home,
203 )
204 .await?;
205 let reader_build_start = Instant::now();
206
207 let reader = ParquetReaderBuilder::new(
208 table_dir,
209 components.path_type,
210 src_handle.clone(),
211 object_store.clone(),
212 )
213 .expected_metadata(Some(region_meta.clone()))
214 .build()
215 .await
216 .map_err(|e| {
217 error::IllegalConfigSnafu {
218 msg: format!("build reader failed: {e:?}"),
219 }
220 .build()
221 })?;
222 let reader = reader.ok_or_else(|| {
223 error::IllegalConfigSnafu {
224 msg: format!(
225 "build reader returned no readable rows for source file {}",
226 src_handle.file_id()
227 ),
228 }
229 .build()
230 })?;
231
232 let reader_build_elapsed = reader_build_start.elapsed();
233 let total_rows = reader.parquet_metadata().file_metadata().num_rows();
234 println!("{} Reader built in {:?}", "✓".green(), reader_build_elapsed);
235 let reader_stream = Box::pin(stream::try_unfold(reader, |mut reader| async move {
236 let batch = reader.next_record_batch().await?;
237 Ok(batch.map(|batch| (batch, reader)))
238 }));
239
240 let fulltext_index_config = FulltextIndexConfig {
242 create_on_compaction: Mode::Disable,
243 ..Default::default()
244 };
245
246 let write_req = SstWriteRequest {
247 op_type: OperationType::Flush,
248 metadata: region_meta,
249 source: FlatSource::Stream(reader_stream),
250 cache_manager,
251 storage: None,
252 max_sequence: None,
253 sst_write_format: FormatType::PrimaryKey,
254 index_options: Default::default(),
255 index_config: mito_engine_config.index.clone(),
256 inverted_index_config: MitoConfig::default().inverted_index,
257 fulltext_index_config,
258 bloom_filter_index_config: MitoConfig::default().bloom_filter_index,
259 #[cfg(feature = "vector_index")]
260 vector_index_config: Default::default(),
261 };
262
263 println!("{}", "Writing SST...".yellow());
265
266 #[cfg(unix)]
268 let profiler_guard = if self.pprof_file.is_some() {
269 println!("{} Starting profiling...", "⚡".yellow());
270 Some(
271 pprof::ProfilerGuardBuilder::default()
272 .frequency(99)
273 .blocklist(&["libc", "libgcc", "pthread", "vdso"])
274 .build()
275 .map_err(|e| {
276 error::IllegalConfigSnafu {
277 msg: format!("Failed to start profiler: {e}"),
278 }
279 .build()
280 })?,
281 )
282 } else {
283 None
284 };
285
286 #[cfg(not(unix))]
287 if self.pprof_file.is_some() {
288 eprintln!(
289 "{}: Profiling is not supported on this platform",
290 "Warning".yellow()
291 );
292 }
293
294 let write_start = Instant::now();
295 let mut metrics = Metrics::new(WriteType::Flush);
296 let infos = src_access_layer
297 .write_sst(write_req, &WriteOptions::default(), &mut metrics)
298 .await
299 .map_err(|e| {
300 error::IllegalConfigSnafu {
301 msg: format!("write_sst failed: {e:?}"),
302 }
303 .build()
304 })?;
305
306 let write_elapsed = write_start.elapsed();
307
308 #[cfg(unix)]
310 if let (Some(guard), Some(pprof_file)) = (profiler_guard, &self.pprof_file) {
311 println!("{} Generating flamegraph...", "🔥".yellow());
312 match guard.report().build() {
313 Ok(report) => {
314 let mut flamegraph_data = Vec::new();
315 if let Err(e) = report.flamegraph(&mut flamegraph_data) {
316 println!("{}: Failed to generate flamegraph: {}", "Error".red(), e);
317 } else if let Err(e) = std::fs::write(pprof_file, flamegraph_data) {
318 println!(
319 "{}: Failed to write flamegraph to {}: {}",
320 "Error".red(),
321 pprof_file.display(),
322 e
323 );
324 } else {
325 println!(
326 "{} Flamegraph saved to {}",
327 "✓".green(),
328 pprof_file.display().to_string().cyan()
329 );
330 }
331 }
332 Err(e) => {
333 println!("{}: Failed to generate pprof report: {}", "Error".red(), e);
334 }
335 }
336 }
337 assert_eq!(infos.len(), 1);
338 let dst_file_id = infos[0].file_id;
339 let dst_file_path = format!("{}/{}.parquet", components.region_dir(), dst_file_id);
340 let mut dst_index_path = None;
341 if infos[0].index_metadata.file_size > 0 {
342 dst_index_path = Some(format!(
343 "{}/index/{}.puffin",
344 components.region_dir(),
345 dst_file_id
346 ));
347 }
348
349 println!("\n{} {}", "Write complete!".green().bold(), "✓".green());
351 println!(" {}: {}", "Destination file".bold(), dst_file_path.cyan());
352 println!(" {}: {}", "Rows".bold(), total_rows.to_string().cyan());
353 println!(
354 " {}: {}",
355 "File size".bold(),
356 format!("{} bytes", file_size).cyan()
357 );
358 println!(
359 " {}: {:?}",
360 "Reader build time".bold(),
361 reader_build_elapsed
362 );
363 println!(" {}: {:?}", "Total time".bold(), write_elapsed);
364
365 println!(" {}: {:?}", "Metrics".bold(), metrics,);
367
368 println!(" {}: {:?}", "Index".bold(), infos[0].index_metadata);
370
371 println!("\n{}", "Cleaning up...".yellow());
373 object_store.delete(&dst_file_path).await.map_err(|e| {
374 error::IllegalConfigSnafu {
375 msg: format!("Failed to delete dest file {}: {}", dst_file_path, e),
376 }
377 .build()
378 })?;
379 println!("{} Temporary file {} deleted", "✓".green(), dst_file_path);
380
381 if let Some(index_path) = dst_index_path {
382 object_store.delete(&index_path).await.map_err(|e| {
383 error::IllegalConfigSnafu {
384 msg: format!("Failed to delete dest index file {}: {}", index_path, e),
385 }
386 .build()
387 })?;
388 println!(
389 "{} Temporary index file {} deleted",
390 "✓".green(),
391 index_path
392 );
393 }
394
395 println!("\n{}", "Benchmark completed successfully!".green().bold());
396 Ok(())
397 }
398}
399
400#[derive(Debug)]
401struct FileDirComponents {
402 catalog: String,
403 schema: String,
404 table_id: u32,
405 region_sequence: u32,
406 path_type: PathType,
407 file_id: FileId,
408}
409
410impl FileDirComponents {
411 fn table_dir(&self) -> String {
412 format!("data/{}/{}/{}", self.catalog, self.schema, self.table_id)
413 }
414
415 fn region_dir(&self) -> String {
416 let region_name = region_name(self.table_id, self.region_sequence);
417 match self.path_type {
418 PathType::Bare => {
419 format!(
420 "data/{}/{}/{}/{}",
421 self.catalog, self.schema, self.table_id, region_name
422 )
423 }
424 PathType::Data => {
425 format!(
426 "data/{}/{}/{}/{}/data",
427 self.catalog, self.schema, self.table_id, region_name
428 )
429 }
430 PathType::Metadata => {
431 format!(
432 "data/{}/{}/{}/{}/metadata",
433 self.catalog, self.schema, self.table_id, region_name
434 )
435 }
436 }
437 }
438}
439
440fn parse_file_dir_components(path: &str) -> error::Result<FileDirComponents> {
441 let pattern =
443 r"^data/([^/]+)/([^/]+)/([^/]+)/([^/]+)_([^/]+)(?:/data|/metadata)?/(.+).parquet$";
444
445 let re = Regex::new(pattern).expect("Invalid regex pattern");
447
448 let path_type = if path.contains("/data/") {
450 PathType::Data
451 } else if path.contains("/metadata/") {
452 PathType::Metadata
453 } else {
454 PathType::Bare
455 };
456
457 let components = (|| {
459 let captures = re.captures(path)?;
460 if captures.len() != 7 {
461 return None;
462 }
463 let mut components = FileDirComponents {
464 catalog: "".to_string(),
465 schema: "".to_string(),
466 table_id: 0,
467 region_sequence: 0,
468 path_type,
469 file_id: FileId::default(),
470 };
471 components.catalog = captures.get(1)?.as_str().to_string();
473 components.schema = captures.get(2)?.as_str().to_string();
474 components.table_id = captures[3].parse().ok()?;
475 components.region_sequence = captures[5].parse().ok()?;
476 let file_id_str = &captures[6];
477 components.file_id = FileId::parse_str(file_id_str).ok()?;
478 Some(components)
479 })();
480 components.context(error::IllegalConfigSnafu {
481 msg: format!("Expect valid source file path, got: {}", path),
482 })
483}
484
485fn extract_region_metadata(
486 file_path: &str,
487 meta: &parquet::file::metadata::ParquetMetaData,
488) -> error::Result<RegionMetadataRef> {
489 let kvs: Option<&Vec<KeyValue>> = meta.file_metadata().key_value_metadata();
490 let Some(kvs) = kvs else {
491 return Err(error::IllegalConfigSnafu {
492 msg: format!("{file_path}: missing parquet key_value metadata"),
493 }
494 .build());
495 };
496 let json = kvs
497 .iter()
498 .find(|kv| kv.key == PARQUET_METADATA_KEY)
499 .and_then(|kv| kv.value.as_ref())
500 .ok_or_else(|| {
501 error::IllegalConfigSnafu {
502 msg: format!("{file_path}: key {PARQUET_METADATA_KEY} not found or empty"),
503 }
504 .build()
505 })?;
506 let region: RegionMetadata = RegionMetadata::from_json(json).map_err(|e| {
507 error::IllegalConfigSnafu {
508 msg: format!("invalid region metadata json: {e}"),
509 }
510 .build()
511 })?;
512 Ok(Arc::new(region))
513}
514
515pub(super) async fn build_object_store(sc: &StorageConfig) -> error::Result<ObjectStore> {
516 store::new_object_store(sc.store.clone(), &sc.data_home)
517 .await
518 .map_err(|e| {
519 error::IllegalConfigSnafu {
520 msg: format!("Failed to build object store: {e:?}"),
521 }
522 .build()
523 })
524}
525
526async fn build_access_layer_simple(
527 components: &FileDirComponents,
528 object_store: ObjectStore,
529 config: &mut MitoConfig,
530 data_home: &str,
531) -> error::Result<(AccessLayerRef, CacheManagerRef)> {
532 let _ = config.index.sanitize(data_home, &config.inverted_index);
533 let puffin_manager = PuffinManagerFactory::new(
534 &config.index.aux_path,
535 config.index.staging_size.as_bytes(),
536 Some(config.index.write_buffer_size.as_bytes() as _),
537 config.index.staging_ttl,
538 )
539 .await
540 .map_err(|e| {
541 error::IllegalConfigSnafu {
542 msg: format!("Failed to build access layer: {e:?}"),
543 }
544 .build()
545 })?;
546
547 let intermediate_manager = IntermediateManager::init_fs(&config.index.aux_path)
548 .await
549 .map_err(|e| {
550 error::IllegalConfigSnafu {
551 msg: format!("Failed to build IntermediateManager: {e:?}"),
552 }
553 .build()
554 })?
555 .with_buffer_size(Some(config.index.write_buffer_size.as_bytes() as _));
556
557 let cache_manager =
558 build_cache_manager(config, puffin_manager.clone(), intermediate_manager.clone()).await?;
559 let layer = AccessLayer::new(
560 components.table_dir(),
561 components.path_type,
562 object_store,
563 puffin_manager,
564 intermediate_manager,
565 );
566 Ok((Arc::new(layer), cache_manager))
567}
568
569async fn build_cache_manager(
570 config: &MitoConfig,
571 puffin_manager: PuffinManagerFactory,
572 intermediate_manager: IntermediateManager,
573) -> error::Result<CacheManagerRef> {
574 let write_cache = write_cache_from_config(config, puffin_manager, intermediate_manager)
575 .await
576 .map_err(|e| {
577 error::IllegalConfigSnafu {
578 msg: format!("Failed to build write cache: {e:?}"),
579 }
580 .build()
581 })?;
582 let cache_manager = Arc::new(
583 CacheManager::builder()
584 .sst_meta_cache_size(config.sst_meta_cache_size.as_bytes())
585 .vector_cache_size(config.vector_cache_size.as_bytes())
586 .page_cache_size(config.page_cache_size.as_bytes())
587 .selector_result_cache_size(config.selector_result_cache_size.as_bytes())
588 .index_metadata_size(config.index.metadata_cache_size.as_bytes())
589 .index_content_size(config.index.content_cache_size.as_bytes())
590 .index_content_page_size(config.index.content_cache_page_size.as_bytes())
591 .index_result_cache_size(config.index.result_cache_size.as_bytes())
592 .puffin_metadata_size(config.index.metadata_cache_size.as_bytes())
593 .write_cache(write_cache)
594 .build(),
595 );
596 Ok(cache_manager)
597}
598
599fn new_noop_file_purger() -> FilePurgerRef {
600 #[derive(Debug)]
601 struct Noop;
602 impl FilePurger for Noop {
603 fn remove_file(&self, _file_meta: FileMeta, _is_delete: bool, _index_outdated: bool) {}
604 }
605 Arc::new(Noop)
606}
607
608async fn load_parquet_metadata(
609 object_store: ObjectStore,
610 path: &str,
611 file_size: u64,
612) -> Result<parquet::file::metadata::ParquetMetaData, Box<dyn std::error::Error + Send + Sync>> {
613 use parquet::file::FOOTER_SIZE;
614 use parquet::file::metadata::ParquetMetaDataReader;
615 let actual_size = if file_size == 0 {
616 object_store.stat(path).await?.content_length()
617 } else {
618 file_size
619 };
620 if actual_size < FOOTER_SIZE as u64 {
621 return Err("file too small".into());
622 }
623 let prefetch: u64 = 64 * 1024;
624 let start = actual_size.saturating_sub(prefetch);
625 let buffer = object_store
626 .read_with(path)
627 .range(start..actual_size)
628 .await?
629 .to_vec();
630 let buffer_len = buffer.len();
631 let mut footer = [0; 8];
632 footer.copy_from_slice(&buffer[buffer_len - FOOTER_SIZE..]);
633 let footer = FooterTail::try_new(&footer)?;
634 let metadata_len = footer.metadata_length() as u64;
635 if actual_size - (FOOTER_SIZE as u64) < metadata_len {
636 return Err("invalid footer/metadata length".into());
637 }
638 if (metadata_len as usize) <= buffer_len - FOOTER_SIZE {
639 let metadata_start = buffer_len - metadata_len as usize - FOOTER_SIZE;
640 let meta = ParquetMetaDataReader::decode_metadata(
641 &buffer[metadata_start..buffer_len - FOOTER_SIZE],
642 )?;
643 Ok(meta)
644 } else {
645 let metadata_start = actual_size - metadata_len - FOOTER_SIZE as u64;
646 let data = object_store
647 .read_with(path)
648 .range(metadata_start..(actual_size - FOOTER_SIZE as u64))
649 .await?
650 .to_vec();
651 let meta = ParquetMetaDataReader::decode_metadata(&data)?;
652 Ok(meta)
653 }
654}
655
656#[cfg(test)]
657mod tests {
658 use std::path::PathBuf;
659 use std::str::FromStr;
660
661 use common_base::readable_size::ReadableSize;
662 use store_api::region_request::PathType;
663
664 use crate::datanode::objbench::{parse_config, parse_file_dir_components};
665
666 #[test]
667 fn test_parse_dir() {
668 let meta_path = "data/greptime/public/1024/1024_0000000000/metadata/00020380-009c-426d-953e-b4e34c15af34.parquet";
669 let c = parse_file_dir_components(meta_path).unwrap();
670 assert_eq!(
671 c.file_id.to_string(),
672 "00020380-009c-426d-953e-b4e34c15af34"
673 );
674 assert_eq!(c.catalog, "greptime");
675 assert_eq!(c.schema, "public");
676 assert_eq!(c.table_id, 1024);
677 assert_eq!(c.region_sequence, 0);
678 assert_eq!(c.path_type, PathType::Metadata);
679
680 let c = parse_file_dir_components(
681 "data/greptime/public/1024/1024_0000000000/data/00020380-009c-426d-953e-b4e34c15af34.parquet",
682 ).unwrap();
683 assert_eq!(
684 c.file_id.to_string(),
685 "00020380-009c-426d-953e-b4e34c15af34"
686 );
687 assert_eq!(c.catalog, "greptime");
688 assert_eq!(c.schema, "public");
689 assert_eq!(c.table_id, 1024);
690 assert_eq!(c.region_sequence, 0);
691 assert_eq!(c.path_type, PathType::Data);
692
693 let c = parse_file_dir_components(
694 "data/greptime/public/1024/1024_0000000000/00020380-009c-426d-953e-b4e34c15af34.parquet",
695 ).unwrap();
696 assert_eq!(
697 c.file_id.to_string(),
698 "00020380-009c-426d-953e-b4e34c15af34"
699 );
700 assert_eq!(c.catalog, "greptime");
701 assert_eq!(c.schema, "public");
702 assert_eq!(c.table_id, 1024);
703 assert_eq!(c.region_sequence, 0);
704 assert_eq!(c.path_type, PathType::Bare);
705 }
706
707 #[test]
708 fn test_parse_config() {
709 let path = "../../config/datanode.example.toml";
710 let (storage, engine, _wal) = parse_config(&PathBuf::from_str(path).unwrap()).unwrap();
711 assert_eq!(storage.data_home, "./greptimedb_data");
712 assert_eq!(engine.index.staging_size, ReadableSize::gb(2));
713 }
714}