1use std::path::PathBuf;
16use std::sync::Arc;
17use std::time::Instant;
18
19use clap::Parser;
20use colored::Colorize;
21use datanode::config::RegionEngineConfig;
22use datanode::store;
23use either::Either;
24use mito2::access_layer::{
25 AccessLayer, AccessLayerRef, Metrics, OperationType, SstWriteRequest, WriteType,
26};
27use mito2::cache::{CacheManager, CacheManagerRef};
28use mito2::config::{FulltextIndexConfig, MitoConfig, Mode};
29use mito2::read::Source;
30use mito2::sst::file::{FileHandle, FileMeta};
31use mito2::sst::file_purger::{FilePurger, FilePurgerRef};
32use mito2::sst::index::intermediate::IntermediateManager;
33use mito2::sst::index::puffin_manager::PuffinManagerFactory;
34use mito2::sst::parquet::reader::ParquetReaderBuilder;
35use mito2::sst::parquet::{PARQUET_METADATA_KEY, WriteOptions};
36use mito2::worker::write_cache_from_config;
37use object_store::ObjectStore;
38use regex::Regex;
39use snafu::OptionExt;
40use store_api::metadata::{RegionMetadata, RegionMetadataRef};
41use store_api::path_utils::region_name;
42use store_api::region_request::PathType;
43use store_api::storage::FileId;
44
45use crate::datanode::{StorageConfig, StorageConfigWrapper};
46use crate::error;
47
48#[derive(Debug, Parser)]
50pub struct ObjbenchCommand {
51 #[clap(long, value_name = "FILE")]
53 pub config: PathBuf,
54
55 #[clap(long, value_name = "PATH")]
57 pub source: String,
58
59 #[clap(short, long, default_value_t = false)]
61 pub verbose: bool,
62
63 #[clap(long, value_name = "FILE")]
65 pub pprof_file: Option<PathBuf>,
66}
67
68fn parse_config(config_path: &PathBuf) -> error::Result<(StorageConfig, MitoConfig)> {
69 let cfg_str = std::fs::read_to_string(config_path).map_err(|e| {
70 error::IllegalConfigSnafu {
71 msg: format!("failed to read config {}: {e}", config_path.display()),
72 }
73 .build()
74 })?;
75
76 let store_cfg: StorageConfigWrapper = toml::from_str(&cfg_str).map_err(|e| {
77 error::IllegalConfigSnafu {
78 msg: format!("failed to parse config {}: {e}", config_path.display()),
79 }
80 .build()
81 })?;
82
83 let storage_config = store_cfg.storage;
84 let mito_engine_config = store_cfg
85 .region_engine
86 .into_iter()
87 .filter_map(|c| {
88 if let RegionEngineConfig::Mito(mito) = c {
89 Some(mito)
90 } else {
91 None
92 }
93 })
94 .next()
95 .with_context(|| error::IllegalConfigSnafu {
96 msg: format!("Engine config not found in {:?}", config_path),
97 })?;
98 Ok((storage_config, mito_engine_config))
99}
100
101impl ObjbenchCommand {
102 pub async fn run(&self) -> error::Result<()> {
103 if self.verbose {
104 common_telemetry::init_default_ut_logging();
105 }
106
107 println!("{}", "Starting objbench with config:".cyan().bold());
108
109 let (store_cfg, mut mito_engine_config) = parse_config(&self.config)?;
111
112 let object_store = build_object_store(&store_cfg).await?;
113 println!("{} Object store initialized", "✓".green());
114
115 let components = parse_file_dir_components(&self.source)?;
117 println!(
118 "{} Source path parsed: {}, components: {:?}",
119 "✓".green(),
120 self.source,
121 components
122 );
123
124 println!("{}", "Loading parquet metadata...".yellow());
126 let file_size = object_store
127 .stat(&self.source)
128 .await
129 .map_err(|e| {
130 error::IllegalConfigSnafu {
131 msg: format!("stat failed: {e}"),
132 }
133 .build()
134 })?
135 .content_length();
136 let parquet_meta = load_parquet_metadata(object_store.clone(), &self.source, file_size)
137 .await
138 .map_err(|e| {
139 error::IllegalConfigSnafu {
140 msg: format!("read parquet metadata failed: {e}"),
141 }
142 .build()
143 })?;
144
145 let region_meta = extract_region_metadata(&self.source, &parquet_meta)?;
146 let num_rows = parquet_meta.file_metadata().num_rows() as u64;
147 let num_row_groups = parquet_meta.num_row_groups() as u64;
148 let max_row_group_uncompressed_size: u64 = parquet_meta
149 .row_groups()
150 .iter()
151 .map(|rg| {
152 rg.columns()
153 .iter()
154 .map(|c| c.uncompressed_size() as u64)
155 .sum::<u64>()
156 })
157 .max()
158 .unwrap_or(0);
159
160 println!(
161 "{} Metadata loaded - rows: {}, size: {} bytes",
162 "✓".green(),
163 num_rows,
164 file_size
165 );
166
167 let file_meta = FileMeta {
169 region_id: region_meta.region_id,
170 file_id: components.file_id,
171 time_range: Default::default(),
172 level: 0,
173 file_size,
174 max_row_group_uncompressed_size,
175 available_indexes: Default::default(),
176 indexes: Default::default(),
177 index_file_size: 0,
178 index_version: 0,
179 num_rows,
180 num_row_groups,
181 sequence: None,
182 partition_expr: None,
183 num_series: 0,
184 };
185 let src_handle = FileHandle::new(file_meta, new_noop_file_purger());
186
187 let table_dir = components.table_dir();
189 let (src_access_layer, cache_manager) = build_access_layer_simple(
190 &components,
191 object_store.clone(),
192 &mut mito_engine_config,
193 &store_cfg.data_home,
194 )
195 .await?;
196 let reader_build_start = Instant::now();
197
198 let reader = ParquetReaderBuilder::new(
199 table_dir,
200 components.path_type,
201 src_handle.clone(),
202 object_store.clone(),
203 )
204 .expected_metadata(Some(region_meta.clone()))
205 .build()
206 .await
207 .map_err(|e| {
208 error::IllegalConfigSnafu {
209 msg: format!("build reader failed: {e:?}"),
210 }
211 .build()
212 })?;
213
214 let reader_build_elapsed = reader_build_start.elapsed();
215 let total_rows = reader.parquet_metadata().file_metadata().num_rows();
216 println!("{} Reader built in {:?}", "✓".green(), reader_build_elapsed);
217
218 let fulltext_index_config = FulltextIndexConfig {
220 create_on_compaction: Mode::Disable,
221 ..Default::default()
222 };
223
224 let write_req = SstWriteRequest {
225 op_type: OperationType::Flush,
226 metadata: region_meta,
227 source: Either::Left(Source::Reader(Box::new(reader))),
228 cache_manager,
229 storage: None,
230 max_sequence: None,
231 index_options: Default::default(),
232 index_config: mito_engine_config.index.clone(),
233 inverted_index_config: MitoConfig::default().inverted_index,
234 fulltext_index_config,
235 bloom_filter_index_config: MitoConfig::default().bloom_filter_index,
236 #[cfg(feature = "vector_index")]
237 vector_index_config: Default::default(),
238 };
239
240 println!("{}", "Writing SST...".yellow());
242
243 #[cfg(unix)]
245 let profiler_guard = if self.pprof_file.is_some() {
246 println!("{} Starting profiling...", "⚡".yellow());
247 Some(
248 pprof::ProfilerGuardBuilder::default()
249 .frequency(99)
250 .blocklist(&["libc", "libgcc", "pthread", "vdso"])
251 .build()
252 .map_err(|e| {
253 error::IllegalConfigSnafu {
254 msg: format!("Failed to start profiler: {e}"),
255 }
256 .build()
257 })?,
258 )
259 } else {
260 None
261 };
262
263 #[cfg(not(unix))]
264 if self.pprof_file.is_some() {
265 eprintln!(
266 "{}: Profiling is not supported on this platform",
267 "Warning".yellow()
268 );
269 }
270
271 let write_start = Instant::now();
272 let mut metrics = Metrics::new(WriteType::Flush);
273 let infos = src_access_layer
274 .write_sst(write_req, &WriteOptions::default(), &mut metrics)
275 .await
276 .map_err(|e| {
277 error::IllegalConfigSnafu {
278 msg: format!("write_sst failed: {e:?}"),
279 }
280 .build()
281 })?;
282
283 let write_elapsed = write_start.elapsed();
284
285 #[cfg(unix)]
287 if let (Some(guard), Some(pprof_file)) = (profiler_guard, &self.pprof_file) {
288 println!("{} Generating flamegraph...", "🔥".yellow());
289 match guard.report().build() {
290 Ok(report) => {
291 let mut flamegraph_data = Vec::new();
292 if let Err(e) = report.flamegraph(&mut flamegraph_data) {
293 println!("{}: Failed to generate flamegraph: {}", "Error".red(), e);
294 } else if let Err(e) = std::fs::write(pprof_file, flamegraph_data) {
295 println!(
296 "{}: Failed to write flamegraph to {}: {}",
297 "Error".red(),
298 pprof_file.display(),
299 e
300 );
301 } else {
302 println!(
303 "{} Flamegraph saved to {}",
304 "✓".green(),
305 pprof_file.display().to_string().cyan()
306 );
307 }
308 }
309 Err(e) => {
310 println!("{}: Failed to generate pprof report: {}", "Error".red(), e);
311 }
312 }
313 }
314 assert_eq!(infos.len(), 1);
315 let dst_file_id = infos[0].file_id;
316 let dst_file_path = format!("{}/{}.parquet", components.region_dir(), dst_file_id);
317 let mut dst_index_path = None;
318 if infos[0].index_metadata.file_size > 0 {
319 dst_index_path = Some(format!(
320 "{}/index/{}.puffin",
321 components.region_dir(),
322 dst_file_id
323 ));
324 }
325
326 println!("\n{} {}", "Write complete!".green().bold(), "✓".green());
328 println!(" {}: {}", "Destination file".bold(), dst_file_path.cyan());
329 println!(" {}: {}", "Rows".bold(), total_rows.to_string().cyan());
330 println!(
331 " {}: {}",
332 "File size".bold(),
333 format!("{} bytes", file_size).cyan()
334 );
335 println!(
336 " {}: {:?}",
337 "Reader build time".bold(),
338 reader_build_elapsed
339 );
340 println!(" {}: {:?}", "Total time".bold(), write_elapsed);
341
342 println!(" {}: {:?}", "Metrics".bold(), metrics,);
344
345 println!(" {}: {:?}", "Index".bold(), infos[0].index_metadata);
347
348 println!("\n{}", "Cleaning up...".yellow());
350 object_store.delete(&dst_file_path).await.map_err(|e| {
351 error::IllegalConfigSnafu {
352 msg: format!("Failed to delete dest file {}: {}", dst_file_path, e),
353 }
354 .build()
355 })?;
356 println!("{} Temporary file {} deleted", "✓".green(), dst_file_path);
357
358 if let Some(index_path) = dst_index_path {
359 object_store.delete(&index_path).await.map_err(|e| {
360 error::IllegalConfigSnafu {
361 msg: format!("Failed to delete dest index file {}: {}", index_path, e),
362 }
363 .build()
364 })?;
365 println!(
366 "{} Temporary index file {} deleted",
367 "✓".green(),
368 index_path
369 );
370 }
371
372 println!("\n{}", "Benchmark completed successfully!".green().bold());
373 Ok(())
374 }
375}
376
377#[derive(Debug)]
378struct FileDirComponents {
379 catalog: String,
380 schema: String,
381 table_id: u32,
382 region_sequence: u32,
383 path_type: PathType,
384 file_id: FileId,
385}
386
387impl FileDirComponents {
388 fn table_dir(&self) -> String {
389 format!("data/{}/{}/{}", self.catalog, self.schema, self.table_id)
390 }
391
392 fn region_dir(&self) -> String {
393 let region_name = region_name(self.table_id, self.region_sequence);
394 match self.path_type {
395 PathType::Bare => {
396 format!(
397 "data/{}/{}/{}/{}",
398 self.catalog, self.schema, self.table_id, region_name
399 )
400 }
401 PathType::Data => {
402 format!(
403 "data/{}/{}/{}/{}/data",
404 self.catalog, self.schema, self.table_id, region_name
405 )
406 }
407 PathType::Metadata => {
408 format!(
409 "data/{}/{}/{}/{}/metadata",
410 self.catalog, self.schema, self.table_id, region_name
411 )
412 }
413 }
414 }
415}
416
417fn parse_file_dir_components(path: &str) -> error::Result<FileDirComponents> {
418 let pattern =
420 r"^data/([^/]+)/([^/]+)/([^/]+)/([^/]+)_([^/]+)(?:/data|/metadata)?/(.+).parquet$";
421
422 let re = Regex::new(pattern).expect("Invalid regex pattern");
424
425 let path_type = if path.contains("/data/") {
427 PathType::Data
428 } else if path.contains("/metadata/") {
429 PathType::Metadata
430 } else {
431 PathType::Bare
432 };
433
434 let components = (|| {
436 let captures = re.captures(path)?;
437 if captures.len() != 7 {
438 return None;
439 }
440 let mut components = FileDirComponents {
441 catalog: "".to_string(),
442 schema: "".to_string(),
443 table_id: 0,
444 region_sequence: 0,
445 path_type,
446 file_id: FileId::default(),
447 };
448 components.catalog = captures.get(1)?.as_str().to_string();
450 components.schema = captures.get(2)?.as_str().to_string();
451 components.table_id = captures[3].parse().ok()?;
452 components.region_sequence = captures[5].parse().ok()?;
453 let file_id_str = &captures[6];
454 components.file_id = FileId::parse_str(file_id_str).ok()?;
455 Some(components)
456 })();
457 components.context(error::IllegalConfigSnafu {
458 msg: format!("Expect valid source file path, got: {}", path),
459 })
460}
461
462fn extract_region_metadata(
463 file_path: &str,
464 meta: &parquet::file::metadata::ParquetMetaData,
465) -> error::Result<RegionMetadataRef> {
466 use parquet::format::KeyValue;
467 let kvs: Option<&Vec<KeyValue>> = meta.file_metadata().key_value_metadata();
468 let Some(kvs) = kvs else {
469 return Err(error::IllegalConfigSnafu {
470 msg: format!("{file_path}: missing parquet key_value metadata"),
471 }
472 .build());
473 };
474 let json = kvs
475 .iter()
476 .find(|kv| kv.key == PARQUET_METADATA_KEY)
477 .and_then(|kv| kv.value.as_ref())
478 .ok_or_else(|| {
479 error::IllegalConfigSnafu {
480 msg: format!("{file_path}: key {PARQUET_METADATA_KEY} not found or empty"),
481 }
482 .build()
483 })?;
484 let region: RegionMetadata = RegionMetadata::from_json(json).map_err(|e| {
485 error::IllegalConfigSnafu {
486 msg: format!("invalid region metadata json: {e}"),
487 }
488 .build()
489 })?;
490 Ok(Arc::new(region))
491}
492
493async fn build_object_store(sc: &StorageConfig) -> error::Result<ObjectStore> {
494 store::new_object_store(sc.store.clone(), &sc.data_home)
495 .await
496 .map_err(|e| {
497 error::IllegalConfigSnafu {
498 msg: format!("Failed to build object store: {e:?}"),
499 }
500 .build()
501 })
502}
503
504async fn build_access_layer_simple(
505 components: &FileDirComponents,
506 object_store: ObjectStore,
507 config: &mut MitoConfig,
508 data_home: &str,
509) -> error::Result<(AccessLayerRef, CacheManagerRef)> {
510 let _ = config.index.sanitize(data_home, &config.inverted_index);
511 let puffin_manager = PuffinManagerFactory::new(
512 &config.index.aux_path,
513 config.index.staging_size.as_bytes(),
514 Some(config.index.write_buffer_size.as_bytes() as _),
515 config.index.staging_ttl,
516 )
517 .await
518 .map_err(|e| {
519 error::IllegalConfigSnafu {
520 msg: format!("Failed to build access layer: {e:?}"),
521 }
522 .build()
523 })?;
524
525 let intermediate_manager = IntermediateManager::init_fs(&config.index.aux_path)
526 .await
527 .map_err(|e| {
528 error::IllegalConfigSnafu {
529 msg: format!("Failed to build IntermediateManager: {e:?}"),
530 }
531 .build()
532 })?
533 .with_buffer_size(Some(config.index.write_buffer_size.as_bytes() as _));
534
535 let cache_manager =
536 build_cache_manager(config, puffin_manager.clone(), intermediate_manager.clone()).await?;
537 let layer = AccessLayer::new(
538 components.table_dir(),
539 components.path_type,
540 object_store,
541 puffin_manager,
542 intermediate_manager,
543 );
544 Ok((Arc::new(layer), cache_manager))
545}
546
547async fn build_cache_manager(
548 config: &MitoConfig,
549 puffin_manager: PuffinManagerFactory,
550 intermediate_manager: IntermediateManager,
551) -> error::Result<CacheManagerRef> {
552 let write_cache = write_cache_from_config(config, puffin_manager, intermediate_manager)
553 .await
554 .map_err(|e| {
555 error::IllegalConfigSnafu {
556 msg: format!("Failed to build write cache: {e:?}"),
557 }
558 .build()
559 })?;
560 let cache_manager = Arc::new(
561 CacheManager::builder()
562 .sst_meta_cache_size(config.sst_meta_cache_size.as_bytes())
563 .vector_cache_size(config.vector_cache_size.as_bytes())
564 .page_cache_size(config.page_cache_size.as_bytes())
565 .selector_result_cache_size(config.selector_result_cache_size.as_bytes())
566 .index_metadata_size(config.index.metadata_cache_size.as_bytes())
567 .index_content_size(config.index.content_cache_size.as_bytes())
568 .index_content_page_size(config.index.content_cache_page_size.as_bytes())
569 .index_result_cache_size(config.index.result_cache_size.as_bytes())
570 .puffin_metadata_size(config.index.metadata_cache_size.as_bytes())
571 .write_cache(write_cache)
572 .build(),
573 );
574 Ok(cache_manager)
575}
576
577fn new_noop_file_purger() -> FilePurgerRef {
578 #[derive(Debug)]
579 struct Noop;
580 impl FilePurger for Noop {
581 fn remove_file(&self, _file_meta: FileMeta, _is_delete: bool, _index_outdated: bool) {}
582 }
583 Arc::new(Noop)
584}
585
586async fn load_parquet_metadata(
587 object_store: ObjectStore,
588 path: &str,
589 file_size: u64,
590) -> Result<parquet::file::metadata::ParquetMetaData, Box<dyn std::error::Error + Send + Sync>> {
591 use parquet::file::FOOTER_SIZE;
592 use parquet::file::metadata::ParquetMetaDataReader;
593 let actual_size = if file_size == 0 {
594 object_store.stat(path).await?.content_length()
595 } else {
596 file_size
597 };
598 if actual_size < FOOTER_SIZE as u64 {
599 return Err("file too small".into());
600 }
601 let prefetch: u64 = 64 * 1024;
602 let start = actual_size.saturating_sub(prefetch);
603 let buffer = object_store
604 .read_with(path)
605 .range(start..actual_size)
606 .await?
607 .to_vec();
608 let buffer_len = buffer.len();
609 let mut footer = [0; 8];
610 footer.copy_from_slice(&buffer[buffer_len - FOOTER_SIZE..]);
611 let footer = ParquetMetaDataReader::decode_footer_tail(&footer)?;
612 let metadata_len = footer.metadata_length() as u64;
613 if actual_size - (FOOTER_SIZE as u64) < metadata_len {
614 return Err("invalid footer/metadata length".into());
615 }
616 if (metadata_len as usize) <= buffer_len - FOOTER_SIZE {
617 let metadata_start = buffer_len - metadata_len as usize - FOOTER_SIZE;
618 let meta = ParquetMetaDataReader::decode_metadata(
619 &buffer[metadata_start..buffer_len - FOOTER_SIZE],
620 )?;
621 Ok(meta)
622 } else {
623 let metadata_start = actual_size - metadata_len - FOOTER_SIZE as u64;
624 let data = object_store
625 .read_with(path)
626 .range(metadata_start..(actual_size - FOOTER_SIZE as u64))
627 .await?
628 .to_vec();
629 let meta = ParquetMetaDataReader::decode_metadata(&data)?;
630 Ok(meta)
631 }
632}
633
634#[cfg(test)]
635mod tests {
636 use std::path::PathBuf;
637 use std::str::FromStr;
638
639 use common_base::readable_size::ReadableSize;
640 use store_api::region_request::PathType;
641
642 use crate::datanode::objbench::{parse_config, parse_file_dir_components};
643
644 #[test]
645 fn test_parse_dir() {
646 let meta_path = "data/greptime/public/1024/1024_0000000000/metadata/00020380-009c-426d-953e-b4e34c15af34.parquet";
647 let c = parse_file_dir_components(meta_path).unwrap();
648 assert_eq!(
649 c.file_id.to_string(),
650 "00020380-009c-426d-953e-b4e34c15af34"
651 );
652 assert_eq!(c.catalog, "greptime");
653 assert_eq!(c.schema, "public");
654 assert_eq!(c.table_id, 1024);
655 assert_eq!(c.region_sequence, 0);
656 assert_eq!(c.path_type, PathType::Metadata);
657
658 let c = parse_file_dir_components(
659 "data/greptime/public/1024/1024_0000000000/data/00020380-009c-426d-953e-b4e34c15af34.parquet",
660 ).unwrap();
661 assert_eq!(
662 c.file_id.to_string(),
663 "00020380-009c-426d-953e-b4e34c15af34"
664 );
665 assert_eq!(c.catalog, "greptime");
666 assert_eq!(c.schema, "public");
667 assert_eq!(c.table_id, 1024);
668 assert_eq!(c.region_sequence, 0);
669 assert_eq!(c.path_type, PathType::Data);
670
671 let c = parse_file_dir_components(
672 "data/greptime/public/1024/1024_0000000000/00020380-009c-426d-953e-b4e34c15af34.parquet",
673 ).unwrap();
674 assert_eq!(
675 c.file_id.to_string(),
676 "00020380-009c-426d-953e-b4e34c15af34"
677 );
678 assert_eq!(c.catalog, "greptime");
679 assert_eq!(c.schema, "public");
680 assert_eq!(c.table_id, 1024);
681 assert_eq!(c.region_sequence, 0);
682 assert_eq!(c.path_type, PathType::Bare);
683 }
684
685 #[test]
686 fn test_parse_config() {
687 let path = "../../config/datanode.example.toml";
688 let (storage, engine) = parse_config(&PathBuf::from_str(path).unwrap()).unwrap();
689 assert_eq!(storage.data_home, "./greptimedb_data");
690 assert_eq!(engine.index.staging_size, ReadableSize::gb(2));
691 }
692}