Skip to content

Commit

Permalink
Rate Limit Scan Statistics
Browse files Browse the repository at this point in the history
This pull request uses a `TokenBucket` to limit the number of keys that
read from `ScanStatistics` within a certain period of time.

Fixes: cockroachdb#2778
  • Loading branch information
raggar committed Aug 1, 2023
1 parent 127a180 commit 48f54ca
Show file tree
Hide file tree
Showing 6 changed files with 46 additions and 3 deletions.
30 changes: 29 additions & 1 deletion db.go
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ import (
"github.com/cockroachdb/pebble/sstable"
"github.com/cockroachdb/pebble/vfs"
"github.com/cockroachdb/pebble/vfs/atomicfs"
"github.com/cockroachdb/tokenbucket"
"github.com/prometheus/client_golang/prometheus"
)

Expand Down Expand Up @@ -1178,6 +1179,7 @@ func (d *DB) ScanInternal(
visitRangeKey func(start, end []byte, keys []rangekey.Key) error,
visitSharedFile func(sst *SharedSSTMeta) error,
includeObsoleteKeys bool,
rateLimitFunc func(key *InternalKey, val LazyValue),
) error {
scanInternalOpts := &scanInternalOptions{
visitPointKey: visitPointKey,
Expand All @@ -1186,6 +1188,7 @@ func (d *DB) ScanInternal(
visitSharedFile: visitSharedFile,
skipSharedLevels: visitSharedFile != nil,
includeObsoleteKeys: includeObsoleteKeys,
rateLimitFunc: rateLimitFunc,
IterOptions: IterOptions{
KeyTypes: IterKeyTypePointsAndRanges,
LowerBound: lower,
Expand Down Expand Up @@ -2599,11 +2602,35 @@ type LSMKeyStatistics struct {
levels [numLevels]KeyStatistics
}

type ScanStatisticsOptions struct {
rateLimitEnabled bool
rate float64
burst float64
}

// ScanStatistics returns the count of different key kinds within the lsm for a
// key span [lower, upper) as well as the number of snapshot keys.
func (d *DB) ScanStatistics(ctx context.Context, lower, upper []byte) (LSMKeyStatistics, error) {
func (d *DB) ScanStatistics(
ctx context.Context, lower, upper []byte, opts ScanStatisticsOptions,
) (LSMKeyStatistics, error) {
stats := LSMKeyStatistics{}
var prevKey InternalKey
tb := tokenbucket.TokenBucket{}
tb.Init(tokenbucket.TokensPerSecond(opts.rate), tokenbucket.Tokens(opts.burst))

var rateLimitFunc func(key *InternalKey, val LazyValue)
if opts.rateLimitEnabled {
rateLimitFunc = func(key *InternalKey, val LazyValue) {
for {
fulfilled, tryAgainAfter := tb.TryToFulfill(tokenbucket.Tokens(key.Size() + val.Len()))

if fulfilled {
break
}
time.Sleep(tryAgainAfter)
}
}
}

err := d.ScanInternal(ctx, lower, upper,
func(key *InternalKey, value LazyValue, iterInfo iterInfo) error {
Expand Down Expand Up @@ -2639,6 +2666,7 @@ func (d *DB) ScanStatistics(ctx context.Context, lower, upper []byte) (LSMKeySta
},
nil,
true,
rateLimitFunc,
)

if err != nil {
Expand Down
4 changes: 3 additions & 1 deletion ingest_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -932,7 +932,9 @@ func TestIngestShared(t *testing.T) {
sharedSSTs = append(sharedSSTs, *sst)
return nil
},
false)
false,
nil, /* rateLimitFunc */
)
require.NoError(t, err)
require.NoError(t, w.Close())

Expand Down
3 changes: 3 additions & 0 deletions options.go
Original file line number Diff line number Diff line change
Expand Up @@ -259,6 +259,9 @@ type scanInternalOptions struct {
// includeObsoleteKeys specifies whether keys shadowed by newer internal keys
// are exposed. If false, only one internal key per user key is exposed.
includeObsoleteKeys bool

// rateLimitFunc is used to limit the amount of bytes read per second.
rateLimitFunc func(key *InternalKey, value LazyValue)
}

// RangeKeyMasking configures automatic hiding of point keys by range keys. A
Expand Down
5 changes: 5 additions & 0 deletions scan_internal.go
Original file line number Diff line number Diff line change
Expand Up @@ -941,6 +941,11 @@ func scanInternalImpl(

for valid := iter.seekGE(lower); valid && iter.error() == nil; valid = iter.next() {
key := iter.unsafeKey()

if opts.rateLimitFunc != nil {
opts.rateLimitFunc(key, iter.lazyValue())
}

switch key.Kind() {
case InternalKeyKindRangeKeyDelete, InternalKeyKindRangeKeyUnset, InternalKeyKindRangeKeySet:
if opts.visitRangeKey != nil {
Expand Down
5 changes: 4 additions & 1 deletion scan_internal_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,7 @@ func TestScanStatistics(t *testing.T) {
ScanStatistics(
ctx context.Context,
lower, upper []byte,
opts ScanStatisticsOptions,
) (LSMKeyStatistics, error)
}
batches := map[string]*Batch{}
Expand Down Expand Up @@ -163,7 +164,7 @@ func TestScanStatistics(t *testing.T) {
default:
}
}
stats, err := reader.ScanStatistics(ctx, lower, upper)
stats, err := reader.ScanStatistics(ctx, lower, upper, ScanStatisticsOptions{rateLimitEnabled: false})
if err != nil {
return err.Error()
}
Expand Down Expand Up @@ -208,6 +209,7 @@ func TestScanInternal(t *testing.T) {
visitRangeKey func(start, end []byte, keys []rangekey.Key) error,
visitSharedFile func(sst *SharedSSTMeta) error,
includeObsoleteKeys bool,
rateLimitFunc func(key *InternalKey, val LazyValue),
) error
}
batches := map[string]*Batch{}
Expand Down Expand Up @@ -429,6 +431,7 @@ func TestScanInternal(t *testing.T) {
},
fileVisitor,
false,
nil, /* rateLimitFunc */
)
if err != nil {
return err.Error()
Expand Down
2 changes: 2 additions & 0 deletions snapshot.go
Original file line number Diff line number Diff line change
Expand Up @@ -71,6 +71,7 @@ func (s *Snapshot) ScanInternal(
visitRangeKey func(start, end []byte, keys []rangekey.Key) error,
visitSharedFile func(sst *SharedSSTMeta) error,
includeObsoleteKeys bool,
rateLimitFunc func(key *InternalKey, value LazyValue),
) error {
if s.db == nil {
panic(ErrClosed)
Expand All @@ -82,6 +83,7 @@ func (s *Snapshot) ScanInternal(
visitSharedFile: visitSharedFile,
skipSharedLevels: visitSharedFile != nil,
includeObsoleteKeys: includeObsoleteKeys,
rateLimitFunc: rateLimitFunc,
IterOptions: IterOptions{
KeyTypes: IterKeyTypePointsAndRanges,
LowerBound: lower,
Expand Down

0 comments on commit 48f54ca

Please sign in to comment.