-
Notifications
You must be signed in to change notification settings - Fork 31
[WIP] #3812
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
[WIP] #3812
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
Summary of ChangesHello @lidezhu, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request significantly refactors the processing of resolved timestamp (ResolvedTs) events within the log puller component. By introducing a dedicated, configurable worker pool, the system can now handle these events asynchronously and in parallel. This change aims to enhance the efficiency, scalability, and robustness of ResolvedTs event processing, reducing potential bottlenecks in the main event handling pipeline and improving overall system performance. Highlights
🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console. Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request refactors the handling of resolved timestamp (resolvedTs) events by introducing a dedicated worker pool to process them in parallel, aiming to improve performance. The core logic for handleResolvedTs is moved to a new file, and the event handling is updated to accommodate this new asynchronous processing flow. The changes are well-structured and include corresponding test updates.
My review has identified a critical bug that could lead to a panic, and a potential memory leak due to a logic change in cleaning up the event matcher. I've provided suggestions to fix these issues.
| if span == nil { | ||
| span = state.region.subscribedSpan | ||
| } else if span != state.region.subscribedSpan { | ||
| log.Panic("resolved ts event contains multiple spans", | ||
| zap.Uint64("workerID", s.workerID), | ||
| zap.Uint64("subscriptionID", uint64(subscriptionID)), | ||
| zap.Uint64("regionID", regionID)) | ||
| } | ||
| if span == nil { | ||
| log.Warn("region request worker receives a resolved ts event for region without span", | ||
| zap.Uint64("workerID", s.workerID), | ||
| zap.Uint64("subscriptionID", uint64(subscriptionID)), | ||
| zap.Uint64("regionID", regionID)) | ||
| continue | ||
| } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The logic to check for consistent spans across regions in a resolved-ts event has a bug. The condition span != state.region.subscribedSpan will cause a panic if span is non-nil and state.region.subscribedSpan is nil. This is incorrect, as it should only panic if they are two different, non-nil spans. This logic is also overly complex. It can be simplified to be more readable and correct.
currentSpan := state.region.subscribedSpan
if currentSpan == nil {
log.Warn("region request worker receives a resolved ts event for region without span",
zap.Uint64("workerID", s.workerID),
zap.Uint64("subscriptionID", uint64(subscriptionID)),
zap.Uint64("regionID", regionID))
continue
}
if span == nil {
span = currentSpan
} else if span != currentSpan {
log.Panic("resolved ts event contains multiple spans",
zap.Uint64("workerID", s.workerID),
zap.Uint64("subscriptionID", uint64(subscriptionID)),
zap.Uint64("regionID", regionID))
}| func handleResolvedTs(span *subscribedSpan, state *regionFeedState, resolvedTs uint64) uint64 { | ||
| if state.isStale() || !state.isInitialized() { | ||
| return 0 | ||
| } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The call to state.matcher.tryCleanUnmatchedValue() was present in the original handleResolvedTs function but is missing here. This function was likely responsible for cleaning up stale, unmatched prewrite entries in the matcher using the advancing resolved timestamp as a watermark. By moving this call to handleEventEntries, the matcher will only be cleaned when there are KV events. If a region is idle and only receives resolved timestamp updates, the matcher may not be cleaned, potentially leading to a memory leak of stale prewrite entries. It seems this call should be restored here to prevent this potential memory leak.
| } | |
| } | |
| state.matcher.tryCleanUnmatchedValue() |
|
|
||
| func handleEventEntries(span *subscribedSpan, state *regionFeedState, entries *cdcpb.Event_Entries_) { | ||
| regionID, _, _ := state.getRegionMeta() | ||
| state.matcher.tryCleanUnmatchedValue() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This call was moved here from handleResolvedTs. However, this means the matcher is only cleaned when KV events are processed. If a region is idle and only receives resolved timestamp updates, this could lead to a memory leak of stale prewrite entries. This call should be moved back to handleResolvedTs and removed from here.
|
[FORMAT CHECKER NOTIFICATION] Notice: To remove the 📖 For more info, you can check the "Contribute Code" section in the development guide. |
|
@lidezhu: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
What problem does this PR solve?
Issue Number: close #xxx
What is changed and how it works?
Check List
Tests
Questions
Will it cause performance regression or break compatibility?
Do you need to update user documentation, design documentation or monitoring documentation?
Release note