-
-
Notifications
You must be signed in to change notification settings - Fork 143
fix: multiple fixes around system stability under load #1346
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: multiple fixes around system stability under load #1346
Conversation
WalkthroughThis change refactors and extends the synchronization, staging, and conversion logic for arrow and parquet files. It introduces asynchronous, per-stream synchronization using Tokio's Changes
Sequence Diagram(s)sequenceDiagram
participant Server
participant SyncModule
participant Streams
participant ObjectStorage
Server->>+SyncModule: sync_start()
SyncModule->>+Streams: flush_and_convert(init_signal=true, shutdown_signal=false)
Streams-->>-SyncModule: Result
SyncModule->>+ObjectStorage: sync_all_streams(joinset)
ObjectStorage->>+ObjectStorage: upload_files_from_staging(stream_name) (per stream, concurrent)
ObjectStorage-->>-SyncModule: Result (per stream)
SyncModule-->>-Server: Result
Possibly related PRs
Suggested labels
Poem
📜 Recent review detailsConfiguration used: CodeRabbit UI 📒 Files selected for processing (3)
🚧 Files skipped from review as they are similar to previous changes (3)
⏰ Context from checks skipped due to timeout of 90000ms (10)
✨ Finishing Touches
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
SupportNeed help? Create a ticket on our support page for assistance with any issues or questions. Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 4
🔭 Outside diff range comments (1)
src/parseable/streams.rs (1)
345-353
:⚠️ Potential issue
File::created()
will panic on common Linux filesystems
std::fs::Metadata::created()
is not implemented on most Unix filesystems and returns an error.
Theexpect("Creation time should be accessible")
will therefore bring the whole conversion task – and potentially the server – down on virtually every Linux deployment.Replace with a fall-back that relies on the consistently available
modified()
timestamp (or skip the filtering whencreated()
is unsupported).- let creation = path.metadata()?.created().expect("Creation time should be accessible"); + let creation = path + .metadata()? + .created() + .or_else(|_| path.metadata()?.modified())?; // fallback
♻️ Duplicate comments (1)
src/handlers/http/modal/server.rs (1)
126-131
: Startup sync duplicationSame concern as in
query_server.rs
: this detachedsync_start()
may overlap with the periodicsync::handler
spawned just below.
Verify that the two paths cannot run concurrently or gate them behind a single-execution guard.
🧹 Nitpick comments (6)
src/handlers/http/modal/query_server.rs (1)
131-136
: Possible duplicate & unmanaged sync task
sync_start()
is fired here while a separate periodic sync thread (sync::handler
) is launched a few lines later.
Without a guard this can lead to two independent object-store uploads running simultaneously, wasting IO and increasing race-surface.
Consider:
- Running the startup sync inside the periodic worker before its main loop begins, or
- Protecting concurrent runs with a mutex/atomic “sync-in-progress” flag, and/or
- At least keep the
JoinHandle
so it can be awaited during shutdown.src/parseable/staging/reader.rs (1)
88-103
: Great improvement, but one remainingunwrap
still panicsThe new
match File::open
keeps the reader resilient – nice.
However the earlierfile.metadata().unwrap()
(line 51) will still crash the entire process for an I/O error (e.g. permission issue).
Replace with a fallible path similar to this block and skip the file on failure.src/handlers/http/health_check.rs (1)
63-65
: Hard-coded 5 s sleep may stall graceful shutdownA fixed
sleep(5s)
delays shutdown even when no in-flight requests exist and also blocks all new requests (flag is already set).
Consider making this configurable or replacing with a loop that waits until active-request-counter drops to zero (with max timeout).src/parseable/streams.rs (2)
70-77
:arrow_path_to_parquet
argument order is confusing
staging_path
is expected to be a directory, yet tests pass a file path.
Consider tightening the contract:-fn arrow_path_to_parquet(staging_path: &Path, path: &Path, random_string: &str) +fn arrow_path_to_parquet(staging_dir: &Path, arrow_file: &Path, random_string: &str)and add an early
debug_assert!(staging_dir.is_dir())
to prevent accidental misuse.
This will avoid silently generating paths like/some/file.arrows/<name>.parquet
.
588-604
: Metric update panics on I/O errors
file.metadata().unwrap()
will panic on any transient I/O failure.
Preferif let Ok(meta) = file.metadata()
to keep the sync path resilient under load.src/sync.rs (1)
155-161
: JoinSet drain duplicates log code – factor into helperThe same success / failure logging block appears three times in this file.
Extracting a small helper (log_join_result(res, "object store sync")
) will remove repetition and keep future fixes in one spot.
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (7)
src/handlers/http/health_check.rs
(2 hunks)src/handlers/http/modal/query_server.rs
(2 hunks)src/handlers/http/modal/server.rs
(2 hunks)src/parseable/staging/reader.rs
(2 hunks)src/parseable/streams.rs
(24 hunks)src/storage/object_storage.rs
(2 hunks)src/sync.rs
(7 hunks)
🧰 Additional context used
🧬 Code Graph Analysis (2)
src/handlers/http/modal/query_server.rs (1)
src/sync.rs (1)
sync_start
(248-271)
src/handlers/http/modal/server.rs (1)
src/sync.rs (1)
sync_start
(248-271)
⏰ Context from checks skipped due to timeout of 90000ms (10)
- GitHub Check: Build Default x86_64-pc-windows-msvc
- GitHub Check: Build Default aarch64-unknown-linux-gnu
- GitHub Check: Build Default aarch64-apple-darwin
- GitHub Check: Build Default x86_64-apple-darwin
- GitHub Check: Build Default x86_64-unknown-linux-gnu
- GitHub Check: Build Kafka x86_64-unknown-linux-gnu
- GitHub Check: Build Kafka aarch64-apple-darwin
- GitHub Check: coverage
- GitHub Check: Quest Smoke and Load Tests for Standalone deployments
- GitHub Check: Quest Smoke and Load Tests for Distributed deployments
🔇 Additional comments (2)
src/sync.rs (2)
79-82
: Re-consider spawning a fresh Tokio runtime here
handler
is annotated with#[tokio::main]
, and the crate already defines another
#[tokio::main]
(alert_runtime
). Each call spins up a stand-alone multi-thread
runtime, which is expensive and prevents reuse of the global IO driver.If
handler
is invoked from within an existing runtime (e.g. Actix), switch to
tokio::spawn
+async fn
instead of a second#[tokio::main]
.
247-271
: Startup sync may run concurrently with periodic sync
sync_start()
performs a full flush + upload but does not coordinate with the
long-runninglocal_sync
/object_store_sync
loops. If startup takes longer than
LOCAL_SYNC_INTERVAL
, you can end up with overlapping conversions on the same stream.Consider signalling completion (e.g. a OnceCell flag) before enabling the periodic
tasks, or make the periodic loops wait onsync_start
’s JoinHandle.
42d27d0
to
7416b7a
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 2
🧹 Nitpick comments (4)
src/sync.rs (4)
131-144
: Potential starvation & duplicated code aroundJoinSet
loopEvery tick builds a fresh
JoinSet
, firessync_all_streams
, then blocks until all joins resolve.
If a large backlog exists, the loop may overrun the next tick, defeating periodic behaviour.Consider extracting the common “spawn, join, log” logic used here and in
local_sync
into a reusable helper that:
- Re-uses a single
JoinSet
(or a bounded one) across ticks, or- Offloads joins into a detached task so the driving loop never stalls.
This will keep upload cadence predictable and DRY-up the nearly identical code in the two sync paths.
195-207
: Duplicate flush/convert scaffold – factor out to avoid divergenceThe block mirrors lines 131-144 almost verbatim (different callback only). If a bug fix is needed later you’ll have to patch two places.
Extract into something like:
async fn run_and_log<F>(name: &str, threshold: Duration, f: F) where F: FnOnce(&mut JoinSet<()>) + Send + 'static, { … }and call it from both locations.
238-264
:sync_start
runs heavy IO on the main thread during startup
sync_start()
performs full flush + upload synchronously before returning. On large datasets this can delay server readiness and make liveness probes fail.Introduce either:
• a “started but warming up” state exposed via health-check, or
• run this in the background and let the server accept traffic immediately (with proper back-pressure).Also consider making the 15 s threshold configurable – real-world clusters may legitimately take longer.
269-278
: Minor: inconsistent log levels
log_join_result()
logs success withinfo!
, failures withwarn!
, and join errors witherror!
.
You may want to promote task failures (Ok(Err(_))
) toerror!
as well to ease alerting.
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (1)
src/sync.rs
(6 hunks)
⏰ Context from checks skipped due to timeout of 90000ms (10)
- GitHub Check: Build Default x86_64-apple-darwin
- GitHub Check: Build Default x86_64-pc-windows-msvc
- GitHub Check: Build Default aarch64-apple-darwin
- GitHub Check: Build Default aarch64-unknown-linux-gnu
- GitHub Check: Quest Smoke and Load Tests for Standalone deployments
- GitHub Check: Build Default x86_64-unknown-linux-gnu
- GitHub Check: Quest Smoke and Load Tests for Distributed deployments
- GitHub Check: Build Kafka aarch64-apple-darwin
- GitHub Check: Build Kafka x86_64-unknown-linux-gnu
- GitHub Check: coverage
fe684f8
to
0cb81b6
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 2
🧹 Nitpick comments (2)
src/sync.rs (1)
131-145
: Consider graceful early-exit for still-runningJoinSet
tasksIf
inbox_rx
receives a shutdown signal whilesync_all_streams
is in progress, any in-flight uploads insidejoinset
keep running until completion because theJoinSet
lives only inside this closure.
In practice that is fine, but you lose the option to abort quickly during shutdown or when the monitor times out.A lightweight pattern is to call
joinset.shutdown().await;
before thewhile let Some(..)
loop, which causes unfinished tasks to be aborted and immediately joined:- let mut joinset = JoinSet::new(); + let mut joinset = JoinSet::new(); sync_all_streams(&mut joinset); + // Abort remaining tasks if the outer future is cancelled + joinset.shutdown().await; while let Some(res) = joinset.join_next().await { log_join_result(res, "object store sync"); }This avoids dangling uploads during shutdown and keeps task lifetimes explicit.
src/parseable/streams.rs (1)
380-387
: Cross-device rename can fail – fall back to copy/remove
fs::rename
fails withEXDEV
if the staging disk and the in-process directory reside on
different mounts (common in containerised setups with bind-mounts).
Handle that case explicitly:- if let Err(e) = fs::rename(&arrow_file_path, &new_path) { + if let Err(e) = fs::rename(&arrow_file_path, &new_path) { error!( "Failed to rename arrow file to inprocess directory: {} -> {}: {e}", arrow_file_path.display(), new_path.display() ); + if e.kind() == std::io::ErrorKind::CrossDeviceLink { + if let Err(copy_err) = fs::copy(&arrow_file_path, &new_path) { + error!("Copy fallback also failed: {copy_err}"); + } else { + let _ = remove_file(&arrow_file_path); + } }This prevents the entire batch from stalling on heterogeneous storage layouts.
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (7)
src/handlers/http/health_check.rs
(2 hunks)src/handlers/http/modal/query_server.rs
(2 hunks)src/handlers/http/modal/server.rs
(2 hunks)src/parseable/staging/reader.rs
(3 hunks)src/parseable/streams.rs
(22 hunks)src/storage/object_storage.rs
(2 hunks)src/sync.rs
(6 hunks)
🚧 Files skipped from review as they are similar to previous changes (5)
- src/handlers/http/modal/query_server.rs
- src/handlers/http/modal/server.rs
- src/handlers/http/health_check.rs
- src/parseable/staging/reader.rs
- src/storage/object_storage.rs
🧰 Additional context used
🧠 Learnings (1)
src/sync.rs (1)
Learnt from: nikhilsinhaparseable
PR: parseablehq/parseable#1346
File: src/sync.rs:78-83
Timestamp: 2025-06-16T04:56:21.596Z
Learning: In Rust async code, `#[tokio::main]` is appropriate when functions are called from separate OS threads (like `thread::spawn()`), as it creates a new Tokio runtime for that thread. The "Cannot start a runtime from within a runtime" error only occurs when `#[tokio::main]` functions are called from within an existing Tokio runtime context.
🧬 Code Graph Analysis (1)
src/sync.rs (2)
src/storage/object_storage.rs (1)
sync_all_streams
(878-897)src/parseable/streams.rs (3)
new
(109-126)flush_and_convert
(951-973)flush_and_convert
(1047-1062)
⏰ Context from checks skipped due to timeout of 90000ms (7)
- GitHub Check: Quest Smoke and Load Tests for Standalone deployments
- GitHub Check: Quest Smoke and Load Tests for Distributed deployments
- GitHub Check: coverage
- GitHub Check: Build Default x86_64-unknown-linux-gnu
- GitHub Check: Build Default x86_64-pc-windows-msvc
- GitHub Check: Build Default aarch64-unknown-linux-gnu
- GitHub Check: Build Kafka x86_64-unknown-linux-gnu
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 1
🧹 Nitpick comments (2)
src/parseable/streams.rs (2)
69-84
:arrow_path_to_parquet
trustsstream_staging_path
is a directory
parquet_path.push(filename_with_random_number)
silently produces paths like
/tmp/myfile.arrows/<generated>.parquet
whenstream_staging_path
is accidentally a
file (the current unit-tests pass such a path).
At runtime this is unlikely, but if it happens the rename that follows will fail with
Not a directory
.- let mut parquet_path = stream_staging_path.to_owned(); - parquet_path.push(filename_with_random_number); + // Guard against a file being passed instead of the staging directory. + let mut parquet_path = if stream_staging_path.is_dir() { + stream_staging_path.to_path_buf() + } else { + stream_staging_path + .parent() + .unwrap_or_else(|| Path::new(".")) + .to_path_buf() + }; + parquet_path.push(filename_with_random_number);This keeps the function robust and lets the unit-tests keep their current call-site.
585-593
: Metrics reset only clears “arrows”/“parquet” bucketsThe helper zeroes
STAGING_FILES
and bothSTORAGE_SIZE
gauges, but only for the
labels"arrows"
and"parquet"
. If a future extension introduces another label
(e.g."orc"
), the metrics will become stale. Consider looping through
metrics::STORAGE_SIZE.collect()
and clearing every entry for the current stream.
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (2)
src/otel/traces.rs
(12 hunks)src/parseable/streams.rs
(22 hunks)
✅ Files skipped from review due to trivial changes (1)
- src/otel/traces.rs
🧰 Additional context used
🧠 Learnings (1)
src/parseable/streams.rs (1)
Learnt from: nikhilsinhaparseable
PR: parseablehq/parseable#1346
File: src/parseable/streams.rs:351-355
Timestamp: 2025-06-16T05:20:18.557Z
Learning: In the Parseable codebase, arrow files are expected to always have valid creation or modified timestamps as a basic system assumption. The conversion flow uses expect() on file metadata operations to enforce this invariant with fail-fast behavior rather than graceful error handling, as violations represent fundamental system issues that should cause immediate failures.
⏰ Context from checks skipped due to timeout of 90000ms (10)
- GitHub Check: Quest Smoke and Load Tests for Standalone deployments
- GitHub Check: Quest Smoke and Load Tests for Distributed deployments
- GitHub Check: coverage
- GitHub Check: Build Default aarch64-apple-darwin
- GitHub Check: Build Default x86_64-unknown-linux-gnu
- GitHub Check: Build Default x86_64-pc-windows-msvc
- GitHub Check: Build Default x86_64-apple-darwin
- GitHub Check: Build Default aarch64-unknown-linux-gnu
- GitHub Check: Build Kafka x86_64-unknown-linux-gnu
- GitHub Check: Build Kafka aarch64-apple-darwin
🔇 Additional comments (2)
src/parseable/streams.rs (2)
717-723
: Hard-coded label mismatch may skew storage metricsHere the label is
ARROW_FILE_EXTENSION
, whileupdate_staging_metrics
uses the
literal string"arrows"
. If the constant ever diverges (e.g."arrow"
), metrics
for deletions and additions will land in different time-series.Validate that
ARROW_FILE_EXTENSION
is exactly"arrows"
or unify both call-sites
to the same constant.
140-149
: 👍 Graceful recovery from poisoned mutexGreat call replacing the immediate panic with a warning and
into_inner()
—
this prevents a single thread panic from killing ingestion on the whole stream.
1. perform object store sync for all streams in parallel 2. remove restriction of multi threading to utilise all available cores 3. add atomicity in conversion by - i. each conversion task processes one minute of arrows ii. move arrow files to inprocess folder to maintain atomicity iii. add a init sync task to process all pending files iv. add tokio sleep of 5 secs in shutdown task to let complete ongoing jobs v. remove unwrap of write locks to avoid thread poisoning
f7b2a2b
to
70ca26d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 1
♻️ Duplicate comments (1)
src/parseable/streams.rs (1)
687-706
: Opening the.part
file withappend(true)
is still fragile
(see previous discussion – unchanged)If a stale
.part
file survives a crash, the next run will silently append new
bytes, producing an invalid parquet footer. Usingtruncate(true)
avoids this
edge case at zero cost.- let mut part_file = OpenOptions::new() - .create(true) - .append(true) + let mut part_file = OpenOptions::new() + .write(true) + .create(true) + .truncate(true)
🧹 Nitpick comments (4)
src/sync.rs (1)
119-145
: Avoid the extratokio::spawn
indirection – run the interval loop directlySpawning a second task inside the already-spawned
handle
adds an unnecessary layer of scheduling, makes panic/ cancellation semantics harder to reason about, and forces the surroundingcatch_unwind
dance.You can drop the inner
tokio::spawn
and execute the interval loop in the outer task itself:- let result = tokio::spawn(async move { - let mut sync_interval = interval_at(next_minute(), STORAGE_UPLOAD_INTERVAL); - ... - }); - - match AssertUnwindSafe(result).catch_unwind().await { + let result = AssertUnwindSafe(async move { + let mut sync_interval = interval_at(next_minute(), STORAGE_UPLOAD_INTERVAL); + ... + }) + .catch_unwind() + .await; + + match result { Ok(_) => { /* handled below */ }This keeps the same panic protection while removing one level of indirection.
src/parseable/streams.rs (3)
72-86
:arrow_path_to_parquet
first parameter is a directory, but tests pass a file path
stream_staging_path
is expected to be the stream’s staging directory (self.data_path
).
Passing the full arrow file path (as the unit-tests currently do) yields a nonsensical output like:/tmp/arrow_file_path/converted_name.parquet
Consider renaming the parameter to
staging_dir
and fixing the tests to call:arrow_path_to_parquet(file_path.parent().unwrap(), &file_path, random)to reflect real-world usage.
210-223
:arrow_files()
does an O(n) metadata stat per file every tickCalling
metadata()
for each entry on every sync cycle can become costly when tens-of-thousands of files accumulate.If ordering by mtime is not strictly required, drop the sort & metadata hit.
If ordering is needed, cache the(PathBuf, SystemTime)
vector once per run ofconvert_disk_files_to_parquet
instead of on every directory scan.
263-288
: Single minute directory may mix older arrow files – revisit atomicity guarantee
arrow_files_grouped_exclude_time
moves all eligible files—regardless of their
original minute—into a directory namedprocessing_<current-minute-1>
.
Files that are >1 minute old therefore get grouped together, breaking the
“one-minute-per-conversion-task” invariant described in the design docs.Either create the directory using each file’s own minute or keep per-minute
sub-directories when doing the move.
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (8)
src/handlers/http/health_check.rs
(2 hunks)src/handlers/http/modal/query_server.rs
(2 hunks)src/handlers/http/modal/server.rs
(2 hunks)src/otel/traces.rs
(12 hunks)src/parseable/staging/reader.rs
(3 hunks)src/parseable/streams.rs
(22 hunks)src/storage/object_storage.rs
(2 hunks)src/sync.rs
(6 hunks)
🚧 Files skipped from review as they are similar to previous changes (6)
- src/otel/traces.rs
- src/handlers/http/modal/query_server.rs
- src/handlers/http/modal/server.rs
- src/handlers/http/health_check.rs
- src/parseable/staging/reader.rs
- src/storage/object_storage.rs
🧰 Additional context used
🧠 Learnings (2)
src/sync.rs (1)
Learnt from: nikhilsinhaparseable
PR: parseablehq/parseable#1346
File: src/sync.rs:78-83
Timestamp: 2025-06-16T04:56:21.596Z
Learning: In Rust async code, `#[tokio::main]` is appropriate when functions are called from separate OS threads (like `thread::spawn()`), as it creates a new Tokio runtime for that thread. The "Cannot start a runtime from within a runtime" error only occurs when `#[tokio::main]` functions are called from within an existing Tokio runtime context.
src/parseable/streams.rs (2)
Learnt from: nikhilsinhaparseable
PR: parseablehq/parseable#1346
File: src/parseable/streams.rs:351-355
Timestamp: 2025-06-16T05:20:18.557Z
Learning: In the Parseable codebase, arrow files are expected to always have valid creation or modified timestamps as a basic system assumption. The conversion flow uses expect() on file metadata operations to enforce this invariant with fail-fast behavior rather than graceful error handling, as violations represent fundamental system issues that should cause immediate failures.
Learnt from: nikhilsinhaparseable
PR: parseablehq/parseable#1346
File: src/parseable/streams.rs:680-686
Timestamp: 2025-06-16T05:30:13.360Z
Learning: The parquet conversion system uses a minute-based atomic design where each conversion task operates on different sets of arrow files moved to timestamped "inprocess_" directories, ensuring no conflicts between tasks and no retry mechanisms that could cause file corruption.
⏰ Context from checks skipped due to timeout of 90000ms (10)
- GitHub Check: coverage
- GitHub Check: Build Default x86_64-apple-darwin
- GitHub Check: Build Default x86_64-pc-windows-msvc
- GitHub Check: Build Default aarch64-apple-darwin
- GitHub Check: Build Default aarch64-unknown-linux-gnu
- GitHub Check: Build Kafka aarch64-apple-darwin
- GitHub Check: Build Default x86_64-unknown-linux-gnu
- GitHub Check: Build Kafka x86_64-unknown-linux-gnu
- GitHub Check: Quest Smoke and Load Tests for Standalone deployments
- GitHub Check: Quest Smoke and Load Tests for Distributed deployments
fn get_node_id_string(&self) -> String { | ||
match self.options.mode { | ||
Mode::Query => QUERIER_META | ||
.get() | ||
.map(|querier_metadata| querier_metadata.get_node_id()) | ||
.expect("Querier metadata should be set"), | ||
Mode::Ingest => INGESTOR_META | ||
.get() | ||
.map(|ingestor_metadata| ingestor_metadata.get_node_id()) | ||
.expect("Ingestor metadata should be set"), | ||
_ => "000000000000000".to_string(), | ||
} | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
get_node_id_string()
will panic when the global meta isn’t initialised
Both QUERIER_META.get()
and INGESTOR_META.get()
are .expect()
ed.
Any early invocation (e.g. during startup sync before the gRPC registration code runs) will crash the thread.
Return a fallback ID instead of panicking:
-Mode::Query => QUERIER_META.get().map(|m| m.get_node_id()).expect("…"),
+Mode::Query => QUERIER_META
+ .get()
+ .map(|m| m.get_node_id())
+ .unwrap_or_else(|| "000000000000000".to_string()),
Same for the ingest path.
📝 Committable suggestion
‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.
fn get_node_id_string(&self) -> String { | |
match self.options.mode { | |
Mode::Query => QUERIER_META | |
.get() | |
.map(|querier_metadata| querier_metadata.get_node_id()) | |
.expect("Querier metadata should be set"), | |
Mode::Ingest => INGESTOR_META | |
.get() | |
.map(|ingestor_metadata| ingestor_metadata.get_node_id()) | |
.expect("Ingestor metadata should be set"), | |
_ => "000000000000000".to_string(), | |
} | |
} | |
fn get_node_id_string(&self) -> String { | |
match self.options.mode { | |
Mode::Query => QUERIER_META | |
.get() | |
.map(|m| m.get_node_id()) | |
.unwrap_or_else(|| "000000000000000".to_string()), | |
Mode::Ingest => INGESTOR_META | |
.get() | |
.map(|m| m.get_node_id()) | |
.unwrap_or_else(|| "000000000000000".to_string()), | |
_ => "000000000000000".to_string(), | |
} | |
} |
🤖 Prompt for AI Agents
In src/parseable/streams.rs around lines 319 to 331, the get_node_id_string()
function uses expect() on QUERIER_META.get() and INGESTOR_META.get(), which
causes a panic if the global metadata is not initialized. To fix this, replace
the expect() calls with code that returns a fallback node ID string when the
metadata is not set, avoiding panics during early startup or uninitialized
states.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ingest or Query mode will always have a node_id, node_id is generated at the server initialisation itself
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@nikhilsinhaparseable, thank you for the clarification! I understand that the server initialization process ensures the node_id is available before this code path is executed, making the .expect()
calls safe in this context.
✏️ Learnings added
Learnt from: nikhilsinhaparseable
PR: parseablehq/parseable#1346
File: src/parseable/streams.rs:319-331
Timestamp: 2025-06-16T09:50:38.623Z
Learning: In Parseable's Ingest or Query mode, the node_id is always available because it's generated during server initialization itself, before the get_node_id_string() function in streams.rs would be called. This makes the .expect() calls on QUERIER_META.get() and INGESTOR_META.get() safe in this context.
Note: Learnings are effective only in the context of similar code segments. To apply general coding guidelines, please configure review instructions. You can manage existing learnings in the app.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 1
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (1)
src/handlers/http/modal/ingest_server.rs
(2 hunks)
🧰 Additional context used
🧬 Code Graph Analysis (1)
src/handlers/http/modal/ingest_server.rs (1)
src/sync.rs (1)
sync_start
(243-271)
⏰ Context from checks skipped due to timeout of 90000ms (10)
- GitHub Check: Quest Smoke and Load Tests for Distributed deployments
- GitHub Check: Quest Smoke and Load Tests for Standalone deployments
- GitHub Check: coverage
- GitHub Check: Build Default x86_64-pc-windows-msvc
- GitHub Check: Build Default aarch64-apple-darwin
- GitHub Check: Build Default x86_64-apple-darwin
- GitHub Check: Build Default x86_64-unknown-linux-gnu
- GitHub Check: Build Kafka x86_64-unknown-linux-gnu
- GitHub Check: Build Default aarch64-unknown-linux-gnu
- GitHub Check: Build Kafka aarch64-apple-darwin
Fixes #1341 |
Summary by CodeRabbit