-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
per tenant retention #116
per tenant retention #116
Changes from 1 commit
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -6,19 +6,25 @@ package compact | |
import ( | ||
"context" | ||
"fmt" | ||
"regexp" | ||
"time" | ||
|
||
"github.com/go-kit/log" | ||
"github.com/go-kit/log/level" | ||
"github.com/oklog/ulid" | ||
"github.com/pkg/errors" | ||
"github.com/prometheus/client_golang/prometheus" | ||
"github.com/prometheus/common/model" | ||
"github.com/thanos-io/objstore" | ||
|
||
"github.com/thanos-io/thanos/pkg/block" | ||
"github.com/thanos-io/thanos/pkg/block/metadata" | ||
) | ||
|
||
const ( | ||
tenantRetentionRegex = `^([\w-]+):((\d{4}-\d{2}-\d{2})|(\d+d))$` | ||
) | ||
|
||
// ApplyRetentionPolicyByResolution removes blocks depending on the specified retentionByResolution based on blocks MaxTime. | ||
// A value of 0 disables the retention for its resolution. | ||
func ApplyRetentionPolicyByResolution( | ||
|
@@ -47,3 +53,75 @@ func ApplyRetentionPolicyByResolution( | |
level.Info(logger).Log("msg", "optional retention apply done") | ||
return nil | ||
} | ||
|
||
type RetentionPolicy struct { | ||
CutoffDate time.Time | ||
RetentionDuration time.Duration | ||
} | ||
|
||
func (r RetentionPolicy) isExpired(blockMaxTime time.Time) bool { | ||
if r.CutoffDate.IsZero() { | ||
return time.Now().After(blockMaxTime.Add(r.RetentionDuration)) | ||
} | ||
return r.CutoffDate.After(blockMaxTime) | ||
} | ||
|
||
func ParesRetentionPolicyByTenant(logger log.Logger, retentionTenants []string) (map[string]RetentionPolicy, error) { | ||
pattern := regexp.MustCompile(tenantRetentionRegex) | ||
retentionByTenant := make(map[string]RetentionPolicy, len(retentionTenants)) | ||
for _, tenantRetention := range retentionTenants { | ||
matches := pattern.FindStringSubmatch(tenantRetention) | ||
invalidFormat := errors.Errorf("invalid retention format for tenant: %s, must be `<tenant>:(<yyyy-mm-dd>|<duration>d)`", tenantRetention) | ||
if len(matches) != 5 { | ||
return nil, errors.Wrapf(invalidFormat, "matched size %d", len(matches)) | ||
} | ||
tenant := matches[1] | ||
var policy RetentionPolicy | ||
if _, ok := retentionByTenant[tenant]; ok { | ||
return nil, errors.Errorf("duplicate retention policy for tenant: %s", tenant) | ||
} | ||
if cutoffDate, err := time.Parse(time.DateOnly, matches[3]); err != nil && matches[3] != "" { | ||
return nil, errors.Wrapf(invalidFormat, "error parsing cutoff date: %v", err) | ||
} else if matches[3] != "" { | ||
policy.CutoffDate = cutoffDate | ||
} | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. nit: don't need There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. still need this, |
||
if duration, err := model.ParseDuration(matches[4]); err != nil && matches[4] != "" { | ||
return nil, errors.Wrapf(invalidFormat, "error parsing duration: %v", err) | ||
} else if matches[4] != "" { | ||
policy.RetentionDuration = time.Duration(duration) | ||
} | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. ditto |
||
level.Info(logger).Log("msg", "retention policy for tenant is enabled", "tenant", tenant, "retention policy", fmt.Sprintf("%v", policy)) | ||
retentionByTenant[tenant] = policy | ||
} | ||
return retentionByTenant, nil | ||
} | ||
|
||
// ApplyRetentionPolicyByTenant removes blocks depending on the specified retentionByTenant based on blocks MaxTime. | ||
func ApplyRetentionPolicyByTenant( | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. plan to add unit test for this as well |
||
ctx context.Context, | ||
logger log.Logger, | ||
bkt objstore.Bucket, | ||
metas map[ulid.ULID]*metadata.Meta, | ||
retentionByTenant map[string]RetentionPolicy, | ||
blocksMarkedForDeletion prometheus.Counter) error { | ||
if len(retentionByTenant) == 0 { | ||
level.Info(logger).Log("msg", "tenant retention is disabled due to no policy") | ||
return nil | ||
} | ||
level.Info(logger).Log("msg", "start tenant retention") | ||
for id, m := range metas { | ||
policy, ok := retentionByTenant[m.Thanos.GetTenant()] | ||
if !ok { | ||
continue | ||
} | ||
maxTime := time.Unix(m.MaxTime/1000, 0) | ||
if policy.isExpired(maxTime) { | ||
level.Info(logger).Log("msg", "applying retention: marking block for deletion", "id", id, "maxTime", maxTime.String()) | ||
if err := block.MarkForDeletion(ctx, logger, bkt, id, fmt.Sprintf("block exceeding retention of %v", policy), blocksMarkedForDeletion); err != nil { | ||
return errors.Wrap(err, "delete block") | ||
} | ||
} | ||
} | ||
level.Info(logger).Log("msg", "tenant retention apply done") | ||
return nil | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Give some examples in a piece of code comment.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
examples in unit tests already