matrixone icon indicating copy to clipboard operation
matrixone copied to clipboard

add asin func

Open gaoxinge opened this issue 2 years ago • 2 comments

What type of PR is this?

  • [ ] API-change
  • [ ] BUG
  • [ ] Improvement
  • [ ] Documentation
  • [x] Feature
  • [ ] Test and CI
  • [ ] Code Refactoring

Which issue(s) this PR fixes:

issue https://github.com/matrixorigin/matrixone/issues/1970

What this PR does / why we need it:

gaoxinge avatar Oct 08 '22 07:10 gaoxinge

It is better to add BVT test

ouyuanning avatar Oct 08 '22 07:10 ouyuanning

@ouyuanning I add some sql tests for asin.

gaoxinge avatar Oct 08 '22 10:10 gaoxinge

Any update? Should we keep this PR open?

fengttt avatar Oct 22 '22 06:10 fengttt

@fengttt I follow the steps in build from source, but it fails with

$ ./mo-service -cfg ./etc/cn-standalone-test.toml
2022/10/23 03:35:44.726942 +0000 ERROR hakeeper-client-backend morpc/backend.go:623 init remote connection failed, retry later {"remote": "2", "error": "dial tcp4: address 2: missing port in address"}
2022/10/23 03:35:45.736112 +0000 ERROR hakeeper-client-backend morpc/backend.go:200 connect to remote failed {"remote": "2", "error": "backend closed"}
2022/10/23 03:35:45.736187 +0000 ERROR hakeeper-client morpc/client.go:406 create backend failed {"backend": "2", "error": "backend closed"}
2022/10/23 03:35:45.736355 +0000 ERROR hakeeper-client-backend morpc/backend.go:623 init remote connection failed, retry later {"remote": "1", "error": "dial tcp4: address 1: missing port in address"}
2022/10/23 03:35:46.738498 +0000 ERROR hakeeper-client-backend morpc/backend.go:200 connect to remote failed {"remote": "1", "error": "backend closed"}
2022/10/23 03:35:46.738549 +0000 ERROR hakeeper-client morpc/client.go:406 create backend failed {"backend": "1", "error": "backend closed"}
panic: backend closed

goroutine 1 [running]:
main.main()
        /matrixone/cmd/mo-service/main.go:90 +0x390

Do I miss something?

gaoxinge avatar Oct 23 '22 03:10 gaoxinge

you can try ./mo-service -launch ./etc/launch/launch.toml

mooleetzi avatar Oct 23 '22 04:10 mooleetzi

@mooleetzi I try the command, but it will raise error:

$ ./mo-service -launch ./etc/launch/launch.toml
{"level":"INFO","time":"2022/10/23 08:48:48.376040 +0000","caller":"trace/trace.go:117","msg":"init GlobalBatchProcessor"}
{"level":"INFO","time":"2022/10/23 08:48:48.388030 +0000","caller":"export/batch_processor.go:216","msg":"MOCollector Start"}
{"level":"INFO","time":"2022/10/23 08:48:48.389582 +0000","caller":"trace/trace.go:125","msg":"init trace span processor"}
{"level":"INFO","time":"2022/10/23 08:48:48.389628 +0000","caller":"trace/trace.go:84","msg":"trace with LongQueryTime: 0s"}
{"level":"INFO","time":"2022/10/23 08:48:48.395148 +0000","caller":"metric/metric.go:129","msg":"metric with ExportInterval: 15s"}
{"level":"INFO","time":"2022/10/23 08:48:48.395219 +0000","caller":"mo-service/config.go:183","msg":"hakeeper client cfg: { [127.0.0.1:32001 127.0.0.1:32011 127.0.0.1:32021] 0}"}
{"level":"INFO","time":"2022/10/23 08:48:48.397284 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:2143","msg":"go version: go1.19.2, linux/amd64"}
{"level":"INFO","time":"2022/10/23 08:48:48.398696 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:2145","msg":"dragonboat version: 4.0.0 (Dev)"}
{"level":"WARN","time":"2022/10/23 08:48:48.398733 +0000","name":"config","caller":"config/config.go:534","msg":"mutual TLS disabled, communication is insecure"}
{"level":"INFO","time":"2022/10/23 08:48:48.399235 +0000","name":"config","caller":"config/config.go:656","msg":"using default EngineConfig"}
{"level":"INFO","time":"2022/10/23 08:48:48.399313 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:347","msg":"DeploymentID set to 1"}
{"level":"INFO","time":"2022/10/23 08:48:48.463980 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:1681","msg":"logdb memory limit: 48 MBytes"}
{"level":"INFO","time":"2022/10/23 08:48:48.468455 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:356","msg":"NodeHost ID: 7c4dccb4-4d3c-41f8-b482-5251dc7a41bf"}
{"level":"INFO","time":"2022/10/23 08:48:48.468537 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:1728","msg":"AddressByNodeHostID: true, use gossip based node registry"}
{"level":"INFO","time":"2022/10/23 08:48:48.468613 +0000","name":"registry","caller":"registry/gossip.go:297","msg":"gossip probe interval set to 5s"}
{"level":"INFO","time":"2022/10/23 08:48:48.468664 +0000","name":"registry","caller":"registry/gossip.go:307","msg":"gossip bind address 127.0.0.1 port 32002"}
{"level":"INFO","time":"2022/10/23 08:48:48.468718 +0000","name":"registry","caller":"registry/gossip.go:315","msg":"gossip advertise address 127.0.0.1 port 32002"}
{"level":"INFO","time":"2022/10/23 08:48:48.472968 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:364","msg":"filesystem error injection mode enabled: false"}
{"level":"INFO","time":"2022/10/23 08:48:48.473323 +0000","name":"transport","caller":"transport/transport.go:238","msg":"transport type: go-tcp-transport"}
{"level":"INFO","time":"2022/10/23 08:48:48.473421 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:1932","msg":"transport type: go-tcp-transport"}
{"level":"INFO","time":"2022/10/23 08:48:48.473472 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:1933","msg":"logdb type: Tan"}
{"level":"INFO","time":"2022/10/23 08:48:48.473518 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:1934","msg":"nodehost address: 127.0.0.1:32000"}
{"level":"INFO","time":"2022/10/23 08:48:48.473560 +0000","name":"LogService","caller":"logservice/store.go:149","msg":"HAKeeper Timeout Configs","uuid":"7c4dccb4-4d3c-41f8-b482-5251dc7a41bf","LogStoreTimeout":20000000000,"DNStoreTimeout":10000000000,"CNStoreTimeout":30000000000}
{"level":"INFO","time":"2022/10/23 08:48:48.473641 +0000","name":"LogService","caller":"logservice/store.go:168","msg":"logservice truncation worker started","uuid":"7c4dccb4-4d3c-41f8-b482-5251dc7a41bf"}
{"level":"INFO","time":"2022/10/23 08:48:48.475649 +0000","caller":"mo-service/main.go:224","msg":"bootstrapping hakeeper..."}
{"level":"INFO","time":"2022/10/23 08:48:48.475665 +0000","name":"LogService","caller":"logservice/service.go:150","msg":"logservice heartbeat worker started","uuid":"7c4dccb4-4d3c-41f8-b482-5251dc7a41bf"}
{"level":"INFO","time":"2022/10/23 08:48:48.479763 +0000","caller":"mo-service/config.go:183","msg":"hakeeper client cfg: { [127.0.0.1:32001 127.0.0.1:32011 127.0.0.1:32021] 0}"}
{"level":"INFO","time":"2022/10/23 08:48:48.479864 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:2143","msg":"go version: go1.19.2, linux/amd64"}
{"level":"INFO","time":"2022/10/23 08:48:48.479920 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:2145","msg":"dragonboat version: 4.0.0 (Dev)"}
{"level":"WARN","time":"2022/10/23 08:48:48.479954 +0000","name":"config","caller":"config/config.go:534","msg":"mutual TLS disabled, communication is insecure"}
{"level":"INFO","time":"2022/10/23 08:48:48.481627 +0000","name":"config","caller":"config/config.go:656","msg":"using default EngineConfig"}
{"level":"INFO","time":"2022/10/23 08:48:48.481764 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:347","msg":"DeploymentID set to 1"}
{"level":"INFO","time":"2022/10/23 08:48:48.502795 +0000","name":"tan","caller":"tan/open.go:55","msg":"/gaoxinge/matrixone/node-1-data/851a46074ca8/00000000000000000001/tandb/node-0-131072 creating a new tan db"}
{"level":"INFO","time":"2022/10/23 08:48:48.513408 +0000","name":"tan","caller":"tan/open.go:76","msg":"/gaoxinge/matrixone/node-1-data/851a46074ca8/00000000000000000001/tandb/node-0-131072 on disk files [CURRENT MANIFEST-000001]"}
{"level":"INFO","time":"2022/10/23 08:48:48.513602 +0000","name":"tan","caller":"tan/open.go:132","msg":"/gaoxinge/matrixone/node-1-data/851a46074ca8/00000000000000000001/tandb/node-0-131072 logFiles to rebuild: map[]"}
{"level":"INFO","time":"2022/10/23 08:48:48.513664 +0000","name":"tan","caller":"tan/open.go:133","msg":"/gaoxinge/matrixone/node-1-data/851a46074ca8/00000000000000000001/tandb/node-0-131072 indexFiles: []"}
{"level":"PANIC","time":"2022/10/23 08:48:48.515193 +0000","name":"dragonboat","caller":"[email protected]/nodehost.go:2157","msg":"operation not supported"}
panic: operation not supported

goroutine 218 [running]:
go.uber.org/zap/zapcore.(*CheckedEntry).Write(0xc0007f4000, {0x0, 0x0, 0x0})
        /root/go/pkg/mod/go.uber.org/[email protected]/zapcore/entry.go:232 +0x44c
go.uber.org/zap.(*SugaredLogger).log(0xc0001961d8, 0x4, {0x24a0624?, 0xc0000b08c0?}, {0xc00021eca0?, 0xc0001903e0?, 0xc0046ed180?}, {0x0, 0x0, 0x0})
        /root/go/pkg/mod/go.uber.org/[email protected]/sugar.go:227 +0xee
go.uber.org/zap.(*SugaredLogger).Panicf(...)
        /root/go/pkg/mod/go.uber.org/[email protected]/sugar.go:159
github.com/matrixorigin/matrixone/pkg/logutil.DragonboatAdaptLogger.Panicf(...)
        /gaoxinge/matrixone/pkg/logutil/dragonboat.go:65
github.com/lni/dragonboat/v4/logger.(*dragonboatLogger).Panicf(0xc0046ba0f0?, {0x24a0624, 0x3}, {0xc00021eca0, 0x1, 0x1})
        /root/go/pkg/mod/github.com/matrixorigin/dragonboat/[email protected]/logger/logger.go:132 +0x57
github.com/lni/dragonboat/v4.panicNow(...)
        /root/go/pkg/mod/github.com/matrixorigin/dragonboat/[email protected]/nodehost.go:2157
github.com/lni/dragonboat/v4.(*NodeHost).startShard(0xc0002f8700, 0xc0046b6090, 0x0, 0x20?, {0x20000, 0x0, 0x1, 0x1, 0xa, 0x1, ...}, ...)
        /root/go/pkg/mod/github.com/matrixorigin/dragonboat/[email protected]/nodehost.go:1576 +0xe13
github.com/lni/dragonboat/v4.(*NodeHost).StartReplica(0x0?, 0x0?, 0x24?, 0x2b?, {0x20000, 0x0, 0x1, 0x1, 0xa, 0x1, ...})
        /root/go/pkg/mod/github.com/matrixorigin/dragonboat/[email protected]/nodehost.go:506 +0xe5
github.com/matrixorigin/matrixone/pkg/logservice.(*store).startHAKeeperReplica(0xc000054fc0, 0x20000, 0xc000157b00?, 0x19?)
        /gaoxinge/matrixone/pkg/logservice/store.go:212 +0xc7
github.com/matrixorigin/matrixone/pkg/logservice.(*Service).BootstrapHAKeeper(_, {_, _}, {{0x0, 0x0}, 0x1, {0xc0001928a0, 0x24}, 0x0, {0xc00011b1d0, ...}, ...})
        /gaoxinge/matrixone/pkg/logservice/service_bootstrap.go:34 +0x92
main.startLogService.func1({0x2865350, 0xc00019da80})
        /gaoxinge/matrixone/cmd/mo-service/main.go:225 +0x11c
github.com/matrixorigin/matrixone/pkg/common/stopper.(*Stopper).doRunCancelableTask.func1()
        /gaoxinge/matrixone/pkg/common/stopper/stopper.go:257 +0x79
created by github.com/matrixorigin/matrixone/pkg/common/stopper.(*Stopper).doRunCancelableTask
        /gaoxinge/matrixone/pkg/common/stopper/stopper.go:252 +0x12c

gaoxinge avatar Oct 23 '22 08:10 gaoxinge

Unfortunately BVT and UT failures. Need fix.

fengttt avatar Oct 25 '22 07:10 fengttt

@fengttt I have difficulty to run mo-service and pass test in the project for a long time. So I will close the pr to avoid wasting time, and I may reopen it when I fix these problems.

gaoxinge avatar Oct 30 '22 08:10 gaoxinge