当前位置:网站首页>RDD的执行原理
RDD的执行原理
2022-06-24 06:44:00 【斯沃福德】
从计算的角度来讲,数据处理过程中需要计算资源(内存 & CPU)和计算模型(逻辑)。执行时,需要将计算资源和计算模型进行协调和整合。
流程概括:
①准备资源
②创建Driver和Executor节点
②然后将应用程序的数据处理逻辑分解成一个一个的计算任务task。
③然后将任务task发到已经分配资源的计算节点executor上, 按照指定的计算模型进行数据计算。最后得到计算结果
1. 启动 Yarn 集群环境(准备资源)

2. Spark 通过申请资源创建调度节点Driver和计算节点Executor

Driver和Executor都是运行在NodeManager上面的 !
ResourceManager是用于管理的,所以真正运行任务的是NodeManager
3. Spark 框架根据需求将计算逻辑根据分区划分成不同的task任务

Driver用于在Executor节点之间调度task任务
多个RDD会组合形成关联,再分解为多个Task任务,并放到TaskPool任务池中(因为需要调度task任务)
4. 调度节点Driver将任务根据计算节点状态发送到对应的计算节点进行计算

调度节点Driver会将Task从任务池中取出,然后根据节点状态、首选位置来发送到不同的Executor进行计算
从以上流程可以看出 RDD 在整个流程中主要用于将逻辑进行封装,并生成 Task 发送给Executor 节点执行计算
边栏推荐
- Black box and white box models for interpretable AI
- Dichotomous special training
- Super fast reading in OI
- Serviceworker working mechanism and life cycle: resource caching and collaborative communication processing
- Fine! Storage knowledge is a must for network engineers!
- The fund management of London gold is more important than others
- [equalizer] bit error rate performance comparison simulation of LS equalizer, def equalizer and LMMSE equalizer
- Shell script for MySQL real-time synchronization of binlog
- 相機標定(標定目的、原理)
- bjdctf_2020_babystack
猜你喜欢

Only two lines are displayed, and the excess part is displayed with Ellipsis
![[image feature extraction] image feature extraction based on pulse coupled neural network (PCNN) including Matlab source code](/img/b3/26cfa385aa357c3a7a77e9db47e94c.png)
[image feature extraction] image feature extraction based on pulse coupled neural network (PCNN) including Matlab source code
![[frame rate doubling] development and implementation of FPGA based video frame rate doubling system Verilog](/img/38/92486c92557e6e5a10a362eb2b7bdf.png)
[frame rate doubling] development and implementation of FPGA based video frame rate doubling system Verilog

Shader 常用函数
![[vulhub shooting range]] ZABBIX SQL injection (cve-2016-10134) vulnerability recurrence](/img/c5/f548223666d7379a7d4aaed2953587.png)
[vulhub shooting range]] ZABBIX SQL injection (cve-2016-10134) vulnerability recurrence

Ultra wideband pulse positioning scheme, UWB precise positioning technology, wireless indoor positioning application

【008】表格数据逐行筛选,跳出for循环及跳过本次循环思路_#VBA

The fund management of London gold is more important than others
![[GUET-CTF2019]zips](/img/79/22ff5d4a3cdc3fa9e0957ccc9bad4b.png)
[GUET-CTF2019]zips

bjdctf_2020_babystack
随机推荐
Selector (>, ~, +, [])
【008】表格数据逐行筛选,跳出for循环及跳过本次循环思路_#VBA
Deploy L2TP in VPN (medium)
Muxvlan principle, Huawei MUX VLAN experimental configuration
PCL point cloud random sampling by ratio
简单的折射效果
Global and Chinese market of anion sanitary napkins 2022-2028: Research Report on technology, participants, trends, market size and share
Win10 build webservice
Analog display of the module taking software verifies the correctness of the module taking data, and reversely converts the bin file of the lattice array to display
(cve-2020-11978) command injection vulnerability recurrence in airflow DAG [vulhub range]
PIP install XXX on the terminal but no module named XXX on pycharm
MaxCompute远程连接,上传、下载数据文件操作
Camera calibration (calibration purpose and principle)
Detailed explanation of C language compilation, link and operation
L2tp/ipsec one click installation script
Global and Chinese market of water massage column 2022-2028: Research Report on technology, participants, trends, market size and share
How to open the soft keyboard in the computer, and how to open the soft keyboard in win10
MySQL - three tables (student, course, score) to query the name, number and score of students whose course is mathematics
Lend you a pair of insight, Frida native trace
Shader 常用函数