当前位置:网站首页>Cluster usage specification
Cluster usage specification
2022-07-29 08:17:00 【Hand tear can】
1. Try to use the database table of the application layer , Reduce access to the source layer library table ; Or build your own application layer table and update it regularly ;
2."spark Inquire about ,pandas Handle 、 Splicing " and "spark Inquire about 、 Handle 、 Splicing " Balance the calculation speed 、 Cluster resources occupy both ;
3. Avoid spark.dataframe turn pd.dataframe and to_csv; take spark.dataframe Directly to csv Save to hdfs:
192.168.101.11 yes master Of ip, Default web UI Interface port 50070, File upload and download port 8020
3.1 Select the cluster location to store : for example hdfs://192.168.101.11:8020/tmp/123.csv
3.2 preservation
spark_df.write.format(“csv”).options(header=‘true’, inferschema=‘true’).save(‘hdfs://192.168.101.11:8020/tmp/’ + “123.csv”)
3.3 see
df = od.spark.read.format(‘com.databricks.spark.csv’).options(header=‘true’, inferschema=‘true’).load(‘hdfs://192.168.101.11:8020/tmp/123.csv’)
边栏推荐
- torch.nn.functional.one_ hot()
- Windows 安装 MySQL 5.7详细步骤
- Application of explosion-proof inclination sensor in safe operation of LNG
- pnpm install出现:ERR_PNPM_PEER_DEP_ISSUES Unmet peer dependencies
- Dp4301-sub-1g highly integrated wireless transceiver chip
- Unity beginner 3 - enemy movement control and setting of blood loss area (2D)
- Beautiful girls
- MySQL rownum implementation
- 【学术相关】为什么很多国内学者的AI的论文复现不了?
- STM32 MDK (keil5) contents mismatch error summary
猜你喜欢

Ws2812b color lamp driver based on f407zgt6

Background management system platform of new energy charging pile

Security baseline of network security

Noise monitoring and sensing system

阿里巴巴政委体系-第四章、政委建在连队上

What constitutes the smart charging pile system?

Reading of false news detection papers (3): semi supervised content-based detection of misinformation via tensor embeddings

Privacy is more secure in the era of digital RMB

Proteus simulation based on 51 MCU ADC0808

110道 MySQL面试题及答案 (持续更新)
随机推荐
Chapter contents of the romance of the Three Kingdoms
BiSeNet v2
Noise monitoring and sensing system
Unicode private use areas
TCP——滑动窗口
Application scheme of charging pile
2.4G band wireless transceiver chip si24r1 summary answer
Collation of ml.net related resources
Network Security Learning chapter
torch.nn.functional.one_hot()
Redshift 2.6.41 for maya2018 watermark removal
The difference between torch.tensor and torch.tensor
Process and concept of process
Tle5012b+stm32f103c8t6 (bluepill) reading angle data
【NOI模拟赛】计算几何(凸包,暴力,并查集)
深度学习(1):银行客户流失预测
Preparation of SQL judgment statement
Some simple uses of crawler requests Library
[noi simulation] computational geometry (convex hull, violence, and search set)
[beauty of software engineering - column notes] 23 | Architect: programmers who don't want to be architects are not good programmers