Serverless MapReduce
Corral is a MapReduce framework designed to be deployed to serverless platforms, like AWS Lambda. It presents a lightweight alternative to Hadoop MapReduce. Much of the design philosophy was inspired by Yelp's mrjob -- corral retains mrjob's ease-of-use while gaining the type safety and speed of Go.
Corral's runtime model consists of stateless, transient executors controlled by a central driver. Currently, the best environment for deployment is AWS Lambda, but corral is modular enough that support for other serverless platforms can be added as support for Go in cloud functions improves.
Corral is best suited for data-intensive but computationally inexpensive tasks, such as ETL jobs.
More details about corral's internals can be found in this blog post.
- Examples
- Deploying in Lambda
- Configuration
- Architecture
- Contributing
- License
- Previous Work / Attributions
Every good MapReduce framework needs a WordCountโข example. Here's how to write a "word count" in corral:
type wordCount struct{}
func (w wordCount) Map(key, value string, emitter corral.Emitter) {
for _, word := range strings.Fields(value) {
emitter.Emit(word, "")
}
}
func (w wordCount) Reduce(key string, values corral.ValueIterator, emitter corral.Emitter) {
count := 0
for range values.Iter() {
count++
}
emitter.Emit(key, strconv.Itoa(count))
}
func main() {
wc := wordCount{}
job := corral.NewJob(wc, wc)
driver := corral.NewDriver(job)
driver.Main()
}
This can be invoked locally by building/running the above source and adding input files as arguments:
go run word_count.go /path/to/some_file.txt
By default, job output will be stored relative to the current directory.
We can also input/output to S3 by pointing to an S3 bucket/files for input/output:
go run word_count.go --out s3://my-output-bucket/ s3://my-input-bucket/*
More comprehensive examples can be found in the examples folder.
No formal deployment step needs run to deploy a corral application to Lambda. Instead, add the --lambda
flag to an invocation of a corral app, and the project code will be automatically recompiled for Lambda and uploaded.
For example,
./word_count --lambda s3://my-input-bucket/* --out s3://my-output-bucket
Note that you must use s3
for input/output directories, as local data files will not be present in the Lambda environment.
NOTE: Due to the fact that corral recompiles application code to target Lambda, invocation of the command with the --lambda
flag must be done in the root directory of your application's source code.
AWS credentials are automatically loaded from the environment. See this page for details.
As per the AWS documentation, AWS credentials are loaded in order from:
- Environment variables
- Shared credentials file
- IAM role (if executing in AWS Lambda or EC2)
In short, setup credentials in .aws/credentials
as one would with any other AWS powered service. If you have more than one profile in .aws/credentials
, make sure to set the AWS_PROFILE
environment variable to select the profile to be used.
There are a number of ways to specify configuraiton for corral applications. To hard-code configuration, there are a variety of Options that may be used when instantiating a Job.
Configuration values are used in the order, with priority given to whichever location is set first:
- Hard-coded job Options.
- Command line flags
- Environment variables
- Configuration file
- Default values
Below are the config settings that may be changed.
splitSize
(int64) - The maximum size (in bytes) of any single file input split. (Default: 100Mb)mapBinSize
(int64) - The maximum size (in bytes) of the combined input size to a mapper. (Default: 512Mb)reduceBinSize
(int64) - The maximum size (in bytes) of the combined input size to a reducer. This is an "expected" maximum, assuming uniform key distribution. (Default: 512Mb)maxConcurrency
(int) - The maximum number of executors (local, Lambda, or otherwise) that may run concurrently. (Default:100
)workingLocation
(string) - The location (local or S3) to use for writing intermediate and output data.verbose
(bool) - Enables debug logging if set totrue
lambdaFunctionName
(string) - The name to use for created Lambda functions. (Default:corral_function
)lambdaManageRole
(bool) - Whether corral should manage creating an IAM role for Lambda execution. (Default:true
)lambdaRoleARN
(string) - IflambdaManageRole
is disabled, the ARN specified inlambdaRoleARN
is used as the Lambda function's executor role.lambdaTimeout
(int64) - The timeout (maximum function duration) in seconds of created Lambda functions. See AWS lambda docs for details. (Default:180
)lambdaMemory
(int64) - The maximum memory that a Lambda function may use. See AWS lambda docs for details. (Default:1500
)
The following flags are available at runtime as command-line flags:
--lambda Use lambda backend
--memprofile file Write memory profile to file
-o, --out directory Output directory (can be local or in S3)
--undeploy Undeploy the Lambda function and IAM permissions without running the driver
-v, --verbose Output verbose logs
Corral leverages Viper for specifying config. Any of the above configuration settings can be set as environment variables by upper-casing the setting name, and prepending CORRAL_
.
For example, lambdaFunctionName
can be configured using an env var by setting CORRAL_LAMBDAFUNCTIONNAME
.
Corral will read settings from a file called corralrc
. Corral checks to see if this file exists in the current directory (.
). It can also read global settings from $HOME/.corral/corralrc
.
Reference the "Configuration Settings" section for the configuration keys that may be used.
Config files can be in JSON, YAML, or TOML format. See Viper for more details.
Below is a high-level diagram describing the MapReduce architecture corral uses.
Input files are split byte-wise into contiguous chunks of maximum size splitSize
. These splits are packed into "input bins" of maximum size mapBinSize
. The bin packing algorithm tries to assign contiguous chunks of a single file to the same mapper, but this behavior is not guaranteed.
There is a one-to-one correspondance between an "input bin" and the data that a mapper reads. i.e. Each mapper is assigned to process exactly 1 input bin. For jobs that run on Lambda, you should tune mapBinSize
, splitSize
, and lambdaTimeout
accordingly so that mappers are able to process their entire input before timing out.
Input data is stramed into the mapper, so the entire input data needn't fit in memory.
Input data is fed into the map function line-by-line. Input splits are calculated byte-wise, but this is rectified during the Map phase into a logical split "by line" (to prevent partial reads, or the loss of records that span input splits).
Mappers may maintain state if desired (though not encouraged).
Key/value pairs emitted during the map stage are written to intermediate files. Keys are partitioned into one N
buckets, where N
is the number of reducers. As a result, each mapper may write to as many as N
separate files.
This results in a set of files labeled map-binX-Y
where X
is a number between 0 and N-1, and Y
is the mapper's ID (a number between 0 and the number of mappers).
Currently, reducer input must be able to fit in memory. This is because keys are only partitioned, not sorted. The reducer performs an in-memory per-key partition.
Reducers receive per-key values in an arbitrary order. It is guaranteed that all values for a given key will be provided in a single call to Reduce by-key.
Values emitted from a reducer will be stored in tab separated format (i.e. KEY\tVALUE
) in files labeled output-X
where X
is the reducer's ID (a number between 0 and the number of reducers).
Reducers may maintain state if desired (though not encouraged).
Contributions to corral are more than welcomed! In general, the preference is to discuss potential changes in the issues before changes are made.
More information is included in the CONTRIBUTING.md
To run tests, run the following command in the root project directory:
go test ./...
Note that some tests (i.e. the tests of corfs
) require AWS credentials to be present.
The main corral has TravisCI setup. If you fork this repo, you can enable TravisCI on your fork. You will need to set the following environment variables for all the tests to work:
AWS_ACCESS_KEY_ID
: Credentials access keyAWS_SECRET_ACCESS_KEY
: Credentials secret keyAWS_DEFAULT_REGION
: Region to use for S3 testsAWS_TEST_BUCKET
: The S3 bucket to use for tests (just the name; i.e.testBucket
instead ofs3://testBucket
)
This project is licensed under the MIT License - see the LICENSE file for details
- lambda-refarch-mapreduce - Python/Node.JS reference MapReduce Architecture
- Uses a "recursive" style reducer instead of parallel reducers
- Requires that all reducer output can fit in memory of a single lambda function
- mrjob
- Excellent Python library for writing MapReduce jobs for Hadoop, EMR/Dataproc, and others
- dmrgo
- mrjob-inspired Go MapReduce library
- Zappa
- Serverless Python toolkit. Inspired much of the way that corral does automatic Lambda deployment
- Logo: Fence by Vitaliy Gorbachev from the Noun Project