
Security News
New CNA Scorecard Tool Ranks CVE Data Quality Across the Ecosystem
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
Identify the bottleneck of your Kedro Pipeline quickly with kedro-profile
You will see something similar to this when running the plugin with spaceflight project:
==========Node Summary==========
┏━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┳━━━━━━━━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━━┳━━━━━━━━━━━━━━━━┳━━━━━━━━━━━━━━━┓
┃ Node Name ┃ Loading Time(s) ┃ Node Compute Time(s) ┃ Saving Time(s) ┃ Total Time(s) ┃
┡━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╇━━━━━━━━━━━━━━━━━╇━━━━━━━━━━━━━━━━━━━━━━╇━━━━━━━━━━━━━━━━╇━━━━━━━━━━━━━━━┩
│ preprocess_shuttles_node │ 1.65 │ 0.01 │ 0.01 │ 1.68 │
│ create_model_input_table_node │ 0.01 │ 0.03 │ 0.02 │ 0.06 │
│ preprocess_companies_node │ 0.01 │ 0.01 │ 0.02 │ 0.03 │
└───────────────────────────────┴─────────────────┴──────────────────────┴────────────────┴───────────────┘
==========Dataset Summary==========
┏━━━━━━━━━━━━━━━━━━━━━━━━┳━━━━━━━━━━━━━━━━━┳━━━━━━━━━━━━┳━━━━━━━━━━━━━━━━┳━━━━━━━━━━━━┳━━━━━━━━━━━━━━━┓
┃ Dataset Name ┃ Loading Time(s) ┃ Load Count ┃ Saving Time(s) ┃ Save Count ┃ Total Time(s) ┃
┡━━━━━━━━━━━━━━━━━━━━━━━━╇━━━━━━━━━━━━━━━━━╇━━━━━━━━━━━━╇━━━━━━━━━━━━━━━━╇━━━━━━━━━━━━╇━━━━━━━━━━━━━━━┩
│ preprocessed_shuttles │ 0.02 │ 1.0 │ 0.01 │ 1.0 │ 0.03 │
│ preprocessed_companies │ 0.0 │ 1.0 │ 0.02 │ 1.0 │ 0.02 │
│ companies │ 0.01 │ 1.0 │ nan │ nan │ nan │
│ shuttles │ 1.65 │ 1.0 │ nan │ nan │ nan │
│ reviews │ 0.01 │ 1.0 │ nan │ nan │ nan │
│ model_input_table │ nan │ nan │ 0.02 │ 1.0 │ nan │
└────────────────────────┴─────────────────┴────────────┴────────────────┴────────────┴───────────────┘
kedro>=0.18.5 # Minimal version for hook specifications
pandas>=1.0.0
If you do not have kedro installed already, install kedro with:
pip install kedro
Then create an example project with this command:
kedro new --example=yes --tools=none --name kedro-profile-example
If you are cloning the repository, the project is already created here
This will create a new directorykedro-profile-example
in your current directory.
You will find this line in settings.py
, update it as follow:
from kedro_profile.hook import ProfileHook
HOOKS: tuple[ProfileHook] = (
ProfileHook(
save_file=True, # Enable CSV file saving
node_profile_path="data/08_reporting/profiling/node_profile.csv",
dataset_profile_path="data/08_reporting/profiling/dataset_profile.csv",
),
)
save_file
: Boolean to enable/disable CSV file saving (default: False)node_profile_path
: Path for node performance CSV file (default: "node_profile.csv")dataset_profile_path
: Path for dataset performance CSV file (default: "dataset_profile.csv")env
: Environment filter (default: "local")Save to custom directory:
HOOKS: tuple[ProfileHook] = (
ProfileHook(
save_file=True,
node_profile_path="reports/node_performance.csv",
dataset_profile_path="reports/dataset_performance.csv",
),
)
Disable CSV saving (console output only):
HOOKS: tuple[ProfileHook] = (
ProfileHook(save_file=False),
)
The plugin generates two CSV files when save_file=True
:
Both files include:
KEDRO_PROFILE_DISABLE=1
: Disable profilingKEDRO_PROFILE_RICH=0
: Disable rich console outputFAQs
Identify the bottleneck of your Kedro Pipeline quickly
We found that kedro-profile demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
Research
/Security News
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.
Research
/Security News
Socket uncovered 11 malicious Go packages using obfuscated loaders to fetch and execute second-stage payloads via C2 domains.