Was the answer to the first question to use a hash function to map intermediate keys to reducers? (that way we dont saturate bandwidth for a single worker?)
Please log in to leave a comment.
Was the answer to the first question to use a hash function to map intermediate keys to reducers? (that way we dont saturate bandwidth for a single worker?)