Skip to main content

Structured ML framework for customer churn prediction -- from exploration notebooks to production pipelines, locally or on Databricks.

Project description

Customer Retention ML Framework

A structured backbone for the messy, iterative reality of ML model development. Exploration and production deployment are treated as parts of the same process -- not separate phases -- reflecting how data science actually works: you explore, decide, build, evaluate, learn something new, and circle back.

Handles both entity-level and event-level datasets. Experiments and production can share the same tables without copying data (Delta Lake), features are served consistently across training and inference (Feast / Feature Store), and every experiment is tracked and reproducible (MLflow). Runs locally or deploys to Databricks.

Python 3.10+ License CI codecov pre-commit Typed MLflow Databricks


Why This Exists

Most ML tutorials jump straight to model.fit(). Real projects fail earlier -- in data issues you didn't notice, leakage you didn't check for, or feature choices you can't explain to your stakeholders three months later. This framework tries to close that gap.

It serves two audiences:

  1. If you're learning, the notebooks walk through a realistic end-to-end process and explain the reasoning behind each step. Why does a 93-day median inter-event gap rule out short aggregation windows? Why might the model that wins validation degrade in production? The goal is to build intuition for the decisions that don't appear in textbooks.

  2. If you're experienced, you can pip install, point to a new dataset, and get an opinionated exploration scaffold. The output is loosely-coupled production code (Bronze / Silver / Gold) with the provenance of every decision captured in self-contained HTML documentation -- useful when you need to explain why the pipeline does what it does.

The approach

  • Exploration is a first-class concept. The framework records what it found in the data, what it recommends, and why -- in versioned YAML artifacts. Each downstream transformation traces back to a specific observation in a specific notebook, so nothing happens without a documented reason.
  • Experimentation is version-controlled end to end. Not just code and features, but the actual data observations and actions taken on them can be frozen in time together. Delta tables support time-travel on live production datasets, so you can always go back to what the data looked like when a decision was made.
  • Iteration is the default. Model feedback -- feature importances, error analysis, drift signals -- feeds back into the next exploration cycle. The framework tracks iteration lineage rather than treating each experiment as independent.

Quick Start

1. Install (local)

pip install "churnkit[ml]"

For Databricks, see the Databricks Installation guide.

2. Bootstrap notebooks into your project

churnkit-init --output ./my_project
cd my_project

3. Point to your data

Open exploration_notebooks/01_data_discovery.ipynb and set the data path:

DATA_PATH = "experiments/data/your_file.csv"   # csv, parquet, or delta

4. Run

Execute cells sequentially. The framework auto-detects column types, data granularity (entity vs event-level), text columns, and temporal patterns -- then routes you through the relevant notebooks.

Findings, recommendations, and production pipeline specs are generated as you go.


Learn More

Detailed documentation lives in the Wiki:

Topic Wiki Page
Installation options & environment setup Getting Started
Databricks install & databricks_init() setup Databricks Installation
Medallion architecture & system design Architecture
Notebook workflow & iteration tracking Exploration Loop
Leakage-safe temporal data preparation Temporal Framework
Feast & Databricks feature management Feature Store
Local execution with Feast + MLFlow Local Track
Databricks with Unity Catalog + Delta Lake Databricks Track

Tutorials

Tutorial What it walks through
Retail Customer Retention Entity-level data: point-in-time snapshots, quality assessment, baseline models, and a production scoring check that reveals how distribution drift affects different model families -- browse HTML
Customer Email Engagement Event-level data: temporal window selection driven by inter-event cadence, aggregating 83K email events into customer-level features, and tracing each decision from data observation to production pipeline -- browse HTML
Bank Customer Churn Dataset setup instructions
Netflix Churn Dataset setup instructions

Acknowledgments


Contributing

See CONTRIBUTING.md for guidelines.

License

Apache 2.0 -- See LICENSE for details.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

churnkit-1.2.0a3.tar.gz (1.4 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

churnkit-1.2.0a3-py3-none-any.whl (1.5 MB view details)

Uploaded Python 3

File details

Details for the file churnkit-1.2.0a3.tar.gz.

File metadata

  • Download URL: churnkit-1.2.0a3.tar.gz
  • Upload date:
  • Size: 1.4 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.12

File hashes

Hashes for churnkit-1.2.0a3.tar.gz
Algorithm Hash digest
SHA256 8e549bf63254f72d0d82dd1f7f9f0bc5aa079d66ac106b73942186065ecc53c5
MD5 ce2231ee22513aebac51f57826655ec2
BLAKE2b-256 24ee9e5856539b211c1f2202eae915456fe1342a03974788f3354df64aa36097

See more details on using hashes here.

File details

Details for the file churnkit-1.2.0a3-py3-none-any.whl.

File metadata

  • Download URL: churnkit-1.2.0a3-py3-none-any.whl
  • Upload date:
  • Size: 1.5 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.12

File hashes

Hashes for churnkit-1.2.0a3-py3-none-any.whl
Algorithm Hash digest
SHA256 9d97b6d50ed16d708ae0bf923de7016da51915640d174821aa56f4d24bb9c75a
MD5 626502b0369d01ab90b1925105aed895
BLAKE2b-256 adeefc7a7555e8d965bcaed1cf579aacf247d3d6bc21ba9e2de779dd3d940ea9

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page