A small tool that is capable to sniff and visualize the control messages between Operators.
Project description
Description
This package contains the experimental implementation of the IO Sniffer. The Sniffer allows you to visualize the control plane of the IO ports of the operators, so you can have a better understanding, what happens during the execution of your pipeline.
Check the documentation for more details.
Install
The python artifact is hosted on https://pypi.org/, so you can install it via pip:
pip install pypz-io-sniffer
If you want to work on it locally, then you should install in editable mode:
pip install -e ./sniffer
Test
Before you run the tests, you need to install the subproject in editable mode. To run the tests locally, you need to execute the following command:
python -m unittest discover .\sniffer\test\ -p "*.py"
Build
Before you build, you will need to install the "build" package:
pip install build
Then from the subproject's root, you will need to execute the following command:
python -m build
It will create the source distribution and the wheel file in the "dist" folder.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for pypz_io_sniffer-0.9.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | e2c409328f40960c4466d576c907f70abd951e47d730260097b1e77adabe7622 |
|
MD5 | 75584e7d3b8fa2a6683cd0f4f04be2af |
|
BLAKE2b-256 | 5112dc56f7bd1d3e64fa6d38b08f602086f0e5a2be8596d77b454947bbf9ee1a |