Devlive 开源社区 本次搜索耗时 0.365 秒,为您找到 760 个相关结果.
  • Function

    5507 2024-06-02 《Ramda 0.30.0》
    always comparator compose construct curry useWith flip groupBy identity invoker nAry once pipe tap binary unary ap empty of constructN converge curryN __ bin...
  • Debezium Format

    Format Options How To Use Kafka Uses example Changelog-Data-Capture Format: Serialization Schema Format: Deserialization Schema Debezium is a set of distributed services to ca...
  • CDC Ingestion

    5486 2024-06-26 《Apache Amoro 0.6.1》
    Ingest into one table Iceberg format Mixed-Iceberg format Ingest Into multiple tables Iceberg format Mixed-Iceberg format CDC stands for Change Data Capture, which is a broa...
  • Function

    5451 2024-06-02 《Ramda 0.28.0》
    always comparator compose construct curry useWith flip groupBy identity invoker nAry once pipe tap binary unary ap empty of constructN converge curryN __ bin...
  • StarRocks

    Support These Engines Key Features Description Sink Options save_mode_create_template table [string] schema_save_mode[Enum] data_save_mode[Enum] custom_sql[String] Data Ty...
  • JDOQL Typed API

    5403 2024-05-25 《Apache JDO 3.2.1》
    JDOQL Typed API Preparation Using Maven Using Eclipse Query Classes Limitations Filtering Ordering Methods Results Parameters Variables If-Then-Else Subqueries Candida...
  • Intro to schema feature

    Why we need schema SchemaOptions table schema_first comment Columns What type supported at now How to declare type supported PrimaryKey ConstraintKeys What constraintType s...
  • FtpFile

    Description Key features Options host [string] port [int] user [string] password [string] path [string] connection_mode [string] custom_filename [boolean] file_name_expres...
  • Configuration

    5307 2024-06-29 《Apache Iceberg 1.5.2》
    Table properties Read properties Write properties Table behavior properties Reserved table properties Compatibility flags Catalog properties Lock catalog properties Hadoop ...
  • Config File Encryption And Decryption

    Introduction How to use How to implement user-defined encryption and decryption Introduction In most production environments, sensitive configuration items such as passwords a...