Devlive 开源社区 本次搜索耗时 0.606 秒,为您找到 441 个相关结果.
  • rest-api

    REST API Overview API reference Returns an overview over all jobs and their current state. Parameters Responses Return details of a job. Parameters Responses Return all fini...
  • LocalFile

    Description Key Features Options path [string] custom_filename [boolean] file_name_expression [string] filename_time_format [string] file_format_type [string] field_delimite...
  • MongoDB

    Support Those Engines Key features Description Supported DataSource Info Data Type Mapping Sink Options Tips How to Create a MongoDB Data Synchronization Jobs Parameter Int...
  • 1. Access Kyuubi with Hive JDBC and ODBC Drivers

    Access Kyuubi with Hive JDBC and ODBC Drivers Instructions Install Hive JDBC JDBC URL Example Unsupported Hive Features Access Kyuubi with Hive JDBC and ODBC Drivers...
  • DataGrip

    7217 2024-07-05 《Apache Kyuubi 1.9.1》
    What is DataGrip Preparation Get DataGrip And Install Get Kyuubi Started Configurations Start DataGrip Select Database Datasource Driver Generic JDBC Connection Settings I...
  • CDC Ingestion

    7211 2024-06-26 《Apache Amoro 0.6.1》
    Ingest into one table Iceberg format Mixed-Iceberg format Ingest Into multiple tables Iceberg format Mixed-Iceberg format CDC stands for Change Data Capture, which is a broa...
  • Mixed-Iceberg

    7193 2024-06-26 《Apache Amoro 0.6.1》
    Compared with Iceberg format, Mixed-Iceberg format provides more features: Stronger primary key constraints that also apply to Spark OLAP performance that is production-ready fo...
  • Hive Metastore

    Syncing to Hive Metastore Pre-requisites Steps Running sync Register the target table in Hive Metastore Conclusion Syncing to Hive Metastore This document walks through the...
  • Implementations

    7078 2024-05-25 《Apache JDO 3.2.1》
    JDO Reference Implementations Implementations To build and run your JDO application, you need a JDO implementation. This page lists commercial and non-commercial JDO implementat...
  • Config File Encryption And Decryption

    Introduction How to use How to implement user-defined encryption and decryption Introduction In most production environments, sensitive configuration items such as passwords a...