Devlive 开源社区 本次搜索耗时 0.571 秒,为您找到 441 个相关结果.
  • RHEL/CentOS/Oracle Linux 7

    Steps Next Step More Information On a server host that has Internet access, use a command line editor to perform the following Steps Before installing Ambari, you must upda...
  • LocalFile

    Description Key Features Options path [string] custom_filename [boolean] file_name_expression [string] filename_time_format [string] file_format_type [string] field_delimite...
  • MongoDB

    Support Those Engines Key features Description Supported DataSource Info Data Type Mapping Sink Options Tips How to Create a MongoDB Data Synchronization Jobs Parameter Int...
  • 1. Access Kyuubi with Hive JDBC and ODBC Drivers

    Access Kyuubi with Hive JDBC and ODBC Drivers Instructions Install Hive JDBC JDBC URL Example Unsupported Hive Features Access Kyuubi with Hive JDBC and ODBC Drivers...
  • Hive Metastore

    Syncing to Hive Metastore Pre-requisites Steps Running sync Register the target table in Hive Metastore Conclusion Syncing to Hive Metastore This document walks through the...
  • CDC Ingestion

    7526 2024-06-26 《Apache Amoro 0.6.1》
    Ingest into one table Iceberg format Mixed-Iceberg format Ingest Into multiple tables Iceberg format Mixed-Iceberg format CDC stands for Change Data Capture, which is a broa...
  • Mixed-Iceberg

    7522 2024-06-26 《Apache Amoro 0.6.1》
    Compared with Iceberg format, Mixed-Iceberg format provides more features: Stronger primary key constraints that also apply to Spark OLAP performance that is production-ready fo...
  • DataGrip

    7484 2024-07-05 《Apache Kyuubi 1.9.1》
    What is DataGrip Preparation Get DataGrip And Install Get Kyuubi Started Configurations Start DataGrip Select Database Datasource Driver Generic JDBC Connection Settings I...
  • Implementations

    7410 2024-05-25 《Apache JDO 3.2.1》
    JDO Reference Implementations Implementations To build and run your JDO application, you need a JDO implementation. This page lists commercial and non-commercial JDO implementat...
  • Config File Encryption And Decryption

    Introduction How to use How to implement user-defined encryption and decryption Introduction In most production environments, sensitive configuration items such as passwords a...