Devlive 开源社区 本次搜索耗时 0.639 秒,为您找到 701 个相关结果.
  • Flink Writes

    3031 2024-06-29 《Apache Iceberg 1.5.2》
    Writing with SQL INSERT INTO INSERT OVERWRITE UPSERT Write with Avro GenericRecord Branch Writes Metrics Options Write options Notes Iceberg support batch and streami...
  • Getting Started

    3027 2024-06-29 《Apache Iceberg 1.5.2》
    Using Iceberg in Spark 3 Adding catalogs Creating a table Writing Reading Next steps The latest version of Iceberg is 1.5.2 . Spark is currently the most feature-rich compu...
  • Intro To Connector V2 Features

    Differences Between Connector V2 And Connector v1 Source Connector Features exactly-once column projection batch stream parallelism support user-defined split support multip...
  • Procedures

    2995 2024-06-29 《Apache Iceberg 1.5.2》
    Usage Named arguments Positional arguments Snapshot management rollback_to_snapshot Usage Output Example Change Data Capture create_changelog_view Usage Output Examples...
  • Installation

    2994 2024-05-20 《Apache Answer 1.3.0》
    Start Answer Install steps Step 1: Choose the language Step 2: Config database Step 3: Create configuration file Step 4: Fill in basic information Step 5: Complete Start A...
  • Ubuntu 18

    步骤 下一步 更多信息 在可以访问 Internet 的服务器主机上,使用命令行编辑器执行以下操作 步骤 在安装 Ambari 之前,您必须更新 ambari.list 文件中的 username 和 password 。运行以下命令: vi /etc/apt/sources.list.d/ambari.list 例如,输出显示以...
  • Debian 9

    Steps Next Step More Information On a server host that has Internet access, use a command line editor to perform the following Steps Before installing Ambari, you must upda...
  • 设置选项

    更多信息 以下选项经常用于 Ambari Server 设置。 -j (or —java-home) 指定要在 Ambari Server 和集群中的所有主机上使用的 JAVA_HOME 路径。默认情况下,如果您不指定此选项,Ambari Server 安装程序会将 Oracle JDK 1.8 二进制文件和随附的 Java 加密扩展 (JCE) ...
  • Set Up the Ambari Server

    More Information Before starting the Ambari Server, you must set up the Ambari Server. Setup configures Ambari to talk to the Ambari database, installs the JDK and allows you to...
  • Config File Encryption And Decryption

    Introduction How to use How to implement user-defined encryption and decryption Introduction In most production environments, sensitive configuration items such as passwords a...