Devlive 开源社区 本次搜索耗时 0.687 秒,为您找到 465 个相关结果.
  • AWS

    3943 2025-03-11 《Apache Iceberg 1.8.1》
    Iceberg AWS Integrations Iceberg provides integration with different AWS services through the iceberg-aws module. This section describes how to use Iceberg with AWS. Enabling ...
  • Arrays

    3938 2024-06-07 《Underscore.js 1.13.6》
    first initial last rest flatten without union intersection difference uniq zip unzip object chunk indexOf lastIndexOf sortedIndex findIndex findLastIndex range ...
  • GitHub 趋势日报 (2025年05月12日)

    📈 今日整体趋势 Top 10 📊 分语言趋势 Top 5 C++ PHP TypeScript C Dart Vim Script Go Java Lua MDX C Markdown HTML Swift Kotlin Dockerfile Ruby Python PowerShell Rust CMake J...
  • SSO Integration

    Background SSO login workflow How to enable SSO login Note Background As an enterpise practice, it’s common to apply Single sign-on (SSO) across all applications, so that use...
  • Paimon

    Description Key features Options Examples Single table Single table(Specify hadoop HA config and kerberos config) Single table with write props of paimon Multiple table P...
  • Installing

    3913 2024-07-05 《Apache Kyuubi 1.9.1》
    Pre-install Install Configure Settings for Connecting Ranger Admin ranger-spark-security.xml Using Macros in Row Level Filters Showing all disallowed privileges ranger-spark-a...
  • Evolution

    3900 2024-06-29 《Apache Iceberg 1.5.2》
    Schema evolution Correctness Partition evolution Sort order evolution Iceberg supports in-place table evolution . You can evolve a table schema just like SQL — even in nested...
  • DB2

    Support Those Engines Description Using Dependency For Spark/Flink Engine For SeaTunnel Zeta Engine Key Features Supported DataSource Info Data Type Mapping Sink Options Ti...
  • Debian 9

    步骤 下一步 更多信息 在可以访问 Internet 的服务器主机上,使用命令行编辑器执行以下操作 步骤 在安装 Ambari 之前,您必须更新 ambari.list 文件中的 username 和 password 。运行以下命令: vi /etc/apt/sources.list.d/ambari.list 例如,输出显示以...
  • 1. Authentication

    Kyuubi Authentication Mechanism Using KERBEROS Kyuubi Authentication Mechanism In a secure cluster, services should be able to identify and authenticate callers. As the ...