Devlive 开源社区 本次搜索耗时 0.397 秒,为您找到 909 个相关结果.
  • Function

    6046 2024-06-02 《Ramda 0.28.0》
    always comparator compose construct curry useWith flip groupBy identity invoker nAry once pipe tap binary unary ap empty of constructN converge curryN __ bin...
  • Configuration Overview

    6035 2024-06-22 《Apache Accumulo 2.x》
    Client Configuration Server Configuration Default Site System Namespace Zookeeper Considerations Viewing Server Configuration Configuration is managed differently for Accu...
  • Select Version

    Choosing Stack Choosing Version Choosing Repositories redhat7 sles12 ubuntu16 ubuntu18 debian9 Advanced Options More Information In this Step, you will select the softwa...
  • StarRocks

    Support These Engines Key Features Description Sink Options save_mode_create_template table [string] schema_save_mode[Enum] data_save_mode[Enum] custom_sql[String] Data Ty...
  • Google BigQuery

    5958 2024-06-30 《Apache Hudi 0.15.0》
    Sync Modes Manifest File Benefits of using the new manifest approach: View Over Files (Legacy) Configurations Partition Handling Example Hudi tables can be queried from Goo...
  • FtpFile

    Description Key features Options host [string] port [int] user [string] password [string] path [string] connection_mode [string] custom_filename [boolean] file_name_expres...
  • JDOQL Typed API

    5938 2024-05-25 《Apache JDO 3.2.1》
    JDOQL Typed API Preparation Using Maven Using Eclipse Query Classes Limitations Filtering Ordering Methods Results Parameters Variables If-Then-Else Subqueries Candida...
  • Hive Metastore

    Syncing to Hive Metastore Pre-requisites Steps Running sync Register the target table in Hive Metastore Conclusion Syncing to Hive Metastore This document walks through the...
  • Kudu

    5916 2024-07-05 《Apache Kyuubi 1.9.1》
    What is Apache Kudu Why Kyuubi on Kudu Kudu Integration with Apache Spark Kudu Integration with Kyuubi Install Kudu Spark Dependency Start Kyuubi Start Beeline Or Other Client...
  • Config File Encryption And Decryption

    Introduction How to use How to implement user-defined encryption and decryption Introduction In most production environments, sensitive configuration items such as passwords a...