Devlive 开源社区 本次搜索耗时 1.288 秒,为您找到 86 个相关结果.
  • Kafka

    Support Those Engines Key Features Description Supported DataSource Info Sink Options Parameter Interpretation Topic Formats Semantics Partition Key Fields Assign Partition...
  • Kafka

    Support Those Engines Key Features Description Supported DataSource Info Source Options Task Example Simple Regex Topic AWS MSK SASL/SCRAM AWS MSK IAM Kerberos Authenticat...
  • Select Version

    Choosing Stack Choosing Version Choosing Repositories redhat7 sles12 ubuntu16 ubuntu18 debian9 Advanced Options More Information In this Step, you will select the softwa...
  • CLI Commands

    2588 2024-06-03 《Docusaurus 1.14.7》
    Running from the command line Using arguments Configuration Reference docusaurus-build docusaurus-examples docusaurus-publish docusaurus-rename-version docusaurus-start ...
  • SLES 12

    步骤 下一步 更多信息 在具有 Internet 访问权限的服务器主机上,使用命令行编辑器执行以下操作: 步骤 以 root 身份登录到您的主机。 将 Ambari 存储库文件下载到安装主机上的目录。 wget - nv https :// username : password@archive . cloudera . com / ...
  • 4. Kyuubi Release Guide

    Kyuubi Release Guide Introduction Overview Decide to release Checklist to proceed to the next step Prepare for the release One-time setup instructions ASF authentication Subve...
  • Release Guide

    2326 2024-07-05 《Apache Kyuubi 1.9.1》
    Introduction Overview Decide to release Checklist to proceed to the next step Prepare for the release One-time setup instructions ASF authentication Java Home Subversion GPG...
  • Introduction

    2324 2024-06-27 《Apache Iceberg 1.5.2》
    User experience Reliability and performance Open standard Apache Iceberg is an open table format for huge analytic datasets. Iceberg adds tables to compute engines including S...
  • Kyuubi High Availability Guide

    2315 2024-07-05 《Apache Kyuubi 1.9.1》
    HA Architecture Key Benefits System-side Deployment Pseudo mode Production mode Client-side Usage How to Hot Upgrade Kyuubi Server As an enterprise-class ad-hoc SQL query s...
  • Config File Encryption And Decryption

    Introduction How to use How to implement user-defined encryption and decryption Introduction In most production environments, sensitive configuration items such as passwords a...