Devlive 开源社区 本次搜索耗时 0.684 秒,为您找到 72 个相关结果.
  • Setup

    929 2024-06-21 《Apache Accumulo 2.x》
    User Manual (2.x and 3.x) Master/Manager naming Setup for testing or development Setup for Production Configuring Accumulo Initialization Run Accumulo Run individual Accumulo...
  • 4. Kyuubi Release Guide

    Kyuubi Release Guide Introduction Overview Decide to release Checklist to proceed to the next step Prepare for the release One-time setup instructions ASF authentication Subve...
  • 1. Terminologies

    900 2024-07-05 《Apache Kyuubi 1.9.1》
    Kyuubi JDBC Apache Hive Apache Thrift Server ServerSpace Engine EngineSpace Apache Spark Multi Tenancy High Availability / Load Balance Apache Zookeeper Apache Curator ...
  • Kafka

    Support Those Engines Key Features Description Supported DataSource Info Source Options Task Example Simple Regex Topic AWS MSK SASL/SCRAM AWS MSK IAM Kerberos Authenticat...
  • Kafka

    Support Those Engines Key Features Description Supported DataSource Info Sink Options Parameter Interpretation Topic Formats Semantics Partition Key Fields Assign Partition...
  • SLES 12

    Steps Next Step More Information On a server host that has Internet access, use a command line editor to perform the following: Steps Log in to your host as root . Download...
  • Select Version

    Choosing Stack Choosing Version Choosing Repositories redhat7 sles12 ubuntu14 ubuntu16 ubuntu18 debian9 Advanced Options More Information In this Step, you will select ...
  • Notice

    789 2024-05-20 《Apache Answer 1.3.0》
    Open-Source Software Notice Apache-2.0 MIT and Apache-2.0 MIT BSD-3-Clause BSD-2-Clause MPL-2.0 Open-Source Software Notice The project is built on and with the aid of the...
  • Kyuubi v.s. Spark Thrift JDBC/ODBC Server (STS)

    784 2024-07-05 《Apache Kyuubi 1.9.1》
    Introductions Barriers to common Spark job usage High Barrier Insecurity Compatibility Bootstrap latency Limitations of Spark ThriftServer Driver Bottleneck Resource isolati...
  • Config File Encryption And Decryption

    Introduction How to use How to implement user-defined encryption and decryption Introduction In most production environments, sensitive configuration items such as passwords a...