Devlive 开源社区 本次搜索耗时 0.120 秒,为您找到 1878 个相关结果.
  • Google BigQuery

    5339 2024-06-30 《Apache Hudi 0.15.0》
    Sync Modes Manifest File Benefits of using the new manifest approach: View Over Files (Legacy) Configurations Partition Handling Example Hudi tables can be queried from Goo...
  • FtpFile

    Description Key features Options host [string] port [int] user [string] password [string] path [string] connection_mode [string] custom_filename [boolean] file_name_expres...
  • Introduction

    5275 2024-06-27 《Apache Iceberg 1.5.2》
    User experience Reliability and performance Open standard Apache Iceberg is an open table format for huge analytic datasets. Iceberg adds tables to compute engines including S...
  • 名词解释

    名词解释 模块介绍 在对 Apache DolphinScheduler 了解之前,我们先来认识一下调度系统常用的名词 名词解释 DAG: 全称 Directed Acyclic Graph,简称 DAG。工作流中的 Task 任务以有向无环图的形式组装起来,从入度为零的节点进行拓扑遍历,直到无后继节点为止。举例如下图: 流程定义 :通过拖...
  • Quickstart

    5266 2024-05-24 《Apache Superset 4.0.1》
    1. Get Superset 2. Start Superset 3. Create an account 4. Configure Superset 5. Start using Superset 🎉 Congratulations! Superset is now up and running on your machine! 🎉 Wrap...
  • Managing Optimizers

    5263 2024-06-26 《Apache Amoro 0.6.1》
    Optimizer container Local container Flink container External container Optimizer group Add optimizer group Edit optimizer group Remove optimizer group Optimizer Scale-out a...
  • 告警自愈模块

    概述 架构 项目地址 安装启动 初始化 sql 启动 server 启动agentd Ibex 是告警自愈功能依赖的模块,提供一个批量执行命令的通道,可以做到在告警的时候自动去目标机器执行脚本,如果大家没有此需求,无需阅读本节内容。 概述 所谓的告警自愈,典型手段是在告警触发时自动回调某个 webhook 地址,在这个 webhook 里...
  • Configuration

    5248 2024-06-29 《Apache Iceberg 1.5.2》
    Table properties Read properties Write properties Table behavior properties Reserved table properties Compatibility flags Catalog properties Lock catalog properties Hadoop ...
  • Clickhouse

    Support Those Engines Key Features Description Supported DataSource Info Data Type Mapping Sink Options How to Create a Clickhouse Data Synchronization Jobs Tips Clickhouse...
  • Config File Encryption And Decryption

    Introduction How to use How to implement user-defined encryption and decryption Introduction In most production environments, sensitive configuration items such as passwords a...