Devlive 开源社区 本次搜索耗时 0.100 秒,为您找到 2342 个相关结果.
  • Select Version

    Choosing Stack Choosing Version Choosing Repositories redhat7 sles12 ubuntu16 ubuntu18 debian9 Advanced Options More Information In this Step, you will select the softwa...
  • StarRocks

    Support These Engines Key Features Description Sink Options save_mode_create_template table [string] schema_save_mode[Enum] data_save_mode[Enum] custom_sql[String] Data Ty...
  • Google BigQuery

    6093 2024-06-30 《Apache Hudi 0.15.0》
    Sync Modes Manifest File Benefits of using the new manifest approach: View Over Files (Legacy) Configurations Partition Handling Example Hudi tables can be queried from Goo...
  • JDOQL Typed API

    6072 2024-05-25 《Apache JDO 3.2.1》
    JDOQL Typed API Preparation Using Maven Using Eclipse Query Classes Limitations Filtering Ordering Methods Results Parameters Variables If-Then-Else Subqueries Candida...
  • Intro to schema feature

    Why we need schema SchemaOptions table schema_first comment Columns What type supported at now How to declare type supported PrimaryKey ConstraintKeys What constraintType s...
  • FtpFile

    Description Key features Options host [string] port [int] user [string] password [string] path [string] connection_mode [string] custom_filename [boolean] file_name_expres...
  • Kudu

    6049 2024-07-05 《Apache Kyuubi 1.9.1》
    What is Apache Kudu Why Kyuubi on Kudu Kudu Integration with Apache Spark Kudu Integration with Kyuubi Install Kudu Spark Dependency Start Kyuubi Start Beeline Or Other Client...
  • Cache API implementations

    6037 2025-03-15 《Redisson 3.45.0》
    Spring Cache Redisson provides various Spring Cache implementations. Each Cache instance has two important parameters: ttl and maxIdleTime . Data is stored infinitely if these se...
  • Writes

    6034 2024-06-29 《Apache Iceberg 1.5.2》
    Writing with SQL INSERT INTO MERGE INTO MERGE INTO syntax INSERT OVERWRITE Overwrite behavior Dynamic overwrite Static overwrite DELETE FROM UPDATE Writing to Branc...
  • Config File Encryption And Decryption

    Introduction How to use How to implement user-defined encryption and decryption Introduction In most production environments, sensitive configuration items such as passwords a...