all any append concat drop zipWith zip xprod uniq filter find flatten head indexOf join lastIndexOf map nth pluck prepend range reduce reduceRight reject re...
Kerberos Overview Enable Kerberos Authentication Create a Kerberos principal and keytab Enable Hadoop Impersonation # Configure the authentication properties Refresh all th...
Pre-requisites Steps Create BigLake Catalog Create BigLake Database Running sync Validating the results Conclusion This document walks through the steps to register a OneTa...
Support Those Engines Key features Description Options host [string] port [int] user [string] password [string] path [string] file_format_type [string] connection_mode [st...
Persist Objects Retrieve Objects Update Objects Delete Objects Making an object transient Any JDO-enabled application will require at least one PersistenceManager (PM). This ...
Instructions Install Hive JDBC JDBC URL Example Instructions Kyuubi is fully compatible with Hive JDBC and ODBC drivers that let you connect to popular Business Intelligence ...
Open-Source Software Notice Apache-2.0 MIT and Apache-2.0 MIT BSD-3-Clause BSD-2-Clause MPL-2.0 Open-Source Software Notice The project is built on and with the aid of the...
Schema evolution Correctness Partition evolution Sort order evolution Iceberg supports in-place table evolution . You can evolve a table schema just like SQL — even in nested...
Kyuubi Authentication Mechanism Using KERBEROS Kyuubi Authentication Mechanism In a secure cluster, services should be able to identify and authenticate callers. As the ...