- Hadoop Cluster Deployment
- Danil Zburivsky
- 223字
- 2021-07-21 18:16:40
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "You need to specify the connection string for all those Metastores in the hive.metastore.uris
variable."
A block of code is set as follows:
{ "access_id": "Your Access Key ID", "private_key": "Your AWS Secret Access Key", "keypair": "emr-keys", "key-pair-file": "/path/to/key-file/emr-keys.pem", "log_uri": "s3n://emr-logs-x123/", "egion": "us-east-1" }
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
{
"access_id": "Your Access Key ID",
"private_key": "Your AWS Secret Access Key",
"keypair": "emr-keys",
"key-pair-file": "/path/to/key-file/emr-keys.pem",
"log_uri": "s3n://emr-logs-x123/",
"egion": "us-east-1"
}
Any command-line input or output is written as follows:
# hdfs dfs -mkdir /warehouse # hdfs dfs -chmod a+w /warehouse
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "clicking the Next button moves you to the next screen".
- 自愿審計(jì)動(dòng)機(jī)與質(zhì)量研究:基于我國(guó)中期財(cái)務(wù)報(bào)告審計(jì)的經(jīng)驗(yàn)證據(jù)
- 基于價(jià)值增值的治理導(dǎo)向型內(nèi)部審計(jì)研究
- 注冊(cè)會(huì)計(jì)師全國(guó)統(tǒng)一考試專用教材:審計(jì)
- Securing Hadoop
- Learning Microsoft Azure
- OAuth 2.0 Identity and Access Management Patterns
- vSphere Design Best Practices
- 風(fēng)險(xiǎn)導(dǎo)向?qū)徲?jì)準(zhǔn)則實(shí)施效果研究
- 政策建模技術(shù):CGE模型的理論與實(shí)現(xiàn)
- 內(nèi)部審計(jì)情景案例:理解審計(jì)行為,辨析審計(jì)決策
- 審計(jì)定價(jià)問題研究
- 2014年注冊(cè)會(huì)計(jì)師(CPA)全國(guó)統(tǒng)考專用輔導(dǎo)教材系列:審計(jì)(名師解讀版)
- Oracle Enterprise Manager 12c Administration Cookbook
- 政府審計(jì)基本理論探索
- Hyper-V Best Practices