当前位置:网站首页>Flink面试常见的25个问题(无答案)
Flink面试常见的25个问题(无答案)
2022-07-26 22:40:00 【me凡】
- flink和spark streaming的优缺比较
- Flink on Yarn任务提交流程
- Flink Sql的执行过程
- Flink所使用的版本
- Flink 内存模型
- Flink Watermark机制
- Flink CheckPoint机制?kafka exactly-once的两阶段提?
- Flink 状态存储backend类型?RocksDBStateBendback的使用场景,优缺点?Flink1.14版本状态存储类型的变化 ?
- FlinkSql 无界流聚合中mini-batch的使用优缺点
- Flink operater chain算子链的机制及优点
- Flink异常后重启策略(固定间隔,失败频率,不重启)
- Flink设置并行度的几种方式(配置文件,客户端,操作算子,执行环境)
- Flink 反压问题产生原因及如何定位排查
- Flink checkpoint失败原因及如何定位排查
- Flink数据倾斜有什么影响?如何处理数据倾斜?
- Flink数据流向(source数据源,sink数据库等,为啥要选择这个sink的数据库,对这个数据库有多少了解)
- Flink 物理执行流程(StreamGraph -> JobGraph -> ExecutionGraph -> 物理执行图)
- Flink 1.14中的新增功能点
- Flink中常用的算子有哪些,shuffer类的算子有哪些?
- 是否使用过广播变量,使用过?什么场景
- Flink state的类型(keyState,operaterState),key state有哪些?
- flink join类型有哪些?
- flink 测输出流作用有哪些?
- flink slot和parallelism区别? slot是指taskmanager的并发执行能力,parallelism是指taskmanager实际使用的并发能力
- flink cdc原理
- 日常学习有哪些途径?
欢迎留言区补充更多可能问到的问题,上述问题如找不到答案也可在评论区留言
边栏推荐
- C language is more than a variety of descriptions of size. Don't stick to one way of writing
- Application of encoding in XSS
- [qt] solve the problem of Chinese garbled code
- [ciscn2019 finals Day2 web1]easyweb
- CUDA version difference between NVIDIA SMI and nvcc -v
- Use csrftester to automatically detect CSRF vulnerabilities
- JSCORE day_ 04(7.5)
- 【4.3 欧拉函数详解】
- Two methods of automated testing XSS vulnerabilities using burpsuite
- [2. TMUX operation]
猜你喜欢

Linux系统中安装Redis-7.0.4
![[CTF攻防世界] WEB区 关于备份的题目](/img/af/b78eb3522160896d77d9e82f7e7810.png)
[CTF攻防世界] WEB区 关于备份的题目

10 Web APIs
![[CISCN2019 华东南赛区]Double Secret](/img/51/9597968ff1747a67e10a70b785ee9f.png)
[CISCN2019 华东南赛区]Double Secret
![[4.9 detailed explanation of inclusion exclusion principle]](/img/c9/673507abab48a1593486c2901adac9.png)
[4.9 detailed explanation of inclusion exclusion principle]

Use csrftester to automatically detect CSRF vulnerabilities

Application of encoding in XSS
![[watevrCTF-2019]Cookie Store](/img/24/8baaa1ac9daa62c641472d5efac895.png)
[watevrCTF-2019]Cookie Store
![[ciscn2019 North China Day1 web5] cyberpunk](/img/84/b186adc8becfc9b3def7dfd8e4cd41.png)
[ciscn2019 North China Day1 web5] cyberpunk
![[HFCTF2020]EasyLogin](/img/23/91912865a01180ee191a513be22c03.png)
[HFCTF2020]EasyLogin
随机推荐
[ciscn2019 North China division Day1 web2]ikun
JSCORE day_ 02(7.1)
并行MPI程序传递发送消息
Leetcode 301 week
Medical data of more than 4000 people has been exposed for 16 years
[watevrCTF-2019]Cookie Store
Detailed explanation of CSRF forged user request attack
logback自定义MessageConverter
[HITCON 2017]SSRFme
Install redis-7.0.4 in Linux system
Search engine realizes keyword highlighting
Export and import in ES6
【 Educational Codeforces Round 132 (Rated for Div. 2) A·B·C】
[4.9 detailed explanation of inclusion exclusion principle]
[interview: concurrent Article 16: multithreading: detailed explanation of wait/notify] principle and wrong usage (false wake-up, etc.)
[Network Research Institute] attackers scan 1.6 million WordPress websites to find vulnerable plug-ins
[By Pass] WAF 的绕过方式
DOM day_ 01 (7.7) introduction and core operation of DOM
C language shutdown applet
[qt] solve the problem of Chinese garbled code