Starburst Enterprise Presto Documentation#
- 1. Overview
- 2. Installation
- 2.1. Software Requirements
- 2.2. Starburst Enterprise Presto License
- 2.3. Deploying Presto
- 2.4. Docker Container
- 2.5. RPM Package and Presto Admin
- 2.6. Microsoft Azure
- 2.7. Presto Verifier
- 2.8. Benchmark Driver
- 2.9. Command Line Interface
- 2.10. JDBC Driver
- 2.11. Starburst JDBC Driver
- 2.12. Starburst ODBC Driver
- 2.13. Starburst Power BI DirectQuery Driver
- 3. Mission Control
- 4. Amazon Web Services
- 4.1. Getting Started on AWS
- 4.2. Overview
- 4.3. Prerequisites
- 4.4. Deploying Presto
- 4.5. Configuring Presto
- 4.6. Configuring Hive Metastore
- 4.7. Accessing the Presto Cluster
- 4.8. Querying Presto
- 4.9. Querying AWS S3
- 4.10. AWS Glue Support
- 4.11. Using Apache Superset
- 4.12. Manual Scaling a Running Presto Cluster
- 4.13. Auto Scaling a Presto Cluster
- 4.14. Coordinator High Availability
- 4.15. Secrets
- 4.16. Integration with CloudWatch Logs
- 4.17. Integration with CloudWatch Metrics
- 4.18. Troubleshooting
- 4.19. Uninstalling Presto
- 4.20. AWS AMI/CFT Release Notes
- 5. Kubernetes
- 5.1. Overview
- 5.2. Prerequisites
- 5.3. Deployment of Presto on Kubernetes
- 5.4. Presto Kubernetes Resource
- 5.5. Querying Presto
- 5.6. Customizing Presto Docker Images
- 5.7. Horizontal Scaling
- 5.8. Secrets
- 5.9. Ranger
- 5.10. Using Amazon Elastic Kubernetes Service
- 5.11. GCP Marketplace
- 5.12. Using Google Kubernetes Engine
- 5.13. Using Microsoft Azure Kubernetes Service
- 5.14. Using Red Hat OpenShift
- 5.15. Kubernetes Resources Release Notes
- 6. Security
- 6.1. Coordinator Kerberos Authentication
- 6.2. CLI Kerberos Authentication
- 6.3. LDAP Authentication
- 6.4. Password File Authentication
- 6.5. User Mapping
- 6.6. Java Keystores and Truststores
- 6.7. Built-in System Access Control
- 6.8. LDAP group provider
- 6.9. Secrets
- 6.10. Secure Internal Communication
- 6.11. Query Audit
- 6.12. Event Logger
- 6.13. Role Based Access Control
- 6.14. System Level Security with Apache Ranger
- 6.15. Hive Level Security with Apache Ranger
- 6.16. Hive Level Security with Apache Sentry
- 6.17. User Impersonation
- 6.18. Kerberos Credential Passthrough
- 6.19. Okta Authentication
- 7. Administration
- 8. Query Optimizer
- 9. Connectors
- 9.1. Starburst Connectors Overview
- 9.2. Starburst DB2 Connector (license required)
- 9.3. Starburst Generic JDBC Connector
- 9.4. Starburst Hive Connector
- 9.5. Starburst Hive Connector Security
- 9.6. Azure Storage Support for the Hive Connector
- 9.7. IBM Cloud Object Storage Support for the Hive Connector
- 9.8. Starburst Hive MapR Connector (license required)
- 9.9. Starburst Delta Lake Connector (license required)
- 9.10. Starburst Kafka Connector
- 9.11. Starburst MySQL Connector
- 9.12. Starburst Oracle Connector (license required)
- 9.13. Starburst PostgreSQL Connector
- 9.14. Starburst Snowflake Connector (license required)
- 9.15. Starburst SQL Server Connector
- 9.16. Starburst Teradata Connector (license required)
- 9.17. Starburst Teradata Parallel Direct Connector (license required)
- 9.18. Accumulo Connector
- 9.19. BigQuery Connector
- 9.20. Black Hole Connector
- 9.21. Cassandra Connector
- 9.22. Elasticsearch Connector
- 9.23. Google Sheets Connector
- 9.24. Hive Connector
- 9.25. Caching for Distributed Storage
- 9.26. Hive Connector GCS Tutorial
- 9.27. Hive Security Configuration
- 9.28. JMX Connector
- 9.29. Kafka Connector
- 9.30. Kafka Connector Tutorial
- 9.31. Kinesis Connector
- 9.32. Kudu Connector
- 9.33. Local File Connector
- 9.34. Memory Connector
- 9.35. MongoDB Connector
- 9.36. MemSQL Connector
- 9.37. MySQL Connector
- 9.38. Phoenix Connector
- 9.39. PostgreSQL Connector
- 9.40. Redis Connector
- 9.41. Redshift Connector
- 9.42. SQL Server Connector
- 9.43. System Connector
- 9.44. Thrift Connector
- 9.45. TPCDS Connector
- 9.46. TPCH Connector
- 10. Functions and Operators
- 10.1. Logical Operators
- 10.2. Comparison Functions and Operators
- 10.3. Conditional Expressions
- 10.4. Lambda Expressions
- 10.5. Conversion Functions
- 10.6. Mathematical Functions and Operators
- 10.7. Bitwise Functions
- 10.8. Decimal Functions and Operators
- 10.9. String Functions and Operators
- 10.10. Regular Expression Functions
- 10.11. Binary Functions and Operators
- 10.12. JSON Functions and Operators
- 10.13. Date and Time Functions and Operators
- 10.14. Aggregate Functions
- 10.15. Window Functions
- 10.16. Array Functions and Operators
- 10.17. Map Functions and Operators
- 10.18. URL Functions
- 10.19. Geospatial Functions
- 10.20. HyperLogLog Functions
- 10.21. Quantile Digest Functions
- 10.22. UUID Functions
- 10.23. Color Functions
- 10.24. Session Information
- 10.25. Teradata Functions
- 10.26. Oracle Functions
- 10.27. List of Functions and Operators
- 11. SQL Language
- 12. SQL Statement Syntax
- 12.1. ALTER SCHEMA
- 12.2. ALTER TABLE
- 12.3. ALTER VIEW
- 12.4. ANALYZE
- 12.5. CALL
- 12.6. COMMENT
- 12.7. COMMIT
- 12.8. CREATE ROLE
- 12.9. CREATE SCHEMA
- 12.10. CREATE TABLE
- 12.11. CREATE TABLE AS
- 12.12. CREATE VIEW
- 12.13. DEALLOCATE PREPARE
- 12.14. DELETE
- 12.15. DESCRIBE
- 12.16. DESCRIBE INPUT
- 12.17. DESCRIBE OUTPUT
- 12.18. DROP ROLE
- 12.19. DROP SCHEMA
- 12.20. DROP TABLE
- 12.21. DROP VIEW
- 12.22. EXECUTE
- 12.23. EXPLAIN
- 12.24. EXPLAIN ANALYZE
- 12.25. GRANT
- 12.26. GRANT ROLES
- 12.27. INSERT
- 12.28. PREPARE
- 12.29. RESET SESSION
- 12.30. REVOKE
- 12.31. REVOKE ROLES
- 12.32. ROLLBACK
- 12.33. SELECT
- 12.34. SET ROLE
- 12.35. SET SESSION
- 12.36. SHOW CATALOGS
- 12.37. SHOW COLUMNS
- 12.38. SHOW CREATE TABLE
- 12.39. SHOW CREATE VIEW
- 12.40. SHOW FUNCTIONS
- 12.41. SHOW GRANTS
- 12.42. SHOW ROLE GRANTS
- 12.43. SHOW ROLES
- 12.44. SHOW SCHEMAS
- 12.45. SHOW SESSION
- 12.46. SHOW STATS
- 12.47. SHOW TABLES
- 12.48. START TRANSACTION
- 12.49. USE
- 12.50. VALUES
- 13. Migration
- 14. Developer Guide
- 15. Versions
- 16. Release Notes