From 6f12a77308e09cea7f775efefbbc6a2108453394 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Herv=C3=A9?= Date: Fri, 10 Feb 2017 11:22:40 +0100 Subject: [PATCH] Encryption of shuffle files Add a note about shuffle files encryption Shuffle files encryption has been introduced by 4b4e329e49f8af28fa6301bd06c48d7097eaf9e6 and extended for all cluster managers by 8b325b17ecdf013b7a6edcb7ee3773546bd914df. --- docs/security.md | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/docs/security.md b/docs/security.md index 42a09a9148d40..a4796767832b9 100644 --- a/docs/security.md +++ b/docs/security.md @@ -28,11 +28,7 @@ If your applications are using event logging, the directory where the event logs ## Encryption Spark supports SSL for HTTP protocols. SASL encryption is supported for the block transfer service -and the RPC endpoints. - -Encryption is not yet supported for data stored by Spark in temporary local storage, such as shuffle -files, cached data, and other application files. If encrypting this data is desired, a workaround is -to configure your cluster manager to store application data on encrypted disks. +and the RPC endpoints. Shuffle files can also be encrypted if desired. ### SSL Configuration