Clarification on Spooling Protocol Security and Encryption Flow #28032
Unanswered
jonsnowseven
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello everyone,
I’m currently exploring the implementation details of the spooling protocol in Trino. I have a few questions regarding the protocol.spooling.shared-secret-key configuration and how it interacts with different storage layers and encryption settings.
Could someone clarify the following?
protocol.spooling.shared-secret-keyused exclusively by the Trino cluster for internal data encryption/decryption?STORAGE?fs.segment.encryption=false? If this is disabled, will requests to S3 still respect the S3-native default encryption keys (SSE-S3orSSE-KMS)?I'm trying to ensure a clear understanding of the data-at-rest security posture when spooling is enabled. Any insights or documentation pointers would be greatly appreciated!
Thank you!
Beta Was this translation helpful? Give feedback.
All reactions