Explanation¶
The pages in this section aim to provide additional context and deeper understanding of foundational topics and concepts relevant to Charmed Apache Spark.
See Components overview page to see explanation of the Charmed Apache Spark solution components.
Security¶
Secure deployments of Charmed Apache Spark can be achieved through using recommended configurations, including setting up encryption and authentication. For more details, see Security topic overview and Cryptography usage explanation pages.
Other topics¶
For hierarchical configuration properties explanation, see the Configuration management page.
Cluster operations monitoring is explained in the Monitoring explanation page.
To read more about our usage of Apache Spark and other relevant trademarks, see the Trademarks explanation page.