Hi Yufei
I created https://github.com/apache/iceberg/issues/15314.
There is a workaround till this arrives:
Compute clients can do:
catalog.add_encryption_key(table, new_key_id)
catalog.update_table_properties(table, {"encryption.current-key-id":
new_key_id})
It is not atomic, but it gets us past this as a blocker.
--
Anand
From: Yufei Gu <[email protected]>
Date: Thursday, February 12, 2026 at 9:50 PM
To: Anand Kumar Sankaran <[email protected]>
Cc: [email protected] <[email protected]>
Subject: Re: RFC for table-level encryption support (#2829)
This Message Is From an External Sender
This message came from outside your organization.
Report
Suspicious<https://us-phishalarm-ewt.proofpoint.com/EWT/v1/Iz9xO38YGHZK!YhNDZABkHi1B67qNGoJr0iIMV2VdHYQqj_G7Q-s5K2DOOMvKALEPrU2GvudX_VARaGKk53RaE1sT0QxNtfM-3grh0_X_JIJzYL3SqsjXwSlxQntfTMDkgS4kNxDzCPK2$>
Thanks Anand for addressing the feedback.
1. I'd recommend adding a Rotate encryption key REST endpoint to IRC, so that
it works across engines. If IRC does not take it, we can consider to define a
Polaris specific approach.
2. The checksum is acceptable to me as an initial step., but may not be
sufficient if users want to hide it, as it is currently plain text. It's
reasonable as phase one. We can continue exploring options such as making
metadata.json optional or leveraging storage level permissions for stronger
protection.
3. Will take a close look later
4. It makes sense to take a phased-in approach.
Yufei
On Thu, Feb 12, 2026 at 6:39 PM Anand Kumar Sankaran
<[email protected]<mailto:[email protected]>> wrote:
Yufei, Mike, Prashant, Russell
Thank for you for your detailed feedback. I have updated the
RFC<https://urldefense.com/v3/__https://docs.google.com/document/d/1f4Mgg5W1t4NT6R7KLq5K3S4pHlAwYwXTFwUR9uNNpSU/edit?usp=sharing__;!!Iz9xO38YGHZK!7SN7TreU_dJsdmWKuRe8vMFJkl-AZH6mu-_QhrmHet6I1ReHkYcRbIncpue3D5OzVbAOcDSQJZpKaq0fDiXap80$>
based on your feedback. I request you to look at the RFC again. I marked some
comments as resolved just so that I know what I need to focus on next, please
feel free to reopen.
I think we need agreement on the following:
1.
Rotate encryption key REST endpoint: Do we need to wait for IRC to add this?
There is an old PR #2373 that was closed as not
planned<https://urldefense.com/v3/__https://github.com/apache/iceberg/issues/2373__;!!Iz9xO38YGHZK!7SN7TreU_dJsdmWKuRe8vMFJkl-AZH6mu-_QhrmHet6I1ReHkYcRbIncpue3D5OzVbAOcDSQJZpKaq0fNqJgUeg$>.
If we want to wait for IRC, can this work still be done without the REST
endpoint?
2.
Is the proposal for protecting metadata.json using checksum
sufficient<https://urldefense.com/v3/__https://docs.google.com/document/d/1f4Mgg5W1t4NT6R7KLq5K3S4pHlAwYwXTFwUR9uNNpSU/edit?tab=t.0*heading=h.hj35el4zxapx__;Iw!!Iz9xO38YGHZK!7SN7TreU_dJsdmWKuRe8vMFJkl-AZH6mu-_QhrmHet6I1ReHkYcRbIncpue3D5OzVbAOcDSQJZpKaq0fOgsjDUI$>
and acceptable?
3.
Is the proposed Key Rotation
semantics<https://urldefense.com/v3/__https://docs.google.com/document/d/1f4Mgg5W1t4NT6R7KLq5K3S4pHlAwYwXTFwUR9uNNpSU/edit?tab=t.0*heading=h.3p1v44t5whpl__;Iw!!Iz9xO38YGHZK!7SN7TreU_dJsdmWKuRe8vMFJkl-AZH6mu-_QhrmHet6I1ReHkYcRbIncpue3D5OzVbAOcDSQJZpKaq0f4b9qPf4$>
acceptable?
4.
Can snapshot-to-snapshot migration path be deferred to another follow up RFC /
design?
In general, this feels like a lot of work to be done in one go. I would
appreciate any guidance on how to break this down into smaller chunks to make
progress.
Thanks again.
—
Anand
From: Yufei Gu <[email protected]<mailto:[email protected]>>
Date: Monday, February 9, 2026 at 10:56 AM
To: [email protected]<mailto:[email protected]>
<[email protected]<mailto:[email protected]>>
Cc: Anand Kumar Sankaran
<[email protected]<mailto:[email protected]>>
Subject: Re: RFC for table-level encryption support (#2829)
This Message Is From an External Sender
This message came from outside your organization.
Report
Suspicious<https://us-phishalarm-ewt.proofpoint.com/EWT/v1/Iz9xO38YGHZK!YhNDZABkHi1B6_pOVSGpMMuQc0CmP3OULNHOAUHUwYVTgbsx_oh5Ze7QOuU7LW1BuqjeDCi1LpG0R1DEuMHUCxOCo0hQG1mi4VmtapPKGSElXop473V-D5mKBlzl65oK$>
Hi Anand, thanks for the RFC. I think it's the right direction, which may
significantly promote the use of the Iceberg Table encryption. Left some
comments. I think we still need to determine which part would be better suited
for IRC and how we will protect metadata.json better.
Yufei
On Mon, Feb 9, 2026 at 9:33 AM Michael Collado
<[email protected]<mailto:[email protected]>> wrote:
Very awesome to see. I left a few comments in the doc.
Mike
On Mon, Feb 9, 2026 at 8:12 AM Anand Kumar Sankaran via dev <
[email protected]<mailto:[email protected]>> wrote:
> Hi all
>
> Please find an RFC for table-level encryption support.
> https://docs.google.com/document/d/1f4Mgg5W1t4NT6R7KLq5K3S4pHlAwYwXTFwUR9uNNpSU/edit?usp=sharing<https://urldefense.com/v3/__https://docs.google.com/document/d/1f4Mgg5W1t4NT6R7KLq5K3S4pHlAwYwXTFwUR9uNNpSU/edit?usp=sharing__;!!Iz9xO38YGHZK!_Cc4ra1dyOvDg7UuabtBS1JqIdb7-ZLvhB0sCEvp1mNohZDTHqUj4QdsSiYNdc52VM7togKNDyMdHIKbbRsb2BI$>
>
> The feature request for this feature can be found here:
> https://github.com/apache/polaris/issues/2829<https://urldefense.com/v3/__https://github.com/apache/polaris/issues/2829__;!!Iz9xO38YGHZK!_Cc4ra1dyOvDg7UuabtBS1JqIdb7-ZLvhB0sCEvp1mNohZDTHqUj4QdsSiYNdc52VM7togKNDyMdHIKb4Th5C-Q$>.
>
> I appreciate any feedback and critical reviews from you.
>
> —
> Anand
>