6 Pulsar security

This chapter covers

  • Encrypting data transmitted into and out of a Pulsar cluster

  • Enabling client authentication using JSON Web Tokens (JWTs)

  • Encrypting data stored inside Apache Pulsar

This chapter covers how to secure your cluster in order to prevent unauthorized access to the data sent through Apache Pulsar. While the tasks I am going to cover are not important in a development environment, they are critically important for a production deployment to reduce the risk of unauthorized access to sensitive information, ensure data loss prevention, and protect your organization’s public reputation. Modern systems and organizations utilize a combination of security controls and safeguards to provide multiple layers of defense ...

Get Apache Pulsar in Action now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.