December 2021
Intermediate to advanced
214 pages
4h 3m
English
The previous chapters worked with Apache Pulsar using the HTTP admin API and Pulsar protocol. You deployed functions, created producers, and created sinks and subscribers using these connections. But until now, you have been working purely with plain unencrypted traffic: HTTP or TCP. However, you often need to securely expose endpoints over the Internet for any production usage over TLS. This chapter looks at the capabilities Pulsar provides for encrypting ...