10 Protecting Kafka
This chapters covers
- Security basics and related terminology
- SSL between a cluster and clients
- Access control lists (ACLs)
- Network bandwidth and request rate quotas to limit demands on resources
This chapter focuses on keeping our data secured so that only those that need to read from or write to it have access. Because security is a huge area to cover, in this chapter, we will talk about some basic concepts to get a general background on the options we have in Kafka. Our goal in this chapter is not to set up security, but to learn some different options that you can talk with your security team on researching in the future and get familiar with the concepts. This will not be a complete guide to security in general, but ...
Get Kafka in Action now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.