Remove apache-kafka-security-authorization-authentication-encryption
article thumbnail

Security Reference Architecture Summary for Cloudera Data Platform

Cloudera

This blog will summarise the security architecture of a CDP Private Cloud Base cluster. The architecture reflects the four pillars of security engineering best practice, Perimeter, Data, Access and Visibility. CDP Private Cloud Base offers 3 levels of security that implement these features. Non-secure.

article thumbnail

How to configure clients to connect to Apache Kafka Clusters securely – Part 1: Kerberos

Cloudera

This is the first installment in a short series of blog posts about security in Apache Kafka. In this article we will explain how to configure clients to authenticate with clusters using different authentication mechanisms. SASL/GSSAPI – Kerberos authentication. Kerberos Authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to configure clients to connect to Apache Kafka Clusters securely – Part 4: TLS Client Authentication

Cloudera

In the previous posts in this series, we have discussed Kerberos , LDAP and PAM authentication for Kafka. In this post we will look into how to configure a Kafka cluster and client to use a TLS client authentication. TLS is assumed to be enabled for the Apache Kafka cluster, as it should be for every secure cluster.

article thumbnail

Using Kafka Connect Securely in the Cloudera Data Platform

Cloudera

In this post I will demonstrate how Kafka Connect is integrated in the Cloudera Data Platform (CDP), allowing users to manage and monitor their connectors in Streams Messaging Manager while also touching on security features such as role-based access control and sensitive information handling. Kafka Connect.

Data 70
article thumbnail

The Good and the Bad of Apache Kafka Streaming Platform

Altexsoft

Kafka can continue the list of brand names that became generic terms for the entire type of technology. In this article, we’ll explain why businesses choose Kafka and what problems they face when using it. In this article, we’ll explain why businesses choose Kafka and what problems they face when using it. What is Kafka?

article thumbnail

Five Strategies to Accelerate Data Product Development

Cloudera

Deep Java Learning, Apache Spark 3.x, Lambda or Kappa architectures) and implementing reliable streaming capabilities at scale by leveraging technologies such as Apache NiFi and Apache Kafka, has made possible the ability to harness and commercialize an ever-increasing volume of real-time data such as time-series or clickstream data.

Strategy 114
article thumbnail

Introducing Confluent Platform 5.3

Confluent

Delivers the new Confluent Operator for cloud-native automation on Kubernetes, a redesigned Confluent Control Center user interface to simplify how you manage event streams, and a preview of Role-Based Access Control for enterprise-grade security. Secure the platform end to end. Automate Kafka operations for production environments.