In this article I will talk about how to enable and manage ACLs in KAFKA and some common ACL commands.
Almost every organisation makes use of Apache Kafka to exchange sensitive information between various systems with in the organisation and also between organisations. So securing the Kafka cluster is necessary!
Kafka provides the ability to exercise granular control over access to objects and operations within the cluster through the use of Kafka Access Control Lists (ACLs) and through several interfaces (command line, API, etc.)
Kafka ACL’s are defined in the general format of:
“Principal P is [Allowed/Denied] Operation O from Host H on Resource…
Learn how to create pipelines as code in Jenkins
One of the key ideas of DevOps is infrastructure-as-code which is the management of infrastructure in a descriptive model using the same versioning control that is used for source code.
Infrastructure as Code enables DevOps teams to test applications in production-like environments early in the development cycle
Pipelines as code is a technique that emphasises on the configuration of delivery pipelines that build, test and deploy applications or infrastructure should be treated as code; they should be kept under source control and modularised in reusable components with automated testing and deployment.
Kafka is run as a cluster of one or more servers that can span across multiple Datacenters or cloud regions. A Kafka cluster is highly scalable and fault-tolerant, if any of its servers fails, the other servers will take over their work to ensure continuous operations without any loss of data.
Stretch clusters are intended to protect the Kafka cluster from failure in the event an entire datacenter fails. This is done by installing a single Kafka cluster across multiple Datacenters. This is NOT a multi-cluster: it is just one cluster which has broker servers on different Datacenters. …