Explanation¶
The pages in this section aim to provide additional context and deeper understanding of foundational topics and concepts relevant to Charmed Apache Kafka.
Security¶
Secure deployments of Charmed Apache Kafka can be achieved through using recommended configurations, including setting up encryption and authentication. For more details, see Security topic overview and Cryptography usage explanation pages.
Cluster configuration¶
See the Cluster configuration page for explanation of the Apache ZooKeeper role in Charmed Apache Kafka.
Check the MirrorMaker explanation page for more context in to how MirrorMaker replicates and migrates Apache Kafka clusters.
Other topics¶
To read more about our usage of Apache Kafka and other relevant trademarks, see the Trademarks explanation page.