Explanation

The pages in this section aim to provide additional context and deeper understanding of foundational topics and concepts relevant to Charmed Apache Kafka.

Security

Secure deployments of Charmed Apache Kafka can be achieved through using recommended configurations, including setting up encryption and authentication. For more details, see Security topic overview and Cryptography usage explanation pages.

Cluster configuration

Check the MirrorMaker explanation page for more context in to how MirrorMaker replicates and migrates Apache Kafka clusters.

Backups

Read through Backups explanation for information on the why snapshots and backing up Apache Kafka’s log data is typically not necessary, and is not supported with Charmed Apache Kafka.

Other topics

To read more about our usage of Apache Kafka and other relevant trademarks, see the Trademarks explanation page.