Explanation¶
The pages in this section aim to provide additional context and deeper understanding of foundational topics and concepts relevant to Charmed Apache Kafka.
Security¶
Secure deployments of Charmed Apache Kafka can be achieved through using recommended configurations, including setting up encryption and authentication. For more details, see Security topic overview and Cryptography usage explanation pages.
Cluster configuration¶
Check the MirrorMaker explanation page for more context in to how MirrorMaker replicates and migrates Apache Kafka clusters.
Backups¶
Read through Backups explanation for information on the why snapshots and backing up Apache Kafka’s log data is typically not necessary, and is not supported with Charmed Apache Kafka.
Other topics¶
To read more about our usage of Apache Kafka and other relevant trademarks, see the Trademarks explanation page.