Kafka Security
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
17 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Kafka Security to your Wishlist.

Add to Wishlist

Kafka Security

Learning how to Implement security in Kafka
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
17 students enrolled
Created by ASHOK M
Last updated 5/2017
English
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • What is kafka security
  • how to implement security in kafka
View Curriculum
Requirements
  • Basic knowledge of Computers
Description

In the 0.9.0.0 release, the Kafka community added a number of features that, used either separately or together, increase security in a Kafka cluster. These features are considered to be of beta quality. The following security measures are currently supported:

  1. Authentication of connections to brokers from clients (producers and consumers), other brokers and tools, using either SSL or SASL (Kerberos)
  2. Authentication of connections from brokers to ZooKeeper
  3. Encryption of data transferred between brokers and clients, between brokers, or between brokers and tools using SSL (Note that there is a performance degradation when SSL is enabled, the magnitude of which depends on the CPU type and the JVM implementation.)
  4. Authorization of read / write operations by clients
  5. Authorization is pluggable and integration with external authorization services is supported


Kafka was originally developed at LinkedIn in 2010. It was originally an open system to encourage adoption; developers could easily create new data streams, add data to the pipeline, and read data as it was created. It succeeded brilliantly at encouraging developers to build new data applications, improved the reliability of systems and applications, and helped LinkedIn scale it’s logging and data infrastructure.

Unfortunately, as Kafka usage grew at LinkedIn (and at other sites), we discovered problems with a totally open system. Developers might inadvertently cause production problems when creating new Kafka streams, engineers might change the configuration of critical systems, and employees might get access to sensitive data. As Kafka has been adopted by larger enterprises with more complex security requirements, we have had to rethink our architecture.

In this course, we will explain how we have secured Apache Kafka. We will explain the threats that Kafka Security mitigates, the changes that we made to Kafka to enable security, and the steps required to secure an existing Kafka cluster.

  • Specifically, we will cover:
  • New security features in Kafka 0.9
  • The risks and threats with a distributed data streaming system
  • Common issues with deploying a secure Kafka system
  • The access control model for Kafka
  • Configuring authentication, access control, and encryption
  • Using a secure Kafka cluster with other secure (and insecure) systems
  • Testing, monitoring and tuning a secure Kafka cluster
  • Future work in Kafka security



Who is the target audience?
  • This course is for students
  • For all hadoop developers
  • for all java developers
  • for all administrators
Students Who Viewed This Course Also Viewed
Curriculum For This Course
7 Lectures
01:13:27
+
Introducion
3 Lectures 16:52


Performance Impact with SSL
08:06
+
Kerberos and Authorization
3 Lectures 19:58
Kerberos Overview
08:13

Authorization in kafka
08:04

+
Detecting Anomalies
1 Lecture 36:37
CyberSecurity Streaming DataPipeline using Kafka and Akka Cluster
36:37
About the Instructor
ASHOK M
2.1 Average rating
71 Reviews
385 Students
31 Courses
Architect

I am  Reddy having 10 years of IT experience.For the last 4 years I have been working on Bigdata.
From Bigdata perspective,I had working experience on Kafka,Spark,and Hbase,cassandra,hive technologies.
And also I had working experience with AWS and Java technologies.

I have the experience in desigining and implemeting lambda architecture solutions in bigdata

Has experience in Working with Rest API and worked in various domains like financial ,insurance,manufacuring.

I am so passinate about  new technologies.


BigDataTechnologies  is a online training provider and has many experienced lecturers who will proivde excellent training.

BigDataTechnologies has extensive experience in providing training for Java,AWS,iphone,Mapredue,hive,pig,hbase,cassandra,Mongodb,spark,storm and Kafka.

From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges.

Main objective is to provide high quality content to all students