{"id":4529,"date":"2021-11-17T17:00:00","date_gmt":"2021-11-17T17:00:00","guid":{"rendered":"https:\/\/dalelane.co.uk\/blog\/?p=4529"},"modified":"2021-11-17T10:35:00","modified_gmt":"2021-11-17T10:35:00","slug":"describing-kafka-security-in-asyncapi-2","status":"publish","type":"post","link":"https:\/\/dalelane.co.uk\/blog\/?p=4529","title":{"rendered":"Describing Kafka security in AsyncAPI"},"content":{"rendered":"<p><strong>As part of <a href=\"https:\/\/conference.asyncapi.com\">AsyncAPI Conference<\/a> this week, I ran a session on how to describe Kafka security in AsyncAPI.<\/strong><\/p>\n<p>The aim of the session was to quickly show how to describe the security configuration of a Kafka cluster in an AsyncAPI document.<\/p>\n<p>And, in reverse, if you&#8217;ve been given an AsyncAPI document, to show how to use that to configure a Kafka client or application to connect to the cluster, using the details in the AsyncAPI spec.<\/p>\n<p>The recording and the slides I used are below.<\/p>\n<p><iframe loading=\"lazy\" width=\"450\" height=\"253\" src=\"https:\/\/www.youtube.com\/embed\/CeGOLijUuQc\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe><br \/>\n<small><a href=\"https:\/\/youtu.be\/CeGOLijUuQc\">youtu.be\/CeGOLijUuQc<\/a><\/small><\/p>\n<p><iframe loading=\"lazy\" src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/key\/pyF9HqGru7Vwss\" width=\"450\" height=\"315\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" style=\"border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;\" allowfullscreen=\"\"> <\/iframe><br \/>\n<small><a href=\"\/\/www.slideshare.net\/dalelane\/describing-kafka-security-in-asyncapi\">slides on Slideshare<\/a><\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As part of AsyncAPI Conference this week, I ran a session on how to describe Kafka security in AsyncAPI. The aim of the session was to quickly show how to describe the security configuration of a Kafka cluster in an AsyncAPI document. And, in reverse, if you&#8217;ve been given an AsyncAPI document, to show how [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4537,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[593,602,584],"class_list":["post-4529","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-code","tag-apachekafka","tag-asyncapi","tag-kafka"],"_links":{"self":[{"href":"https:\/\/dalelane.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/4529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dalelane.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dalelane.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dalelane.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dalelane.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4529"}],"version-history":[{"count":0,"href":"https:\/\/dalelane.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/4529\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dalelane.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/media\/4537"}],"wp:attachment":[{"href":"https:\/\/dalelane.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dalelane.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dalelane.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}