Description
In this three-day training, you will learn how to deploy, operate, and monitor a Kafka cluster using industry best practices, which have been developed by leading Apache Kafka experts.
/p>
Who is this training for ?
For whom ?
This course is designed for developers and operational teams who are required to deploy, administer and configure a Kafka cluster.
Prerequisites
Participants must have a good knowledge of Linux/Unix, and have basic knowledge of TCP/IP networks.
Knowledge of the Java Virtual Machine (JVM) is useful.
No prior knowledge of Kafka is necessary
Training objectives
Training program
- The Motivations of Apache Kafka
- The complexity of systems
- The advent of real-time processing
- Kafka: "Stream Data Platform"
- Kafka Concepts and Fundamentals
- Kafka Overview
- Producers
- Brokers
- Consumers
- Using Zookeeper
- Comparison with traditional message broker systems
- Consistency and guarantee of non-loss of data
- Replication concepts
- Message publication consistency
- Shutdown and breakdown of a broker
- Role of the Broker Controller
- Kafka (data) log files
- Offset Management
- High Availability (HA)
- The Kafka reference architecture
- Brokers
- ZooKeeper
- Kafka Connect
- SchemaRegistry
- RESTProxy
- Multi-Data-centers
- Manage a Kafka cluster
- Installation and operation of Kafka
- Monitoring and supervision of a cluster
- Basic operations of a cluster
- Retention and compaction of logs
- Elasticity of a cluster
- Optimize Kafka performance
- Producer Performance
- Broker Performance
- Broker Failure and Recovery Time
- Consumer Load Distribution
- Consumer Performance
- Performance Tests
- Secure a Kafka/Zookeeper cluster
- Network encryption and Authentication via SSL
- Authentication via SASL
- Data encryption on disk
- Securing ZooKeeper, SchemaRegistry and RESTProxy
- Migrating to a secure cluster
- Kafka Connect: Integrate systems with Kafka
- Motivations for Kafka Connect
- Types of connectors
- Implementation of Kafka Connect
- Deployment modes (standalone/distributed )
- Connector configuration
- Deployment considerations
- Comparison with other systems