-
Notifications
You must be signed in to change notification settings - Fork 12
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'release/v2.1.2' into main
- Loading branch information
Showing
14 changed files
with
888 additions
and
718 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
[{"text":"Latest","icon":"fas fa-home","key":"latest","tag":"v2.1.1"}] | ||
[{"text":"Latest","icon":"fas fa-home","key":"latest","tag":"v2.1.2"}] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
31 changes: 28 additions & 3 deletions
31
src/solutions/concepts/kafka-proxies/secure-public-access.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,25 +1,50 @@ | ||
--- | ||
redirectFrom: /solutions/how-tos/amazon-msk/secure-public-access/overview.html | ||
icon: aky-zilla-plus | ||
description: Securely access your Kafka cluster via the internet. | ||
--- | ||
|
||
# Secure Public Access | ||
|
||
<!-- markdownlint-disable MD024 --> | ||
|
||
[Available in <ZillaPlus/>](https://www.aklivity.io/products/zilla-plus) | ||
{.zilla-plus-badge .hint-container .info} | ||
|
||
By automating the configuration of an internet-facing network load balancer and auto-scaling group of stateless Zilla Plus Secure Public Access proxies to expose your Kafka cluster via the public internet, Kafka clients can connect, publish messages and subscribe to topics in your Kafka cluster from outside the host network. | ||
The [Zilla Plus for Amazon MSK](https://aws.amazon.com/marketplace/pp/prodview-jshnzslazfm44) Secure Public Access Proxy lets authorized Kafka clients connect, publish messages and subscribe to topics in your Amazon MSK cluster via the internet. | ||
|
||
By automating the configuration of an internet-facing network load balancer and auto-scaling group of stateless Secure Public Access proxies to expose your MSK cluster via the public internet, Kafka clients can connect, publish messages and subscribe to topics in your Amazon MSK cluster from outside AWS. | ||
|
||
You will need to choose a wildcard DNS pattern to use for public internet access to the brokers in your Kafka cluster. These wildcard DNS names must resolve to the public IP address(es) where the <ZillaPlus/> proxy is deployed. The <ZillaPlus/> proxy must also be configured with a TLS server certificate representing the same wildcard DNS pattern. | ||
|
||
The <ZillaPlus/> proxy can securely expose any Kafka cluster with these deployment options. | ||
|
||
## Amazon MSK | ||
|
||
The [Zilla Plus for Amazon MSK](https://aws.amazon.com/marketplace/pp/prodview-jshnzslazfm44) Secure Public Access proxy lets authorized Kafka clients connect, publish messages and subscribe to topics in your Amazon MSK cluster via the internet. | ||
|
||
> [Follow the guide to get started](../../how-tos/amazon-msk/secure-public-access/overview.md) | ||
### Deploy with Terraform | ||
|
||
Follow the [Secure Public Access with Terraform](https://github.com/aklivity/zilla-plus-aws-templates/tree/main/amazon-msk/cdktf/secure-public-access) guide to generated or deploy a custom Terraform template using [CDKTF](https://developer.hashicorp.com/terraform/cdktf). This Terraform script can be configured to deploy `SASL/SCRAM authentication`, `Mutual TLS (mTLS) authentication` or `Unauthorized access` to setup connectivity to your MSK cluster with a wildcard DNS pattern. | ||
|
||
### Deploy with CloudFormation | ||
|
||
#### SASL/SCRAM authentication | ||
|
||
Follow the [Secure Public Access via SASL/SCRAM authentication](../../how-tos/amazon-msk/secure-public-access/production.md) guide to setup connectivity to your MSK cluster using a globally trusted TLS server certificate with a wildcard DNS pattern `*.example.aklivity.io` to illustrate the steps. | ||
|
||
#### Mutual TLS (mTLS) authentication | ||
|
||
Follow the [Secure Public Access via mTLS](../../how-tos/amazon-msk/secure-public-access/production-mutual-tls.md) guide to setup connectivity to your MSK cluster using a globally trusted TLS server certificate with a wildcard DNS pattern `*.example.aklivity.io` to illustrate the steps. | ||
|
||
#### Unauthorized access | ||
|
||
Follow the [Secure Public Access via Unauthorized access](../../how-tos/amazon-msk/secure-public-access/development.md) guide to setup connectivity to your MSK cluster using a locally trusted TLS server certificate with the example wildcard DNS pattern `*.aklivity.example.com`. | ||
|
||
## Confluent Cloud | ||
|
||
The [Zilla Plus for Confluent Cloud](https://aws.amazon.com/marketplace/pp/prodview-eblxkinsqbaks) Secure Public Access proxy lets authorized Kafka clients connect, publish messages and subscribe to topics in your Confluent Cloud cluster via the internet. | ||
|
||
> [Follow the guide to get started](../../how-tos/confluent-cloud/secure-public-access.md) | ||
### Deploy with CloudFormation | ||
|
||
Follow the [Secure Public Access via SASL/SCRAM authentication](../../how-tos/confluent-cloud/secure-public-access.md) guide to setup connectivity to your MSK cluster using a globally trusted TLS server certificate with a wildcard DNS pattern `*.example.aklivity.io` to illustrate the steps. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
--- | ||
icon: aky-zilla-plus | ||
description: Zilla Plus Web Streaming lets Web clients publish, update, and stream messages to a Kafka topic in your Amazon MSK cluster. | ||
--- | ||
|
||
# Amazon MSK Web Streaming | ||
|
||
[Available in <ZillaPlus/>](https://www.aklivity.io/products/zilla-plus) | ||
{.zilla-plus-badge .hint-container .info} | ||
|
||
The [Zilla Plus for Amazon MSK](https://aws.amazon.com/marketplace/pp/prodview-jshnzslazfm44) Web Streaming proxy lets Web clients publish, update, and stream messages to a Kafka topic in your Amazon MSK cluster. | ||
|
||
By automating the configuration of a network load balancer and auto-scaling group of stateless Web Streaming proxies to expose a topic in your MSK cluster, Web clients can natively interact with messages on the topic. Event streaming backend systems can quickly integrate user-facing web clients using customizable REST and SSE APIs. | ||
|
||
You will need to choose a wildcard DNS pattern to use for public internet access to the Web Streaming proxies. These wildcard DNS names must resolve to the public IP address(es) where the <ZillaPlus/> proxy is deployed. The <ZillaPlus/> proxy must also be configured with a TLS server certificate representing the same wildcard DNS pattern. | ||
|
||
## Deployment with Terraform | ||
|
||
Follow the [Web Streaming with Terraform](https://github.com/aklivity/zilla-plus-aws-templates/tree/main/amazon-msk/cdktf/web-streaming) guide to generated or deploy a custom Terraform template using [CDKTF](https://developer.hashicorp.com/terraform/cdktf). This Terraform script can be configured to expose a custom REST path and uses `SASL/SCRAM` authentication. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
35 changes: 0 additions & 35 deletions
35
src/solutions/how-tos/amazon-msk/secure-public-access/overview.md
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.