Skip to main content

Posts

Showing posts with the label Apache Kafka

Mastering Kafka Streams and ksqlDB

  Table of Contents Foreword. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Part I. Kafka 1. A Rapid Introduction to Kafka. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         Communication Model 2 How Are Streams Stored? 6 Topics and Partitions 9 Events 11 Kafka Cluster and Brokers 12 Consumer Groups 13 Installing Kafka 15 Hello, Kafka 16 Summary 19 The Kafka Ecosystem 23 Before Kafka Streams 24 Enter Kafka Streams 25 Features at a Glance 27 Part II. Kafka Streams 2. Getting Started with Kafka Streams. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Operational Characteristics 28 Scalability 28 Reliability 29 Maintainability 30 Co...

Designing Event Driven Systems

  1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. The Origins of Streaming. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3. Is Kafka What You Think It Is?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Kafka Is Like REST but Asynchronous? 13 Kafka Is Like a Service Bus? 14 Kafka Is Like a Database? 15 What Is Kafka Really? A Streaming Platform 15 4. Beyond Messaging: An Overview of the Kafka Broker. . . . . . . . . . . . . . . . . . . . . . . 17 The Log: An Efficient Structure for Retaining and Distributing Messages 18 Linear Scalability 19 Segregating Load in Multiservice Ecosystems 21 Maintaining Strong Ordering Guarantees 21 Ensuring Messages Are Durable 22 Load-Balance Services and Make Them Highly Available 23 Compacted Topics 24 Long-Term Data Storage 25 Security 25 Summary 25 Part II. Designing E...