File tree Expand file tree Collapse file tree 2 files changed +3
-8
lines changed
Expand file tree Collapse file tree 2 files changed +3
-8
lines changed Original file line number Diff line number Diff line change @@ -73,11 +73,6 @@ <h5>Projects</h5>
7373 JUnit5 Extension
7474 </ a >
7575 </ li >
76- < li class ="mb-2 ">
77- < a class ="text-body link-underline-dark link-underline-opacity-0 link-underline-opacity-10-hover " href ="https://github.com/kroxylicious/topic-encryption ">
78- Topic Encryption
79- </ a >
80- </ li >
8176 </ ul >
8277 </ div >
8378 < div class ="col-6 col-lg-2 mb-3 text-lg-end ">
Original file line number Diff line number Diff line change @@ -66,9 +66,9 @@ of a design flaw or bug are significant (confidentiality breach).
6666Having the applications encrypt/decrypt data themselves, whilst technically feasible, is not really a tenable solution
6767at the scale required for most enterprises.
6868
69- #### Kroxylicious Topic Encryption
69+ #### Kroxylicious Record Encryption
7070
71- The Kroxylicious Topic Encryption feature offers a solution to the problem. The proxy takes the responsibility
71+ The Kroxylicious Record Encryption feature offers a solution to the problem. The proxy takes the responsibility
7272to encrypt and decrypt the messages. In this way, the Kafka Brokers never see the plain text content of
7373the message thus ensuring confidentiality. Encryption is introduced into the system without requiring changes to
7474either applications or the Kafka Cluster.
@@ -99,7 +99,7 @@ are encrypted and some remain unencrypted are supported.
9999
100100| ![ image] ( ../assets/encryption-at-rest_solution.png ) {: width ="100%"} |
101101| :------------------------------------------------------------------:|
102- | * Kroxylicious Topic Encryption Deployment[ ^ 2 ] * |
102+ | * Kroxylicious Record Encryption Deployment[ ^ 2 ] * |
103103
104104<br />
105105
You can’t perform that action at this time.
0 commit comments