{"id":614,"date":"2020-07-01T22:42:52","date_gmt":"2020-07-01T17:12:52","guid":{"rendered":"https:\/\/www.techandtrain.com\/blog\/?p=614"},"modified":"2025-10-22T14:54:59","modified_gmt":"2025-10-22T09:24:59","slug":"key-concepts-documentation-keywords-in-kafka-part-1","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2020\/07\/key-concepts-documentation-keywords-in-kafka-part-1\/","title":{"rendered":"Key concepts, documentation &#038; keywords in Kafka &#8211; Part 1"},"content":{"rendered":"\n<p>Here are some important concepts, documentation and keywords of Kafka that you can refer and learn. There are two major flavors of Kafka &#8211; Apache Kafka &amp; Confluent Kafka, I have listed major keywords, documentation and concepts from both here:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Broker<\/li><li>Zookeeper<\/li><li>kSQL<\/li><li>REST-Proxy<\/li><li>Schema-Registry<\/li><li>Connectors<\/li><li>Operator<\/li><li>Control Center<\/li><li>Streams<\/li><li>Topics<\/li><li>Consumers<\/li><li>Producers<\/li><li>Partitions<\/li><li>Offset<\/li><li>Log<\/li><li>Node<\/li><li>Replica<\/li><li>Message<\/li><li>Leader<\/li><li>Follower<\/li><li>Replicator<\/li><li>Schema management<\/li><li>Confluent Hub<\/li><li>Events<\/li><li>Associated keywords in today&#8217;s cloud deployments: Docker containers, Kubernetes, Ansible, Security<\/li><\/ul>\n\n\n\n<p><strong>Associated documentation:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/kafka.apache.org\/documentation\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/kafka.apache.org\/documentation\/<\/a><\/li><li><a href=\"https:\/\/docs.confluent.io\/current\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.confluent.io\/current\/index.html<\/a><\/li><li><a href=\"https:\/\/www.confluent.io\/blog\/apache-kafka-vs-enterprise-service-bus-esb-friends-enemies-or-frenemies\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.confluent.io\/blog\/apache-kafka-vs-enterprise-service-bus-esb-friends-enemies-or-frenemies\/<\/a><\/li><li><a href=\"https:\/\/www.enterpriseintegrationpatterns.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.enterpriseintegrationpatterns.com\/<\/a><\/li><li><a href=\"https:\/\/www.confluent.io\/blog\/apache-kafka-kubernetes-could-you-should-you\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.confluent.io\/blog\/apache-kafka-kubernetes-could-you-should-you\/<\/a><\/li><li><a href=\"https:\/\/kubernetes.io\/blog\/2017\/09\/kubernetes-statefulsets-daemonsets\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/kubernetes.io\/blog\/2017\/09\/kubernetes-statefulsets-daemonsets\/<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here are some important concepts, documentation and keywords of Kafka that you can refer and learn. There are two major [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":617,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[127],"tags":[132,130,128,131,129],"class_list":["post-614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-enterprise-integration","tag-apache","tag-apache-kafka","tag-confluent","tag-confluent-kafka","tag-kafka"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/07\/Integration2.png?fit=1920%2C1280&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-9U","jetpack-related-posts":[{"id":1380,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/11\/web-portal-commerce-cyber-forensics\/","url_meta":{"origin":614,"position":0},"title":"Web portal &amp; commerce cyber forensics","author":"Neil Harwani","date":"November 24, 2024","format":false,"excerpt":"For this discussion, we will refer the top open-source products like Liferay, Drupal, WordPress, etc. and one proprietary portal like SharePoint which has good documentation. Home - Liferay WordPress.com: Build a Site, Sell Your Stuff, Start a Blog & More Drupal - Open Source CMS | Drupal.org Microsoft SharePoint Online\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":505,"url":"https:\/\/www.techandtrain.com\/blog\/2019\/09\/enterprise-environment-software-areas-part-1\/","url_meta":{"origin":614,"position":1},"title":"Enterprise environment software areas &#8211; Part 1","author":"Neil Harwani","date":"September 29, 2019","format":false,"excerpt":"Over the years that I have been working in IT industry, I have got the chance to be exposed to multiple enterprise (large & mid sized company environments) level software technologies, products & frameworks. These vary in a big way from company to company and project to project \/ program\u2026","rel":"","context":"In &quot;Enterprise Software&quot;","block_context":{"text":"Enterprise Software","link":"https:\/\/www.techandtrain.com\/blog\/category\/enterprise-software\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/09\/Enterprise-Software.jpg?fit=960%2C640&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/09\/Enterprise-Software.jpg?fit=960%2C640&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/09\/Enterprise-Software.jpg?fit=960%2C640&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/09\/Enterprise-Software.jpg?fit=960%2C640&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":557,"url":"https:\/\/www.techandtrain.com\/blog\/2020\/02\/what-are-we-doing-in-ai-ml-data-science-decision-science-analytics-world-glossary\/","url_meta":{"origin":614,"position":2},"title":"What are we doing in AI \/ ML \/ Data Science \/ Decision Science \/ Analytics World? &#8211; Glossary","author":"Neil Harwani","date":"February 17, 2020","format":false,"excerpt":"Over the last few years I have explored, programmed, worked in, researched and taught Data Science \/ AI \/ ML \/ Analytics \/ Decision Science to multiple students and with many software professionals. I have collected many keywords that you can google and explore. This will help you to keep\u2026","rel":"","context":"In &quot;Analytics&quot;","block_context":{"text":"Analytics","link":"https:\/\/www.techandtrain.com\/blog\/category\/analytics\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Mathematics.jpg?fit=960%2C490&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Mathematics.jpg?fit=960%2C490&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Mathematics.jpg?fit=960%2C490&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Mathematics.jpg?fit=960%2C490&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":944,"url":"https:\/\/www.techandtrain.com\/blog\/2022\/08\/java-ecosystem-observations-part-1\/","url_meta":{"origin":614,"position":3},"title":"Java ecosystem observations &#8211; Part 1","author":"Neil Harwani","date":"August 3, 2022","format":false,"excerpt":"Below are some notes on Java which help us to decipher how it has evolved over time since 1995. This is part 1 of the series. This acts as a mini caselet to understand how a successful ecosystem related to an application programming language has evolved over decades. Origins: Bytecode,\u2026","rel":"","context":"In &quot;Java&quot;","block_context":{"text":"Java","link":"https:\/\/www.techandtrain.com\/blog\/category\/java\/"},"img":{"alt_text":"www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/Volcano.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/Volcano.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/Volcano.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/Volcano.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/Volcano.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1532,"url":"https:\/\/www.techandtrain.com\/blog\/2026\/04\/keywords-notes-from-executive-masters-in-data-science-for-decision-making-at-iit-gandhinagar-part-1-assisted-by-chatgpt\/","url_meta":{"origin":614,"position":4},"title":"Keywords &amp; Notes from Executive Masters in Data Science for Decision Making at IIT Gandhinagar &#8211; Part 1 &#8211; Assisted by ChatGPT","author":"Neil Harwani","date":"April 11, 2026","format":false,"excerpt":"Here are 20 high-quality keywords for each category, structured for learning, research, and practical application: 1. Advanced Probability & Statistics Bayesian Inference Markov Chains Stochastic Processes Central Limit Theorem Hypothesis Testing Maximum Likelihood Estimation (MLE) Bayesian Networks Copulas Multivariate Distributions Monte Carlo Simulation Gibbs Sampling Hidden Markov Models (HMM) Variational\u2026","rel":"","context":"In &quot;Academics&quot;","block_context":{"text":"Academics","link":"https:\/\/www.techandtrain.com\/blog\/category\/academics\/"},"img":{"alt_text":"Image credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2026\/04\/DS-scaled.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2026\/04\/DS-scaled.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2026\/04\/DS-scaled.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2026\/04\/DS-scaled.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2026\/04\/DS-scaled.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":950,"url":"https:\/\/www.techandtrain.com\/blog\/2022\/08\/cyber-security-keywords-concepts-part-1\/","url_meta":{"origin":614,"position":5},"title":"Cyber Security Keywords &#038; Concepts &#8211; Part 1","author":"Neil Harwani","date":"August 28, 2022","format":false,"excerpt":"Here is a list of keywords & concepts in Cyber Security that technology professionals should be aware of. This is part 1 of the series. CSPXSSISO 27001OWASPEncoding \/ decodingEncryption and it's typesCSRFCORSHashingAuthenticationAuthorizationIAMSSOSAMLOAuthTokensHTTPS \/ SSLDOS \/ DDOSBackdoorMalwareSecure codingThreats, Vulnerabilities, Controls & MitigationVAPTSocial EngineeringSpoofingProxy serversPhishingSQL injectionBuffer overflowViruses, Worms, Keyloggers, SpywaresIdentity theftRootKitsZero DayVPN\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=614"}],"version-history":[{"count":1,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/614\/revisions"}],"predecessor-version":[{"id":616,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/614\/revisions\/616"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/617"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}