Summary
In this chapter, we deployed a microservices-based application that connects to Kafka. We used Helm to deploy this sample application. We were able to test the application by sending events to a locally created Kafka cluster and watching objects being created and updated.
Finally, we covered storing events in Azure Event Hubs using Kafka support, and we were able to gather the required details to connect our microservice-based application and modify the Helm chart.
The next chapter will cover cluster security. We will cover RBAC security, secret management, and network security using Istio.