This is an automated email from the ASF dual-hosted git repository.
lhotari pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/pulsar-site.git
The following commit(s) were added to refs/heads/main by this push:
new c40924bfe021 Fix link in security overview
c40924bfe021 is described below
commit c40924bfe0216eb544e1ec50b4849dc4b8027a0d
Author: Lari Hotari <[email protected]>
AuthorDate: Fri Mar 15 20:19:12 2024 +0200
Fix link in security overview
---
versioned_docs/version-3.0.x/security-overview.md | 6 ++++++
versioned_docs/version-3.2.x/schema-overview.md | 6 ------
versioned_docs/version-3.2.x/security-overview.md | 6 ++++++
3 files changed, 12 insertions(+), 6 deletions(-)
diff --git a/versioned_docs/version-3.0.x/security-overview.md
b/versioned_docs/version-3.0.x/security-overview.md
index cf5304412aff..d180f189b167 100644
--- a/versioned_docs/version-3.0.x/security-overview.md
+++ b/versioned_docs/version-3.0.x/security-overview.md
@@ -4,6 +4,12 @@ title: Pulsar security overview
sidebar_label: "Overview"
---
+:::note
+
+There's a separate page for Apache Pulsar [Security advisories and Security
policy](https://pulsar.apache.org/security/).
+
+:::
+
As the central message bus for a business, Apache Pulsar is frequently used
for storing mission-critical data. Therefore, enabling security features in
Pulsar is crucial. This chapter describes the main security controls that
Pulsar uses to help protect your data.
Pulsar security is based on the following core pillars.
diff --git a/versioned_docs/version-3.2.x/schema-overview.md
b/versioned_docs/version-3.2.x/schema-overview.md
index aeb80a723a68..a9a503b9d472 100644
--- a/versioned_docs/version-3.2.x/schema-overview.md
+++ b/versioned_docs/version-3.2.x/schema-overview.md
@@ -5,12 +5,6 @@ sidebar_label: "Overview"
description: Get a comprehensive understanding of Pulsar schema.
---
-:::note
-
-There's a separate page for Apache Pulsar [Security advisories and Security
policy](https://pulsar.apache.org/security/).
-
-:::
-
## Definitions
Pulsar messages are stored as unstructured byte arrays and the data structure
(as known as schema) is applied to this data only when it's read. So both the
producer and consumer need to agree upon the data structure of the messages,
including the fields and their associated types.
diff --git a/versioned_docs/version-3.2.x/security-overview.md
b/versioned_docs/version-3.2.x/security-overview.md
index 939cea782da9..6bf79612be9a 100644
--- a/versioned_docs/version-3.2.x/security-overview.md
+++ b/versioned_docs/version-3.2.x/security-overview.md
@@ -5,6 +5,12 @@ sidebar_label: "Overview"
description: Get a comprehensive understanding of Pulsar security, including
encryption, authentication, and authorization.
---
+:::note
+
+There's a separate page for Apache Pulsar [Security advisories and Security
policy](https://pulsar.apache.org/security/).
+
+:::
+
As the central message bus for a business, Apache Pulsar is frequently used
for storing mission-critical data. Therefore, enabling security features in
Pulsar is crucial. This chapter describes the main security controls that
Pulsar uses to help protect your data.
Pulsar security is based on the following core pillars.