Before creating a Kafka instance, ensure the availability of resources, including a virtual private cloud (VPC), subnet, security group, and security group rules. Each Kafka instance is deployed in a VPC and bound to a specific subnet and security group. In this way, Kafka provides an isolated virtual network environment and security protection policies that you can easily configure and manage.
To access a Kafka instance over a public network, prepare an elastic IP address (EIP) in advance.
To encrypt the disk, prepare a KMS key in advance.
Table 1 lists the resources required by a Kafka instance.
Resource |
Requirement |
Operations |
---|---|---|
VPC and subnet |
Different Kafka instances can use the same or different VPCs and subnets based on site requirements. Note the following when creating a VPC and a subnet:
|
For details about how to create a VPC and subnet, see the Virtual Private Cloud User Guide. |
Security group |
Different Kafka instances can use the same or different security groups. Note the following when creating a security group:
|
For details about how to create a security group and configure security group rules, see the Virtual Private Cloud User Guide. |
EIP |
Note the following when creating EIPs:
|
For details about how to create an EIP, see "Assigning an EIP" in Elastic IP User Guide. |
KMS key |
To encrypt the disk for a Kafka instance, prepare a KMS key in advance. The KMS key must be created in the same region as the Kafka instance. |
For details about how to create a KMS key, see "Creating a Key" in the Key Management Service User Guide. |
Direction |
Protocol |
Port |
Source |
Description |
---|---|---|---|---|
Inbound |
TCP |
9094 |
0.0.0.0/0 |
Access a Kafka instance through the public network (without SSL encryption). |
Inbound |
TCP |
9092 |
0.0.0.0/0 |
Access a Kafka instance within a VPC (without SSL encryption). |
Inbound |
TCP |
9095 |
0.0.0.0/0 |
Access a Kafka instance through the public network (with SSL encryption). |
Inbound |
TCP |
9093 |
0.0.0.0/0 |
Access a Kafka instance within a VPC (with SSL encryption). |
Inbound |
TCP |
9011 |
198.19.128.0/17 |
Access a Kafka instance using VPC Endpoint (VPCEP). |
Inbound |
TCP |
9011 |
0.0.0.0/0 |
Access a Kafka instance using DNAT. |