Preparing Required Resources
Overview
Before creating a Kafka instance, ensure the availability of resources, including a virtual private cloud (VPC), subnet, security group, and security group rules. Each Kafka instance is deployed in a VPC and bound to a specific subnet and security group. In this way, Kafka provides an isolated virtual network environment and security protection policies that you can easily configure and manage.
To access a Kafka instance over a public network, prepare an elastic IP address (EIP) in advance.
To encrypt the disk, prepare a key in Data Encryption Workshop (DEW) in advance.
Required Resources
Table 1 lists the resources required by a Kafka instance.
Resource |
Requirement |
Operations |
---|---|---|
VPC and subnet |
Different Kafka instances can use the same or different VPCs and subnets based on site requirements. Note the following when creating a VPC and a subnet:
|
For details about how to create a VPC and subnet, see the Virtual Private Cloud User Guide. |
Security group |
Different Kafka instances can use the same or different security groups. Note the following when creating a security group:
|
For details about how to create a security group and configure security group rules, see the Virtual Private Cloud User Guide. |
EIP |
Note the following when creating EIPs:
|
For details about how to create an EIP, see "Assigning an EIP" in Elastic IP User Guide. |
Key |
To encrypt the disk for a Kafka instance, prepare a key in advance. The key must be created in the region your Kafka instance is in. |
For details about how to create a key, see "Creating a CMK" in the Data Encryption Workshop User Guide. |
Direction |
Protocol |
Port |
Source |
Description |
---|---|---|---|---|
Inbound |
TCP |
9094 |
0.0.0.0/0 |
Access a Kafka instance through the public network (without SSL encryption). |
Inbound |
TCP |
9092 |
0.0.0.0/0 |
Access a Kafka instance within a VPC (without SSL encryption). |
Inbound |
TCP |
9095 |
0.0.0.0/0 |
Access a Kafka instance through the public network (with SSL encryption). |
Inbound |
TCP |
9093 |
0.0.0.0/0 |
Access a Kafka instance within a VPC (with SSL encryption). |
Inbound |
TCP |
9999 |
0.0.0.0/0 |
Access Kafka Manager. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot