Skip to content

Commit f4cc281

Browse files
simonlordasimms41
andauthored
Update AWS Private Link security group port guide (#137)
Update AWS Private Link security group port guide Co-authored-by: Angela Simms <[email protected]>
1 parent e233de4 commit f4cc281

File tree

1 file changed

+29
-4
lines changed

1 file changed

+29
-4
lines changed

modules/networking/pages/aws-privatelink.adoc

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -262,20 +262,23 @@ SECURITY_GROUP_ID=<security_group_id>
262262

263263
The example below to add security group rules is based on the assumption that the Redpanda broker count is three. If you are not using three brokers, modify the example:
264264

265-
* Replace `32094` with `32092 + <broker_count-1>`.
266-
* Replace `35084` with `35082 + <broker_count-1>`.
265+
* Replace `32094`,`32194`,`32294` with `32092 + <broker_count-1>`, `32192 + <broker_count-1>`, `32292 + <broker_count-1>`.
266+
* Replace `35084`,`35184`,`35284` with `35082 + <broker_count-1>`, `35182 + <broker_count-1>`, `35282 + <broker_count-1>`.
267267

268268
[,bash]
269269
----
270+
# Allow Redpanda Kafka seed port
270271
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
271272
--group-id $SECURITY_GROUP_ID \
272273
--protocol "tcp" \
273274
--port 30292 \
274275
--cidr 0.0.0.0/0
276+
# Allow Schema Registry port
275277
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
276278
--group-id $SECURITY_GROUP_ID --protocol "tcp" \
277279
--port 30081 \
278280
--cidr 0.0.0.0/0
281+
# Allow Panda Proxy port
279282
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
280283
--group-id $SECURITY_GROUP_ID --protocol "tcp" \
281284
--port 30282 \
@@ -286,18 +289,40 @@ aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
286289
--protocol "tcp" \
287290
--port 443-443 \
288291
--cidr 0.0.0.0/0
289-
# Adjust the port 32094 if the Redpanda broker count is not 3.
292+
# Redpanda Kafka broker port ranges
293+
# There are three broker port ranges that alternate during normal system maintenance, and all three must be open. Adjust the end port number if the Redpanda broker count is not three.
290294
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
291295
--group-id $SECURITY_GROUP_ID \
292296
--protocol "tcp" \
293297
--port 32092-32094 \
294298
--cidr 0.0.0.0/0
295-
# Adjust the port 35084 if the Redpanda broker count is not 3.
299+
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
300+
--group-id $SECURITY_GROUP_ID \
301+
--protocol "tcp" \
302+
--port 32192-32194 \
303+
--cidr 0.0.0.0/0
304+
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
305+
--group-id $SECURITY_GROUP_ID \
306+
--protocol "tcp" \
307+
--port 32292-32294 \
308+
--cidr 0.0.0.0/0
309+
# Redpanda Panda Proxy port ranges
310+
# There are three port ranges that alternate during normal system maintenance, and all three must be open. Adjust the end port number if the Redpanda broker count is not three.
296311
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
297312
--group-id $SECURITY_GROUP_ID \
298313
--protocol "tcp" \
299314
--port 35082-35084 \
300315
--cidr 0.0.0.0/0
316+
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
317+
--group-id $SECURITY_GROUP_ID \
318+
--protocol "tcp" \
319+
--port 35182-35184 \
320+
--cidr 0.0.0.0/0
321+
aws ec2 authorize-security-group-ingress --region $REGION --profile $PROFILE \
322+
--group-id $SECURITY_GROUP_ID \
323+
--protocol "tcp" \
324+
--port 35282-35284 \
325+
--cidr 0.0.0.0/0
301326
----
302327

303328
=== Create VPC subnet

0 commit comments

Comments
 (0)