Throughout this document, “AutoMQ” refers to AutoMQ HK Limited and its affiliates.
VPC Requirements
For Proof-of-Concept (POC) testing, we recommend creating a new VPC to isolate the AutoMQ deployment and test applications. In production environments, you will likely use an existing VPC. In this case, you must verify that your VPC meets AutoMQ’s requirements and make any necessary adjustments. To install the AutoMQ BYOC environment, your AWS VPC must meet the following requirements:VPC Checklist | Description |
---|---|
Public Subnet: 1 |
|
Private Subnet: 1 or 3 |
|
S3 Endpoint: 1 |
|
EC2 Interface Endpoint: 1 |
|
DNS Hostnames and Resolution: Enabled |
|
NAT Gateway: 1 |
Failure to configure a NAT Gateway will prevent the AutoMQ cluster from being installed on EKS. |
Prerequisites
The AWS account used for setup must be either the root account or an IAM user/role with sufficient permissions. If using an IAM principal, ensure the following AWS managed policies (or equivalent custom policies) are attached:- AmazonVPCFullAccess: Permissions to manage the VPC.
- AmazonS3FullAccess: Permissions to manage S3.
- AmazonRoute53FullAccess: Permissions to manage Route 53.
The policies listed are AWS managed policies. For production environments, we recommend following the principle of least privilege by creating custom IAM policies with more restrictive permissions tailored to your specific needs.
Scenario 1: Create a New VPC
This scenario is ideal for POC testing or if you do not have an existing VPC. Follow these steps to create a new VPC that meets AutoMQ’s requirements.Step 1: Create a VPC and Enable the S3 Endpoint
Log in to the VPC console using your AWS cloud account. Taking the Singapore region as an example, visit the VPC console, and click “Create VPC.”
- VPC Name: Set the VPC name to a custom name.
- CIDR: Set an appropriate CIDR subnet.
- Availability Zones: It is recommended to select 1-3 zones based on your business deployment needs.
- Public subnets: Configure at least one public subnet to host the AutoMQ environment console.
- VPC endpoints: Select “S3 Gateway” to create the S3 endpoint.
- DNS options: Ensure both “Enable DNS hostnames” and “Enable DNS resolution” are checked. AutoMQ relies on these for internal service discovery.
- NAT Gateway: Ensure that a NAT Gateway is enabled if AutoMQ is deployed on EKS.

Step 2: Create EC2 Endpoint
Create an EC2 Interface Endpoint within the VPC to allow AutoMQ components to access the EC2 API over the AWS private network.
- Service category: Select “AWS services”.
-
Service name: Search for and select
com.amazonaws.<region>.ec2
. - VPC: Select the VPC created in the previous step.
- Subnets: Select all private subnets where the AutoMQ data plane might be deployed.
-
Security group: Create a new security group and add an inbound rule to allow TCP traffic on port 443 from your VPC’s CIDR block (or
0.0.0.0/0
for simplicity in test environments).
AutoMQ clusters require access to the EC2 API via the VPC internal network. When creating the EC2 Interface Endpoint, ensure that the subnet and security group configurations are correct. An incorrect configuration will cause the AutoMQ cluster to fail during startup.All subnets and availability zones planned for AutoMQ cluster deployment must be covered; no possible subnet should be omitted.Security group rules must ensure access to port 443 is smooth and allow sources from 0.0.0.0/0.

Scenario 2: Configuring an Existing VPC
If you plan to install AutoMQ in an existing VPC, you must first verify that its configuration meets all requirements.Step 1: Check and Enable DNS Configuration
Access the existing VPC network, click on details, and review the VPC configuration.

Step 2: Check and Create S3 Endpoints
Confirm whether the current VPC has an S3 gateway endpoint created. If there is no S3 endpoint, you need to create one.
When creating the S3 Gateway Endpoint, ensure its route table includes all private subnets where the AutoMQ cluster might be deployed. This ensures that all traffic to S3 from your cluster nodes stays within the AWS private network.

Step 3: Check and Create EC2 Endpoints
Verify that an EC2 Interface Endpoint exists and is correctly configured. If not, create one to allow private access to the EC2 API.
- Service category: Select “AWS services”.
-
Service name: Search for and select
com.amazonaws.<region>.ec2
. - VPC: Select your existing VPC.
- Subnets: Select all private subnets where the AutoMQ data plane might be deployed.
- Security group: Create or select a security group and add an inbound rule to allow TCP traffic on port 443 from your VPC’s CIDR block.

Next Steps
After setting up the VPC network, you can proceed to install the AutoMQ BYOC environment. On AWS, AutoMQ supports installation through the following two methods:- Install the AutoMQ environment through the AWS Marketplace: Users can select the corresponding product link from the AWS Marketplace to install the AutoMQ BYOC environment. Install Env from Marketplace▸
- Install the AutoMQ environment through the Terraform Module: Users can install the AutoMQ BYOC environment using the AutoMQ Terraform Module with Terraform. Install Env via Terraform Module▸