In this document, “AutoMQ,” “AutoMQ service provider,” and “the AutoMQ service” all refer to AutoMQ HK Limited and its affiliates.
Prepare VPC
You can choose to use an existing VPC when installing AutoMQ, or create a new one for it. For production environments, we recommend checking and adjusting your existing VPC configuration to meet AutoMQ’s requirements. For POC testing, creating a new VPC is a quicker option.VPC Requirements
To deploy AutoMQ BYOC environment on AWS, your VPC must meet the following conditions:| Resource | Requirement Description |
|---|---|
| Control Plane Subnet | 1. Used to deploy the AutoMQ BYOC environment console, which needs to connect to the public network via NAT or other methods. |
| Data Plane Subnet | 1 or 3. Used to deploy the AutoMQ data plane cluster. The number of subnets depends on whether you choose a single-AZ or three-AZ deployment model. |
| S3 Gateway Endpoint | 1. Ensures AutoMQ components access S3 via the AWS internal network, avoiding public network traffic costs. The endpoint’s route table must cover all private subnets. |
| EC2 Interface Endpoint | 1. Ensures AutoMQ components can call EC2 and Auto Scaling APIs via the AWS internal network. |
| DNS Configuration | Enabled. The VPC must have DNS hostnames and DNS resolution enabled, as AutoMQ relies on Route 53 for DNS resolution within the VPC. |
| NAT Gateway | 1. If you plan to deploy the AutoMQ data plane cluster on EKS, you must configure a NAT gateway and the correct public outbound routes for the private subnets where the EKS worker nodes are located. Note: If the NAT gateway is not configured correctly, the AutoMQ cluster installation on EKS will fail. |
Scenario 1: Create a New VPC
If you need to create a new VPC for AutoMQ, we recommend using the VPC and more feature in the AWS VPC console.- Log in to the AWS VPC console.
- In the left navigation pane, choose Your VPCs, then click Create VPC.
- In VPC settings, select VPC and more.
- In the Name tag auto-generation section, set a clear name for your VPC.
- Configure the IPv4 CIDR block, Number of Availability Zones, Number of public subnets, and Number of private subnets.
- Depending on your deployment needs, choose whether to create NAT gateway(s) and VPC endpoints.
- NAT Gateway: If you plan to deploy on EKS, select at least 1 per AZ.
- VPC Endpoints: Select S3 Gateway, which will automatically create a gateway-type S3 endpoint.
- Ensure that both Enable DNS hostnames and Enable DNS resolution under DNS options are checked.
- Click Create VPC.
- In the AWS VPC console, choose Endpoints from the left navigation pane.
- Click Create endpoint.
- Name tag: Name the endpoint.
- Service category: Select AWS services.
- Services: Search for and select the
com.amazonaws.<region>.ec2interface service. - VPC: Select the VPC you just created.
- Subnets: Select all the private subnets intended for AutoMQ deployment.
- Security groups: Select or create a security group and add an inbound rule to allow HTTPS (443) traffic from your VPC’s CIDR.
- Click Create endpoint.
Scenario 2: Configure an Existing VPC
If you are deploying AutoMQ in an existing VPC, please verify that the following configurations meet the requirements.1. Check DNS Configuration
- In the AWS VPC console, choose Your VPCs from the left navigation pane.
- Select your target VPC and view the Details tab.
- Confirm that the values for DNS hostnames and DNS resolution are both Enabled. If not, click Actions -> Edit VPC settings to modify them.
2. Check S3 Endpoint
- In the AWS VPC console, choose Endpoints from the left navigation pane.
- Search for and check if there is an S3 endpoint of type Gateway (service name
com.amazonaws.<region>.s3) associated with your VPC. - If it doesn’t exist, click Create endpoint to create one.
- When creating it, ensure its route table (Route tables) is associated with all private subnets that will be used for deploying AutoMQ.
3. Check EC2 Endpoint
- On the Endpoints page, continue to search for and check if there is an EC2 endpoint of type Interface (service name
com.amazonaws.<region>.ec2) associated with your VPC. - If it doesn’t exist, click Create endpoint to create one.
- Subnets: Ensure you select all private subnets that will be used for deploying AutoMQ.
- Security groups: Select or create a security group and add an inbound rule to allow HTTPS (443) traffic from your VPC’s CIDR.
Prepare Private DNS (Optional)
The AutoMQ cluster exposes service addresses to applications through Private DNS, which relies on private domain name resolution within the VPC. Therefore, a Private DNS must be configured to provide reliable domain name resolution services. You can choose to have the AutoMQ console create the Private DNS Zone automatically or prepare it yourself by following the tutorial below.Private DNS Zone Requirements
When configuring Private DNS, the following two key conditions must be met:| Condition | Description | Importance |
|---|---|---|
| Associated VPC | The Private DNS must be associated with the VPC where AutoMQ is deployed. | Required |
| Domain Name and TLS Consistency | If you need to use the TLS feature later, the domain name of the Private DNS must be consistent with the domain name in the TLS certificate. | As needed |
Private DNS Configuration Steps
Step 1: Check Existing Private DNS
- Log in to the AWS console and visit the Route53 console.
- In the left navigation bar, select Hosted zones.
- Check if a Private DNS associated with the target VPC already exists.
Step 2: Create or Configure Private DNS
If a Private DNS already exists:- Select the target Private DNS and click Details.
- Confirm that the Type is Private hosted zone.
- Check the VPCs section to ensure it includes the VPC where AutoMQ is deployed.
- Record the domain name information for subsequent TLS feature configuration.
- Click Create hosted zone.
- Configure the basic information:
- Domain name: Enter a private domain name (e.g.,
internal.example.com). - Type: Select Private hosted zone.
- VPC: Select the VPC where AutoMQ is deployed and the corresponding region.
- Domain name: Enter a private domain name (e.g.,
- Click Create hosted zone.
Step 3: Verify the Configuration
- On the Private DNS details page, confirm the VPC association status.
- Check if the domain name configuration meets the planning requirements for the TLS feature.
- Record the ID and domain name of the Private DNS, which will be provided to the AutoMQ components during subsequent installation.