Connection Details for Deployment of PubSub+ Cloud Components

The following summarizes the Operational Connectivity required in a deployment. From a security perspective, this information is important to help you understand the ports and access points required to deploy PubSub+ Cloud in a Customer-Controlled Region. Depending on whether the deployment is on a Kubernetes cluster or a VM-based region (Azure or AWS), the connections differ slightly. The connection information may be an important consideration when you decide on the deployment solution for a Customer-Controlled Region.

Connection Details for Operational Connectivity

©The following connection details are required for Kubernetes deployments, such as Azure Kubernetes Service (AKS), Google Kubernetes Engine for Google Cloud (GKE), and Amazon Elastic Kubernetes Service (EKS). These connections are required for the Operational Connectivity when you deploy PubSub+ Cloud to Customer-Controlled Regions. 

For more information about the security architecture for Customer-Controlled Regions, see Deployment Architecture for Kubernetes and Security Architecture for Customer-Controlled Regions.

For some connections, there are different regional sites as indicated in the table below.

Connection Host                        IP Addresses Port Description
Mission Control Agent to PubSub+ Home Cloud

Regional Site for United States (US):

production-ivmr.messaging.solace.cloud

Regional Site for United States:

  • 34.233.110.233
  • 52.205.60.66
  • 54.204.227.82

55443

TLS encrypted SMF traffic between the Mission Control Agent and the Home Cloud. For more information, see Information Exchanged Between the PubSub+ Home Cloud and the Mission Control Agent.

Regional Site for Australia (AUS):

prod-aws-au-1-ivmr.messaging.solace.cloud

Regional Site: Australia:

  • 13.236.32.115
  • 3.106.10.188
  • 3.105.186.75

Regional Site for Singapore (SG):

prod-aws-sg-ivmr.messaging.solace.cloud

Regional Site for Singapore:

  • 13.228.252.157
  • 18.139.22.7
   
Datadog Agents to Datadog Servers
  • api.datadoghq.com
  • agent-http-intake.logs.datadoghq.com

  • *.agent.datadoghq.com

There are multiple IP addresses that must be configured for both the Mission Control Agent and the event broker services.

For the Mission Control Agent:

You must configure the addresses directly to Datadog. See https://ip-ranges.datadoghq.com/ for information.

For event broker services: This is required for monitoring traffic to the central monitoring service (Datadog). For details about the external IP addresses, see Getting the IP Addresses for Monitoring Traffic.

 443

Required for monitoring traffic and metrics.

TLS encrypted traffic between each Datadog agent (one per Solace pod, including Mission Control Agent) and Datadog server.

Note for the Mission Control Agent, you must configure the addresses directly .

Kubernetes to Google
Container Registry
gcr.io( storage.googleapis.com )

This is not a single fixed IP address but can be proxied.

443

Required to download Solace's Container images.

TLS encrypted traffic between each Kubernetes cluster and gcr.io.

Note: You do not need to allow this host and port combination if you choose to configure an image repository in your data center to mirror Solace's Container Registry (gcr.io).

For more information, see the Solace Container Registry information in Connectivity Model for Kubernetes Deployments.

Mission Control Agent to PubSub+ Home Cloud maas-secure-prod.s3.amazonaws.com

N/A

443

Required to download the certificate files for the created event broker service.

${bucket_name}.s3.amazonaws.com

N/A

443

This is a unique value for each private data center. Refer to the table of bucket names when deploying PubSub+ Cloud.

This is required for gathering diagnostic information.

S3 Bucket Names for Gathered Diagnostics

As detailed in the table in Connection Details for Operational Connectivity above, host address to an Amazon S3 bucket is required for gathering diagnostics. Replace {bucket_name} in the ${bucket_Name}.s3.amazonaws.com string with the appropriate value from the S3 Bucket Name column in the table below. When selecting the S3 bucket, choose the one that is geographically closest to the region where your event broker services are being deployed.

S3 Bucket Name AWS Region
solace-gd-af-south-1 Africa (Cape Town) – af-south-1
solace-gd-ap-northeast-1 Asia Pacific (Tokyo) – ap-northeast-1
solace-gd-ap-northeast-2 Asia Pacific (Seoul) – ap-northeast-2
solace-gd-ap-northeast-3 Asia Pacific (Osaka) – ap-northeast-3
solace-gd-ap-south-1 Asia Pacific (Mumbai) – ap-south-1
solace-gd-ap-southeast-1 Asia Pacific (Singapore) – ap-southeast-1
solace-gd-ap-southeast-2 Asia Pacific (Sydney) – ap-southeast-2
solace-gd-ca-central-1 Canada (Central) – ca-central-1
solace-gd-eu-central-1 EU (Frankfurt) – eu-central-1
solace-gd-eu-north-1 EU (Stockholm) – eu-north-1
solace-gd-eu-west-1 EU (Ireland) – eu-west-1
solace-gd-eu-west-2 EU (London) – eu-west-2
solace-gd-eu-west-3 EU (Paris) – eu-west-3
solace-gd-us-east-1 US East (N. Virginia) – us-east-1
solace-gd-us-east-2 US East (Ohio) – us-east-2
solace-gd-us-west-1 US West (N. California) – us-west-1
solace-gd-us-west-2 US West (Oregon) – us-west-2

Connection Details for Amazon Web Service (AWS) Deployments

Support for VM-based deployments is now deprecated and version 10.0.1 was the last event broker release that supported deployments in VM-based regions. For more details, see the Deprecated Features list.

The following are the connection details are for VM-based deployments on Virtual Networks (VNets) on Amazon Web Services (AWS) deployments. If you are deploying with Kubernetes [Amazon Elastic Kubernetes Service (EKS)] on the Virtual Networks (VNets), see the connection details in the Connection Details for Operational Connectivity.

Source Destination Port Protocol Description
Mission Control Agent EC2

PubSub+ Home Cloud:

34.233.110.233

55443 SMFs/TCP Control traffic from Home Cloud
Mission Control Agent EC2

PubSub+ Home Cloud:

52.5.82.203

100.24.177.220

443 HTTPs Retrieve bootstrap info
Mission Control Agent EC2

868978040651.dkr.ecr.us-east-1.amazonaws.com:

234.202.110.152

18.215.24.247

3.211.214.161

3.214.195.203

3.224.48.7

3.226.62.160

34.195.38.47

18.211.154.191

443 HTTPs Retrieve Docker images
Mission Control Agent EC2

You must configure the addresses directly to Datadog. See https://ip-ranges.datadoghq.com/ for information. For the fully-qualified domain names, you can use the following:

    • api.datadoghq.com
    • agent-http-intake.logs.datadoghq.com

    • *.agent.datadoghq.com

443 TCP Send metrics
Mission Control Agent EC2

us-east-1.ec2.archive.ubuntu.com:

34.237.137.22

34.201.250.36

52.91.65.63

52.73.36.184

34.229.150.131

54.172.25.22

3.209.10.109

54.152.129.43

52.207.133.243

54.165.17.230

80 HTTP Retrieve security updates
Event Broker Service EC2

Monitoring traffic (Datadog).

For details about the external IP addresses, see Getting the IP Addresses for Monitoring Traffic.

443

TCP Send monitoring traffic and metrics
Event Broker Service EC2

us-east-1.ec2.archive.ubuntu.com:

34.237.137.22

34.201.250.36

52.91.65.63

52.73.36.184

34.229.150.131

54.172.25.22

3.209.10.109

54.152.129.43

52.207.133.243

54.165.17.230

80 HTTP Retrieve security updates
External Clients N/A Various ports (e.g., 55555, 55003, 55443, 9000, 9443, 8443, 8883, 8000, 1883, 5671, 5672, 443, 80, 943, 22) and are configured on a specific event broker service Supported protocols that are configured on a specific event broker service Required the clients (publishers, subscribers) that use event broker services.
External hosts N/A Various ports (e.g., 9000, 9443, 8443, 8883, 8000, 1883, 5671, 5672, 443, 80, 943, 22) and are configured on a specific event broker service Supported protocols that are configured on a specific event broker service Required for outbound connections initiated by the event broker service to the external host.

If the customer's security policy doesn't permit port 80 to be open, the Mission Control Agent EC2 must be periodically recreated with an updated AMI to obtain the latest security patches. Contact Solace for assistance to obtain an updated AMI.

Connection Details for Azure Deployments

Support for VM-based deployments is now deprecated and version 10.0.1 was the last event broker release that supported deployments in VM-based regions. For more details, see the Deprecated Features list.

The following are the connection details for VM-based deployments on Virtual Private Clouds (VPCs) on Azure. If you deploying Kubernetes [Azure Kubernetes Service (AKS)] on the VPCs, refer to the connection details in Connection Details for Operational Connectivity.

Source Destination Port Protocol Description
Mission Control Agent VM

Home Cloud:

34.233.110.233

55443 SMFs/TCP Control traffic from Home Cloud
Mission Control Agent VM

Home Cloud:

52.5.82.203

100.24.177.220

443 HTTPs Retrieve configuration information
Mission Control Agent VM

868978040651.dkr.ecr.us-east-1.amazonaws.com:

234.202.110.152

18.215.24.247

3.211.214.161

3.214.195.203

3.224.48.7

3.226.62.160

34.195.38.47

18.211.154.191

443 HTTPs Retrieve Docker images
Mission Control Agent VM

You must configure the addresses directly to Datadog. See https://ip-ranges.datadoghq.com/ for information. For the fully-qualified domain names, you can use the following:

    • api.datadoghq.com
    • agent-http-intake.logs.datadoghq.com

    • *.agent.datadoghq.com

443 TCP Send metrics
Mission Control Agent VM

The specific destinations are determined based on the mirror sites for security updates. You can contact Solace to get updates for the Mission Control Agent.

80 HTTP Retrieve security updates
Event Broker Service VM

Monitoring traffic (Datadog).

For details about the external IP addresses, see Getting the IP Addresses for Monitoring Traffic.

443

TCP Send monitoring traffic and metrics
Event Broker Service VM

The specific destinations are determined based on the mirror sites for security updates. Security updates are provided when the event broker services are upgraded.

80 HTTP Retrieve security updates
External Clients N/A Various ports (e.g., 55555, 55003, 55443, 9000, 9443, 8443, 8883, 8000, 1883, 5671, 5672, 443, 80, 943, 22) and are configured on a specific event broker service Supported protocols that are configured on a specific event broker service Required the clients (publishers, subscribers) that use event broker services.
External hosts N/A Various ports (e.g., 55555, 55003, 55443, 9000, 9443, 8443, 8883, 8000, 1883, 5671, 5672, 443, 80, 943, 22) and are configured on a specific event broker service Supported protocols that are configured on a specific event broker service Required for outbound connections initiated by the event broker to the external host.

If the customer's security policy doesn't permit port 80 to be open, the Mission Control Agent VM must be periodically recreated with an updated managed image to obtain the latest security patches. Contact Solace for assistance to obtain an updated managed image.