Secure ports usage

Understanding which ports the hybrid runtime plane uses is important for enterprise implementations. This section describes the ports used for secure communications within the runtime plane as well as external ports used for communications with external services.

Internal connections

Communication between the runtime plane and management plane is secured with TLS 1-way and OAuth 2.0. Individual services use different protocols, depending on which service they are communicating with.

The certificates used for intra-component communication are generated by Apigee's certificate manager. You do not have to provide a certificate or manage it.

The following image shows the ports and communications channels within the hybrid runtime plane:

Shows connections
between internal components on the hybrid runtime plane

The following table describes the ports and communications channels within the hybrid runtime plane:

Internal Connections
Source
Destination
Protocol/Ports
Security protocol
Description
MART
Cassandra
TCP/9042
TCP/9142
TLS
Sends data for persistence.
Apigee Connect
MART
TCP/8443
TLS
Requests from the management plane go through Apigee Connect. Apigee Connect initiates the connection.
Default Istio Ingress
Message Processor
TCP/8443
TLS (Apigee-generated, self-signed cert)
Processes incoming API requests.
Message Processor
Cassandra
TCP/9042
TCP/9142
TLS
Sends data for persistence.
Message Processor
fluentd (analytics / logging)
TCP/20001
mTLS
Streams data to the data collection pod.
Cassandra
Cassandra
TCP/7001
mTLS
Intra-node cluster communications. Note that you can also leave port 7000 open for firewall configuration as a backup option for potential troubleshooting.
Synchronizer
Cassandra
TCP/9042
TCP/9142
TLS
Sends data for persistence.
Prometheus (metrics)
Cassandra
TCP/7070 (HTTPS)
TLS
Scrapes metrics data from various services.
MART
TCP/8843 (HTTPS)
TLS
Message Processor
TCP/8843 (HTTPS)
TLS
Synchronizer
TCP/8843 (HTTPS)
TLS
UDCA
TCP/7070 (HTTPS)
TLS
Watcher
Default Istio Ingress
TCP/8843
TLS
Makes virtual hosts related changes to configure istio ingress.

External connections

To appropriately configure your network firewall, you should know the inbound and outbound ports used by hybrid to communicate with external services.

The following image shows the ports used for external communications with the hybrid runtime plane:

Shows connections
with external services from the hybrid runtime plane

The following table describes the ports used for external communications with the hybrid runtime plane:

External Connections
Source
Destination
Protocol/Port(s)
Security Protocol
Description
Inbound Connections (exposed externally)
OPTIONAL: Apigee Services
Only if not using Apigee Connect (recommended) . See Two-way Connections below.
MART Istio Ingress
TCP/443
OAuth over TLS 1.2
Hybrid API calls from the management plane.
Client Apps
Default Istio Ingress
TCP/*
None/OAuth over TLS 1.2
API requests from external apps.
Outbound Connections
Message Processor
Backend services
TCP/*
UDP/*
None/OAuth over TLS 1.2
Sends requests to customer-defined hosts.
Synchronizer
Apigee Services
TCP/443
OAuth over TLS 1.2
Fetches configuration data; connects to apigee.googleapis.com .
Google Cloud
Connects to iamcredentials.googleapis.com for authorization.
UDCA (Analytics)
Apigee Services (UAP)
TCP/443
OAuth over TLS 1.2
Sends data to UAP in the management plane and to Google Cloud; connects to apigee.googleapis.com and storage.googleapis.com .
Apigee Connect
Apigee Services
TCP/443
TLS
Establishes the connection with the management plane; connects to apigeeconnect.googleapis.com .
Prometheus (metrics)
Google Cloud (Cloud Operations)
TCP/443
TLS
Sends data to Cloud Operations in the management plane; connects to monitoring.googleapis.com .
fluentd (logging)
Google Cloud (Cloud Operations)
TCP/443
TLS
Sends data to Cloud Operations in the management plane; connects to logging.googleapis.com
MART
Google Cloud
TCP/443
OAuth over TLS 1.2
Connects to iamcredentials.googleapis.com for authorization.
Message Processor
Distributed Trace back end
http or https
TLS (configurable)
(Optional) Communicates trace information to the Distributed Trace back end service. Configure the service and protocol in the TraceConfig API . The back end for Distributed Trace is usually Cloud Trace or Jaeger.
Two-way Connections
Apigee Connect
Apigee Services
TCP/443
TLS
Communicates management data between the managemennt plane and the Management API for runtime data (MART) in the runtime plane. Apigee Connect initiates the connection; connects to apigeeconnect.googleapis.com . Therefore, you do not need to configure your firewall for inbound connectivity.
Watcher
Google Cloud
TCP/443
OAuth over TLS 1.2
Pulls virtual hosts related changes for an org to configure istio ingress.
* indicates that the port is configurable. Apigee recommends using port 443.

You should not allow external connections for specific IP addresses associated with *.googleapis.com . The IP addresses can change since the domain currently resolves to multiple addresses.

Design a Mobile Site
View Site in Mobile | Classic
Share by: