Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • ML Services
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Load Testing
  • Getting started
    • All guides
    • Creating a test agent
    • Configuring test agent security groups
    • Configuring test target security groups
    • Creating a test with data from a bucket
    • Exporting test reports
    • Collecting user requests using Dispatcher
    • Creating and configuring a regression dashboard
    • Checking regression metrics for exceeded thresholds
    • Saving test artifacts to Object Storage
    • Viewing service resource operations
  • Access management
  • Pricing policy
  • Terraform reference
  • Audit Trails events
  • Release notes
  1. Step-by-step guides
  2. Configuring test agent security groups

Configuring test agent security groups

Written by
Yandex Cloud
Updated at May 26, 2025

Warning

Make sure to set up security groups before creating the agent. This way you can restrict the agent's access.

  1. Create an agent security group named agent-sg.
  2. Add rules:
    1. Rule for outbound HTTPS traffic to the Load Testing public API:

      • Port range: 443.
      • Protocol: TCP.
      • Destination name: CIDR.
      • CIDR blocks: 0.0.0.0/0.

      This will allow you to connect the agent to Load Testing to manage tests from the interface and get test results.

    2. Inbound SSH traffic rule:

      • Port range: 22.
      • Protocol: TCP.
      • Destination name: CIDR.
      • CIDR blocks: 0.0.0.0/0.

      This will allow you to connect to the agent over SSH and manage tests from the console or collect debugging information.

    3. Rule for outbound traffic when generating load to the test target:

      • Port range: 0-65535.
      • Protocol: Any.
      • Destination name: Security group.
        Select From list. Specify the security group comprising the test target.

      Create this rule for each test target with a unique security group.

If you plan to use multiple security groups for your agent, allow all traffic between them.
To assign another security group, update the VM network settings in Yandex Compute Cloud.

Note

You can specify more granular rules for your security groups, such as allowing traffic only within specific subnets.

Make sure security groups are properly configured for all subnets that will host traffic-generating agents.

Was the article helpful?

Previous
Creating a test agent
Next
Configuring test target security groups
© 2025 Direct Cursus Technology L.L.C.