Yandex Cloud
Search
Contact UsGet started
  • Blog
  • Pricing
  • Documentation
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • ML & AI
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Customer Stories
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
    • Yandex Cloud Partner program
  • Blog
  • Pricing
  • Documentation
© 2025 Direct Cursus Technology L.L.C.
Yandex Managed Service for Apache Kafka®
  • Getting started
    • Resource relationships
    • Topics and partitions
    • Brokers
    • KRaft protocol
    • Producers and consumers
    • Managing data schemas
    • APIs in Managed Service for Apache Kafka®
    • Host classes
    • Networking in Managed Service for Apache Kafka®
    • Quotas and limits
    • Storage in Managed Service for Apache Kafka®
    • Connectors
    • Maintenance
    • Apache Kafka® settings
  • Access management
  • Pricing policy
  • Terraform reference
  • Yandex Monitoring metrics
  • Audit Trails events
  • Public materials
  • Release notes
  • FAQ

In this article:

  • Host name and FQDN
  • Public access to clusters
  • Security groups
  1. Concepts
  2. Networking in Managed Service for Apache Kafka®

Networking in Managed Service for Apache Kafka®

Written by
Yandex Cloud
Updated at November 27, 2024
  • Host name and FQDN
  • Public access to clusters
  • Security groups

When creating a cluster, you can:

  • Set the network for cluster hosts.
  • Specify the availability zones where the cluster hosts will reside.
  • Set subnets in all availability zones.
  • Turn on public access to the cluster from outside Yandex Cloud.

If there are ZooKeeper hosts in the cluster, each of the three ZooKeeper hosts will use its dedicated availability zone and the subnet selected in it. For more information, see Resource relationships in the service.

Host name and FQDNHost name and FQDN

Managed Service for Apache Kafka® generates the name of each cluster host when creating it. This name will be the host's fully qualified domain name (FQDN). The host name and, consequently, FQDN cannot be changed.

For more information on how to get a host FQDN, see this guide.

You can use the FQDN to access the host within a single cloud network. For more information, see the Yandex Virtual Private Cloud documentation.

Public access to clustersPublic access to clusters

If you request public access when creating a cluster, all broker hosts in the cluster will be accessible from outside Yandex Cloud. To connect to such a cluster, use the FQDN of one or more cluster's broker hosts.

You cannot request public access after creating a cluster.

When you delete a cluster with public access enabled, all public IP addresses assigned to this cluster are revoked.

Security groupsSecurity groups

Security groups follow the All traffic that is not allowed is prohibited principle. To connect to a cluster, configure security group rules. These rules allow traffic from certain ports, IP addresses, or other security groups. For example, a VM will not be able to connect to a cluster in the following cases:

  • The VM is in subnet 10.128.0.0/16, whereas the incoming traffic rules only specify subnet 10.133.0.0/24.
  • The VM is in subnet 10.133.0.0/24 but attempts to access a port not specified in the security group rules.

For information on how to configure security groups, see Pre-configuring a connection to an Apache Kafka® cluster.

Tip

When connecting to a cluster from the same cloud network, configure security groups both for the cluster and the VM you are connecting from.

Specifics of working with security groups:

  • Security group settings only affect whether it will be possible to connect to the cluster. They do not affect cluster operation, such as replication of topic sections by broker hosts, connections between brokers and ZooKeeper hosts, and other features.

  • Even if the cluster and the connecting VM are in the same security group, there will be no connection unless you set up rules within this group that allow traffic between the VM and the cluster.

    However, by default, such rules are contained within the security group added automatically when creating a cloud network. They are the Self rules that allow unlimited traffic within a group.

Was the article helpful?

Previous
Host classes
Next
Quotas and limits
© 2025 Direct Cursus Technology L.L.C.