tencent cloud

TDMQ for CKafka

Release Notes and Announcements
Release Notes
Broker Release Notes
Announcement
Product Introduction
Introduction and Selection of the TDMQ Product Series
What Is TDMQ for CKafka
Strengths
Scenarios
Technology Architecture
Product Series Introduction
Apache Kafka Version Support Description
Comparison with Apache Kafka
High Availability
Use Limits
Regions and AZs
Related Cloud Services
Billing
Billing Overview
Pricing
Billing Example
Changing from Postpaid by Hour to Monthly Subscription
Renewal
Viewing Consumption Details
Overdue Payments
Refund
Getting Started
Guide for Getting Started
Preparations
VPC Network Access
Public Domain Name Access
User Guide
Usage Process Guide
Configuring Account Permission
Creating Instance
Configuring Topic
Connecting Instance
Managing Messages
Managing Consumer Group
Managing Instance
Changing Instance Specification
Configuring Traffic Throttling
Configuring Elastic Scaling Policy
Configuring Advanced Features
Viewing Monitoring Data and Configuring Alarm Rules
Synchronizing Data Using CKafka Connector
Use Cases
Cluster Resource Assessment
Client Practical Tutorial
Log Integration
Open-Source Ecosystem Integration
Replacing Supporting Route (Old)
Migration Guide
Migration Solution Overview
Migrating Cluster Using Open-Source Tool
Troubleshooting
Topics
Clients
Messages
​​API Reference
History
Introduction
API Category
Making API Requests
Other APIs
ACL APIs
Instance APIs
Routing APIs
DataHub APIs
Topic APIs
Data Types
Error Codes
SDK Reference
SDK Overview
Java SDK
Python SDK
Go SDK
PHP SDK
C++ SDK
Node.js SDK
SDK for Connector
Security and Compliance
Permission Management
Network Security
Deletion Protection
Event Record
CloudAudit
FAQs
Instances
Topics
Consumer Groups
Client-Related
Network-Related
Monitoring
Messages
Agreements
CKafka Service Level Agreements
Contact Us
Glossary

Network Connection Instructions

PDF
포커스 모드
폰트 크기
마지막 업데이트 시간: 2026-01-20 16:52:40
TDMQ for CKafka (CKafka) supports both private and public network access, with connection requirements varying depending on the network type.

Connection Method Description

Connection Method
Connection Description
Reference Documentation
Private network connection
If the client and the CKafka instance are deployed in the same Virtual Private Cloud (VPC) network, they are interconnected by default, and no additional configuration is required.
If the client and the CKafka instance are deployed in different VPC networks, they cannot communicate with each other directly because different VPC networks are logically isolated. To enable VPC networks in different regions under the same account to communicate with each other, use Cloud Connect Network (CCN).
Public network connection
A dedicated public network route needs to be enabled, allowing clients to connect to the CKafka instance via the public network. Since public networks are accessible from any network environment, the access control list (ACL) policies shall be configured to manage user access permissions and ensure connection security.
Normally, it is recommended that you prioritize private network access to achieve lower network latency, higher transmission bandwidth, and better security isolation, especially for core businesses in production environments. Public network access can be enabled when your businesses need to provide services or conduct development and debugging through the public network. When the public network access is enabled, you shall configure ACL policies to control user access permissions and ensure data security.

Security Protocol Type Description

To ensure security, CKafka provides multiple security authentication mechanisms. Select an appropriate authentication method based on the security requirements for message transmission when adding network routing policies.

Basic Concepts

Simple Authentication and Security Layer (SASL): is a security protocol used for identity authentication, supporting two authentication mechanisms:
PLAIN mechanism: uses simple authentication where usernames and passwords are transmitted in plain text.
SCRAM mechanism: uses hash algorithms to securely authenticate usernames and passwords between the server and client. CKafka supports two SCRAM encryption algorithms with different security strengths: SCRAM-SHA-256 and SCRAM_SHA_512.
Secure Sockets Layer (SSL): is a security protocol for data transmission that uses encryption technology to prevent data from being stolen or tampered with during transmission, effectively enhancing communication security.

Protocol Comparison

Protocol Type
Protocol Description
Supported by the VPC Network or Not
Supported by the Public Network or Not
PLAINTEXT
Authentication is not required for message sending and receiving, and data is transmitted in plaintext.
×
SASL_PLAINTEXT
SASL authentication is required for message sending and receiving, and data is transmitted in plaintext, showing higher performance.
SASL_SSL
SASL authentication is required for message sending and receiving, and data is encrypted using SSL certificates for transmission to prevent interception or eavesdropping, showing higher security.
✓ (Only supported by Pro Edition, and not supported by version 3.2.3 currently)
✓ (Only supported by Pro Edition, and not supported by version 3.2.3 currently)
SASL_SCRAM_SHA_256
SASL authentication is required for message sending and receiving. Passwords are stored using a hash algorithm (SHA-256) and not transmitted in plaintext. Data is transmitted in plaintext.
✓ (Only supported by instances of versions 1.1.1, 2.4.1, and 2.8.1. For existing instances, you need to upgrade the broker minor version or submit a ticket to apply for the upgrade.)
×
SASL_SCRAM_SHA_512
SASL authentication is required for message sending and receiving. Passwords are stored using a hash algorithm (SHA-512) and not transmitted in plaintext. Data is transmitted in plaintext. Compared to SHA-256, SHA-512 provides higher security but consumes more computing resources.
✓ (Only supported by instances of versions 1.1.1, 2.4.1, and 2.8.1. For existing instances, you need to upgrade the broker minor version or submit a ticket to apply for the upgrade.)
×

Security Group Requirements

Since ports may change after cluster configuration changes or migrations, if your server has access restrictions (security groups) configured, allow the following port range on the server to avoid read/write exceptions of messages after configuration changes or migrations.
Port range for VPC routes: 9092–60000.
Port range for public network routes: 50000–53000.
Port range for supporting routes: 6000–12000.

도움말 및 지원

문제 해결에 도움이 되었나요?

피드백