Configure ports and set up firewalls

You are currently viewing version 1.1 of the Apigee hybrid documentation.This version is end of life. You should upgrade to a newer version. For more information, seeSupported versions.

Understanding which ports the hybrid runtime plane uses is important for enterpriseimplementations. This section describes the ports used for secure communications within theruntime plane as well as external ports used for communications with external services.

Internal connections

Communication between the runtime plane and management plane is secured with TLS 1-way and OAuth2.0. Individual services use different protocols, depending on which service they are communicatingwith.

The following image shows the ports and communications channels within the hybrid runtimeplane:

Shows connectionsbetween internal components on the hybrid runtime plane

The following table describes the ports and communications channels within the hybrid runtimeplane:

Internal Connections
SourceDestinationProtocol/Port(s)Security ProtocolDescription
MARTCassandraTCP/9042
TCP/9142
mTLSSends data for persistence
MART Istio IngressMARTTCP/8443TLSRequests from the management plane go through the MART Istio Ingress
Default Istio IngressMessage ProcessorTCP/8443TLS (Apigee-generated, self-signed cert)Processes incoming API requests
Message ProcessorCassandraTCP/9042
TCP/9142
mTLSSends data for persistence
Message Processorfluentd (Analytics)TCP/20001mTLSStreams data to the data collection pod
CassandraCassandraTCP/7001mTLSIntra-node cluster communications. Note that you can also leave port 7000 open for firewall configuration as a backup option for potential troubleshooting.
PrometheusCassandraTCP/7070 (HTTPS)TLSScrapes metrics data from various services
MARTTCP/8843 (HTTPS)TLS
Message ProcessorTCP/8843 (HTTPS)TLS
SynchronizerTCP/8843 (HTTPS)TLS
UDCATCP/7070 (HTTPS)TLS

External connections

To appropriately configure your network firewall, you should know the inbound and outbound portsused by hybrid to communicate with external services.

The following image shows the ports used for external communications with the hybrid runtimeplane:

Shows connectionswith external services from the hybrid runtime plane

The following table describes the ports used for external communications with the hybrid runtimeplane:

External Connections
SourceDestinationProtocol/Port(s)Security ProtocolDescription
Inbound Connections (exposed externally)
Apigee ServicesMART Istio IngressTCP/443OAuth over TLS 1.2Hybrid API calls from the management plane
Client AppsDefault Istio IngressTCP/*None/OAuth over TLS 1.2/mTLSAPI requests from external apps
Outbound Connections
Message ProcessorBackend servicesTCP/*
UDP/*
None/OAuth over TLS 1.2Sends requests to customer-defined hosts
SynchronizerApigee ServicesTCP/443OAuth over TLS 1.2Fetches configuration data; connects toapigee.googleapis.com
GCPConnects toiamcredentials.googleapis.com for authorization
UDCA (Analytics)Apigee Services (UAP)TCP/443OAuth over TLS 1.2Sends data to UAP in the management plane and to GCP; connects toapigee.googleapis.com andstorage.googleapis.com
Prometheus (Metrics)GCP (Stackdriver)TCP/443TLSSends data to Stackdriver in the management plane; connects tomonitoring.googleapis.com
fluentd (Logging)GCP (Stackdriver)TCP/443TLSSends data to Stackdriver in the management plane; connects tologging.googleapis.com
MARTGCPTCP/443OAuth over TLS 1.2Connects toiamcredentials.googleapis.com for authorization
* indicates that the port is configurable. Apigee recommends using 443.

You should not allow external connections for any specific IP addresses associated with*.googleapis.com. The IP addresses can change since the domain currently resolves tomultiple addresses.

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-18 UTC.