Skip to main content

Prerequisites

Before you can create a deployment in the EZ-CDC portal, you need certain AWS resources already in place. This page explains what you need before starting the deployment wizard.

What does the portal handle?

The deployment wizard guides you through creating the IAM role (via CloudFormation) and automatically provisions security groups, worker instances, and the VPC Endpoint (for PrivateLink mode). You only need to prepare your networking and databases beforehand.

Choose Your Connectivity Mode

EZ-CDC offers two connectivity modes. Choose based on your security requirements:

ModeDescriptionBest For
StandardWorkers connect to control-plane via public internet (HTTPS)Most use cases, simpler setup
PrivateLinkWorkers connect via AWS PrivateLink (no public internet)Enterprise, strict security requirements

Standard Mode Prerequisites

For standard connectivity, workers connect to the EZ-CDC control-plane over the public internet using HTTPS/TLS encryption.

What You Need Before Starting

1. A VPC

Any VPC in a supported region. No special configuration required.

2. At Least 2 Subnets with Internet Access

  • In different Availability Zones (for high availability)
  • Must have outbound internet access

Workers need outbound connectivity to the EZ-CDC control-plane on port 443 (HTTPS/gRPC).

Standard Mode Architecture
Optional: NAT Gateway

By default, workers run in subnets with direct internet access. If you prefer workers to remain in private subnets without public IPs, you can add a NAT Gateway to provide outbound connectivity. This is optional and depends on your security requirements.

3. Network Access to Your Databases

From the subnets you select, workers must be able to reach:

DatabasePort
PostgreSQL (source)5432
StarRocks (sink)9030, 8040

Standard Mode Checklist

□ VPC in a supported region
□ 2+ subnets in different AZs with outbound internet access
□ PostgreSQL reachable from subnets (port 5432)
□ StarRocks reachable from subnets (port 9030, 8040)

For PrivateLink connectivity, workers connect to the EZ-CDC control-plane through AWS PrivateLink. Traffic never leaves the AWS network.

Automatic VPC Endpoint

The VPC Endpoint that connects workers to the EZ-CDC control-plane is created automatically during deployment. You do not need to create it yourself.

What You Need Before Starting

1. A VPC with DNS Enabled

Critical: Your VPC must have these settings enabled:

enable_dns_support   = true
enable_dns_hostnames = true

Without these settings, the VPC Endpoint created during deployment will not work.

Verify in AWS Console:

  1. Go to VPC → Your VPCs
  2. Select your VPC
  3. Check "DNS resolution" and "DNS hostnames" are both Enabled

Or verify with AWS CLI:

aws ec2 describe-vpc-attribute --vpc-id vpc-xxx --attribute enableDnsSupport
aws ec2 describe-vpc-attribute --vpc-id vpc-xxx --attribute enableDnsHostnames

If not enabled, enable them:

aws ec2 modify-vpc-attribute --vpc-id vpc-xxx --enable-dns-support '{"Value":true}'
aws ec2 modify-vpc-attribute --vpc-id vpc-xxx --enable-dns-hostnames '{"Value":true}'

2. At Least 2 Private Subnets

  • In different Availability Zones (for high availability)
PrivateLink Mode Architecture

No outbound internet access is needed. Workers download binaries and communicate with the control-plane entirely through the VPC Endpoint (created automatically during deployment).

3. Network Access to Your Databases

From the subnets you select, workers must be able to reach:

DatabasePort
PostgreSQL (source)5432
StarRocks (sink)9030, 8040
□ VPC with DNS support ENABLED
□ VPC with DNS hostnames ENABLED
□ 2+ private subnets in different AZs
□ PostgreSQL reachable from subnets (port 5432)
□ StarRocks reachable from subnets (port 9030, 8040)

Database Requirements

Both connectivity modes require your databases to be properly configured.

PostgreSQL Source

RequirementValue
VersionPostgreSQL 12+
WAL Levellogical
Max Replication SlotsAt least 1 available per job
Max WAL SendersAt least 1 available per job

Verify with:

SHOW wal_level;             -- Must be 'logical'
SHOW max_replication_slots; -- Must have available slots
SHOW max_wal_senders; -- Must have available senders

See PostgreSQL Requirements for detailed setup.

StarRocks Sink

RequirementValue
VersionStarRocks 2.5+
Stream LoadEnabled
HTTP Port8040 accessible
MySQL Port9030 accessible

See StarRocks Requirements for detailed setup.


Supported Regions

EZ-CDC supports deployment in these AWS regions:

RegionName
us-east-1N. Virginia
us-east-2Ohio
us-west-2Oregon
eu-west-1Ireland
eu-central-1Frankfurt
ap-southeast-1Singapore

Summary

RequirementStandard ModePrivateLink Mode
VPCAnyDNS enabled (both settings)
Subnets2+ in different AZs, with internet access2+ private, in different AZs
Internet accessRequiredNot required
PostgreSQL accessFrom subnetsFrom subnets
StarRocks accessFrom subnetsFrom subnets

Created Automatically During Deployment

These resources are provisioned by EZ-CDC when you create a deployment — you do not need to set them up:

ResourceDescription
IAM RoleCreated via guided CloudFormation in the portal wizard
Security GroupsEgress-only rules for worker communication
Auto Scaling GroupWorker EC2 instances
VPC EndpointPrivateLink connection to EZ-CDC (PrivateLink mode only)
CloudWatch Log GroupsWorker and daemon logs
Worker IAM ProfilePermissions for S3, CloudWatch, SSM

Next Steps

Once you have all prerequisites in place:

  1. Create Deployment - The wizard guides you through IAM role setup, network configuration, and launching workers