tencent cloud

Elastic MapReduce

Release Notes and Announcements
Release Notes
Announcements
Security Announcements
Product Introduction
Overview
Strengths
Architecture
Features
Use Cases
Constraints and Limits
Technical Support Scope
Product release
Purchase Guide
EMR on CVM Billing Instructions
EMR on TKE Billing Instructions
EMR Serverless HBase Billing Instructions
Getting Started
EMR on CVM Quick Start
EMR on TKE Quick Start
EMR on CVM Operation Guide
Planning Cluster
Administrative rights
Configuring Cluster
Managing Cluster
Managing Service
Monitoring and Alarms
TCInsight
EMR on TKE Operation Guide
Introduction to EMR on TKE
Configuring Cluster
Cluster Management
Service Management
Monitoring and Ops
Application Analysis
EMR Serverless HBase Operation Guide
EMR Serverless HBase Product Introduction
Quotas and Limits
Planning an Instance
Managing an Instance
Monitoring and Alarms
Development Guide
EMR Development Guide
Hadoop Development Guide
Spark Development Guide
Hbase Development Guide
Phoenix on Hbase Development Guide
Hive Development Guide
Presto Development Guide
Sqoop Development Guide
Hue Development Guide
Oozie Development Guide
Flume Development Guide
Kerberos Development Guide
Knox Development Guide
Alluxio Development Guide
Kylin Development Guide
Livy Development Guide
Kyuubi Development Guide
Zeppelin Development Guide
Hudi Development Guide
Superset Development Guide
Impala Development Guide
Druid Development Guide
TensorFlow Development Guide
Kudu Development Guide
Ranger Development Guide
Kafka Development Guide
Iceberg Development Guide
StarRocks Development Guide
Flink Development Guide
JupyterLab Development Guide
MLflow Development Guide
Practical Tutorial
Practice of EMR on CVM Ops
Data Migration
Practical Tutorial on Custom Scaling
API Documentation
History
Introduction
API Category
Cluster Resource Management APIs
Cluster Services APIs
User Management APIs
Data Inquiry APIs
Scaling APIs
Configuration APIs
Other APIs
Serverless HBase APIs
YARN Resource Scheduling APIs
Making API Requests
Data Types
Error Codes
FAQs
EMR on CVM
Service Level Agreement
Contact Us

Setting Security Groups

PDF
フォーカスモード
フォントサイズ
最終更新日: 2025-11-28 14:46:32
EMR uses Tencent Cloud VPC as the underlying network. Security groups in EMR are used as virtual firewalls to control the access between the internal nodes in a cluster and access from external nodes to internal nodes. This document provides a practical tutorial for using security groups in Elastic MapReduce (EMR) to help you select security group policies.

Security Groups

A security group is a virtual firewall for stateful data packet filtering. As an important network isolation approach provided by Tencent Cloud, it is used to control network access to CVM instances (nodes). When creating an EMR cluster, you can select an existing security group. If there is no existing security group, EMR will automatically create one for you. If the number of security groups has reached the upper limit and you want to create a new one, delete those you no longer use. You can view existing security groups in the VPC console.

Use Limits and Rules

For use limits and quotas of security groups, see the Security Group Limits section in Use Limits Overview.
A security group rule consists of:
Source: IP address of the source data (inbound) or target data (outbound).
Protocol type and protocol port: protocol type such as TCP and UDP.
Policy: allow or reject access requests.

Rules for Selecting a Security Group

By default, Select an existing security group is selected and an EMR security group is selected. You can create a new EMR security group or select a non-EMR security group.
1. When an EMR security group is created, port 30002 and the necessary private network IP ranges will be opened by default. If remote login is enabled, port 22 will also be opened. The security group is named in the format of "emr-xxxxxxxx_yyyyMMdd". Do not modify its name.
2. Select an existing security group available in the current region for the current instance. A security group starting with "emr" is recommended, as EMR service has been activated and necessary policies are running properly for such security groups. Security groups not starting with "emr" may lack necessary inbound and outbound rules. This may cause cluster creation failure or cluster unavailability.
3. When you scale out a cluster, the new nodes will inherit the security group policy that was selected during the cluster’s creation by default.

Details of EMR Security Group Policies

Inbound Rules for Allowing Traffic from the Private Network (VPC IP Ranges)

When you create an EMR cluster and use a non-EMR security group, the inbound rules should allow traffic from the private network IP ranges. Otherwise, the cluster cannot be created. For example, if the selected Virtual Private Cloud (VPC) IP range belongs to the IP range A, the inbound rules should be configured to allow traffic from the IP range A.

Inbound rules

Source
Protocol Port
Policy
Note
10.0.0.0/8
ALL
ACCEPT
Opens IP range A.
172.16.0.0/12
ALL
ACCEPT
Opens IP range B.
192.168.0.0/16
ALL
ACCEPT
Opens IP range C.
0.0.0.0/0
ICMP
ACCEPT
Opens local ICMP.

Inbound Rules for Allowing the Ping Service

When you use a non-EMR security group and need to allow the Ping service, the inbound rules should include the following policies:
Source
Protocol Port
Policy
Remarks
0.0.0.0/0
ICMP
ACCEPT
Open local ICMP.

Inbound Rules for Accessing the WebUI

When you use a non-EMR security group, to ensure normal access to the cluster service WebUI, the inbound rules should include the following policies:
Source
Protocol Port
Policy
Remarks
0.0.0.0/0
TCP:13000
ACCEPT
Port 13000, Hue port.
0.0.0.0/0
TCP:30002
ACCEPT
Open port 30002.

Inbound Rules for Allowing Linux SSH Login

When you use a non-EMR security group and need to enable Linux SSH remote login, the inbound rules should include the following policies:
Source
Protocol Port
Policy
Remarks
0.0.0.0/0
TCP:22
ACCEPT
Open port 22 for remote login.

Outbound rules

Source
Protocol Port
Policy
Note
0.0.0.0/0
ALL
ACCEPT
Opens all outbound ports.
For more information, see Security Group.

ヘルプとサポート

この記事はお役に立ちましたか?

フィードバック