Prerequisites for the Nodinite Message Queueing Monitoring Agent
💡This page describes the prerequisites for installing and running the Nodinite Message Queueing Monitoring Agent.
Unlock seamless monitoring of your enterprise message queues with the Nodinite Message Queueing Monitoring Agent. This page guides you through all prerequisites to ensure a smooth installation and optimal performance for ActiveMQ, MSMQ, and Azure Service Bus environments.
✅ Effortless integration with leading message queue platforms
✅ Centralized, real-time monitoring for on-premise and cloud deployments
✅ Enhanced security and compliance with granular user rights
✅ Scalable architecture for enterprise-grade reliability
Architecture overview: The Nodinite Message Queueing Monitoring Agent connects to multiple queueing technologies for unified monitoring.
Instances of this agent can be installed on-premise using TCP/IP for local network access and/or in the cloud/off-site using Service Bus Relaying (see also the external link for additional information 'Azure Relay FAQs').
We recommend that you keep this agent close to Nodinite Core Services. This documentation covers local network setup (usually on the Nodinite application server)
Software Requirements
The Message Queueing Monitoring Agent is a Windows Service, typically installed on the Nodinite application server for best performance and security.
| Product | Version/Edition |
|---|---|
| Windows Server | Windows 2025 Windows 2022 Windows 2019 Windows 2016 Windows 2012 R2 Windows 2012 |
| .NET Framework | .NET Framework 4.8 or later New 6.0 Our recommendation is .NET Framework 4.8.1 or later |
| ActiveMQ | 5.14.0 and later |
MSMQ
|
For supported Windows versions. NOTE: Additional roles and features may be required depending on the intended usage |
| Azure Service Bus | Current public (GA) version by Microsoft in Azure |
Versions 6.0 and later require .NET Framework 4.8 or later.
Versions 5.4 and later require .NET Framework 4.6.2 or later.
Versions before 5.4 require .NET Framework 4.5.2 or later.
What Windows User Rights does the Message Queueing Monitoring Agent require?
The agent installs as a Windows Service—usually on the Nodinite application server or a supported virtual machine.
- Use a local named account or, preferably, a domain account.
- Grant access and run-time rights.
- Follow the 'How to set logon as a Windows service right' user guide for detailed instructions.
What ActiveMQ User rights does the Message Queueing Monitoring Agent require
Review the Apache ActiveMQ Security guide for best practices on securing your message queues.
What MSMQ User rights does the Message Queueing Monitoring Agent require
For MSMQ, refer to the Securing Messages Using Transport Security user guide for configuration and security recommendations.
What Azure ServiceBus User rights does the Message Queueing Monitoring Agent require
The Nodinite Message Queueing Monitoring Agent requires the following Azure Roles to be set on the ClientId/ApplicationId used to connect with the Azure REST API:
| Service Name | Permission | Comment |
|---|---|---|
| Service Bus Namespace | Azure Service Bus Data Owner | Allows for full access to Azure Service Bus resources. Set on Subscription, or Resource Group Level |
| Subscription | Reader | Show Details and Match/Validate the Subscription Id with the current configuration. NOTE: This right inherits to all other Resources in selected Subscription |
You can apply these rights on different scopes. For more details, review the Authenticate and authorize an application with Azure Active Directory to access Azure Service Bus entities user guide.
Firewall
Depending on where you install the Nodinite Message Queueing Monitoring Agent in relation to Nodinite Monitoring Service and your network's Internet access, you may need to configure firewalls on different servers. The following diagram illustrates the agent installed on its own server.
Network communication overview: The agent requires specific ports for secure and reliable monitoring across platforms.
1. Between the Message Queueing Monitoring Agent and ActiveMQ Broker
Server types: Agent Server (Message Queueing Monitoring Agent), ActiveMQ Server (Apache ActiveMQ Broker).
ActiveMQ Connection (Agent → ActiveMQ Broker)
The agent connects to the ActiveMQ Broker to monitor queues and topics.
| Direction | Source | Destination | Protocol | Port(s) | Purpose | Notes |
|---|---|---|---|---|---|---|
| Outbound | Agent Server | ActiveMQ Server | TCP | 61616 | ActiveMQ remote connection | Default OpenWire protocol port |
| Inbound | ActiveMQ Server | Agent Server | TCP | 61616 | Response traffic | Allowed automatically by stateful firewalls |
Tip
Custom Ports: The ActiveMQ Broker port can be configured in
activemq.xml. Common configurations include port 61616 (OpenWire), 8161 (Web Console), 5672 (AMQP), or custom ports. Adjust firewall rules to match your configuration.
Tip
SSL/TLS: For secure ActiveMQ connections, configure SSL on a custom port (e.g., 61617). Ensure the Agent Server trusts the ActiveMQ SSL certificate. See Apache ActiveMQ Security guide for details.
2. Between the Message Queueing Monitoring Agent and MSMQ Service
Server types: Agent Server (Message Queueing Monitoring Agent), MSMQ Server (Microsoft Message Queuing service).
MSMQ Connection (Agent → MSMQ Service)
The agent connects to MSMQ servers to monitor message queues.
| Direction | Source | Destination | Protocol | Port(s) | Purpose | Notes |
|---|---|---|---|---|---|---|
| Outbound | Agent Server | MSMQ Server | TCP | 1801 | MSMQ TCP connection | Primary MSMQ port |
| Outbound | Agent Server | MSMQ Server | UDP | 1801 | MSMQ UDP connection | Alternative MSMQ protocol |
| Outbound | Agent Server | MSMQ Server | TCP/UDP | 135 | RPC Endpoint Mapper | Maps RPC requests to MSMQ services |
| Outbound | Agent Server | MSMQ Server | TCP | 2101, 2103, 2105 | MSMQ RPC | Additional MSMQ RPC ports |
| Outbound | Agent Server | MSMQ Server | UDP | 3527 | MSMQ Ping | MSMQ discovery protocol |
| Inbound | MSMQ Server | Agent Server | TCP/UDP | 135, 1801, 2101, 2103, 2105, 3527 | Response traffic | Allowed automatically by stateful firewalls |
Tip
MSMQ Port List: For a comprehensive list of MSMQ ports, review the Microsoft guide 'Network Ports Used by Message Queuing'.
Tip
MSMQ Security: For production environments, enable MSMQ transport security with encryption and authentication.
3. Between the Message Queueing Monitoring Agent and Azure Service Bus
Server types: Agent Server (Message Queueing Monitoring Agent), Azure Cloud (Azure Service Bus namespace).
Azure Service Bus Connection (Agent → Azure Cloud)
The agent connects to Azure Service Bus to monitor queues and topics using HTTPS and AMQP protocols.
| Direction | Source | Destination | Protocol | Port(s) | Purpose | Notes |
|---|---|---|---|---|---|---|
| Outbound | Agent Server | Azure Cloud (Service Bus) | TCP | 443 | HTTPS Azure REST API | Service Bus management and monitoring |
| Outbound | Agent Server | Azure Cloud (Service Bus) | TCP | 5671, 5672 | AMQP with TLS | Advanced Message Queuing Protocol |
| Inbound | Azure Cloud | Agent Server | TCP | 443, 5671, 5672 | Response traffic | Allowed automatically by stateful firewalls |
Tip
Azure Service Bus Ports: Azure Service Bus supports both HTTPS (port 443) and AMQP (ports 5671, 5672). For details, see Azure Service Bus FAQ - What ports do I need to open on the firewall?
Tip
Connectivity Testing: Use PowerShell to verify connectivity:
Test-NetConnection -ComputerName [service bus name].servicebus.windows.net -Port 5671 Test-NetConnection -ComputerName [service bus name].servicebus.windows.net -Port 5672Repeat for each unique Azure Service Bus namespace in use.
Tip
Azure Authentication: The agent requires Azure Active Directory authentication. Ensure the ClientId/ApplicationId has Azure Service Bus Data Owner role and Reader role on the Subscription. See Authenticate and authorize an application with Azure Active Directory to access Azure Service Bus entities.
Note
No Inbound Rules on Azure: Azure Service Bus is a cloud service accessed outbound from the Agent Server. No inbound firewall rules are required on the Azure side.
4. Between the Monitoring Service and the Nodinite Message Queueing Monitoring Agent
The following ports must be allowed on the Windows server where the agent is installed and running:
| Port | Name | Inbound | Outbound | TCP | UDP | Nodinite Version | Comment |
|---|---|---|---|---|---|---|---|
| 53 | DNS | All | The Agent needs to know where your other servers/services are (can sometimes optionally be solved using entries in the local hosts file) |
And further with 'Option 1' or 'Option 2' as documented next:
Option 1a (Nodinite v7 - IIS hosted on local network)
| Port | Name | Inbound | Outbound | TCP | UDP | Nodinite Version | Comment |
|---|---|---|---|---|---|---|---|
| Custom | HTTP/HTTPS | v7 | Agent IIS site port (configured during installation in the Portal). Only required if agent is on a remote IIS server |
Note
Nodinite v7 IIS Hosting: When agents are hosted in IIS on the same server as the Nodinite application (typical installation), firewall rules are not required between the Monitoring Service and the agent. The custom port is assigned during installation via the Nodinite Portal and only needs to be opened if the agent is hosted on a remote IIS Windows Server.
Option 1b (Nodinite v6 and earlier - Windows Service on local network)
| Port | Name | Inbound | Outbound | TCP | UDP | Nodinite Version | Comment |
|---|---|---|---|---|---|---|---|
| 8000 | RPC | v6 and earlier | Communication is initiated by the Monitoring Service. Only used with legacy MSI installer on remote Windows servers |
Note
Nodinite v6 Legacy: Port 8000 is only used when agents have default installations on remote Windows servers using the legacy MSI installer. This port is not required for Nodinite v7 IIS-hosted agents.
Option 2 (Cloud/Hybrid - All versions)
Use Service Bus Relayed connections when Nodinite and the agent are on totally different networks.
Nodinite uses the same principle technique as the On-Premise data gateway, see 'Adjust communication settings for the on-premises data gateway' user guide.
| Port | Name | Inbound | Outbound | TCP | UDP | Nodinite Version | Comment |
|---|---|---|---|---|---|---|---|
| 443 | HTTPS | All | Secure outbound traffic | ||||
| 5671, 5672 | Secure AMQP | All | |||||
| 9350 - 9354 | Net.TCP | All |
Note
DNS Resolution: All servers (Agent Server, ActiveMQ Server, MSMQ Server) require outbound access to DNS on TCP/UDP port 53 for name resolution. This is already listed in section 4 and applies universally. You can optionally solve this using entries in the local
hostsfile on each server.
Important
Stateful Firewalls: Most modern Windows Firewall implementations are stateful, meaning inbound response traffic for established outbound connections is automatically allowed. The inbound rules listed above are primarily for reference and troubleshooting scenarios where stateful inspection may be disabled or restricted.
Release Notes
For detailed information about the features and bug fixes, please visit the Portal
Next Step
Install Message Queues Monitoring Agent
Related Topics
Add or manage a Monitoring Agent Configuration
Monitoring
Administration