Access Transparency Auditable Event Methods on Confluent Cloud
Expand all examples | Collapse all examples
Access Transparency logs are generated with audit log type io.confluent.cloud/access-transparency when Confluent personnel access your Dedicated Kafka clusters for support, maintenance, or other operational purposes.
Access Transparency provides visibility into when and why Confluent personnel access your Dedicated Kafka clusters. This feature helps maintain security and compliance by ensuring all privileged access is logged and auditable.
Access Transparency is in Limited Availability
Access Transparency is in Limited Availability to Confluent customers as a fully supported feature and recommended for production use. To get access, contact Confluent Support.
Method name | Action triggering an auditable event message |
|---|---|
Confluent personnel access your Dedicated Kafka clusters for support, maintenance, or other operational purposes. |
confluent.privileged.access
The confluent.privileged.access event is generated when Confluent personnel access your Dedicated Kafka clusters for support, maintenance, or other operational purposes.
Note
There are no failure logs for Access Transparency events. Only successful access events are logged.
Examples
SUCCESS
{
"datacontenttype": "application/json",
"data": {
"serviceName": "crn://confluent.cloud/",
"methodName": "confluent.privileged.access",
"cloudResources": [
{
"scope": {
"resources": [
{
"type": "ORGANIZATION",
"resourceId": "eb619a34-5f1f-4376-9a45-d1adc3cfeb52"
},
{
"type": "ENVIRONMENT",
"resourceId": "env-devc6z01q8"
}
]
},
"resource": {
"type": "KAFKA_CLUSTER",
"resourceId": "lkc-devcon877j"
}
}
],
"authenticationInfo": {
"principal": {
"confluentUser": {
"resourceId": "confluent.privileged"
}
},
"result": "SUCCESS"
},
"requestMetadata": {
"requestId": [
"38880967242586514466153831704219986423509094185461874714"
]
},
"request": {
"data": {
"employee_base_location": "IN",
"employee_job_family": "L1 Engineering",
"cloud": "aws",
"reason_category": "Confluent Incident Investigation"
}
},
"resourceName": "crn://confluent.cloud/organization=eb619a34-5f1f-4376-9a45-d1adccfeb52/environment=env-devc6z31q8/kafka-cluster=lkc-devco7077j"
},
"subject": "crn://confluent.cloud/organization=eb619a34-5f1f-4376-9a45-d1adc3cfeb52/environment=env-devc6z01q8/kafka-cluster=lkc-devcon877j",
"specversion": "1.0",
"id": "9cfaa96a-170e-4d21-970f-391178fcd971",
"source": "crn://confluent.cloud/",
"time": "2025-06-09T12:48:26.778340Z",
"type": "io.confluent.cloud/access-transparency"
}