Conduktor release notes
- Get notified about new releases! Click Follow from the Conduktor Console and Conduktor Gateway pages.
- Try out the latest Conduktor version for free.
- Have questions or feedback? Get in touch.
Console 1.32.0
Release date: 2025-03-12
Breaking changes
Partner Zones
Improvements to Partner Zones require Gateway 3.6.1 to be deployed with this release of Console. Find out more about Partner Zones and required environment variables.
Scale
Alert history
In the alert details page you can now also see the history of an alert's status and notifications which may have failed to send. Find out more about alerts.
Audit logs
You can now view the new CloudEvents-based audit log events with enhanced filtering capabilities for the new resource and event types, including Conduktor platform triggered events.
See the full list of all the audited events.
While legacy audit log events will stop being captured in this release, existing legacy events will remain accessible through a dedicated page until a future release.
Service account labels
You can now edit labels on service accounts in plain Kafka clusters through the UI, in addition to the existing CLI & API support.
Support for labels on Aiven and Confluent Cloud service accounts is coming soon.
RBAC-aware menu
The left-hand menu is now RBAC (Role Based Access Control) aware, dynamically showing/hiding menu items based on users' permissions. Hiding functionality that users don't have access to makes onboarding easier and reduces confusion.
In Console, menu items are shown based on the user's Resource access
permissions on individual clusters, while the Settings menu items are shown according to the Service access
permissions. Find out more about RBAC.
Exchange
Exchange is a new Conduktor product that enables you to share data securely with your external partners. Find out more about the Exchange product.
Introducing Partner Zones UI
Partner Zones is currently in Beta and is subject to changes, as we continue building out this functionality.
Partner Zones enable you to securely share your Kafka streaming data with external partners, without the need to replicate that data into a second, physical Kafka cluster.
In this release we're introducing the option to create Partner Zones using the Console UI in just few steps, including the ability to set traffic control policies.
In upcoming releases we'll be adding further enhancements, such as:
- an ability to edit Partner Zone configurations
- the option to rename shared topics, securing your data even further by ensuring that no internal information is shared
Find out more about Partner Zones.
Quality of life improvements
- Enabled the confirmation of resource deletion using the Enter key.
- Updated the connector restart button labels and toast messages to accurately reflect their behavior for Confluent Cloud connectors.
- Removed a legacy option to disable monitoring.
Fixes
- Fixed an issue where editing a schema registry subject would overwrite its compatibility mode with the global compatibility setting.
- Fixed an issue where creating an ACL for a service account with a duplicate name could override the existing ACL.
- Fixed an issue where you could not remove the last ACL and Save in the Service Account UI.
- Fixed an issue where the Kafka Connect failed task heatmap didn't display data for days in 2025.
- Fixed an issue where the CLI would report incorrect actions taken (although the correct actions were shown when the
--dry-run
flag was used). - When Azure Active Directory is used as an LDAP server, the
userPrincipalName
field can now be set as the field containing the email address. - Fixed an issue where very large numbers would show rounded in the details view of a topic message (e.g.
7777705807840271771
would display as7777705807840271000
). - Fixed the UI issue where the option to reset a consumer group offset would disappear off the screen, if the partition count was too large.
Known issues
In the Topic Consume view, equality filters (==
) on JSON number fields isn't working correctly when the number exceeds JavaScript's safe integer limit of 2^53-1
. Note that while range operators (>
, <
, >=
, <=
) still work with large numbers, there's currently no workaround for exact equality filtering. We'll address this in a future release.
Gateway 3.6.1
Release date: 2025-03-05
New features
- New metric
gateway.apiKeys.throttle_ms
: sets the throttling time in Kafka responses per apiKey in milliseconds - Updated existing metric
gateway.apiKeys.latency.request_response
: sets the latency to process a request and generate a response for each API key- It now tracks latency for all verbs (eg CONNECTION) not just FETCH/PRODUCE
Feature changes
- Changes to
Limit Commit Offset Plugin
:- accuracy of rate limiting has been improved
action
/throttleTimeInMs
properties did not work correctly and are now ignored
- Changes to
cluster ACLs
:- when creating cluster ACLs using a programmatic API, only allow
kafka-cluster
for the name part of the resource. This makes Gateway consistent with Kafka.
- when creating cluster ACLs using a programmatic API, only allow
Fixes
- Fixed a problem with the Create Topic Policy plugin which would not apply overrides to default configurations from the underlying Kafka setup.
- Fixed a problem with
CreateTopics ACLs
in Gateway which previously also required theCreate cluster
permission enabled. - Addressed a problem with Non Delegated SASL/PLAIN token credentials, where Gateway would continue to work after service account has been deleted. To enable this feature set the environment variable
GATEWAY_USER_POOL_SERVICE_ACCOUNT_REQUIRED
totrue
(it currently defaults tofalse
). - Fixed a problem in
AddPartitionsToTxnRequest
where ACLs on transactionIds in new location were not being checked when Kafka API version was >= 4. - An un-authorized idempotent producer will now throw a
ClusterAuthorizationException
instead of aTransactionalIdAuthorizationException
, making Conduktor Gateway consistent with Kafka.
Console 1.31.2
Release date: 2025-03-03
Fixes
- Fixed prefixed ACLs not displaying correctly in the Service Account UI
- Fixed an issue where Service Accounts with no ACL were incorrectly shown in the UI
- Fixed an issue allowing creation of Service Accounts without ACLs
Known Issues
- When removing ACLs in the Service Account UI, you cannot remove the last ACL
- As a workaround, you can remove that last ACL, then create a new ACL against a resource name that does not exist.
- We will address this issue in the next release
Console 1.31.1
Release date: 2025-02-18
Console metrics performance and configuration
To address issues related to monitoring graph timeouts and OutOfMemory issues when Console is connected with large Kafka clusters, we've introduced a change to how metrics are collected in Console.
This feature is currently optional but will be enabled by default in the next release.
If you're experiencing graph timeouts or OutOfMemory issues, upgrade to 1.31.1 and configure the following additional environment variables:
CDK_MONITORING_ENABLENONAGGREGATEDMETRICS: false
CDK_MONITORING_USEAGGREGATEDMETRICS: true
This configuration will disable the collection of obsolete granular metrics and use the new aggregated metrics in the Console graphs.
See metric configuration for details.
Fixes
- Fixed dependencies vulnerable to the following CVEs:
- Resolved an issue related to SSL checks between the Console and Cortex where bad certificates caused communication issues
- Fixed an issue with user email addresses containing a
'
character that blocked database migrations - Reduced the memory consumption and improved the performance of metrics under heavy load that prevented them from displaying
- Partner Zones: configuration updates are now applied correctly
- Partner Zones: partners can now utilize consumer groups
Gateway 3.6.0
Release date: 2025-02-12
Features
Kafka Cluster connection management
This release includes a set of enhancements to how Gateway manages connectivity to a Kafka Cluster. This provides greater stability and flexibility for how Gateway can be configured with the Kafka Clusters it's connected to, and is a precursor change for future product releases.
Encryption improvements
Encryption Secret Id Mustache Templates
The encryption now allows multiple mustache substitutions in a key secret Id configuration. Previously, only a single substitution was supported. E.g. This is now allowed:
"keySecretId": "vault-kms://my-vault:8200/transit/keys/{{record.key}}-{{record.header.someHeader}}"
Decryption failure modes
This release adds a new optional configuration to the decryption plugin to allow different modes of handling errors. There are two supported modes:
errorPolicy: "return_encrypted"
Previous - if there's an error during decryption, then the encrypted data is returned.errorPolicy: "fail_fetch"
New - if there's an error during decryption, then the fetch that was reading the data is failed and the client will receive an error.
In both cases, we have enhanced the logging, so issues during decryption are more fully reported.
Schema Registry access improvements
Read only Schema Registry access
Some of our Gateway plugins will deserialize and re-serialize messages in order to perform their functions. A side effect of this is that the serializer code would unnecessarily require write access to the Schema Registry. While there was no situation where Gateway would actually cause any updated or additional schema to appear, - we've altered the Schema Registry access to be read only. This avoids having to unnecessarily assign write permission for our Gateway Schema Registry connections if you're using ACLs on your Schema Registry.
Plugin validation of Schema Registry access
All Gateway plugins which access the Schema Registry will now validate that the configuration for the Schema Registry is correct when it's added or updated in Gateway. Previously, this behavior was inconsistent and a few of our plugins would only detect incorrect configurations when they processed a message rather than when they were setup.
Quality of life improvements
- Added a new CLI command
conduktor run generateServiceAccountToken
to generate the JWT for local service accounts. Update your CLI to version 0.4.0 or higher.
Fixes
- Fix: CreateTopicPolicy and AlterTopicPolicy overrides. There were some edge cases where the desired overrides from the plugin config would not be applied. These plugins now behave consistently in all situations.
- Improvement: Removed some verbose logs and updated logging to be clearer. A general set of improvements has been made to Gateway logging, making some errors clearer and reducing repetition.
Console 1.31.0
Release date: 2025-02-05
Breaking changes
Removed V1 Alerts
Original alerts created in the Monitoring/Alerts section are no longer available.
Changes to V2 Alerts
V2 Alerts, that can be created since Console 1.28 on the dedicated resource page (Topics, Brokers, etc.) are still available and active, but have been migrated with the following rules:
- Alerts have been automatically configured with the previously globally configured channel (Teams or Slack).
- Alerts have been assigned to the individual who created them.
Read below for more information about the new alerting functionality.
Id of Certificates
The Id of certificates in the public/v1/certificates
API endpoints were modified to represent the fingerprint of the certificate.
It brings a more stable way to identify certificates in audit log and prevent multiple uploads of the same certificate.
Scale
Enhanced Alerting with Added Webhooks Support
We have made significant improvements to the alerting system in Console.
Here are some of the changes:
- Alerts are now owned by individuals, groups, or applications
- We added Webhook destination to alerts notifications
- Destinations are now configurable per-alert
- API / CLI support for Alerts is now available
apiVersion: console/v3
kind: Alert
metadata:
name: messages-in-dead-letter-queue
group: support-team
spec:
cluster: my-dev-cluster
type: TopicAlert
topicName: wikipedia-parsed-DLQ
metric: MessageCount
operator: GreaterThan
threshold: 0
destination:
type: Slack
channel: "alerts-p1"
Alert creation workflow has been updated to allow you to configure the alert destination and ownership in the UI.
Read the alerting section of our documentation for more information about the new alert functionality.
API / CLI support for Service Accounts
We have added support for Service Accounts in the API and CLI.
Declaring ServiceAccount resource lets you manage the ACLs of a service account in Kafka.
At the moment we only support Kafka ACLs (calls to Kafka APIs) but we plan to add support for Aiven ACLs in ServiceAccount resource in the future.
---
apiVersion: v1
kind: ServiceAccount
metadata:
cluster: shadow-it
name: clickstream-sa
spec:
authorization:
type: KAFKA_ACL
acls:
- type: TOPIC
name: click.event-stream.avro
patternType: PREFIXED
operations:
- Write
- type: CLUSTER
name: kafka-cluster
patternType: LITERAL
operations:
- DescribeConfigs
- type: CONSUMER_GROUP
name: cg-name
patternType: LITERAL
operations:
- Read
Labels support for Service Accounts
We have added support for labels in the ServiceAccount resource.
For now you can only edit labels through ServiceAccount resource in the API and CLI.
---
apiVersion: v1
kind: ServiceAccount
metadata:
cluster: shadow-it
name: clickstream-sa
labels:
domain: payment
region: EMEA
application: clickstream
spec:
...
The labels are used to filter the Service Accounts in the UI. Editing labels in the UI will be available in the next release.
Self-Service support for Application Managed Service Accounts
We have added a new mode for ApplicationInstance that allows Application Teams to have full control over their Service Accounts.
This mode can be enabled in the ApplicationInstance with the following flag spec.applicationManagedServiceAccount
set to true
.
When enabled, Self-Service will not synchronize the Service Account with the ApplicationInstance and will let the Application Team manage the Service Account directly.
Application Managed Service Accounts can be declared in the API and CLI using the Application API Key.
---
apiVersion: v1
kind: ServiceAccount
metadata:
appInstance: "clickstream-app-dev" # Mandatory to link the Service Account to the ApplicationInstance
cluster: shadow-it
name: clickstream-sa
spec:
authorization:
type: KAFKA_ACL
acls:
...
Application Group permissions now available on Users Permissions page
The users permissions page has been updated to show the permissions inherited when they belong to an ApplicationGroup.
Exchange
Exchange is a new Conduktor Product aimed at helping you share your data securely with your external partners.
Check the associated Exchange Product page for more information.
Introducing Partner Zones for Third-Party Data Sharing
Partner Zones is currently in Beta and is subject to changes as we continue to build out the feature.
Partner Zones enable you to securely share your streaming data with external partners, without needing to replicate the data into a second, physical Kafka cluster.
In the upcoming releases, we will be adding the following:
- Dedicated pages that allows you to manage Partner Zones completely from the UI
- Support for Traffic Control Policies to limit the amount of data that can be consumed or produced by your partners
- Topic renaming capability to avoid leaking internal topic names to your partners
For more information, check out the Partner Zones documentation.
Quality of Life improvements
- Added a "Groups" tab in the Application page which shows all of the Application Groups created via Self-service
- Improved the license plan page to show the start and end date of the license, as well as the packages included in the license
- Added the remaining days left in the sidebar when the license is expiring in less than 30 days
- Improved how a connector's configuration is displayed in the raw JSON view by sorting the properties alphabetically
Fixes
- Fixed several issues Confluent Cloud Managed Connectors
- Fixed Pause/Resume connector
- Fixed Connector and Task Restart
- Fixed Connector Status (Running, Paused, etc.), previously displayed as "Unknown"
- Fixed a permission check issue when adding partitions to a topic
- Improved the serialization of
String
andcom.fasterxml.jackson.databind.JsonNode
types returned by custom deserializers - Fixed an issue parsing masked data when choosing the String format on data that cannot be parsed as JSON
- Added topics ending with
-subscription-registration-topic
and-subscription-response-topic
to the Kafka Stream filter - Fixed the edition of ownership mode of application instances
- Fixed the form for saving producer templates
- Fixed the navigation to go back to the home page of connectors when switching clusters
Known issues
- We are aware of more inconsistencies with Confluent Cloud Managed Connector support in Console. We are working on it.
- Task status is not always correctly displayed
- Various UI responsiveness issues
Gateway 3.5.2
Release date: 2025-01-17
Features
- Add support for sourcing environment variables from a file
Fixes
- Add automatic refresh of HashiCorp Vault authentication tokens
Gateway 3.5.1
Release date: 2025-01-08
Features
- Added support for Hashicorp Vault Enterprise namespaces
Console 1.30.0
Release date: 2024-12-16
Features ✨
RBAC support for Conduktor SQL
In a previous release, we introduced Conduktor SQL. It was restricted to Admins because it did not apply any permission model.
This new update brings full RBAC support on Conduktor SQL:
- Users & Groups can only see and query the tables for which they have an associated Topic permission in Console
- Data masking policies are applied (with limitations)
You can now bring SQL to all users within your organization.
For more detailed information, check out the SQL security section.
Add support for multi-hosts database configuration
You can now setup Console's backing database for high availability(HA). If you have a PostgreSQL HA setup with multiple hosts, you can now configure a Console to JDBC connection to the database using a list of hosts.
CDK_DATABASE_URL: jdbc:postgresql://user:password@host1:5432,host2:5433/console_database
CDK_KAFKASQL_DATABASE_URL: jdbc:postgresql://user:password@host1:5432,host2:5433/kafka_sql_database
For more information, check out the Multi-host configuration section in the Database configuration documentation.
Delegating authentication to an identity provider
Console can now be configured to accept a JWT token from an external identity provider.
It allows you to directly use your identity provider for managing access to Console.
A common use case of this feature is to delegate authentication to your API gateway.
For the full configuration details, check out the documentation.
More Audit Log CloudEvents into Kafka
We have made more events available for the Audit Log Publisher:
- Kafka.Subject.ChangeCompatibility
- Kafka.Topic.Browse
- Kafka.Topic.ProduceRecord
- Kafka.Topic.SqlQuery
- Kafka.Connector.Restart
- Kafka.Connector.Pause
- Kafka.Connector.Resume
- Kafka.Connector.RestartTask
- Kafka.Connector.AutoRestartActivate
- Kafka.Connector.AutoRestartStop
A full list of all the exported audit log event types is published on the Audit Log page.
Quality of Life improvements ✨
- Alert lists in the resource pages have been updated to show the metric and condition, the alert state and a new column "Last Triggered"
- Chargeback data can now be exported into a CSV file to enable easier integration with existing organization cost management data.
- The User permission page provides a clearer distinction between inherited and user-specific permissions.
- Topic policy validation errors message are easier to read when using the CLI
- Added support for Array and Boolean types in Conduktor SQL
- Added Kafka Key column and other metadata in Conduktor SQL Topics (Full list)
Fixes 🔨
- Fixed a pagination issue in the SQL Indexed Topics view
- Fixed several instances where the CLI would not report the expected state change (Updated vs. Not Changed) on apply
Gateway 3.5.0
Release date: 2024-12-16
Breaking changes
Breaking change: Local Users 💣
This breaking change only impacts Local Gateway service accounts generated through our token endpoints:
POST /admin/username/{username}
POST /admin/vclusters/v1/vcluster/{vcluster}/username/{username}
If you are using Gateway services accounts from OIDC, mTLS, Delegated Kafka, you are not impacted.
From this release, we will now strictly enforce that the username and the token matches in requests made to the Gateway where local service accounts are used. This will help reduce inconsistencies and avoid unexpected behaviors. If they do not match, requests will fail to authenticate.