Skip to main content
Solved

Akeyless Audit Logs TCP Listener Fails To Receive Events With TLS Enabled

  • April 8, 2026
  • 9 replies
  • 1 view

This message originated from Cribl Community Slack.
Click here to view the original link.

Has anyone successfully configured an Akeyless audit logs TCP listener with TLS? Ours works without TLS, but when we try to enable regular TLS or mTLS, we stop receiving events. We have other log sources successfully using TLS in the same worker group from the same network

Best answer by Jon Rust

Can you use openssl to validate the server side? Something like openssl s_client -connect hostname:port You should get the TLS handshake, including certs returned to you. Make sure the server cert matches

9 replies

Jon Rust
Forum|alt.badge.img
  • Employee
  • April 8, 2026
Definitely. Would need more info to troubleshoot

Apologies, our certificate might of had some incorrect formatting. We are trying again.

Our fixed certificate is not successfully forwarding events. We have uploaded our cribl certificate to akeyless per the syslog config instructions here: Log Forwarding. The part we are confused on is if this means we need to set up mutual auth in cribl and if so what options to select. Is there any documented examples of this from the cribl side?

Jon Rust
Forum|alt.badge.img
  • Employee
  • April 8, 2026
No, mTLS is not required there. I'm assuming they want the public cert for the server, but it's hard to tell from their docs

Thank you for the clarification

Jon Rust
Forum|alt.badge.img
  • Employee
  • April 8, 2026
is this a Cribl Cloud install, or a self-managed? Did you upload the private key, the public cert, or the CA cert?

This is self managed, I used our public cert certificate.pem file that we use on our other TLS deployments without issue.

Jon Rust
Forum|alt.badge.img
  • Employee
  • Answer
  • April 8, 2026
Can you use openssl to validate the server side? Something like openssl s_client -connect hostname:port You should get the TLS handshake, including certs returned to you. Make sure the server cert matches

ok, thank you