Connection Guide
Connect Syslog over TLS Receiver Without Breaking the Audit Trail
Use this guide to connect Syslog over TLS Receiver or confirm the export-based path that fits your environment. Aurora keeps source, timestamps, ownership, and collection history attached so the first run becomes reusable proof instead of one-off setup work.
First-Run Checklist
Use this sequence to connect Syslog over TLS Receiver and make sure the first collection lands cleanly.
- 1Configure your syslog sender to forward RFC5424 over TLS to the platform receiver endpoint.
- 2If your deployment uses **custom TLS termination** for this receiver, provide `server_cert` and `server_key` secrets. Optionally provide `optional_client_ca` for mutual TLS (mTLS).
- 3If your deployment uses **platform-managed TLS termination**, set `platform_managed_tls=true` in connection config (TLS secrets are not required).
- 4Send a test syslog message and confirm it is ingested as `security.event` with `source=syslog_tls`.
Credentials and Secrets
The keys, secrets, or tokens Aurora uses to authenticate and collect proof.
Recommended Access
Aurora only asks for the minimum read access needed for collection and checks.
Access requirements depend on the collection mode and scope you choose.