These docs are for Cribl Stream 4.8 and are no longer actively maintained.
See the latest version (4.13).
Securing Cribl.Cloud with TLS and Mutual TLS
Cribl.Cloud prioritizes secure data transfer with pre-enabled TLS on many sources. This guide details configuring TLS and enabling mutual TLS (mTLS) for additional sources.
TLS in Cribl.Cloud
TLS encryption is pre-enabled on several Sources in Cribl.Cloud, as indicated on the Data Sources tab of the Cribl.Cloud portal. All TLS is terminated by individual Nodes.
Enable mTLS Authentication on Cribl.Cloud
In Cribl.Cloud, you configure mTLS authentication separately for each Source.
This requires a CA certificate chain that can validate the client certificate used for authentication. You add your CA certificate by creating a new certificate entry in Cribl.Cloud.
Prepare the CA certificate chain PEM file.
Go to the Worker Node: Settings > Security > Certificates and select Add Certificate.
Populate the Certificate field with any valid PEM-formatted content:
-----BEGIN CERTIFICATE----- CERTIFICATE CONTENT -----END CERTIFICATE-----
The certificate and key are required only for UI validation and are not used otherwise.
Populate the Private key with the key in PEM format:
-----BEGIN RSA PRIVATE KEY----- HIDDEN PRIVATE KEY -----END RSA PRIVATE KEY-----
In the CA certificate field, enter your PEM-formatted certificate and save. This will generate the CA certificate path.
Edit the certificate again to view the certificate path and copy it.
Go to the Source where you want to enable mTLS and paste the path in the CA certificate path field.
Save, commit, and deploy to finish the process.