Troubleshooting the Gateway
Use this page to troubleshoot common deployment and runtime issues for Akeyless Gateway.
Troubleshooting Workflow
Use this sequence first, before deep component-level debugging:
- Validate outbound connectivity to Akeyless SaaS services.
- Validate authentication method and access permissions.
- Validate TLS, certificate trust, and endpoint settings.
- Validate cache behavior and runtime health.
- Validate log forwarding and telemetry output.
1. Connectivity and Reachability
When Gateway cannot sync, authenticate, or retrieve data, start with network validation.
Check:
- Outbound HTTPS connectivity (
443) to required Akeyless SaaS endpoints. - DNS resolution for required service hostnames.
- Proxy, firewall, and egress control behavior.
Reference:
2. Authentication and Permissions
Authentication failures are commonly caused by mismatched Access IDs, invalid credentials, or missing permissions.
Check:
- The configured Gateway authentication type matches the deployed environment.
- The configured Access ID and credentials are valid.
- The authentication method has required permissions for intended operations.
- Access permissions for Gateway management users are configured as expected.
Reference:
3. TLS and Certificate Trust
TLS misconfiguration usually appears as handshake errors, certificate validation failures, or management endpoint access issues.
Check:
- TLS certificate and key are valid and correctly loaded.
- Certificate chain is complete and trusted by clients.
- Private CA certificates are present in Certificate Store when required.
References:
4. Cache and Offline Behavior
If stale values are returned, or behavior differs during SaaS interruptions, validate cache configuration and expected offline behavior.
Check:
- Cache mode is configured as intended (local or cluster cache).
- Refresh and cleanup intervals align with operational requirements.
- Workload behavior with
ignore-cachematches expected disconnected-mode behavior.
Reference:
5. Logging and Telemetry
When diagnosis data is missing, validate both forwarding targets and collector configuration.
Check:
- Log forwarding destination and credentials are valid.
- Telemetry exporter configuration is loaded and reachable.
- Runtime logs include expected request, auth, and connectivity events.
References:
Symptom-Based Quick Checks
Gateway starts, but requests fail
- Validate authentication and permissions first.
- Validate network path to SaaS endpoints.
- Validate Gateway endpoint and TLS settings used by clients.
Gateway cannot authenticate users or workloads
- Validate authentication method configuration and credentials.
- Validate Access Role permissions and bound conditions.
- Validate identity-provider integration assumptions when SSO is used.
Gateway returns stale secret values
- Validate cache mode and refresh settings.
- Validate whether disconnected mode is active.
- Validate whether request paths intentionally use cache.
No logs in SIEM or metrics backend
- Validate destination endpoint, token/key, and network reachability.
- Validate exporter configuration format.
- Validate that the enabled forwarding mode matches the deployment model.
Deployment-Specific Checks
- Self-managed runtime options: validate environment variables, mounts, container restart history, and (when applicable) self-managed Kubernetes runtime configuration.
- Cloud-managed Kubernetes platforms: validate pod health, service account permissions, secrets, and Helm values.
- Cloud-managed serverless platforms: validate platform identity, runtime environment variables, and provider-level networking.
References:
Before Escalation
Before opening an internal escalation or support ticket, capture:
- Deployment model and Gateway version.
- Exact failing operation and timestamp (UTC).
- Relevant error message and response code.
- Recent configuration changes.
- Sanitized logs from the failing time window.
Updated about 6 hours ago
