**Why Logs Matter in a TLS-Configured Proxy**
A proxy sits between clients and servers, mediating requests. When TLS encryption is enabled, the traffic is secure, but visibility changes. You must configure the proxy to capture connection metadata, TLS certificates, cipher suites, handshake timings, and error events. Without this, troubleshooting handshake