upti.my

SSL / TLS Certificate Monitoring

Monitor SSL certificate expiration with configurable warning thresholds. Never miss an expiring certificate.

Overview

SSL/TLS certificate monitoring ensures your certificates are valid and not approaching expiration. Expired certificates cause browser warnings, failed API connections, and broken trust with your users. upti.my continuously checks your certificates and alerts you well before they expire, giving you time to renew.

Beyond expiration tracking, SSL checks provide comprehensive details about your TLS configuration, including the TLS version, cipher suite, certificate chain, and issuer information. This helps you maintain strong security practices across all your domains.

Configuration

ParameterDescriptionDefault
HostThe hostname to check the SSL certificate forRequired
PortThe port to connect to for the TLS handshake443
Expiry Warning DaysNumber of days before expiration to trigger a warning30

💡 Warning Threshold

Set your expiry warning days based on your certificate renewal process. If you use automated renewal (e.g., Let's Encrypt with certbot), 14 days may be sufficient. For manual renewal processes, 30 to 60 days gives you adequate time to act.

How It Works

When an SSL health check runs, upti.my performs a TLS handshake with the target host and inspects the presented certificate. The check evaluates:

  1. Whether the TLS handshake completes successfully
  2. The full certificate chain from leaf to root
  3. Certificate validity dates (not before, not after)
  4. Days remaining until the certificate expires
  5. Whether the expiry warning threshold has been crossed

Response Data

Each SSL health check execution captures comprehensive certificate and connection data:

FieldDescription
TLS Handshake StatusWhether the TLS handshake completed successfully
TLS VersionThe negotiated TLS protocol version (e.g., TLS 1.2, TLS 1.3)
Cipher SuiteThe cipher suite used for the connection
Certificate Chain LengthNumber of certificates in the chain (leaf + intermediates)
SubjectThe certificate subject (typically the domain name)
IssuerThe certificate authority that issued the certificate
Serial NumberThe unique serial number of the certificate
Valid FromThe date the certificate became valid
Valid UntilThe date the certificate expires
Days Until ExpiryNumber of days remaining before the certificate expires
Expiry Warning FlagWhether the certificate is within the warning threshold

Example Configuration

SSL Check Configuration
{
  "host": "example.com",
  "port": 443,
  "expiry_warning_days": 30,
  "timeout_seconds": 10,
  "interval_seconds": 3600
}

ℹ️ Check Frequency

SSL certificates change infrequently, so checking every hour or every few hours is usually sufficient. More frequent checks are unnecessary and consume monitoring resources without added benefit.

Common Use Cases

  • Expiration Prevention - Get alerted days or weeks before certificates expire
  • Renewal Verification - Confirm that automated renewals (Let's Encrypt, ACM) are working
  • Security Auditing - Track TLS versions and cipher suites across all domains
  • Multi-Domain Monitoring - Monitor certificates for all your domains from a single dashboard
  • Non-Standard Ports - Monitor TLS on services like SMTPS (465), IMAPS (993), or custom ports

Best Practices

  • Set up SSL checks for every domain and subdomain you manage
  • Use a warning threshold that matches your renewal workflow (14 days for automated, 30+ for manual)
  • Monitor non-standard TLS ports alongside standard HTTPS on port 443
  • Review TLS version and cipher suite data regularly to ensure you meet security standards
  • Set up alert escalation for critical certificates approaching expiry

⚠️ Certificate Chain Issues

An incomplete certificate chain can cause TLS failures on some clients even if the certificate itself is valid. If the chain length seems shorter than expected, verify that your server is sending all intermediate certificates.