Support TLS Expiry alerts #1

Closed
opened 2026-02-28 01:31:19 -05:00 by deekerman · 7 comments
Owner

Originally created by @proffalken on GitHub (Jul 11, 2021).

This is an amazing project, I had it up and running within minutes of your post on Reddit, thank you so much!

It would be awesome if you could add TLS monitoring alongside the "uptime" monitoring.

Although LetsEncrypt does a great job of auto-renewing certs, it would be great to monitor the following metrics as well:

  1. Days until certificate expires
  2. Whether the certificate is valid or invalid

I've been bitten by this so many times in the past!

Originally created by @proffalken on GitHub (Jul 11, 2021). This is an amazing project, I had it up and running within minutes of your post on Reddit, thank you so much! It would be awesome if you could add TLS monitoring alongside the "uptime" monitoring. Although [LetsEncrypt](https://letsencrypt.org) does a great job of auto-renewing certs, it would be great to monitor the following metrics as well: 1. Days until certificate expires 2. Whether the certificate is valid or invalid I've been bitten by this so many times in the past!
deekerman 2026-02-28 01:31:19 -05:00
Author
Owner

@TheGuyDanish commented on GitHub (Jul 11, 2021):

The ability to import a trusted root CA (for internal CA's) would be a welcome addition to the above.

@TheGuyDanish commented on GitHub (Jul 11, 2021): The ability to import a trusted root CA (for internal CA's) would be a welcome addition to the above.
Author
Owner

@12nick12 commented on GitHub (Jul 11, 2021):

Adding to this domain expiration would also be great.

@12nick12 commented on GitHub (Jul 11, 2021): Adding to this domain expiration would also be great.
Author
Owner

@joe-eklund commented on GitHub (Jul 16, 2021):

The ability to import a trusted root CA (for internal CA's) would be a welcome addition to the above.

Hi I detailed how you can do this in https://github.com/louislam/uptime-kuma/issues/21#issuecomment-881757886 using an environment variable.

@joe-eklund commented on GitHub (Jul 16, 2021): > The ability to import a trusted root CA (for internal CA's) would be a welcome addition to the above. Hi I detailed how you can do this in https://github.com/louislam/uptime-kuma/issues/21#issuecomment-881757886 using an environment variable.
Author
Owner

@tmarly commented on GitHub (Dec 15, 2021):

Hi, I see that the commit #44c1b336 fix this issue and is in the latest version, am I wrong ?

@tmarly commented on GitHub (Dec 15, 2021): Hi, I see that the commit #44c1b336 fix this issue and is in the latest version, am I wrong ?
Author
Owner

@proffalken commented on GitHub (Dec 15, 2021):

@tmarly nope, not wrong, this is working well in the latest version.

@proffalken commented on GitHub (Dec 15, 2021): @tmarly nope, not wrong, this is working well in the latest version.
Author
Owner

@jsloane commented on GitHub (Jan 2, 2022):

Is there a way to disable these alerts? I don't want to be notified when the certificate is going to expire in 14 days, I just need outage notifications.

@jsloane commented on GitHub (Jan 2, 2022): Is there a way to disable these alerts? I don't want to be notified when the certificate is going to expire in 14 days, I just need outage notifications.
Author
Owner

@chakflying commented on GitHub (Jan 2, 2022):

See #844, config is currently not implemented yet.

@chakflying commented on GitHub (Jan 2, 2022): See #844, config is currently not implemented yet.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/uptime-kuma#1
No description provided.