mirror of
https://github.com/louislam/uptime-kuma.git
synced 2026-03-02 22:57:00 -05:00
X.509 expiration monitoring #4339
Labels
No labels
A:accessibility
A:api
A:cert-expiry
A:core
A:dashboard
A:deployment
A:documentation
A:domain expiry
A:incidents
A:maintenance
A:metrics
A:monitor
A:notifications
A:reports
A:settings
A:status-page
A:ui/ux
A:user-management
Stale
ai-slop
blocked
blocked-upstream
bug
cannot-reproduce
dependencies
discussion
duplicate
feature-request
feature-request
good first issue
hacktoberfest
help
help wanted
house keeping
invalid
invalid-format
invalid-format
question
releaseblocker 🚨
security
spam
type:enhance-existing
type:new
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/uptime-kuma#4339
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @jakcyl on GitHub (Oct 17, 2025).
📑 I have found these related issues/pull requests
It would be nice to manually add expiration dates for certificates that are not just for ssl/tls on domain.
🏷️ Feature Request Type
Certificate expiry
🔖 Feature description
a new monitor time based
✔️ Solution
while the expiration date approces the color of the monitor will change to yellow / red and send a notification before 90-60-30-15 days
❓ Alternatives
No response
📝 Additional Context
No response
@maxmichels commented on GitHub (Oct 27, 2025):
I will try to create a monitor for this. @jakcyl did i understood you correctly, you want a monitor type to monitor certificate expiration which are available via DNS/FQDN on specified port, e.g. smtp-server certificate?
@jakcyl commented on GitHub (Oct 27, 2025):
Thanks @maxmichels! It's close but what i meant is a bit broader. i'd like to monitor certificates that are not available via dns or net ports. Like mTls, apple push (apns) certificates, or any other local/manually managed certificate file.
the idea would be to have a new monitor where i can either enter an expiration date or upload (temporarly?) the certicate so kuma can extract its expiry date. then when it's expirying/expired you can update the cert or date with the new one
basically a time based certificate expiry monitor for services where certificates aren't publically "queryable".
Thanks again for looking into this 🦸
@appletalk commented on GitHub (Nov 6, 2025):
I'm also interested in this for monitoring XMPP server certificates. I can query my XMPP cert using the following command and monitoring the expiry in uptime-kuma would be great!
echo | openssl s_client -starttls xmpp-server -connect xmpp.example.com:5269 | openssl x509 -noout -datesEdit: My use case might be covered by #5678