Scheduled SSL Certificate Expiry Checks
Automate SSL/TLS certificate expiry monitoring with TrigRun. Get alerts before your certificates expire and cause downtime.
Check your SSL certificates weekly and get alerted before they expire. TrigRun calls your certificate check endpoint, which inspects expiry dates and returns the results.
The problem
An expired SSL certificate takes your entire site offline with a browser security warning. Let's Encrypt certificates expire every 90 days. Even with auto-renewal, things break — DNS changes, permission issues, expired accounts. You need a scheduled check that verifies your certs are valid and alerts you before expiry.
How it works with TrigRun
Step-by-step setup
1. Create the weekly check job
2. Alert on failure (cert expiring soon)
Your endpoint should return a non-200 status when a cert is expiring within the warning threshold. Attach a Slack notification to catch it:
Expected results
All certs healthy:
| Field | Example value |
|---|---|
| Status | 200 OK |
| Response | {"all_valid": true, "domains": [{"domain": "yoursite.com", "expires_in_days": 62, "issuer": "Let's Encrypt"}, {"domain": "api.yoursite.com", "expires_in_days": 62, "issuer": "Let's Encrypt"}]} |
Cert expiring soon (your endpoint returns 409):
| Field | Example value |
|---|---|
| Status | 409 Conflict |
| Response | {"all_valid": false, "expiring": [{"domain": "cdn.yoursite.com", "expires_in_days": 6, "issuer": "Let's Encrypt"}]} |
| Result | failed — Slack alert: "SSL cert for cdn.yoursite.com expires in 6 days" |