SSL Certificate Monitoring — Why 30-Day Warning Isn't Enough
SSL Certificate Monitoring — Why 30-Day Warning Isn't Enough
SSL certificate monitoring is one of the most overlooked aspects of website reliability. Everyone remembers to monitor uptime — is the server responding? — but few teams actively monitor the SSL certificates that protect their traffic. When an SSL certificate expires, browsers show a terrifying red warning page that drives away every visitor. In India, this has impacted government portals, banking applications, and high-traffic e-commerce sites — some losing crores in revenue from a single expired certificate. A 30-day warning sounds reasonable until you realize how fast 30 days disappear inside a busy engineering team.
PingSLA provides multi-stage SSL certificate monitoring with alerts at 60, 30, 14, 7, and 1 day before expiry — delivered via WhatsApp, email, and Slack. This guide explains why you need this, what can go wrong, and how to set it up properly.
Why SSL Certificates Expire (And Why Auto-Renewal Fails)
Most modern websites use Let's Encrypt for free SSL certificates. Let's Encrypt certificates are valid for 90 days and are designed to be auto-renewed by tools like Certbot, acme.sh, or your hosting provider's built-in renewal system.
The problem? Auto-renewal fails silently more often than you think.
Here are the most common reasons Let's Encrypt auto-renewal fails:
1. DNS Changes
You migrated your DNS from GoDaddy to Cloudflare but forgot to update the Certbot DNS plugin configuration. The renewal job runs, tries to create a DNS TXT record using the old API credentials, fails, and logs a warning that nobody reads.
2. Server Migration
You moved from a single EC2 instance to a Kubernetes cluster on DigitalOcean. The old cron job that ran certbot renew no longer exists. The certificate was last renewed on the old server 60 days ago. In 30 days, it expires on the new server.
3. Port 80 Blocked
Let's Encrypt HTTP-01 validation requires port 80 to be accessible. If your security team locked down port 80 (redirecting everything to 443), or if your cloud firewall rules changed, the renewal validation fails silently.
4. Rate Limits
Let's Encrypt enforces rate limits — 50 certificates per registered domain per week. If your CI/CD pipeline requests certificates aggressively (common with preview deployments), you can hit the rate limit and block production renewals.
5. Hosting Provider Issues
If you're on shared hosting (common for Indian small businesses using Bluehost, HostGator India, or BigRock), the SSL renewal depends entirely on the hosting provider's automation. When their renewal system breaks, you don't know until your site shows a certificate error.
6. Wildcard Certificate Complexity
Wildcard certificates (*.yourdomain.in) require DNS-01 validation, which needs API access to your DNS provider. If the API token expires or the DNS provider changes their API, the renewal breaks.
The Real Cost of an Expired SSL Certificate
An expired SSL certificate doesn't just show a warning — it actively blocks access to your website. Here's what happens:
- Chrome, Firefox, Safari all show a full-page "Your connection is not private" error. Users cannot proceed without clicking through advanced options — and most won't.
- Google Search Console may flag your site and temporarily lower your search rankings.
- API integrations break. If your partners call your API over HTTPS (and they should), their HTTP clients will reject the expired certificate. Webhooks from Razorpay, Stripe, or Shopify will fail.
- Mobile apps crash or show errors. Native apps using certificate pinning will completely refuse to connect.
- SEO impact. Google explicitly uses HTTPS as a ranking signal. An expired certificate can trigger a ranking drop that takes weeks to recover from.
For Indian businesses, the financial impact of downtime can be severe. Consider an e-commerce site doing ₹10 lakh in daily revenue. A 6-hour SSL outage during business hours means ₹2.5 lakh in lost sales — plus the brand damage of thousands of customers seeing a security warning.
SSL Certificate Monitoring Across Tools — A Comparison
Not all monitoring tools handle SSL certificates equally. Here's how the major players compare:
| Feature | PingSLA | UptimeRobot | Better Uptime | Pingdom | Datadog | Site24x7 |
|---|---|---|---|---|---|---|
| SSL expiry monitoring | Yes | Yes | Yes | Yes | Yes | Yes |
| Multi-stage alerts (60/30/14/7/1 day) | Yes | No (30 days only) | No (30/7 days) | No (30 days only) | Yes (custom) | Yes (custom) |
| Cert chain validation | Yes | No | Yes | No | Yes | Yes |
| WhatsApp alerts for SSL | Yes | No | No | No | No | No |
| Certificate transparency log monitoring | Yes | No | No | No | Yes | No |
| Wildcard cert monitoring | Yes | Yes | Yes | Yes | Yes | Yes |
| Custom alert thresholds | Yes | No | Limited | No | Yes | Yes |
| Indian probe locations (BLR/Mumbai) | Yes | No | No | No | Yes | Yes |
| Free tier SSL checks | 10 monitors | 1 monitor | 1 monitor | No | No | No |
| Price for SSL monitoring | From ₹2,499/mo | $7/mo (~₹580) | $24/mo (~₹2,000) | $15/mo (~₹1,250) | $23/host/mo | $9/mo (~₹750) |
The most critical difference is multi-stage alerting. Most tools send a single alert at 30 days before expiry. PingSLA sends alerts at 60, 30, 14, 7, and 1 day before expiry. Here's why each stage matters:
- 60 days: Planning alert. Enough time to schedule renewal during a maintenance window.
- 30 days: Action alert. This is your deadline to start the renewal process.
- 14 days: Urgency alert. If the 30-day alert was missed, this catches it.
- 7 days: Escalation alert. If SSL hasn't been renewed, escalate to team leads.
- 1 day: Emergency alert. Last chance before the certificate expires. PingSLA sends this via WhatsApp and phone call.
SSL Disasters in India: Real Incidents
IRCTC (2024)
India's largest ticket booking platform, IRCTC, experienced an SSL certificate issue that caused browsers to show security warnings during peak tatkal booking hours. Thousands of users were unable to book tickets, and the incident trended on Twitter (now X) for hours. A simple SSL monitoring check would have caught this days in advance.
State Government Portals
Multiple Indian state government portals — e-Seva, MeeSeva, various state transport department sites — have been caught with expired SSL certificates. These portals handle sensitive citizen data including Aadhaar numbers, PAN details, and bank account information. An expired certificate on such a portal is not just an inconvenience; it is a security risk that could expose citizens to man-in-the-middle attacks.
Indian Banking Applications
RBI guidelines mandate that all banking applications use valid SSL/TLS certificates. Despite this, several cooperative banks and regional rural banks have been found operating with expired or misconfigured certificates. For fintech companies integrating with these banks via APIs, an expired certificate on the bank's side breaks the integration — and the fintech company's customers blame the fintech, not the bank.
Beyond Expiry: What Else SSL Certificate Monitoring Should Check
SSL certificate monitoring is more than just checking the expiry date. PingSLA monitors these additional aspects:
Certificate Chain Validity
Your SSL certificate is part of a chain: your certificate → intermediate certificate → root certificate. If any link in the chain is missing or invalid, browsers will reject the connection. This is a common issue when installing certificates manually — you forget to include the intermediate certificate.
Protocol and Cipher Suite
PingSLA checks which TLS versions and cipher suites your server supports. If your server still supports TLS 1.0 or TLS 1.1, it flags a security warning. Modern best practice is TLS 1.2 minimum, with TLS 1.3 preferred.
Certificate Transparency Logs
Certificate Transparency (CT) is a system where all issued certificates are logged publicly. PingSLA monitors CT logs for your domains. If someone issues a certificate for your domain without your knowledge (a sign of a potential attack or misconfiguration), you get an alert.
HSTS Configuration
HTTP Strict Transport Security (HSTS) tells browsers to always use HTTPS for your domain. PingSLA checks whether HSTS is configured and whether the max-age value is sufficient (recommended: at least 1 year / 31536000 seconds).
Mixed Content Detection
If your HTTPS page loads resources (images, scripts, stylesheets) over HTTP, browsers flag it as "mixed content" and may block those resources. PingSLA's synthetic monitoring can detect mixed content issues that SSL-only checks miss.
Setting Up SSL Certificate Monitoring in PingSLA
Step 1: Add Your Domain
Navigate to Monitors → Add Monitor → SSL Certificate in your PingSLA dashboard. Enter the domain name — for example, api.yourcompany.in.
Step 2: Configure Alert Thresholds
Set your multi-stage alert thresholds. The recommended configuration:
Alert stages:
- 60 days before expiry → Email notification
- 30 days before expiry → Email + Slack notification
- 14 days before expiry → WhatsApp notification
- 7 days before expiry → WhatsApp + escalate to team lead
- 1 day before expiry → WhatsApp + phone call to CTO
Step 3: Add Your Alert Channels
Configure where alerts should be delivered. For Indian teams, the recommended setup is:
- Primary: WhatsApp to the DevOps on-call engineer
- Secondary: Email to the engineering mailing list
- Escalation: WhatsApp to the engineering manager
- Emergency: Phone call to the CTO/VP Engineering
Step 4: Enable Certificate Chain Monitoring
Toggle "Full chain validation" to check intermediate and root certificates as well. This catches chain issues before they affect users.
Step 5: Set Up Protocol Checks
Enable TLS version and cipher suite monitoring. PingSLA will alert you if your server is using deprecated protocols or weak ciphers.
Best Practices for SSL Certificate Management
1. Use Infrastructure-as-Code for Certificate Management
Don't rely on manual certificate installation. Use tools like:
- cert-manager for Kubernetes clusters
- AWS Certificate Manager for AWS deployments
- Caddy server with automatic HTTPS
- Traefik with built-in Let's Encrypt support
2. Monitor All Subdomains
Don't just monitor your main domain. Monitor every subdomain that serves traffic:
www.yourdomain.inapi.yourdomain.inapp.yourdomain.incdn.yourdomain.inmail.yourdomain.instaging.yourdomain.in
Each may have a different certificate with a different expiry date.
3. Use Separate Monitoring for Wildcard Certificates
Even if you have a wildcard certificate (*.yourdomain.in), monitor specific subdomains individually. A wildcard certificate might be installed correctly on your main server but missing on a new microservice that was deployed after the certificate was last provisioned.
4. Set Up Redundant Alerts
Do not rely on a single alert channel. If your email goes to spam and your Slack notifications are muted, you need WhatsApp as a backup. PingSLA's multi-channel alerting ensures at least one alert reaches a human.
5. Test Your Renewal Process
Every quarter, manually trigger a certificate renewal to verify the process works. Don't wait for the actual expiry window to discover that your renewal pipeline is broken.
6. Document Your Certificate Inventory
Maintain a list of all certificates, their providers, expiry dates, and renewal methods. PingSLA's SSL dashboard gives you this overview automatically, but having it documented ensures continuity when team members change.
The ₹2,499 Insurance Policy
SSL certificate monitoring through PingSLA starts at ₹2,499/month with the Starter plan — less than the cost of a team dinner in Bengaluru or Mumbai. For that price, you get multi-stage alerts across WhatsApp, email, and Slack, full certificate chain validation, protocol checks, and monitoring from Indian probe locations.
Compare that to the cost of an expired SSL certificate: lost revenue, damaged SEO, broken API integrations, customer support tickets, and the engineering hours spent diagnosing and fixing the issue under pressure at 2 AM.
"Our Let's Encrypt renewal failed silently after a DNS migration. PingSLA's 14-day alert caught it. Without that alert, our API would have gone down when the cert expired." — DevOps Lead, Bengaluru fintech startup
SSL certificate monitoring is not an advanced feature for enterprise teams. It is a basic hygiene check that every website needs. If you have a website, you have an SSL certificate. If you have an SSL certificate, it will expire. And when it expires — not if, when — you need to know about it well before your customers do.
Start monitoring your SSL certificates with PingSLA today. Set up multi-stage alerts, sleep peacefully, and never be surprised by an expired certificate again.
Related: Website Monitoring for Indian Startups — a complete guide to monitoring your web infrastructure from Indian probe locations.
Start monitoring free — no credit card required
Start Free →Monitor your site from 12 global regions →
Start Free →