Skip to content

SSL/TLS checks

A TLS check verifies that a domain’s TLS certificate is valid and tells you when it’s about to expire. It catches the silent failure mode where your site is up but its cert quietly expires next Tuesday.

  • Anything served over HTTPS where an expired cert would cause customer pain.
  • Internal services with self-renewing certs (Let’s Encrypt, ACM) where renewal can fail without anyone noticing.
  • Custom-domain status pages, customer subdomains, anything where you don’t have full control of the renewal pipeline.

TLS checks are paired with an HTTP check today. Set monitor_tls: true when creating an HTTP check; SiteQwality auto-provisions a paired TLS check that targets the same domain on a slower schedule (no need to handshake every minute).

The TLS check’s current_status reflects the most recent handshake outcome:

  • Healthy — cert valid, hostname matches, chain trusted, expiry > 14 days away.
  • Pending failure — handshake failed in one tick; flips to fail after another.
  • Failed — chain invalid, hostname mismatch, or cert expired.

expiry_date is recorded so the dashboard can render a countdown. Standard advance-warning periods (30 days, 14 days, 7 days) trigger increasingly severe notifications.

  • Standalone TLS checks (without an HTTP host) aren’t currently supported. Track via the API roadmap.
  • CT log checks — confirming new certs appear in Certificate Transparency logs — aren’t yet supported.
  • Custom expiry-warning thresholds are inherited from the HTTP check’s notification group.