SSL/TLS checks
A TLS check verifies that a domain’s TLS certificate is valid and tells you when it’s about to expire. It catches the silent failure mode where your site is up but its cert quietly expires next Tuesday.
When to use TLS checks
Section titled “When to use TLS checks”- Anything served over HTTPS where an expired cert would cause customer pain.
- Internal services with self-renewing certs (Let’s Encrypt, ACM) where renewal can fail without anyone noticing.
- Custom-domain status pages, customer subdomains, anything where you don’t have full control of the renewal pipeline.
How it works
Section titled “How it works”TLS checks are paired with an HTTP check today. Set monitor_tls: true when creating an HTTP check; SiteQwality auto-provisions a paired TLS check that targets the same domain on a slower schedule (no need to handshake every minute).
The TLS check’s current_status reflects the most recent handshake outcome:
- Healthy — cert valid, hostname matches, chain trusted, expiry > 14 days away.
- Pending failure — handshake failed in one tick; flips to fail after another.
- Failed — chain invalid, hostname mismatch, or cert expired.
expiry_date is recorded so the dashboard can render a countdown. Standard advance-warning periods (30 days, 14 days, 7 days) trigger increasingly severe notifications.
What it doesn’t do (today)
Section titled “What it doesn’t do (today)”- Standalone TLS checks (without an HTTP host) aren’t currently supported. Track via the API roadmap.
- CT log checks — confirming new certs appear in Certificate Transparency logs — aren’t yet supported.
- Custom expiry-warning thresholds are inherited from the HTTP check’s notification group.
See also
Section titled “See also” Quickstart Add a TLS check to an existing HTTP monitor.
Reference Every field on a TLS check, with status meanings.
HTTP checks TLS checks are paired with HTTP checks.