Search Exchange
Search All Sites
Nagios Live Webinars
Let our experts show you how Nagios can help your organization.Login
Directory Tree
check_ssl_cert_expiry
v 1.0
2014-12-10
- Nagios 3.x
- Nagios 4.x
- Nagios XI
GPL
24239
Meet The New Nagios Core Services Platform
Built on over 25 years of monitoring experience, the Nagios Core Services Platform provides insightful monitoring dashboards, time-saving monitoring wizards, and unmatched ease of use. Use it for free indefinitely.
Monitoring Made Magically Better
- Nagios Core on Overdrive
- Powerful Monitoring Dashboards
- Time-Saving Configuration Wizards
- Open Source Powered Monitoring On Steroids
- And So Much More!
Even after the date of expiration it will remain continue showing alert as CRITICAL.
Contact us for further improvement and suggestion.
Usage Syntax Example:
check_ssl_cert_expiry -h Domain-Name -w days -c days
Here,
-h = Give domain name with using https. For eg example.com or www.example.com . Manually check URL in web browser first,which is using HTTPS.
-w = No. of days for Warning alert
-c = No. of days for Critical alert
Install the plugin directly into Nagios Server.
In case if there is firewall rule in network, Allow https (443) port access from Nagios Server to Target Web server.
check_ssl_cert_expiry -h Domain-Name -w days -c days
Here,
-h = Give domain name with using https. For eg example.com or www.example.com . Manually check URL in web browser first,which is using HTTPS.
-w = No. of days for Warning alert
-c = No. of days for Critical alert
Install the plugin directly into Nagios Server.
In case if there is firewall rule in network, Allow https (443) port access from Nagios Server to Target Web server.
Reviews (4)
bynishith, March 15, 2023
This is the most advanced & simple script to achieve the Nagios SSL Expiry Monitoring. Worked Well. Some Nagios Administrators, here is my configuration file.
==========================
commands.cfg
{
define command
command_name check_ssl_cert_expiry
command_line $USER1$/check_ssl_cert_expiry -h $ARG1$ -w $ARG2$ -c $ARG3$
}
==========================
{
define service
use generic-service
check_interval 60
retry_interval 5
host_name central_nagios
service_description Server SSL Certificate Expiry of YOUR DOMAIN NAME check_command check_ssl_cert_expiry!YOUR_DOMAIN_NAME!60!30 contacts nishithvyas notification_interval 60 notifications_enabled 1
}
Done.
==========================
commands.cfg
{
define command
command_name check_ssl_cert_expiry
command_line $USER1$/check_ssl_cert_expiry -h $ARG1$ -w $ARG2$ -c $ARG3$
}
==========================
{
define service
use generic-service
check_interval 60
retry_interval 5
host_name central_nagios
service_description Server SSL Certificate Expiry of YOUR DOMAIN NAME check_command check_ssl_cert_expiry!YOUR_DOMAIN_NAME!60!30 contacts nishithvyas notification_interval 60 notifications_enabled 1
}
Done.
byjose.a.guardia, August 18, 2016
In a single SSL site it´s works fine. However, if we have more than one SSL site in the same server, this plugin only check one of them, and all the sites has the same expiry date.
Thanks.
Thanks.
byutahluge, December 18, 2015
After trying a bunch of other ssl cert plugins, this one works right out of the box on a minimal install O.S. Thank you very much!
byDaveHowe, December 12, 2014
how does this differ from check_http --certificate ?