SSL Certificate Expiration
Monitoring API
Prevent outages caused by expired or misconfigured certificates — with one request.
NetDiag runs TLS checks from 3 regions simultaneously and returns a single JSON with quorum and the fields you actually need: validity, expiry date, days remaining, issuer, protocol, and per-region results.
What you get
Core fields (the ones you actually use)
Is the certificate valid right now?
Exact expiry timestamp (ISO 8601)
For alerting thresholds (7/14/30 days)
Detect unexpected issuance changes
TLS version (useful for hardening)
Alert based on majority behavior
Common issues you can detect early
7/14/30 day warning windows before it's too late
Detect unexpected changes after renewal
Multi-CDN mismatches, mis-routed traffic
Unexpected TLS1.2 fallback on TLS1.3 endpoints
Intermittent, regional, or load-balancer specific
Per-region comparison catches misconfigs
Simple, transparent pricing
Start free with 2,000 checks/month. Scale as you grow.
$0/mo
2,000 checks/month
- 10 req/min
- Multi-region checks
- Quorum consensus
$19/mo
25,000 checks/month
- 60 req/min
- Observations enabled
- Problem detection
$29/mo
150,000 checks/month
- 300 req/min
- Full observations
- AI-powered insights
How it works
You send a host
Pass a domain name (no full URL needed). Just the hostname like example.com.
TLS checks run from 3 regions
US, EU, and Asia-Pacific execute the same TLS handshake in parallel.
Results are aggregated with quorum
You get a single status even if one region behaves differently. 2 out of 3 = quorum met.
You get one JSON response
Includes validity, expiry, issuer, protocol, and per-region details. Evidence can be collected automatically.
Use cases
Prevent "it expired overnight" incidents
Integrate with your existing cron or CI/CD pipeline. Get expiry data you can act on before renewal becomes a fire drill.
Catch partial rollouts and mismatched certs
When one region still serves the old cert (or a wrong one), you'll see it immediately in the per-region results.
Prove what happened during an outage
Per-region TLS results give you evidence for postmortems and vendor tickets. No more "we can't reproduce it".
FAQ
What's the difference between "SSL monitoring" and "certificate expiration monitoring"?
Do I need to provide a full URL?
example.com. This avoids storing or leaking sensitive paths and query strings.
Why multi-region TLS checks?
What does "quorum" mean here?
What should I alert on?
- 30 days: early warning (renewal planning)
- 14 days: action required
- 7 days: urgent