PulseAPI can monitor your SSL certificates and alert you before they expire. This article explains how SSL monitoring works and how to configure expiry alerts.
Every check PulseAPI makes to an https:// endpoint includes SSL validation by default. If the SSL certificate is invalid — expired, doesn't match the hostname, or has a broken trust chain — the check is recorded as a failure.
This means you get automatic SSL failure detection built into every monitor. You don't need to configure anything extra to detect an expired or broken certificate.
SSL validation tells you when a certificate is already broken. Expiry alerts tell you when a certificate is about to expire — giving you time to renew it before your users see any errors.
To set up an expiry alert:
We recommend creating two rules: one at 30 days (low priority, advance warning) and one at 7 days (high priority, urgent action needed).
See Alert Rule Conditions: SSL Certificate Expiry for step-by-step instructions.
If you're monitoring an endpoint with a self-signed certificate (common for internal tools and staging environments), SSL verification will cause every check to fail because the certificate can't be verified against a public CA.
To disable verification for these monitors:
Warning: Only disable SSL verification for internal or staging endpoints where you control the certificate. Never disable it for public production endpoints — if a production cert is invalid, your users are seeing errors and you need to know about it.
When SSL validation fails, the check history shows a Failed status with an error message indicating the SSL issue:
SSL certificate expired — the cert's expiry date has passedSSL certificate hostname mismatch — the cert doesn't cover the hostname you're monitoringSSL certificate untrusted — the cert chain can't be verified (self-signed or missing intermediate CA)SSL handshake failed — a general TLS negotiation errorStill have questions? Contact support.