Overview
SSL certificate and domain registration expiry monitoring with configurable alert thresholds.
Subdomain: certs.microgemlabs.aiGetting Started
1. Enable CertGuard in the Products page
2. Navigate to certs.microgemlabs.ai
3. Click + Add Domain and enter your hostname
4. CertGuard immediately checks the SSL certificate and domain registration
What CertGuard Monitors
SSL/TLS Certificates
CertGuard connects to your domain via TLS, inspects the certificate, and tracks:
- Validity โ Is the certificate currently valid and trusted?
- Days until expiry โ Countdown to certificate expiration
- Issuer โ Certificate authority (Let's Encrypt, DigiCert, etc.)
- Subject โ Domain the certificate covers (including wildcards)
- Protocol โ TLS version in use (TLSv1.2, TLSv1.3)
- Valid from/to โ Certificate validity period
Domain Registration (WHOIS)
CertGuard queries the RDAP (Registration Data Access Protocol) API to check:
- Registration expiry date โ When the domain registration expires
- Days until expiry โ Countdown
- Registrar โ Domain registrar (Cloudflare, GoDaddy, Namecheap, etc.)
RDAP is the modern replacement for raw WHOIS and provides structured JSON responses. Some TLDs may not support RDAP โ CertGuard will note this and you can add the expiry date manually.
Alert Thresholds
CertGuard alerts at configurable day thresholds before expiry. Defaults:
Certificate alerts: 30, 14, 7, 1, 0 daysThis means you get your first warning 30 days before the cert expires, with increasing urgency as the deadline approaches. The day-0 alert fires when the certificate has actually expired.
Domain registration alerts: 60, 30, 14, 7 daysDomain registration alerts start earlier because domain renewals often take longer to process.
Customizing thresholds: Enter comma-separated day values when adding a domain:- Conservative:
60,30,14,7,3,1,0 - Minimal:
7,1,0
Severity Levels
CertGuard maps days-remaining to severity:
| Days Left | Severity | Alert Channel |
|---|---|---|
| 0 (expired) | Critical | SMS + Voice + Email |
| 1-7 days | High | SMS + Email |
| 8-30 days | Warning | Email only |
| 31+ days | None | No alert (healthy) |
Domain Statuses
| Status | Meaning |
|---|---|
| Healthy | Certificate valid, 30+ days remaining |
| Warning | Certificate valid, 8-30 days remaining |
| Critical | Certificate valid, 1-7 days remaining |
| Expired | Certificate has expired (0 or negative days) |
| Error | Could not connect or inspect certificate |
| New | Just added, initial check in progress |
Dashboard
The domains list is sorted by urgency โ the domain with the fewest days remaining appears first. Each card shows:
- Status badge with color coding
- Hostname and port
- Certificate issuer and TLS protocol
- Days until cert expiry (large, color-coded number)
- Days until domain registration expiry
- Time since last check
- Active incident banner (if any)
Domain Detail Page
Click any domain to see:
SSL Certificate panel โ Full certificate details or error message if the check failed. Domain Registration panel โ WHOIS/RDAP data with registrar and expiry date. Also displays configured alert thresholds as day pills. Check History table โ Historical SSL checks showing date, validity, days remaining, protocol, and any errors. Useful for tracking certificate renewals over time. Incidents timeline โ Past and active incidents with event timeline (detected, escalated, acknowledged, resolved).Check Now
Click the Check Now button on any domain's detail page to trigger an immediate SSL and WHOIS check. Results appear within a few seconds. This is useful after renewing a certificate to verify the new cert is live.
Check Schedule
CertGuard runs a comprehensive check of all domains daily at 6:00 AM UTC. On-demand checks can be triggered anytime via the dashboard.
Adding Domains
example.com, api.example.com, *.example.com.
Port โ Default: 443 (HTTPS). Change for services running SSL on non-standard ports (e.g., 8443).
Subdomains โ Add each subdomain you want to monitor separately. A wildcard certificate on *.example.com and a specific certificate on api.example.com are different certificates that may expire at different times.On-Call Integration
Certificate expiry alerts route through your team's shared escalation policy. An expiring certificate at 3 AM triggers SMS and voice calls to whoever is on call โ the same on-call system used by PulseGuardPlus, CronKeeper, LogVault, CronRunner, and HookRelay.
Auto-Resolution
When CertGuard's daily check finds that a previously-expiring certificate has been renewed (days remaining increased), it automatically resolves the active incident and linked on-call alert. No manual action needed.
Maintenance Windows
Suppress CertGuard alerts during planned certificate migrations or domain transfers by creating a maintenance window (Ops โ Maintenance). Daily checks continue running, but expiry alerts won't create incidents or trigger on-call. Scope suppression to CertGuard as a product or to a specific domain.
Runbook Actions
Define automated responses to certificate expiry (Skills โ Runbook (/agent/skills?type=runbook)). Example: create a "Trigger Cert Renewal" template that POSTs to your cert-manager webhook when CertGuard detects a certificate expiring within 7 days. Set the trust level to auto-approval so MicroGemAI triggers the renewal and your on-call engineer approves via Slack or Telegram.
Postmortems
When cert incidents resolve (e.g., an expired certificate is renewed), MicroGemAI auto-generates a postmortem with what expired, when, how long the outage lasted, what other services were affected (cross-product correlation), and action items to prevent recurrence. Review and publish at Ops โ Postmortems.