Search Exchange
Search All Sites
Nagios Live Webinars
Let our experts show you how Nagios can help your organization.Login
Directory Tree
check_ssl_cert Popular
2.79.0
2024-01-01
- Nagios 1.x
- Nagios 2.x
- Nagios 3.x
- Nagios 4.x
GPL
203471
Meet The New Nagios Core Services Platform
Built on over 25 years of monitoring experience, the Nagios Core Services Platform provides insightful monitoring dashboards, time-saving monitoring wizards, and unmatched ease of use. Use it for free indefinitely.
Monitoring Made Magically Better
- Nagios Core on Overdrive
- Powerful Monitoring Dashboards
- Time-Saving Configuration Wizards
- Open Source Powered Monitoring On Steroids
- And So Much More!
A POSIX shell script (that can be used as a Nagios/Icinga plugin) to check an SSL/TLS connection and certificate
Reviews (8)
This script is the gold standard for Nagios core SSL checks and for how bash scripts should be written and distributed!
1.) It has options for just about every aspect of X.509 certificates
2.) It is simple to use (once you figure out you have to tell it where your local CA (Certificate Authority) is located
3.) It can check a 3rd party API at SSL Labs to grade a web sites cert. This takes a long time and the check may time-out for Nagios but that's not the fault of this script. I may batch process those checks and save the results and just do those as soft checks / and or, run them in batch mode, and leverage the fact that SSL Labs caches subsequent request which allow this check to then complete quickly.
4.) It is very well documented
5.) It is actively maintained (big deal)
6.) It just works!
Phreedom Technologies will be using it to check all of our company & client web sites as well as all publicly accessible SSL-VPN, HTTP admin portals (internal and external) including both those registered to a public CA or a self-signed.
Excellent work and thank you!
1.) It has options for just about every aspect of X.509 certificates
2.) It is simple to use (once you figure out you have to tell it where your local CA (Certificate Authority) is located
3.) It can check a 3rd party API at SSL Labs to grade a web sites cert. This takes a long time and the check may time-out for Nagios but that's not the fault of this script. I may batch process those checks and save the results and just do those as soft checks / and or, run them in batch mode, and leverage the fact that SSL Labs caches subsequent request which allow this check to then complete quickly.
4.) It is very well documented
5.) It is actively maintained (big deal)
6.) It just works!
Phreedom Technologies will be using it to check all of our company & client web sites as well as all publicly accessible SSL-VPN, HTTP admin portals (internal and external) including both those registered to a public CA or a self-signed.
Excellent work and thank you!
While check_http fails checking Let’s Encrypt certificates this one does a good job
Works without any issues on all of my linux boxes and without any additional software.
Actually respects http hosts and pulls the correct certificate unlike the built in check_http. Great plugin for checking certs!
byfabien.clerc, June 13, 2017
Hello,
Is it possible to give an URL instead of a host ?
Thanks and Regards
Is it possible to give an URL instead of a host ?
Thanks and Regards
Owner's reply
It's possible. Just get the latest version from https://github.com/matteocorti/check_ssl_cert/releases
byavonnieda, February 9, 2017
Excellent features, easy to use, thanks for sharing!
Fully featured. Appreciate the option to point to an alternate (newer) openssl.
Thanks for an excellent Nagios plugin! We use this to check certificate validity and expiration with the following command:
define command{
command_name check_ssl_cert
command_line /etc/nagios-plugins/local-bin/check_ssl_cert -H '$HOSTADDRESS$' -c 60 -r /etc/ssl/certs/ -n '$HOSTADDRESS$'
}
Works great, even with wildcard SSL certs. Thanks!
Dane
define command{
command_name check_ssl_cert
command_line /etc/nagios-plugins/local-bin/check_ssl_cert -H '$HOSTADDRESS$' -c 60 -r /etc/ssl/certs/ -n '$HOSTADDRESS$'
}
Works great, even with wildcard SSL certs. Thanks!
Dane