You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SSL certificates are becoming more important than ever due to recent events. Administrators are securing an ever increasing number of services with unique SSL certificates and when these expire bad things happen.
Yes IT teams should be getting notified by their SSL CA that a certificate is about to expire but sometimes due to politics those emails are directed to billing managers. Other times your lucky enough to be running your own Internal CA to issue your own certs.
In 2015 this is madness and Administrators sometimes just need a visual alert to remind them before bad things happen. No one can be expected to remember every arcane day that some important certificate expires. Sometimes it's an unimportant certificate we have deployed for a service that some other critical service relies upon for operations but in 2015 we needed to make it secure so we setup ssl/tls.
Until we figure out a better way of handling ssl/tls certificates, Administrators are going to need lots of help and LibreNMS can be there to remind them a few weeks before. Otherwise LibreNMS will only be there to start triggering Down events and interrupting a good nights sleep when midnight rolls around and certificates begin expiring and angry people start calling.
Having a grouped graph showing the count down lines and a group page listing certificate hostnames with expiration dates for multiple certificates would also be nice to see all your certificates in one place and take action on those about to expire the soonest.
SSL certificates are becoming more important than ever due to recent events. Administrators are securing an ever increasing number of services with unique SSL certificates and when these expire bad things happen.
Yes IT teams should be getting notified by their SSL CA that a certificate is about to expire but sometimes due to politics those emails are directed to billing managers. Other times your lucky enough to be running your own Internal CA to issue your own certs.
In 2015 this is madness and Administrators sometimes just need a visual alert to remind them before bad things happen. No one can be expected to remember every arcane day that some important certificate expires. Sometimes it's an unimportant certificate we have deployed for a service that some other critical service relies upon for operations but in 2015 we needed to make it secure so we setup ssl/tls.
Until we figure out a better way of handling ssl/tls certificates, Administrators are going to need lots of help and LibreNMS can be there to remind them a few weeks before. Otherwise LibreNMS will only be there to start triggering Down events and interrupting a good nights sleep when midnight rolls around and certificates begin expiring and angry people start calling.
Having a grouped graph showing the count down lines and a group page listing certificate hostnames with expiration dates for multiple certificates would also be nice to see all your certificates in one place and take action on those about to expire the soonest.
https://github.com/zenoss/ZenPacks.Iwillfearnoevil.Domain/tree/master/ZenPacks/Iwillfearnoevil/Domain/libexec
The text was updated successfully, but these errors were encountered: