On Tue, May 12, 2020, at 18:34, Julian van den Berkmortel wrote:
> It's in regards to the "probe_ssl_earliest_cert_expiry" metric which uses the 
> date of the earliest expiring certificate in the chain as its value.
> Its value at the moment is the 30th of May because the root certificate is 
> the certificate which will expire the earliest in the certificate chain right 
> now, even though the end-user certificate won't expire for the next couple of 
> months and stay valid because of the cross signing certificates as you 
> explained (thus causing the false-positives alerts).
> I was curious whether there is another solution to prevent false-positives 
> but keep alerting active for the domains in question which have the expiring 
> certificate as their root certificate, other than completely renewing the 
> certificate.

- make sure the newer (cross-signing) certs are in your trust store, so that 
the blackbox exporter can find a valid chain to/through them.
- remove the expiring Root CA from your trust store.

Problem solved?

-- 
Harald

-- 
You received this message because you are subscribed to the Google Groups 
"Prometheus Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/prometheus-users/9e7d225d-a0a5-4250-859c-b0079905c14b%40www.fastmail.com.

Reply via email to