Priority 2 - Critical for production operation
Target audience: DevOps, SRE, IT-Operations
Monitoring of PKI infrastructure with focus on certificate expiry, availability, and compliance.
| Scenario | Description | Tools |
|---|---|---|
| Expiry Monitoring | Monitor certificate expiry | Prometheus, Grafana |
| Revocation Check | Check CRL/OCSP availability | curl, OpenSSL |
| Audit Logging | Compliance-conformant logging | Syslog, ELK |
| Alerting Setup | Configure notifications | Alertmanager, PagerDuty |
| Metric | Description | Thresholds |
| ——– | ————- | ———— |
cert_expiry_days | Days until expiry | Warn: 30, Crit: 7 |
crl_next_update_days | Days until CRL update | Warn: 3, Crit: 1 |
ocsp_response_time_ms | OCSP response time | Warn: 500, Crit: 2000 |
ca_availability | CA reachable (0/1) | Crit: 0 |
signing_ops_per_hour | Signing operations | Info |
Minimal setup (5 minutes):
# 1. Install cert-exporter wget https://github.com/enix/cert-exporter/releases/download/v2.0.0/cert-exporter_2.0.0_linux_amd64.tar.gz tar xzf cert-exporter_*.tar.gz ./cert-exporter --kubeconfig="" --files /etc/ssl/certs/*.pem & # 2. Check expiring certificates curl -s localhost:9793/metrics | grep cert_expires_in_seconds
| Environment | Stack | Description |
| ————- | ——- | ————- |
| Small (<100 Certs) | Script + E-Mail | Cron job with e-mail alerts |
| Medium (100-1000) | Prometheus + Grafana | Standard monitoring |
| Large (>1000) | ELK + Grafana + PagerDuty | Enterprise stack |
| Kubernetes | cert-manager + Prometheus | Native integration |
« <- Operator Scenarios | -> Expiry Monitoring »
Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional