Alerting and Notification Issues

The Alerting and Notification Issues section addresses problems where expiry alerts, policy violation alerts, or other lifecycle notifications are not being generated, delivered, or displayed as expected. Since alerts are critical for preventing outages and compliance failures, timely resolution ensures proactive certificate management.

CERTInext provides configurable alert rules, notification channels, and reporting visibility to support real-time monitoring.

Common Symptoms

Alert-related issues may appear as:

  • Expiry alerts not received before certificate expiration

  • Policy violation alerts not triggered

  • Notifications sent to incorrect recipients

  • Email delivery failures

  • Alerts visible in dashboard but no email received

  • Duplicate or excessive alerts

Step 1: Verify Alert Configuration

Navigate to the relevant alert configuration section:

  • Expiry Alerts

  • Policy Violation Alerts

  • Notification Channels

Confirm:

  • Alert rule is enabled

  • Threshold values are correctly defined (e.g., 30 days before expiry)

  • Domains or groups are correctly mapped

  • Policy rules are active

Incorrect thresholds or disabled rules are common causes.

Step 2: Check Certificate Scope

Ensure the affected certificate:

  • Is within the configured alert scope

  • Is not marked as ignored

  • Is properly linked to a group

  • Has valid expiration metadata

Certificates excluded from scope will not trigger alerts.

Step 3: Validate Notification Channels

Navigate to Notification Channels configuration and verify:

  • Email addresses are correct

  • Distribution lists are active

  • Channel status is enabled

  • No typo in recipient entries

If using multiple channels, confirm all required recipients are mapped correctly.

Step 4: Confirm Email Delivery

If alerts are generated but not received:

  • Check spam or junk folders

  • Verify domain allowlisting

  • Confirm SMTP or mail relay configuration

  • Ensure sender domain is not blocked by security controls

Coordinate with the email security team if necessary.

Step 5: Review Dashboard Metrics

Navigate to monitoring dashboards and verify:

  • Expiring certificates count

  • Policy violation metrics

  • Alert history logs

If dashboard shows zero results, verify discovery and provisioning data is up to date.

Step 6: Validate Policy Configuration

For policy violation alerts:

Confirm:

  • Weak key detection rules are enabled

  • Unsupported protocol checks are active

  • Non-approved CA detection is configured

  • Trust chain validation rules are active

Policy rules must be enabled to trigger alerts.

Step 7: Check Group-Level Configuration

If alerts are group-specific:

  • Verify correct group assignment

  • Confirm users are mapped to the group

  • Ensure renewal notification emails are defined at group level

Misconfigured group ownership can block alert delivery.

Step 8: Review Alert Timing

Some alerts trigger based on schedule:

  • Confirm time zone settings (UTC)

  • Validate renewal window configuration

  • Ensure bots are active during evaluation window

Inactive bots may delay alert evaluation.

Step 9: Re-test Alert

After correcting configuration:

  • Trigger a manual evaluation (if available)

  • Adjust threshold temporarily to simulate alert

  • Monitor dashboard for updated metrics

When to Escalate

Provide:

  • Certificate CN / SAN

  • Alert type (Expiry / Policy Violation)

  • Expected threshold

  • Notification recipient list

  • Screenshot of alert configuration

  • Timestamp when alert was expected

This helps isolate configuration versus delivery issues.

Best Practices

  • Use multiple recipients for critical alerts

  • Configure 30–45 day expiry thresholds

  • Regularly review alert rules

  • Monitor dashboard KPIs weekly

  • Keep notification distribution lists updated

Last updated