Track Custom Domain Certificates for Serverless APIs
Serverless developers and cloud architects deploying APIs on platforms like AWS Lambda or Vercel often use custom domains. An expired SSL certificate on these domains will render your serverless functions inaccessible, breaking critical application functionalities.
The problem
Serverless architectures, leveraging platforms like AWS Lambda, Google Cloud Functions, or Vercel, frequently expose APIs and web services via custom domains. If the SSL certificate for one of these custom domains expires, your serverless functions become unreachable, returning browser security warnings or API errors. This completely breaks any frontend applications, mobile apps, or third-party integrations that rely on these endpoints, leading to immediate service disruption and a degraded user experience. Managing these certs manually across many functions is prone to oversight.
Consider a critical authentication API built on AWS Lambda and fronted by `auth.your-saas.com`. If its certificate expires, no user can log in, and all dependent services fail. Such an outage is not only frustrating for users but can halt business operations, requiring urgent attention from your development team. The ephemeral nature of serverless often means less direct server management, making proactive certificate monitoring on custom domains even more critical to maintain uptime and reliability.
How Certfly solves it
Concrete example
$ curl -v https://api.your-serverless.com/users\n
* Trying 203.0.113.5...\n
* Connected to api.your-serverless.com (203.0.113.5) port 443 (#0)\n
* TLSv1.3 (OUT), TLS handshake, Client hello (1):\n
* TLSv1.3 (IN), TLS handshake, Server hello (2):\n
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):\n
* TLSv1.3 (IN), TLS handshake, Certificate (11):\n
* subject: CN=api.your-serverless.com\n
* SSL certificate verify ok.\n
< HTTP/1.1 200 OK