<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL Certificate Monitor extension - monitor and alert only necessary Certs in Extensions</title>
    <link>https://community.dynatrace.com/t5/Extensions/SSL-Certificate-Monitor-extension-monitor-and-alert-only/m-p/239534#M4194</link>
    <description>&lt;P&gt;I'm seeking assistance with regarding the ssl certificate Extension. I'm currently tasked with monitoring custom certificates, however, I'm encountering difficulties&amp;nbsp; filtering them based on the provided technology filter because the certificate doesn't fall under any of the technology filter. This is resulting in an influx of old and unnecessary certificates, some dating back to 1999 and generating alerts as "Multiple infrastructure problem" attaching itself to host problem.&lt;/P&gt;
&lt;P&gt;i'm wondering if there's a method to streamline the discovery process for list of certs to monitor and alerts.&lt;/P&gt;
&lt;P&gt;Any insights or guidance will be greatly appreciated.&lt;/P&gt;</description>
    <pubDate>Fri, 10 May 2024 14:26:48 GMT</pubDate>
    <dc:creator>D644774</dc:creator>
    <dc:date>2024-05-10T14:26:48Z</dc:date>
    <item>
      <title>SSL Certificate Monitor extension - monitor and alert only necessary Certs</title>
      <link>https://community.dynatrace.com/t5/Extensions/SSL-Certificate-Monitor-extension-monitor-and-alert-only/m-p/239534#M4194</link>
      <description>&lt;P&gt;I'm seeking assistance with regarding the ssl certificate Extension. I'm currently tasked with monitoring custom certificates, however, I'm encountering difficulties&amp;nbsp; filtering them based on the provided technology filter because the certificate doesn't fall under any of the technology filter. This is resulting in an influx of old and unnecessary certificates, some dating back to 1999 and generating alerts as "Multiple infrastructure problem" attaching itself to host problem.&lt;/P&gt;
&lt;P&gt;i'm wondering if there's a method to streamline the discovery process for list of certs to monitor and alerts.&lt;/P&gt;
&lt;P&gt;Any insights or guidance will be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 14:26:48 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Extensions/SSL-Certificate-Monitor-extension-monitor-and-alert-only/m-p/239534#M4194</guid>
      <dc:creator>D644774</dc:creator>
      <dc:date>2024-05-10T14:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Monitor extension - monitor and alert only necessary Certs</title>
      <link>https://community.dynatrace.com/t5/Extensions/SSL-Certificate-Monitor-extension-monitor-and-alert-only/m-p/245334#M4414</link>
      <description>&lt;P&gt;Thanks for the feedback. It's very helpful to hear how people are using the extension. Adding an option to disable problem creation for certificates that have expired, "greater than x days ago", is at the top of the list for new features for the Certificate Manager. I'll update this thread again when the update has been released.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 17:26:40 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Extensions/SSL-Certificate-Monitor-extension-monitor-and-alert-only/m-p/245334#M4414</guid>
      <dc:creator>ben_davidson</dc:creator>
      <dc:date>2024-05-10T17:26:40Z</dc:date>
    </item>
  </channel>
</rss>

