Kubernetes TLS/SSL certificate expiration

Description

Check for expiring TLS certificates in Kubernetes by advancing the system clock forward one day, one week, and one month. Detect certificates that will expire before they cause outages.

What this Scenario does

This Scenario advances the system clock within your Kubernetes pods forward by one day, one week, and one month. This triggers certificate validation logic and reveals any TLS/SSL certificates that will expire within those time windows—including certificates managed by cert-manager, mounted as Kubernetes secrets, or used by ingress controllers.

Why run this Scenario?

  • Proactively identify expiring certificates across your Kubernetes environment before they cause outages.
  • Test cert-manager and other Kubernetes certificate automation workflows under time-based pressure.
  • Verify that Kubernetes secrets containing TLS certificates are being rotated correctly.
  • Validate that ingress controller certificates and service mesh mTLS certificates are covered by your renewal process.

Expected outcome

If a TLS certificate expires without renewal, the Kubernetes service fails gracefully and alerts trigger immediately.

Target
Kubernetes
Experiments
Time Travel
Time Travel
Preview
Runtime:  
5 minutes