
Built a self-hosted expiration monitoring tool for certificates, secrets, API keys, and licenses
I’ve been working on a self-hosted tool called TokenTimer to solve a problem I kept seeing in ops/security environments: expired certificates, forgotten secrets, rotated API keys, and unclear renewal ownership causing avoidable incidents.
The idea is simple: provide one place to track expiring assets across providers and environments, instead of relying on a mix of provider dashboards, calendar reminders, and custom scripts.
Current features include:
- auto-import / auto-sync from Vault, AWS, Azure, GCP, GitHub, and GitLab
- multi-channel alerting
- HTTPS endpoint monitoring with SSL expiry detection
- multi-workspace RBAC and audit logging
- self-hosted deployment with Docker Compose or Helm
I’m sharing it here mainly to get feedback from people who actually run infrastructure in production.
A few things I’d love input on:
- How are you currently tracking expirations across teams and providers?
- Which integrations would be must haves in your environment?
- Would you rather centralize this in one tool, or keep it inside existing platforms?
The core version is source-available with internal usage allowed so you are free to use it (the license just prohibits commercial usage).
Repo: https://github.com/tokentimerch/tokentimer-core
Website: https://tokentimer.ch

