Overview
HTTP/HTTPS monitoring is the most common monitor type, used to check the availability and performance of websites, APIs, and web services. UptimeIO makes HTTP requests to your endpoint and validates the response.UptimeIO automatically detects whether to use HTTP or HTTPS based on your URL. Both protocols are supported under the “HTTP” monitor type.
Use Cases
Website Monitoring
Ensure your website is accessible and loading correctly
API Health Checks
Monitor REST API endpoints for availability
E-commerce Sites
Track checkout pages and payment gateways
Authentication Endpoints
Monitor login and authentication services
Creating an HTTP Monitor
1
Basic Configuration
2
Select Monitoring Regions
Choose regions to monitor from:
- Auto: Intelligent selection (2 regions)
- Manual: Select specific regions
3
Configure HTTP Settings
Customize the HTTP request:
- HTTP method
- Expected status codes
- Request headers
- Request body
- Authentication
- Redirect behavior
HTTP Methods
UptimeIO supports all standard HTTP methods:| Method | Use Case | Body Allowed |
|---|---|---|
| GET | Retrieve data, health checks | No |
| HEAD | Check headers without body (faster) | No |
| POST | Submit data, trigger actions | Yes |
| PUT | Update resources | Yes |
| PATCH | Partial updates | Yes |
| DELETE | Remove resources | No |
| OPTIONS | Check supported methods | No |
Expected Status Codes
Configure which HTTP status codes indicate success. By default, UptimeIO expects 2xx and 3xx status codes.Common Configurations
- Default (2xx, 3xx)
- Strict (200 only)
- Custom Range
- Maintenance Mode
Request Headers
Add custom headers to your HTTP requests for authentication, content negotiation, or custom requirements.Common Headers
Request Body
For POST, PUT, and PATCH requests, you can include a request body.JSON Body Example
When you provide a request body, UptimeIO automatically sets
Content-Type: application/json unless you override it in the headers.Authentication
UptimeIO supports two authentication methods for HTTP monitors:- Basic Authentication
- Digest Authentication
- Bearer Token
Authorization header using Base64 encoding:Redirect Handling
Control how UptimeIO handles HTTP redirects:| Setting | Behavior | Use Case |
|---|---|---|
| Follow Redirects: ON | Follows up to 5 redirects | Normal websites, APIs with redirects |
| Follow Redirects: OFF | Treats redirects as failures | Ensure no unexpected redirects |
| Max Redirects: 1-10 | Custom redirect limit | Fine-tune redirect behavior |
SSL/TLS Verification
UptimeIO automatically verifies SSL certificates for HTTPS endpoints:Certificate Validation
Certificate Validation
- Checks certificate validity
- Verifies certificate chain
- Validates hostname matches
- Checks expiration date
SSL Expiry Alerts
SSL Expiry Alerts
Configure warnings before certificate expiration:
- 30 days before expiry
- 7 days before expiry
- 1 day before expiry
Disable SSL Verification
Disable SSL Verification
For development or self-signed certificates, you can disable SSL verification.
Slow Response Alerts
Monitor response time performance and get alerted when your service slows down:1
Enable slow response monitoring
2
Incident creation
When response time exceeds the threshold, a separate “Slow Response” incident is created (distinct from downtime incidents).
3
Automatic resolution
The incident resolves when response time drops below 80% of the threshold for 3 consecutive checks.Example: With 2000ms threshold, incident resolves when response time is below 1600ms for 3 checks.
Slow response incidents are separate from downtime incidents. Your monitor can be “UP” but have an active slow response incident.
Response Time Breakdown
UptimeIO provides detailed timing information for each check:- DNS Resolution: DNS lookup time
- TCP Connection: Time to establish TCP connection
- TLS Handshake: SSL/TLS negotiation time
- Server Response: Time for server to generate and send response
Cache Buster
To bypass caches and monitor your origin server:- Query String Method
- Custom Header Method
- Unique Path Method
Add a random query parameter to your URL:Most caches treat different query strings as unique URLs.
Best Practices
Use dedicated health check endpoints
Use dedicated health check endpoints
Create lightweight
/health or /ping endpoints that:- Return quickly (< 100ms)
- Check critical dependencies (database, cache)
- Return meaningful status codes
- Don’t perform heavy operations
Set appropriate timeouts
Set appropriate timeouts
- Fast APIs: 5-10 seconds
- Standard websites: 15-30 seconds
- Heavy operations: 30-60 seconds
Monitor from multiple regions
Monitor from multiple regions
Always use at least 2 regions to avoid false positives from regional network issues. For global services, monitor from 3-4 regions.
Use HEAD requests when possible
Use HEAD requests when possible
HEAD requests are faster and consume less bandwidth. Use them for simple availability checks where you don’t need the response body.
Example Configurations
Troubleshooting
Getting timeout errors
Getting timeout errors
- Increase timeout value
- Check if your server is slow to respond
- Verify no firewall is blocking UptimeIO’s IP ranges
- Check if SSL handshake is taking too long
Unexpected status codes
Unexpected status codes
- Verify expected status codes match your endpoint’s behavior
- Check if authentication is required
- Ensure no redirects are occurring if you’re not following them
- Verify the URL is correct
SSL certificate errors
SSL certificate errors
- Ensure certificate is valid and not expired
- Check certificate chain is complete
- Verify hostname matches certificate
- For self-signed certs, disable SSL verification (testing only)
False positives
False positives
- Enable multi-region monitoring (at least 2 regions)
- Increase timeout if server occasionally responds slowly
- Check if your server blocks repeated requests (rate limiting)
- Whitelist UptimeIO’s user agent if needed