SSL certificate expiration not updating after replacing cert

CMK version: 1.5.0p11
OS version: Ubuntu 18.04

Error message: I’ve replaced a certificate on the webserver

root@ind-dmz-web1:/etc/check_mk/ssl_cert_exp.d# stat /etc/ssl/certs/wildcard.website.com.crt && openssl x509 -in /etc/ssl/certs/wildcard.website.com.crt -noout -text | grep 'Not '
  File: /etc/ssl/certs/wildcard.website.com.crt
  Size: 6367            Blocks: 16         IO Block: 4096   regular file
Device: 802h/2050d      Inode: 658492      Links: 1
Access: (0644/-rw-r--r--)  Uid: (    0/    root)   Gid: (    0/    root)
Access: 2022-08-05 11:12:22.610282250 -0400
Modify: 2022-08-05 11:12:12.670231847 -0400
Change: 2022-08-05 11:12:13.362235355 -0400
 Birth: -
            Not Before: Aug  5 00:00:00 2022 GMT
            Not After : Aug  5 23:59:59 2023 GMT

, but checkmk is still showing that it’s expired…

Certificate at /etc/ssl/certs/wildcard.website.com.crt expired 74 days ago

I’ve checked that I’m on the correct host, so I’m scratching my head as to what checkmk is actually doing behind the scenes where it’s not getting the updated cert.

Short question. If this certificate is used by service (web/mail and so on), would it not be better to check it from the service point of view?

So I found out that it was a plugin that created a cache file. Deleting the cache file on the server that the cert was located on forced the check to re-run.

IDK if it is an org-written plugin or not, but removing /var/lib/check_mk_agent/cache/plugins_86400\ssl_cert_exp.cache forced the check.