Starting from release 20.3.3 it's possible for the administrator to configure the number of days ahead of expiry of a TLS certificate present in SLX, as an alert to be issued from SLX and map this configured period against one of the 4 levels that indicate the severity of this alert. The 4 levels are critical, major, minor and info. Below is an example of how the configuration will be.
SLX(config)# crypto cert expiry-level info period 50 SLX(config)# crypto cert expiry-level minor period 30 SLX(config)# crypto cert expiry-level major period 10 SLX(config)# crypto cert expiry-level critical period 5
The configuration allows period to be specified in the range between 1 to 90 in number of days. It means
      when this configuration is done, periodically once in 24 hours the expiry date of all TLS
      certificates present in SLX are checked and when the number of days remaining for expiry of a
      certain certificate matches the period configured, an alert is issued with the severity
      indicating the level specified in the expiry-level field. 
The alert is issued in the
      form of a RASLOG. On SLX SNMP
      trap severity levels can be set. Upon setting the SNMP trap severity level to warning the
      generated raslogs will also issue an SNMP trap. 
The RASLOGs and SNMP traps carries detail about the
      expired certificate like the serial number of the certificate and its subject etc., and
      display that this certificate expires within these many days. Below is an example when info
      level is configured. 
RASLOG
2022/05/13-00:00:02, [SEC-3136], 87,, WARNING, SLX, Event: cert expiry ,Alert-level:INFO, Certificate Details=[subject= /C=IN/ST=KA/L=BAN/O=HCL/OU=Engg/CN=10.24.12.129/emailAddress=gselvara j@hcl.com issuer= /C=IN/ST=KA/L=BAN/O=HCL/OU=Engg/CN=root serial=4098] will expire in 44 days.
SNMP Trap
05:35:32.203670 IP 10.24.12.129.50000 > ldap.testsqa.com.SNMPtrap: C="cm2" V2Trap(452) system.sysUpTime.0=81400 S:1.1.4.1.0=E:1588.2.1.1.1.0.4 S:18.1.3.0=10.24.12.129 E:1588.2.1.1.1.8.5.1.1.87=87 E:1588.2.1.1.1.8.5.1.2.87="2022/05/13- 00:00:02" E:1588.2.1.1.1.8.5.1.3.87=3 E:1588.2.1.1.1.8.5.1.4.87=1 E:1588.2.1.1.1.8.5.1.5.87="SEC-3136 Event: cert expiry , Alertlevel: INFO, Certificate Details=[subject= /C=IN/ST=KA/L=BAN/O=HCL/OU=Engg/CN=10.24.12.129/emailAddress=gselvara j@hcl.com issuer= /C=IN/ST=KA/L=BAN/O=HCL/OU=Engg/CN=root serial=4098] will expire in 44 days."
In case administrator has configured multiple levels or all 4 levels, then many alerts are issued indicating the particular severity level when the period remaining for expiry matches the configured period against each level.
In case a certificate is already expired a raslog with Error as severity level is sent continuously sent every 24 hours until the specific certificate is changed.
This RASLOG is sent irrespective of the expiry level configuration. Having the above
      configurations provides reminders to administrators to change the certificate and prevents a
      service from non-functional due to TLS handshake failure resulting from certificate
      expiry.