Back to Blog
Monitoring Strategy Engineering March 14, 2026 · 24 min read

Monitoring Check Types Explained in 2026: HTTP, TCP, Ping, DNS, SSL, Database, SMTP, WebSocket, gRPC, Heartbeats & Network Quality

Most teams say they need “uptime monitoring,” but what they actually need is the right mix of check types. A single HTTP probe cannot tell you whether your DNS is wrong, your SSL certificate is about to expire, your cron jobs stopped running, your Redis instance is refusing connections, or your users in one region are seeing severe packet loss. This guide breaks down the major monitoring checks modern teams should run, what each one catches, where each one falls short, and how to combine them into a monitoring stack that detects real failures before customers do.

Why Check Type Selection Matters More Than Most Teams Realize

Monitoring fails when teams pick a check because it is easy, not because it matches the failure mode they care about. A simple GET /health monitor is useful, but it is not enough. If your TCP port is open but the app returns garbage, TCP alone is useless. If your website returns 200 OK but your login JSON is malformed, ping and TCP both stay green. If your cron job never runs, no pull-based HTTP check will notice. If a gRPC server is reachable but reports NOT_SERVING, a generic port check misses the incident entirely.

The right question is not “Do we have monitoring?” The right question is: Which class of failure are we trying to detect, and which check is designed to catch it?

Rule of thumb: monitor at the layer where the customer feels pain. If users hit an HTTP API, run HTTP checks with response validation. If a background billing job must finish every hour, use a heartbeat monitor. If a VoIP or streaming workflow depends on stable latency, add network quality checks for jitter and packet loss.

The 10 Core Monitoring Checks Engineering Teams Should Know

Check Type Best For Detects Misses
HTTP / HTTPSWebsites, APIs, web appsStatus codes, latency, body validation, JSON correctnessLow-level network issues hidden behind a green HTTP response
TCP PortPorts and servicesOpen port, connection acceptance, connect latencyApplication correctness after connect
Ping / ICMPBasic reachabilityHost reachability, packet loss, RTTApp-layer failures
DNSDomains and failover recordsResolution success, unexpected IPsWhether the app behind the IP actually works
SSL / TLSHTTPS and secure endpointsHandshake success, cert validity, expiry warningsBusiness logic failures
DatabasePostgreSQL, RedisConnectivity, auth, query executionHTTP/frontend issues
SMTPEmail delivery infrastructureBanner, EHLO, STARTTLS support, auth readinessMailbox-level deliverability problems
WebSocketRealtime appsHandshake, message send/receive, expected response textNon-realtime paths
gRPC HealthgRPC microservicesgrpc.health.v1.Health serving stateEndpoints without health implementation
Heartbeat / PushCron jobs, queues, workersMissing scheduled execution, delayed jobsRequest/response path issues
Network QualityLatency-sensitive workloadsJitter, packet loss, RTT varianceApplication correctness

1. HTTP / HTTPS Checks: The Workhorse of Modern Monitoring

For most software companies, HTTP monitoring is the highest-value check type because it maps most closely to the customer experience. If your frontend, REST API, admin portal, public status page, or webhook endpoint is delivered over HTTP, this is where your monitoring strategy should start.

A mature HTTP check is much more than “does the server return 200.” Modern HTTP checks should support:

Best HTTP Use Cases

Great at catching5xx errors, auth failures, malformed JSON, bad content, slow responses
Not enough forCron jobs, packet loss analysis, or protocol-specific checks like SMTP and gRPC

Why Response Validation Matters

HTTP status alone is a weak signal. Many production failures still return 200 OK:

That is why keyword checks, regex rules, JSON path validation, and JSON schema validation are so valuable. They catch the incidents users actually notice.

Example HTTP monitor strategy:
- Method: GET
- URL: https://api.example.com/v1/orders
- Header: Authorization: Bearer <token>
- Expected status: 200
- Validation mode: schema + path checks
- Path checks: $.data.length > 0, $.meta.request_id exists
- Latency threshold: 800ms

2. TCP Port Checks: Fast, Simple, and Still Extremely Useful

TCP checks answer a lower-level question than HTTP: can a client open a socket to this host and port? That is perfect when the protocol itself is not HTTP or when you want to isolate a network problem from an application problem.

TCP monitors are ideal for:

If the port is closed, refusing connections, or timing out, you know the problem is likely below the application layer. TCP connect timing also gives you a simple but useful latency signal.

Important: a successful TCP connect does not mean the service is healthy. The process may accept connections and then fail every command. That is why TCP checks are excellent companions to protocol-aware checks, not replacements for them.

3. Ping / ICMP Checks: Basic Reachability, Not Full Health

Ping is the oldest check in the book, and it still has value. It tells you whether a host is reachable and gives you round-trip latency and packet loss. For network operations teams, infrastructure engineers, and hybrid-cloud deployments, that baseline signal is still useful.

Good use cases include:

Ping checks typically measure multiple packets, calculate average RTT, and track loss percentage. That gives you a better signal than a single ping.

But ping has limits. Many hosts block ICMP by policy. And even when ICMP is allowed, a ping-successful host can still have a dead web app, a broken DB, or an overloaded runtime.

4. DNS Checks: Catching the Silent Routing Failures

DNS is a surprisingly common source of outages, especially during cutovers, failovers, CDN migrations, and certificate rotations. DNS monitors verify that a domain resolves and, when needed, that it resolves to the expected IP addresses.

DNS checks are useful when:

One of the easiest mistakes in infrastructure is assuming “the app is down” when the real problem is “the domain now points somewhere else.” DNS checks prevent that confusion.

DNS Check Best Practices

5. SSL / TLS Certificate Checks: Preventing the Most Avoidable Outage

Certificate-expiry outages are painful because they are almost entirely preventable. SSL/TLS checks exist to make sure you never learn about an expired cert from your customers.

A good SSL check validates:

SSL checks should be attached to every public HTTPS service: apps, APIs, status pages, admin portals, gRPC TLS endpoints, and WebSocket endpoints using wss://.

They are especially important in environments with custom domains, automated certificate renewals, and multi-tenant infrastructure. Renewal jobs fail more often than teams expect.

6. Database Checks: Monitoring the Systems That Actually Hold State

When a database is unavailable, the app usually follows shortly after. But sometimes the app still serves cached pages or stale responses, masking the real issue. Database-specific checks let you monitor the dependency directly.

For production teams, database checks are invaluable because they can validate not only that the socket opens, but also that authentication works and a test query succeeds. That is a much better signal than a bare TCP connect.

Common use cases:

Strongest patternConnect and run a tiny read-only query
Use carefullyAvoid expensive queries or anything that mutates production data

7. SMTP Checks: Monitoring the Infrastructure Behind Critical Email

Email is still business-critical for password resets, verification flows, receipts, billing alerts, and incident notifications. SMTP monitors verify that the mail server can be reached, that the server banner is sane, that EHLO works, and that STARTTLS and authentication are available when required.

SMTP checks are excellent for:

SMTP checks are not the same as inbox placement or deliverability monitoring. They tell you whether the mail server path is healthy enough to accept traffic, not whether Gmail will place your message in Promotions.

8. WebSocket Checks: Because "Connected" Realtime Apps Fail Differently

Realtime systems break in ways HTTP checks cannot see. A WebSocket server might accept the initial upgrade, then fail to respond to subscription or heartbeat messages. Or it might accept some event types but not others.

That is why WebSocket monitoring should test more than the handshake. The most useful pattern is:

  1. Connect to the socket
  2. Optionally send a message
  3. Wait for a reply
  4. Assert that the reply contains expected text

This is perfect for chat apps, trading feeds, collaborative tools, dashboards, and streaming updates. If your product experience depends on socket-based state sync, a plain HTTP monitor is only telling part of the story.

9. gRPC Health Checks: The Right Way to Monitor gRPC Services

gRPC services should be monitored with a gRPC-aware check, not just TCP or generic HTTP. The standard approach is to call the grpc.health.v1.Health service and inspect the returned serving status.

This matters because a gRPC process can be reachable while still reporting:

Good gRPC health monitoring supports:

If your platform relies on internal gRPC services, this check type is often the fastest route to accurate incident detection.

10. Heartbeat / Push Checks: The Correct Model for Cron Jobs and Background Workers

Some systems are not meant to be polled. A nightly ETL pipeline, hourly billing reconciliation job, queue consumer, or backup worker may not expose a stable endpoint at all. For those workflows, heartbeat monitoring is the right pattern.

Instead of the monitor calling your service, your service calls the monitor. Each successful run pings a unique URL or tokenized endpoint. If the expected heartbeat does not arrive within the configured interval plus grace period, the check goes down.

Heartbeat checks are ideal for:

Heartbeat monitoring is one of the highest-ROI checks you can add. Teams often spend months perfecting HTTP health endpoints while a single silent cron failure quietly corrupts billing, reporting, or user notifications.

11. Network Quality Checks: Jitter and Packet Loss for Latency-Sensitive Systems

Some workloads are not merely availability-sensitive. They are quality-sensitive. Voice, streaming, low-latency gaming, remote desktop, live collaboration, trading systems, and edge workloads can all be technically “up” while still being unusable because network quality is poor.

Network quality checks go beyond reachability and measure:

These checks are especially useful for multi-region services, WAN links, and customer-facing products where stability matters as much as raw uptime.

How to Combine Check Types Into a Real Monitoring Stack

The strongest monitoring setups use several complementary checks per critical service.

1

Public Website or SPA

Run HTTP checks for pages and APIs, SSL checks for certificate expiry, and DNS checks for the primary domain. Add heartbeat checks for scheduled publishing or cache warmup jobs.

2

REST or GraphQL API

Use HTTP checks with response validation, latency thresholds, SSL checks, and heartbeat checks for background workers like webhooks, retry queues, and async processors.

3

Database-Centric App

Pair HTTP checks with database checks against PostgreSQL or Redis, plus TCP checks for dependent services if you want fast infrastructure-level visibility.

4

Realtime Product

Use WebSocket checks, HTTP checks for auth/session APIs, and network quality checks from important regions. If the realtime backend is gRPC-based, add gRPC health checks too.

5

Microservices Platform

Monitor external entry points with HTTP, internal critical services with gRPC or TCP depending on protocol, dependencies with database checks, and all scheduled jobs with heartbeats.

Choosing the Right Check for the Right Failure Mode

If you need to know... Use this check Add this companion check
Is my API returning correct JSON?HTTP with JSON validationSSL, heartbeat for workers
Is this host reachable?PingTCP or HTTP
Is the service port open?TCPProtocol-aware check
Will my certificate expire soon?SSLHTTP or WebSocket
Did the cron job actually run?HeartbeatHTTP for user-visible output
Can the mail path accept traffic?SMTPHTTP for app workflows
Is my gRPC service serving?gRPC healthTCP, SSL if public
Why are calls failing for one region only?Network qualityHTTP from multiple regions

Features That Matter Across Every Check Type

Even though every protocol is different, the best monitoring platforms share several important capabilities across check types:

These features are often more important than the raw number of check types supported. A tool with ten check types but weak validation will still miss the incidents you care about.

Common Monitoring Mistakes Teams Make

1. Using only one check per service

Critical services almost always need at least two or three layers. For example: HTTP + SSL + heartbeat for async jobs.

2. Monitoring only health endpoints

Health endpoints are valuable, but they can drift away from reality. Monitor real paths that real users or systems depend on.

3. Ignoring non-user-facing systems

Many incidents begin in schedulers, queues, mail relays, or background workers before users notice symptoms elsewhere.

4. Treating a 200 response as proof of correctness

If you are not validating content, schema, or expected fields, you are only partially monitoring the service.

5. Skipping region-aware monitoring

A service can be healthy from one geography and degraded from another. Single-location monitoring creates blind spots.

A Practical Starting Point for Most SaaS Teams

If you want a pragmatic, high-signal rollout, start here:

  1. HTTP checks on your homepage, login API, and one critical user workflow
  2. SSL checks on every public domain
  3. Heartbeat checks on every scheduled job or worker
  4. Database checks on your primary PostgreSQL or Redis dependency
  5. DNS checks on your main production domains
  6. WebSocket or gRPC checks if your product depends on them
  7. Network quality checks for any latency-sensitive product surface

That stack covers the majority of real production incidents without overwhelming the team.

Build a Monitoring Stack That Matches Reality

The best monitoring setups are not the ones with the most dashboards. They are the ones with the right checks for the right failure modes. Mix HTTP, TCP, DNS, SSL, database, SMTP, WebSocket, gRPC, heartbeat, and network-quality checks based on how your system actually breaks.

Start Monitoring for Free