Since the dawn of HTTPS, expiring certificates have plagued IT Ops: whether it’s the outage and impact of some untracked certificate expiring in your web infrastructure or just the dread of knowing it’s your turn next to update the dozens of certs you have littered around your distributed infrastructure.

Our latest app release onto Splunkbase can help with the first issue and maybe help you plan the second better. For certificates held in AWS IAM this Splunk App will pull all the certificate information and display them in an ordered list on a dashboard – highlighting expired or expiring soon certificates. There is also a filter function on the dashboard should you need to focus on a particular set of certs.

At iDelta we have extensive experience of AWS and Splunk – helping customers combine both technologies to address operational, compliance and security requirements. Contact us to discuss any requirements you have – call, email or use the form below.

AWS IAM certificate information
an example certificate entry in Splunk
  • The App provides the following features:
  • data collection – makes a call to AWS (using the AWS CLI) to retrieve the certificate information
  • parses the data received to chop it up into individual events for Splunk
  • provides a dashboard ordering and colour coding the certificates based on their expiry date

It is available to download now from Splunkbase – the Splunk App store.

Use the form below to get in touch to discuss your AWS and Splunk integration requirements:

Posted by:Stuart Robertson

Stuart Robertson is the Consulting Director at iDelta. He is one of the initial founders of iDelta and has worked there since formation in 2001. Stuart holds various certifications in Core Splunk and ITSI. Stuart also holds a Bsc(Hons) in Computing Science from the University of Glasgow.