![]()
Automatically generates a weekly report of all AWS ACM certificates, including status, expiry dates, and renewal eligibility. The workflow formats the data into both Markdown (for PDF export to Slack) and HTML (for email summary), helping teams stay on top of certificate compliance and expiration risks.
This workflow is designed for DevOps engineers, cloud administrators, and compliance teams who manage AWS infrastructure and need automated weekly visibility into the status of their SSL/TLS certificates in AWS Certificate Manager (ACM). It's ideal for teams that want to reduce the risk of expired certs, track renewal eligibility, and maintain reporting for audit or operational purposes.
This n8n workflow performs the following actions on a weekly schedule:
Weekly schedule trigger.Get many certificates action from AWS Certificate Manager to retrieve all certificate records.Certificate Summary Markdown Agent (OpenAI) to generate a Markdown report for PDF export.Certificate Summary HTML Agent to generate a styled HTML report for email.Configure AWS Credentials in n8n to allow access to AWS ACM.
Create a new workflow and use the following nodes in sequence:
Schedule Trigger: Weekly (e.g., every Monday at 08:00 UTC)AWS ACM → Get many certificatesFunction Node → Parse ACM Data: Converts and summarizes certificate metadataOpenAI Chat Node (Markdown Agent) with a system/user prompt to generate MarkdownConfigure Metadata → Define file name and MIME type (.md)Create document file → Converts Markdown to document streamConvert to PDFSlack Node → Upload the PDF to a channelOpenAI Chat Node for generating HTML and sending it via emailConnect Output:
Weekly schedule trigger to daily or monthly as needed.EXPIRED, IN_USE, or INELIGIBLE certs.EXPIRED or INELIGIBLE.