Automatically generates a weekly report of all AWS ACM certificates, including status, expiry dates, and renewal eligibility. The workflow formats the data into both Markdown (for PDF export to Slack) and HTML (for email summary), helping teams stay on top of certificate compliance and expiration risks.
This workflow is designed for DevOps engineers, cloud administrators, and compliance teams who manage AWS infrastructure and need automated weekly visibility into the status of their SSL/TLS certificates in AWS Certificate Manager (ACM). It's ideal for teams that want to reduce the risk of expired certs, track renewal eligibility, and maintain reporting for audit or operational purposes.
This n8n workflow performs the following actions on a weekly schedule:
Weekly schedule trigger
.Get many certificates
action from AWS Certificate Manager to retrieve all certificate records.Certificate Summary Markdown Agent
(OpenAI) to generate a Markdown report for PDF export.Certificate Summary HTML Agent
to generate a styled HTML report for email.Configure AWS Credentials in n8n to allow access to AWS ACM.
Create a new workflow and use the following nodes in sequence:
Schedule Trigger
: Weekly (e.g., every Monday at 08:00 UTC)AWS ACM → Get many certificates
Function Node → Parse ACM Data
: Converts and summarizes certificate metadataOpenAI Chat Node (Markdown Agent)
with a system/user prompt to generate MarkdownConfigure Metadata
→ Define file name and MIME type (.md
)Create document file
→ Converts Markdown to document streamConvert to PDF
Slack Node
→ Upload the PDF to a channelOpenAI Chat Node
for generating HTML and sending it via emailConnect Output:
Weekly schedule trigger
to daily or monthly as needed.EXPIRED
, IN_USE
, or INELIGIBLE
certs.EXPIRED
or INELIGIBLE
.