Certificate Activity Search Automation in Splunk

Project Summary

At UKG, I built an automated system to monitor recent activity for SSL/TLS certificates across our infrastructure. The solution uses a combination of Jira webhooks, a Google Cloud Function (Python), and Splunk's HTTP Event Collector (HEC) to identify whether new or rotated certificates are actively in use and visible in logs.

Technologies Used

Workflow

  1. A Jira Webhook is triggered when a new ticket related to a certificate is created (e.g., cert renewal, deployment).
  2. The webhook invokes a Google Cloud Function (Python) which:
    • Parses the Jira issue for certificate serial numbers (hex format)
    • Converts them to decimal (for Splunk indexing)
  3. The function constructs a query and sends it to Splunk HEC to determine:
    • If the certificate has been seen in recent logs (e.g., last 7 days)
    • If not, it marks the cert as potentially inactive
  4. The function optionally sends the results back to Jira as a comment or attaches them to the ticket.

Example Use Case

A newly issued certificate with serial 0x3FA29B4E0C is detected in a Jira ticket. The Cloud Function extracts this serial, converts it to decimal 171011739532, and checks Splunk using:

index=cert_logs serial="171011739532"

If the certificate appears in Splunk logs, it's considered "active." If no logs are found, it's flagged for investigation.

Outcome