Forum Discussion
SSL Certificate Report assistance
I have task to collect the active certificate details which have called in SSL Profiles(Client & Server) around 140 LTM's inclusive of Active and stand-By
We dont have BIG-IQ in place so need a assistance to gather all information to report the active certificates and unused certificates from LTM.
I have tried with some CLI commands which gives me detail information and will involves more manual effort to gather in a EXCEL.
Some one please share the script or method to capture my requirements.
- arpydays
Nimbostratus
This might get you started, it checks for any clientssl or serverssl profiles in all VSs then dumps any certs names from those profiles. Once you have the output you can sort and remove duplicates. Haven't used it anger so test it out first, v11+
!/bin/bash for d in `tmsh -q -c "cd /;show ltm virtual recursive profiles" | grep '^ | Ltm::\(ClientSSL\|ServerSSL\)' | awk '{print $4}'` do tmshout=$(tmsh -q -c "cd /; list ltm profile client-ssl $d" 2>/dev/null | egrep -i '^ {4}(cert|chain) ' |awk '!/none/ {print $2}') [[ "$tmshout" ]] || { tmshout=$(tmsh -q -c "cd /; list ltm profile server-ssl $d" 2>/dev/null | egrep -i '^ {4}(cert|chain) ' |awk '!/none/ {print $2}') } [[ -z "$tmshout" ]] || echo "$tmshout" done
bash ./activecerts.sh > activecerts.txt
bash sort -u -o activecerts.txt activecerts_sorted.txt
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com