Skip to content

Conversation

@nc-shahidazim
Copy link
Contributor

Description

This PR implements alerting for near‑expiry and expired Azure Key Vault certificates using scheduled query alerts. It detects Key Vault event records from AzureDiagnostics and routes notifications through existing Action Groups. The goal is to strengthen operational awareness and prevent service interruptions due to expired certificates.

Context

Managing certificate lifecycles is critical for maintaining application security and avoiding unexpected outages caused by expired Key Vault certificates. While Azure Key Vault emits events for CertificateNearExpiry and CertificateExpired, no alerting mechanism was previously in place to surface these events to engineering teams. This PR introduces automated alerting based on these system events to improve visibility and ensure proactive certificate rotation.

What’s Included

  • Added scheduled query alerts to capture CertificateExpired and CertificateNearExpiry events from Key Vault.
  • Implemented KQL logic to surface relevant certificate metadata from AzureDiagnostics.
  • Integrated Action Group notifications to deliver timely alerts to the team.
  • Added configuration options for evaluation frequency and alert window.

Type of changes

  • Refactoring (non-breaking change)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would change existing functionality)
  • Bug fix (non-breaking change which fixes an issue)

Checklist

  • I am familiar with the contributing guidelines
  • I have followed the code style of the project
  • I have added tests to cover my changes
  • I have updated the documentation accordingly
  • This PR is a result of pair or mob programming

Sensitive Information Declaration

To ensure the utmost confidentiality and protect your and others privacy, we kindly ask you to NOT including PII (Personal Identifiable Information) / PID (Personal Identifiable Data) or any other sensitive data in this PR (Pull Request) and the codebase changes. We will remove any PR that do contain any sensitive information. We really appreciate your cooperation in this matter.

  • I confirm that neither PII/PID nor sensitive data are included in this PR and the codebase changes.

@nc-shahidazim nc-shahidazim force-pushed the feat/DTOSS-12035-alert-cert-expiry branch from 62ff887 to 5eb8e3c Compare January 30, 2026 14:42
@nc-shahidazim nc-shahidazim added this pull request to the merge queue Jan 30, 2026
Merged via the queue into main with commit 9985dc1 Jan 30, 2026
13 checks passed
@nc-shahidazim nc-shahidazim deleted the feat/DTOSS-12035-alert-cert-expiry branch January 30, 2026 15:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants