In n8n, click the "Add workflow" button in the Workflows tab to create a new workflow. Add the starting point – a trigger on when your workflow should run: an app event, a schedule, a webhook call, another workflow, an AI chat, or a manual trigger. Sometimes, the HTTP Request node might already serve as your starting point.
Create custom Coda and Elastic Security workflows by choosing triggers and actions. Nodes come with global operations and settings, as well as app-specific parameters that can be configured. You can also use the HTTP Request node to query data from any app or service with a REST API.
Get
Get a control
Get Many
Get many controls
Get
Get a formula
Get Many
Get many formulas
Create Row
Create/Insert a row
Delete Row
Delete one or multiple rows
Get All Columns
Get all columns in a table
Get All Rows
Get all rows in a table
Get Column
Get a column
Get Row
Get a row
Push Button
Pushes a button
Delete Row
Delete view row
Get
Get a view
Get Columns
Get all views columns
Get Many
Get many views
Get Rows
Get all views rows
Push Button
Push view button
Update Row
Create
Create a case
Delete
Delete a case
Get
Get a case
Get Many
Retrieve many cases
Get Status
Retrieve a summary of all case activity
Update
Update a case
Add
Add a comment to a case
Get
Get a case comment
Get Many
Retrieve many case comments
Remove
Remove a comment from a case
Update
Update a comment in a case
Add
Add a tag to a case
Remove
Remove a tag from a case
Create
Create a connector
With Elastic Security, you can prevent, detect, and respond to attacks on your organization. Years of data are analyzed by Elastic Security, which also automates crucial procedures and secures every system.
Elastic Security node docs + examples
Elastic Security credential docs
See Elastic Security integrations
The world's most popular workflow automation platform for technical teams including
Build complex workflows, really fast