In n8n, click the "Add workflow" button in the Workflows tab to create a new workflow. Add the starting point – a trigger on when your workflow should run: an app event, a schedule, a webhook call, another workflow, an AI chat, or a manual trigger. Sometimes, the HTTP Request node might already serve as your starting point.
Create custom Elastic Security and Reverse Contact workflows by choosing triggers and actions. Nodes come with global operations and settings, as well as app-specific parameters that can be configured. You can also use the HTTP Request node to query data from any app or service with a REST API.
Create
Create a case
Delete
Delete a case
Get
Get a case
Get Many
Retrieve many cases
Get Status
Retrieve a summary of all case activity
Update
Update a case
Add
Add a comment to a case
Get
Get a case comment
Get Many
Retrieve many case comments
Remove
Remove a comment from a case
Update
Update a comment in a case
Add
Add a tag to a case
Remove
Remove a tag from a case
Create
Create a connector
Get person data
Retrieves person data using reverse email lookup.
Get person data profile
Extracts detailed profile information for a specific person.
Extract Person Data Profile
This operation allows you to extract data from a Person Linkedin URL.
Get company data
Retrieves company information using reverse domain lookup.
Get company data profile
Extracts detailed profile information for a specific company.
Get company data
This operation allows you to find data from a domain and returns company information as the response.
Retrieve person data from email
This operation allows you to find data from an email.
To set up Reverse Contact integration, add the HTTP Request node to your workflow canvas and authenticate it using a generic authentication method. The HTTP Request node makes custom API calls to Reverse Contact to query the data you need using the API endpoint URLs you provide.
See the example hereThese API endpoints were generated using n8n
n8n AI workflow transforms web scraping into an intelligent, AI-powered knowledge extraction system that uses vector embeddings to semantically analyze, chunk, store, and retrieve the most relevant API documentation from web pages. Remember to check the Reverse Contact official documentation to get a full list of all API endpoints and verify the scraped ones!
With Elastic Security, you can prevent, detect, and respond to attacks on your organization. Years of data are analyzed by Elastic Security, which also automates crucial procedures and secures every system.
Elastic Security node docs + examples
Elastic Security credential docs
See Elastic Security integrations
The world's most popular workflow automation platform for technical teams including
Build complex workflows, really fast