In n8n, click the "Add workflow" button in the Workflows tab to create a new workflow. Add the starting point – a trigger on when your workflow should run: an app event, a schedule, a webhook call, another workflow, an AI chat, or a manual trigger. Sometimes, the HTTP Request node might already serve as your starting point.
Create custom Elastic Security and Venafi TLS Protect Datacenter workflows by choosing triggers and actions. Nodes come with global operations and settings, as well as app-specific parameters that can be configured. You can also use the HTTP Request node to query data from any app or service with a REST API.
With Elastic Security, you can prevent, detect, and respond to attacks on your organization. Years of data are analyzed by Elastic Security, which also automates crucial procedures and secures every system.
Elastic Security node docs + examples
Elastic Security credential docs
See Elastic Security integrations
Venafi is a cybersecurity company that develops software to secure and protect cryptographic keys and digital certificates.
Venafi TLS Protect Datacenter node docs + examples
Venafi TLS Protect Datacenter credential docs
See Venafi TLS Protect Datacenter integrations
The world's most popular workflow automation platform for technical teams including
Build complex workflows, really fast