In n8n, click the "Add workflow" button in the Workflows tab to create a new workflow. Add the starting point – a trigger on when your workflow should run: an app event, a schedule, a webhook call, another workflow, an AI chat, or a manual trigger. Sometimes, the HTTP Request node might already serve as your starting point.
Create custom Elastic Security and Venafi TLS Protect Datacenter workflows by choosing triggers and actions. Nodes come with global operations and settings, as well as app-specific parameters that can be configured. You can also use the HTTP Request node to query data from any app or service with a REST API.
Create
Create a case
Delete
Delete a case
Get
Get a case
Get Many
Retrieve many cases
Get Status
Retrieve a summary of all case activity
Update
Update a case
Add
Add a comment to a case
Get
Get a case comment
Get Many
Retrieve many case comments
Remove
Remove a comment from a case
Update
Update a comment in a case
Add
Add a tag to a case
Remove
Remove a tag from a case
Create
Create a connector
Create
Provision a new certificate
Delete
Delete a certificate
Download
Download a certificate
Get
Retrieve a certificate
Get Many
Retrieve many certificates
Renew
Renew a certificate
Get
Get a policy
With Elastic Security, you can prevent, detect, and respond to attacks on your organization. Years of data are analyzed by Elastic Security, which also automates crucial procedures and secures every system.
Elastic Security node docs + examples
Elastic Security credential docs
See Elastic Security integrations
Venafi is a cybersecurity company that develops software to secure and protect cryptographic keys and digital certificates.
Venafi TLS Protect Datacenter node docs + examples
Venafi TLS Protect Datacenter credential docs
See Venafi TLS Protect Datacenter integrations
The world's most popular workflow automation platform for technical teams including
Build complex workflows, really fast