In n8n, click the "Add workflow" button in the Workflows tab to create a new workflow. Add the starting point – a trigger on when your workflow should run: an app event, a schedule, a webhook call, another workflow, an AI chat, or a manual trigger. Sometimes, the HTTP Request node might already serve as your starting point.
Create custom Elastic Security and Ycode workflows by choosing triggers and actions. Nodes come with global operations and settings, as well as app-specific parameters that can be configured. You can also use the HTTP Request node to query data from any app or service with a REST API.
List collections
List all collections for a given project.
Get collection
Retrieve a specific collection by ID.
List collection items
List all items in a specific collection.
Get collection item
Retrieve a specific item from a collection by item ID.
To set up Ycode integration, add the HTTP Request node to your workflow canvas and authenticate it using a generic authentication method. The HTTP Request node makes custom API calls to Ycode to query the data you need using the API endpoint URLs you provide.
These API endpoints were generated using n8n
n8n AI workflow transforms web scraping into an intelligent, AI-powered knowledge extraction system that uses vector embeddings to semantically analyze, chunk, store, and retrieve the most relevant API documentation from web pages. Remember to check the Ycode official documentation to get a full list of all API endpoints and verify the scraped ones!
With Elastic Security, you can prevent, detect, and respond to attacks on your organization. Years of data are analyzed by Elastic Security, which also automates crucial procedures and secures every system.
Elastic Security node docs + examples
Elastic Security credential docs
See Elastic Security integrations
The world's most popular workflow automation platform for technical teams including
Build complex workflows, really fast