In n8n, click the "Add workflow" button in the Workflows tab to create a new workflow. Add the starting point – a trigger on when your workflow should run: an app event, a schedule, a webhook call, another workflow, an AI chat, or a manual trigger. Sometimes, the HTTP Request node might already serve as your starting point.
Create custom Redis and Venafi TLS Protect Cloud workflows by choosing triggers and actions. Nodes come with global operations and settings, as well as app-specific parameters that can be configured. You can also use the HTTP Request node to query data from any app or service with a REST API.
Delete
Delete a key from Redis
Get
Get the value of a key from Redis
Increment
Atomically increments a key by 1. Creates the key if it does not exist.
Info
Returns generic information about the Redis instance
Keys
Returns all the keys matching a pattern
Pop
Pop data from a redis list
Publish
Publish message to redis channel
Push
Push data to a redis list
Set
Set the value of a key in redis
Delete
Delete a certificate
Download
Download a certificate
Get
Retrieve a certificate
Get Many
Retrieve many certificates
Renew
Renew a certificate
Create
Create a new certificate request
Get
Retrieve a certificate request
Get Many
Retrieve many certificate requests
Venafi TLS Protect provides the observability, consistency, reliability, and freedom of choice you require to safeguard your business from certificate-related outages and cybercrime in the data center, the cloud, and everywhere else.
Venafi TLS Protect Cloud node docs + examples
Venafi TLS Protect Cloud credential docs
See Venafi TLS Protect Cloud integrations
The world's most popular workflow automation platform for technical teams including
Build complex workflows, really fast