Save yourself the work of writing custom integrations for F5 Big-IP and Lusha and use n8n instead. Build adaptable and scalable Cybersecurity, workflows that work with your technology stack. All within a building experience you will love.

In n8n, click the "Add workflow" button in the Workflows tab to create a new workflow. Add the starting point – a trigger on when your workflow should run: an app event, a schedule, a webhook call, another workflow, an AI chat, or a manual trigger. Sometimes, the HTTP Request node might already serve as your starting point.
Create custom F5 Big-IP and Lusha workflows by choosing triggers and actions. Nodes come with global operations and settings, as well as app-specific parameters that can be configured. You can also use the HTTP Request node to query data from any app or service with a REST API.
Delete
Get
Head
Options
Patch
Post
Put
To set up F5 Big-IP integration, add the HTTP Request node to your workflow canvas and authenticate it using a predefined credential type. This allows you to perform custom operations, without additional authentication setup. The HTTP Request node makes custom API calls to F5 Big-IP to query the data you need using the URLs you provide.
Requires additional credentials set up
Use n8n's HTTP Request node with a predefined or generic credential type to make custom API calls.
Enrich Single
Enrich a single contact with additional information
Enrich Bulk
Enrich multiple contacts with additional information
Search Contacts
Search and discover new contacts based on criteria
Enrich from Search
Enrich contacts found through a previous search
Enrich Single
Enrich a single company with additional information
Enrich Bulk
Enrich multiple companies with additional information
Search Companies
Search and discover new companies based on criteria
Enrich from Search
Enrich companies found through a previous search
The world's most popular workflow automation platform for technical teams including
Build complex workflows, really fast
