Algolia icon

Algolia

Use Algolia in your n8n workflows

Overview

The "Vaults - Replace sources" operation in this Algolia node allows you to replace the entire list of allowed IP address sources that have access to your Algolia clusters. This is useful for managing network security by specifying which IP ranges or addresses are permitted to connect to your Algolia infrastructure.

Typical use cases include:

  • Updating the list of trusted IP addresses after network changes.
  • Restricting access to only certain subnets or IP ranges.
  • Automating security policies for cluster access control.

For example, if your company changes its office IP range, you can use this operation to replace the old IP ranges with the new ones, ensuring only authorized networks can access your Algolia clusters.

Properties

Name Meaning
Fixed Collection A collection of source entries, each containing:
- Source The IP address range of the source (e.g., "10.0.0.1/32").
- Description A description for the source entry (e.g., "Server subnet").

This property accepts multiple values, allowing you to specify multiple IP address ranges and their descriptions to replace the existing list of allowed sources.

Output

The output of this operation will be the JSON response from the Algolia API after replacing the sources. It typically contains confirmation details about the updated list of allowed sources.

No binary data is involved in this operation.

Dependencies

  • Requires an API key credential with appropriate permissions to manage Vaults and security sources in Algolia.
  • The node must be configured with the Algolia application ID and API key.
  • Network connectivity to Algolia's API endpoint (https://<appId>.algolia.net).

Troubleshooting

  • Invalid IP address format: Ensure all source IP addresses are valid CIDR notation strings (e.g., "192.168.1.0/24").
  • Insufficient permissions: The API key used must have rights to modify Vaults sources; otherwise, the request will fail.
  • Empty sources list: Replacing with an empty list might lock out all access; verify before applying.
  • API rate limits: Frequent updates may hit Algolia API rate limits; handle errors accordingly.

Common error messages:

  • "Invalid source format": Check the IP address and CIDR mask syntax.
  • "Unauthorized" or "Forbidden": Verify API key permissions.
  • "Too many requests": Slow down request frequency or check rate limits.

Links and References


This summary covers the "Vaults" resource and the "Replace sources" operation specifically, based on the provided properties and bundled code metadata.

Discussion