Log Service allows you to collect and manage logs by using the Log Service console. In addition, you can use API operations to write logs, query logs, and manage your projects and Logstores.

The following table lists the available API operations.

Object Operation
Service operations OpenSlsService and GetSlsService
Project ListProject, CreateProject, DeleteProject, GetProject, and UpdateProject
GetProjectLogs (Queries all logs in a project)
Config (Logtail configuration file) ListConfig, CreateConfig, DeleteConfig, GetConfig, and UpdateConfig
GetAppliedMachineGroups(Queries the machine groups to which a Logtail configuration file is applied)
MachineGroup ListMachineGroup, CreateMachineGroup, DeleteMachineGroup, GetMachineGroup, and UpdateMachineGroup
ApplyConfigToMachineGroup and RemoveConfigFromMachineGroup (Deletes a Logtail configuration file)
GetAppliedConfigs (Queries the applied Logtail configuration files)
Logstore ListLogstore, CreateLogstore, DeleteLogstore, GetLogstore, and UpdateLogstore
GetLogs (Queries logs) and GetHistograms (Queries the distribution of logs)
Index CreateIndex, UpdateIndex, DeleteIndex, and GetIndex
Shard ListShards, SplitShard, and MergeShards
PutLogs (Writes logs)
GetCursor (Locates logs)
PullLogs (Consumes logs)
Shipper (LogShipper rules) GetShipperStatus(Queries the status of a LogShipper task)
RetryShipperTask (Re-runs a failed LogShipper task)
Consumer group CreateConsumerGroup, UpdateConsumerGroup, DeleteConsumerGroup, and ListConsumerGroup
HeartBeat (Sends heartbeat packets), GetCheckPoint, and UpdateCheckPoint
Alert CreateAlert, UpdateAlert, DeleteAlert, GetAlert, and ListAlert
Savedsearch CreateSavedsearch, UpdateSavedsearch, DeleteSavedsearch, GetSavedsearch, and ListSavedsearch

You can call the API operations to perform the following operations:

Note
  • To call the API operations, you must specify the endpoints. For more information, see Endpoints.
  • Security verification is required for all API requests. For information about the signature algorithm and process, see Request signatures.
  • You can manage Log Service resources by using Resource Access Management (RAM) and Security Token Services (STS). If you are a RAM user, you must provide an AccessKey pair when you call the API operations. To use an STS temporary identity, you must provide an STS token and a specific HTTP header. For more information, see Common request headers. This HTTP header is used to sign the request. For more information, see Request signatures.