All Products
Search
Document Center

Compute Nest:ListServiceInstanceLogs

Last Updated:Oct 23, 2025

Retrieves the deployment and upgrade logs of a service instance.

Try it now

Try this API in OpenAPI Explorer, no manual signing needed. Successful calls auto-generate SDK code matching your parameters. Download it with built-in credential security for local usage.

Test

RAM authorization

The table below describes the authorization required to call this API. You can define it in a Resource Access Management (RAM) policy. The table's columns are detailed below:

  • Action: The actions can be used in the Action element of RAM permission policy statements to grant permissions to perform the operation.

  • API: The API that you can call to perform the action.

  • Access level: The predefined level of access granted for each API. Valid values: create, list, get, update, and delete.

  • Resource type: The type of the resource that supports authorization to perform the action. It indicates if the action supports resource-level permission. The specified resource must be compatible with the action. Otherwise, the policy will be ineffective.

    • For APIs with resource-level permissions, required resource types are marked with an asterisk (*). Specify the corresponding Alibaba Cloud Resource Name (ARN) in the Resource element of the policy.

    • For APIs without resource-level permissions, it is shown as All Resources. Use an asterisk (*) in the Resource element of the policy.

  • Condition key: The condition keys defined by the service. The key allows for granular control, applying to either actions alone or actions associated with specific resources. In addition to service-specific condition keys, Alibaba Cloud provides a set of common condition keys applicable across all RAM-supported services.

  • Dependent action: The dependent actions required to run the action. To complete the action, the RAM user or the RAM role must have the permissions to perform all dependent actions.

Action

Access level

Resource type

Condition key

Dependent action

computenest:ListServiceInstanceLogs

list

*ServiceInstance

acs:computenest:{#regionId}:{#accountId}:serviceinstance/{#serviceInstanceId}

None None

Request parameters

Parameter

Type

Required

Description

Example

RegionId

string

Yes

The region ID.

cn-hangzhou

MaxResults

integer

No

The number of entries per page. Maximum value: 100. Default value: 20.

20

NextToken

string

No

The token that is used to retrieve the next page of results. Set this to the NextToken value that was returned in the last response.

BBBAAfu+XtuBE55iRLHEYYuojI4=

ServiceInstanceId

string

Yes

The service instance ID.

si-70a3b15bb626435b****

LogSource

string

No

The log source. Valid values:

  • computeNest (default): The deployment and upgrade logs of the service instance.

  • application: The logs generated by the application.

  • actionTrail: The ActionTrail audit logs.

  • ros: The ROS logs.

  • compliancePack: The compliance package logs.

computeNest

Logstore

string

No

The Logstore. This parameter is required when you query application logs.

logabc

Filter

array<object>

No

The filter.

object

No

The filter.

Value

array

No

A list of filter values. The value of N can be from 1 to 10.

string

No

The value of the filter condition.

- StartTime:2024-07-01T02:41:20Z - EndTime:2024-07-01T02:41:20Z - EventName:DeleteInstance - ResourceName:i-bp1dgfcx8vl4w9m7a1st - ApplicationGroupName:groupA

Name

string

No

The filter name. You can query by one or more filter names. Valid values:

  • StartTime: Queries logs by the start time of the log event.

  • EndTime: Queries logs by the end time of the ActionTrail event.

  • EventName: Queries logs by the name of the ActionTrail event.

  • ResourceName: Queries logs by the ActionTrail resource name.

  • ApplicationGroupName: Queries logs by the application group name.

Valid values:

  • EndTime :

    EndTime

  • ResourceName :

    ResourceName

  • StartTime :

    StartTime

  • EventName :

    EventName

- StartTime - EndTime - EventName - ResourceName - ApplicationGroupName

SortOrder

string

No

The sort order. Valid values:

  • Ascending: Ascending order.

  • Descending (default): Descending order.

Valid values:

  • Descending :

    Descending

  • Ascending :

    Ascending

- Ascending - Descending

Response elements

Element

Type

Description

Example

object

NextToken

string

The token for the next query.

AAAAAfu+XtuBE55iRLHEYYuojI4=

RequestId

string

The request ID.

51945B04-6AA6-410D-93BA-236E0248B104

MaxResults

integer

The number of entries returned per page. Maximum value: 100. Default value: 20.

20

ServiceInstancesLogs

array<object>

The service instance logs.

object

The service instance logs.

Timestamp

string

The timestamp of the service instance log.

2021-05-21T00:00:00Z

Source

string

The source of the service instance log. Valid values:

computeNest: The deployment and upgrade logs of the service instance.

application: The logs generated by the application.

actionTrail: The ActionTrail audit logs.

ros: The ROS logs.

compliancePack: The compliance package logs.

ros

Content

string

The log content.

Start creating service instance

LogType

string

The log type. Valid values:

  • serviceInstance: The logs generated by the service instance.

  • resource: The logs generated by the ROS resource.

serviceInstance

ResourceType

string

The resource type.

ROS.Stack

ResourceId

string

The associated ID.

si-5c6525c0589545c3****

Status

string

The log status. Valid values:

  • Creating: The instance is being created.

  • Created: The instance is created.

  • Deploying: The instance is being deployed.

  • Deployed: The instance is deployed.

  • DeployedFailed: The deployment failed.

  • Expired: The instance has expired.

  • ExtendSuccess: The renewal is successful.

  • Upgrading: The instance is being upgraded.

  • UpgradeSuccess: The upgrade is successful.

Creating

CompliancePackType

string

The threat type of the compliance package. For example, VpcDataRisk indicates a data security check in a VPC.

VpcDataRisk

ComplianceRuleName

string

The name of the specific threat rule in the compliance package. For example, ecs-move-out-vpc indicates the migration of an ECS instance out of a VPC.

ecs-move-out-vpc

Examples

Success response

JSON format

{
  "NextToken": "AAAAAfu+XtuBE55iRLHEYYuojI4=",
  "RequestId": "51945B04-6AA6-410D-93BA-236E0248B104",
  "MaxResults": 20,
  "ServiceInstancesLogs": [
    {
      "Timestamp": "2021-05-21T00:00:00Z",
      "Source": "ros",
      "Content": "Start creating service instance",
      "LogType": "serviceInstance",
      "ResourceType": "ROS.Stack",
      "ResourceId": "si-5c6525c0589545c3****",
      "Status": "Creating",
      "CompliancePackType": "VpcDataRisk\n\n",
      "ComplianceRuleName": "ecs-move-out-vpc"
    }
  ]
}

Error codes

See Error Codes for a complete list.

Release notes

See Release Notes for a complete list.