Log Service allows you to collect and manage logs by using the Log Service console.
In addition, you can use API operations to write logs, query logs, and manage your
projects and Logstores.
The following table lists the available API operations.
||OpenSlsService and GetSlsService
||ListProject, CreateProject, DeleteProject, GetProject, and UpdateProject
|GetProjectLogs (Queries all logs in a project)
|Config (Logtail configuration file)
||ListConfig, CreateConfig, DeleteConfig, GetConfig, and UpdateConfig
|GetAppliedMachineGroups(Queries the machine groups to which a Logtail configuration file is applied)
||ListMachineGroup, CreateMachineGroup, DeleteMachineGroup, GetMachineGroup, and UpdateMachineGroup
|ApplyConfigToMachineGroup and RemoveConfigFromMachineGroup (Deletes a Logtail configuration file)
|GetAppliedConfigs (Queries the applied Logtail configuration files)
||ListLogstore, CreateLogstore, DeleteLogstore, GetLogstore, and UpdateLogstore
|GetLogs (Queries logs) and GetHistograms (Queries the distribution of logs)
||CreateIndex, UpdateIndex, DeleteIndex, and GetIndex
||ListShards, SplitShard, and MergeShards
|PutLogs (Writes logs)
|GetCursor (Locates logs)
|PullLogs (Consumes logs)
|Shipper (LogShipper rules)
||GetShipperStatus(Queries the status of a LogShipper task)
|RetryShipperTask (Re-runs a failed LogShipper task)
||CreateConsumerGroup, UpdateConsumerGroup, DeleteConsumerGroup, and ListConsumerGroup
|HeartBeat (Sends heartbeat packets), GetCheckPoint, and UpdateCheckPoint
||CreateAlert, UpdateAlert, DeleteAlert, GetAlert, and ListAlert
||CreateSavedsearch, UpdateSavedsearch, DeleteSavedsearch, GetSavedsearch, and ListSavedsearch
You can call the API operations to perform the following operations:
- To call the API operations, you must specify the endpoints. For more information,
- Security verification is required for all API requests. For information about the
signature algorithm and process, see Request signatures.
- You can manage Log Service resources by using Resource Access Management (RAM) and
Security Token Services (STS). If you are a RAM user, you must provide an AccessKey
pair when you call the API operations. To use an STS temporary identity, you must
provide an STS token and a specific HTTP header. For more information, see Common request headers. This HTTP header is used to sign the request. For more information, see Request signatures.