Skip to main content
POST
/
{log_group_name}
Filter and retrieve log events
curl --request POST \
  --url https://api.altostrat.io/{log_group_name} \
  --header 'Authorization: Bearer <token>' \
  --header 'Content-Type: application/json' \
  --data '{
  "streams": [
    "<string>"
  ],
  "start": "2023-11-07T05:31:56Z",
  "end": "2023-11-07T05:31:56Z",
  "filter": "<string>",
  "limit": 500,
  "next_token": "<string>"
}'
{
  "data": [
    {
      "timestamp": "2023-11-07T05:31:56Z",
      "message": "<string>",
      "type": "<string>"
    }
  ],
  "next_token": "<string>"
}

Authorizations

Authorization
string
header
required

Bearer authentication header of the form Bearer <token>, where <token> is your auth token.

Path Parameters

log_group_name
enum<string>
required

Log group name, allowed values: cve-scan-log, sites, AuditLog

Available options:
cve-scan-log,
sites,
AuditLog

Body

application/json

Filter parameters for log retrieval

streams
string[]
required

Name of log streams to filter

start
string<date-time>
required

Start date/time for events (ISO8601). Must be before end.

end
string<date-time>
required

End date/time for events (ISO8601). Must be after start.

filter
string | null

Optional filter pattern for AWS CloudWatch logs.

limit
integer

Max number of log events to return. Default is 50.

Required range: 1 <= x <= 1000
next_token
string | null

Pagination token from a previous request, if any.

Response

OK. Returns the filtered log events in ascending order by timestamp, plus a nextToken if more are available.

data
object[]
next_token
string | null

Token to retrieve the next batch of results, if any.

I