MediaWiki API result

This is the HTML representation of the JSON format. HTML is good for debugging, but is unsuitable for application use.

Specify the format parameter to change the output format. To see the non-HTML representation of the JSON format, set format=json.

See the complete documentation, or the API help for more information.

{
    "batchcomplete": "",
    "continue": {
        "lecontinue": "20230629122745|108",
        "continue": "-||"
    },
    "query": {
        "logevents": [
            {
                "logid": 118,
                "ns": 2,
                "title": "User:Aryathespecial",
                "pageid": 0,
                "logpage": 0,
                "params": {
                    "userid": 4
                },
                "type": "newusers",
                "action": "create",
                "user": "Aryathespecial",
                "timestamp": "2025-11-25T06:33:37Z",
                "comment": ""
            },
            {
                "logid": 117,
                "ns": 0,
                "title": "Bleckmann Custom URL's Autorenewal Checks",
                "pageid": 121,
                "logpage": 121,
                "revid": 313,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Admin",
                "timestamp": "2025-09-22T11:47:52Z",
                "comment": "Created page with \"- The directory where the certbot config is located is /etc/letsencrypt/renewal  - To change the webroot I did: sed -i 's|bleckmannci4|halivephp84/bleckmannci4|' *  - To test the config you can: certbot renew --dry-run -v  - To remove a config you can: certbot delete --cert-name eureturns.blakelyclothing.com  - To check the renewal hook you can: nano /etc/letsencrypt/renewal-hooks/deploy/postrenewal.sh   - Custom domain auto renewal changes when we change root path like...\""
            },
            {
                "logid": 116,
                "ns": 0,
                "title": "Adding a New Bleckmann Host to Nagios Monitoring",
                "pageid": 120,
                "logpage": 120,
                "revid": 306,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "223.233.81.116",
                "anon": "",
                "timestamp": "2025-06-27T14:04:29Z",
                "comment": "Created page with \"Adding a New Server to Nagios Monitoring ----------------------------------------   \ud83d\udd39 Step 1: Add DNS Entry (on Mercury Server)  Before anything else:  \u2022\tMake sure the Nagios server can resolve the new server\u2019s hostname.  \u2022\tLog in to the Mercury server (your internal DNS server).  \u2022\tAdd the DNS entry (IP \uf0e0 Hostname) for the new server.    \ud83d\udd39 Step 2: Define the New Server in Nagios  1.\tLog in to the Nagios server  Example: nagios.apoyar  2.\tNavigate to the...\""
            },
            {
                "logid": 115,
                "ns": 0,
                "title": "Gitlab version upgrade",
                "pageid": 119,
                "logpage": 119,
                "revid": 298,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "223.233.82.43",
                "anon": "",
                "timestamp": "2024-08-01T06:10:32Z",
                "comment": "Created page with \"Gitlab version upgrade ----------------------  - To check current version, open GitLab console, go to admin area, on right side under \"Components\" we can see the Gitlab  version   - If there  written up to date with green color or if orange color then no issues, if its red color then we need to update the version.  Login to server gitlab.aws.poyar  Run below commands one by one  apt-get update  apt-get upgrade   - After running above upgrade commands, it will show you av...\""
            },
            {
                "logid": 114,
                "ns": 0,
                "title": "Create clone of CloudFront distribution using AWS CLI",
                "pageid": 118,
                "logpage": 118,
                "revid": 293,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Admin",
                "timestamp": "2024-06-17T06:13:14Z",
                "comment": "Created page with \"Connect to ZEB LB (lb.zeb.apoyar) or any ZEB server where we have CLI access to AWS  And below two commands one by one at /home/neal/  ---> aws cloudfront get-distribution-config --id E2KCQM43EXPGWB --output json > sourceCFconfig.json (In this, we have to edit the ID, from which we need to create clone)   ---> cp sourceCFconfig.json newCFconfig.json   Then we need to open & edit the newCFconfig.json file   ---> vi newCFconfig.json   edit out the first parent element (2nd...\""
            },
            {
                "logid": 113,
                "ns": 0,
                "title": "Lambda Function Version Upgrade (16.x to 20.x)",
                "pageid": 117,
                "logpage": 117,
                "revid": 292,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Admin",
                "timestamp": "2024-06-17T06:12:08Z",
                "comment": "Created page with \"Go to AWS console ---> Lambda ---> Functions  Select the function here, for which we want to upgrade the version ---> Actions ---> View details  In details page, go down.. will get \"Runtime Settings\"  Under \"Runtime Settings\".. click on \"Edit\".. It will open new page  On this page.. will get option to select the version from dropdown list  So, change runtime version from 16.x to 20.x and click on \"Save\"  Once we click save, it will save and get back us on details page  N...\""
            },
            {
                "logid": 112,
                "ns": 0,
                "title": "SSL renewal for login.ubanvpn.com",
                "pageid": 116,
                "logpage": 116,
                "revid": 287,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Admin",
                "timestamp": "2024-06-10T10:50:31Z",
                "comment": "Created page with \"SSL renewal for login.ubanvpn.com  Login to ubanvpn.apoyar with root user and apoyar keyfile   go to below path  ---> cd /etc/apache2/sites-enabled/   make sure we have ubanvpn.conf file there   then run below command to renew ssl  ---> sudo certbot -d login.ubanvpn.com --manual --preferred-challenges dns certonly   it will ask to continue.. press Y and hit enter to continue   now it will give us value to update in TXT record in go daddy, so update there given value..  -...\""
            },
            {
                "logid": 111,
                "ns": 0,
                "title": "SSL renewal for Apoyar 3cx sip.apoyar.net",
                "pageid": 115,
                "logpage": 115,
                "revid": 284,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Admin",
                "timestamp": "2024-06-10T07:01:20Z",
                "comment": "Created page with \"SSL renewal for sip.apoyar.net -------------------------------  Login to 3cx.apoyar with neal user and apoyar keyfile  go to below path  ---> cd /etc/nginx/sites-enabled/   make sure we have 3cxpbx file there   then run below command to renew ssl  ---> sudo certbot certonly   --manual   --rsa-key-size 2048   --preferred-challenges dns   --debug-challenges   -d sip.apoyar.net   it will ask to continue.. press Y and hit enter to continue   now it will give us value to upda...\""
            },
            {
                "logid": 110,
                "ns": 0,
                "title": "Image color coding conversion",
                "pageid": 114,
                "logpage": 114,
                "revid": 282,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "223.233.83.241",
                "anon": "",
                "timestamp": "2024-04-22T06:22:49Z",
                "comment": "Created page with \"- To go through the path recursively, find all jpeg and png files and convert them to webp (leaving the original):   cd </folder/to/check/>  find . -name '*.jpg' -type f -exec bash -c 'cwebp -q 75 \"$0\" -o \"${0%.jpg}.webp\"' {} \\;  find . -name '*.JPG' -type f -exec bash -c 'cwebp -q 75 \"$0\" -o \"${0%.jpg}.webp\"' {} \\;  find . -name '*.png' -type f -exec bash -c 'cwebp -q 75 \"$0\" -o \"${0%.jpg}.webp\"' {} \\;    - if it gives an error about the unsupported colour conversion, c...\""
            },
            {
                "logid": 109,
                "ns": 0,
                "title": "Commercial SSL Certificate Chain Checks",
                "pageid": 113,
                "logpage": 113,
                "revid": 272,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Admin",
                "timestamp": "2023-06-29T12:28:52Z",
                "comment": "Created page with \"SSL Certificate chain checks ----------------------------  - Once we got certificate from the client, if multiple .crt files.. combine them into a single certificate and if its single certificate just keep as it is   - then we can check the certificate content with following command   openssl x509 -in certificate.crt -text -noout   - then depending on certificate authority we need to downlaod and add intermediate certificates - downloaded intermediate certificates should...\""
            }
        ]
    }
}