Authorizations
API key authentication
Body
application/json
In an atomic operation delete all existing log policies and create the provided list by order.
Response
A successful response.
This data structue is obtained when overwriting log policies atomically.