User Activity
Track and monitor user actions across your organization with comprehensive audit logs and activity tracking. This guide covers how to view user activity, understand audit trails, and monitor team usage.Overview
Bud Stack automatically tracks all significant user actions to provide:- Audit trails for compliance and security
- Activity monitoring for team oversight
- Troubleshooting support for debugging issues
- Usage analytics for understanding platform adoption
Only Admin users with USER_VIEW or USER_MANAGE permissions can access user activity logs.
What’s Tracked
User Actions
All major user actions are logged:Account Actions
- User creation (CREATE)
- Profile updates (UPDATE)
- Account deletion (DELETE)
- Login attempts (LOGIN)
- Failed logins (LOGIN_FAILED)
- Password resets
Resource Actions
- Project creation/deletion
- Model deployments
- Endpoint configuration
- Cluster registration
- Benchmark runs
- Settings changes
Captured Information
For each action, the system records:| Field | Description | Example |
|---|---|---|
| Action | Type of action performed | CREATE, UPDATE, DELETE, LOGIN |
| Resource Type | What was affected | USER, PROJECT, MODEL, ENDPOINT, CLUSTER |
| Resource ID | Specific resource identifier | project-abc-123 |
| User ID | Who performed the action | User’s UUID |
| User Email | User’s email address | john@company.com |
| Timestamp | When it happened | 2025-01-15T14:30:00Z |
| IP Address | Where it came from | 192.168.1.100 |
| User Agent | Browser/client info | Mozilla/5.0... |
| Details | Additional context | JSON object with specifics |
| Status | Success or failure | SUCCESS, FAILED |
Viewing User Activity
Access Activity Logs
1
Navigate to User Management
From the dashboard sidebar, click on User Management.
2
Select a User
Click on any user in the list to view their profile.
3
View Activity Tab
Click the Activity or Audit Log tab to see their action history.
4
Filter and Search
Use filters to narrow down by date range, action type, or resource.
Activity Dashboard
The activity dashboard shows:- Recent Actions: Latest 50 actions
- Action Timeline: Visual timeline of user activity
- Action Summary: Count by action type
- Resource Breakdown: Which resources users interact with most
Action Types Explained
CREATE Actions
Logged when users create new resources:- New project creation
- User invitation
- Model deployment
- Endpoint setup
- Cluster registration
UPDATE Actions
Logged when users modify existing resources:- User profile changes
- Role/permission updates
- Project configuration changes
- Endpoint modifications
- Settings updates
DELETE Actions
Logged when users delete resources:- Project deletion
- User account removal
- Endpoint deletion
- Model undeployment
- Cluster deregistration
LOGIN Actions
Logged for successful authentication:LOGIN_FAILED Actions
Logged for failed authentication attempts:Filtering Activity Logs
Filter by Date Range
View activity within specific time periods:- Last 24 hours: Recent activity
- Last 7 days: Weekly overview
- Last 30 days: Monthly trends
- Custom range: Specify exact dates
Filter by Action Type
Focus on specific actions:- CREATE
- UPDATE
- DELETE
- LOGIN
- LOGIN_FAILED
Filter by Resource Type
See activity for specific resources:- USER
- PROJECT
- MODEL
- ENDPOINT
- CLUSTER
- BENCHMARK
Filter by User
View activity for specific team members:- Select from user dropdown
- Search by name or email
- View all actions by that user
Team Usage Analytics
Activity Metrics
Track overall team engagement:Active Users
Number of users who logged in during the period
Total Actions
All actions performed across the organization
Resource Changes
CREATE, UPDATE, DELETE operations
Usage Patterns
Identify:- Peak Usage Times: When your team is most active
- Popular Features: Which features are used most
- Inactive Users: Users who haven’t logged in recently
- Power Users: Most active team members
Resource Activity
See which resources are most actively managed:- Projects with most changes
- Frequently accessed models
- Heavily used endpoints
- Active clusters
Security Monitoring
Suspicious Activity Detection
Watch for potential security issues:Multiple Failed Login Attempts
Multiple Failed Login Attempts
Several failed logins from same IP address may indicate brute force attack. Review IP and consider blocking if necessary.
Unusual Login Locations
Unusual Login Locations
User logging in from unexpected geographic location. Verify with user or investigate potential account compromise.
After-Hours Activity
After-Hours Activity
Activity outside normal working hours. Could be legitimate or indicate unauthorized access.
Bulk Deletions
Bulk Deletions
Large number of resources deleted quickly. May indicate malicious activity or accidental bulk action.
Permission Escalations
Permission Escalations
User role changed to higher privilege level. Verify this was intentional and authorized.
Security Best Practices
- Regular Reviews: Check audit logs weekly
- Alert Setup: Configure notifications for suspicious activities
- Failed Login Monitoring: Investigate repeated failures
- IP Whitelisting: Restrict access to known IPs when possible
- Two-Factor Authentication: Enable for sensitive accounts
Exporting Activity Logs
Export Options
- CSV Export
- JSON Export
- API Access
Download activity logs as CSV for analysis in spreadsheet tools:
- Apply desired filters
- Click Export button
- Select CSV format
- Open in Excel, Google Sheets, etc.
Compliance Reporting
For compliance requirements:- Export logs for specific audit periods
- Filter by specific users or actions
- Include all required fields for auditors
- Maintain logs for required retention period
Activity logs are retained for 90 days by default. Contact support for extended retention options.
Real-Time Activity Monitoring
Live Activity Feed
View real-time user actions as they happen:- Live updates without page refresh
- Color-coded by action type
- Instant notifications for critical actions
- Stream view of all organizational activity
Activity Notifications
Set up alerts for specific events:1
Navigate to Settings
Go to Organization Settings > Notifications.
2
Configure Activity Alerts
Enable alerts for events you want to monitor.
3
Choose Delivery Method
Select email, Slack, or in-app notifications.
4
Set Alert Criteria
Define conditions that trigger alerts (e.g., failed logins > 5).
Use Cases
Compliance Auditing
Scenario: Annual security audit requires proof of access controls Solution:- Export all USER actions for the audit period
- Filter by CREATE and UPDATE to show user management
- Demonstrate proper role assignments and changes
- Show audit trail of who made what changes
Troubleshooting
Scenario: User reports they can’t access a project Solution:- View user’s recent activity
- Check for any DELETE actions on projects
- Review permission UPDATE actions
- Identify when access changed and by whom
Security Investigation
Scenario: Suspicious activity detected on account Solution:- Filter LOGIN and LOGIN_FAILED for the user
- Check IP addresses and locations
- Review recent actions for unauthorized changes
- Identify timeline of suspicious activity
Team Performance
Scenario: Understanding team productivity and engagement Solution:- View activity metrics for all users
- Identify most/least active team members
- See which features are used most
- Plan training based on usage patterns
Troubleshooting Activity Logs
Missing Activity Data
If expected actions aren’t showing:- Check date range filter
- Verify you have USER_VIEW permission
- Ensure user exists and has taken actions
- Contact support if issue persists
Incomplete Action Details
Some actions may have limited details:- Actions from API vs UI may have different details
- System actions may lack user context
- Deleted resources may show ID only
Export Not Working
If export fails:- Try smaller date range
- Reduce number of filters
- Check browser console for errors
- Try different format (CSV vs JSON)
API Reference
List Activity Logs
Get User-Specific Activity
Filter by Resource
Related Pages
- Inviting Users - Add team members to track
- Roles & Permissions - Understand permission changes
- Security Best Practices - Secure your organization
- Organization Settings - Configure activity alerts
Summary
User activity tracking provides:- Complete Audit Trail: All actions logged with full context
- Security Monitoring: Detect and investigate suspicious activity
- Compliance Support: Export logs for regulatory requirements
- Troubleshooting: Debug issues by reviewing action history
- Team Insights: Understand platform usage and engagement