Activity Log
Track all actions performed on your cloud resources.
Activity Log
The activity log provides a complete audit trail of every action performed on your cloud resources. Every create, delete, power action, configuration change, and management operation is recorded with full context.
What Gets Logged
Every significant action across your cloud infrastructure is captured:
| Category | Actions Logged |
|---|---|
| Instances | Create, destroy, start, stop, reboot, resize, rebuild, rename |
| Snapshots | Create, restore, delete |
| Backups | Enable, disable, restore |
| Firewall | Create rule, update rule, delete rule, assign to instance |
| Volumes | Create, attach, detach, resize, delete |
| SSH Keys | Add, remove |
| Networking | Assign floating IP, remove floating IP, update reverse DNS |
| Labels | Add, update, remove |
Log Entry Details
Each activity log entry includes:
| Field | Description |
|---|---|
| Action | The operation performed (e.g., instance.create, snapshot.delete) |
| Resource | The resource type and identifier affected |
| User | The account or API key that initiated the action |
| Timestamp | When the action occurred (UTC) |
| Status | Whether the action succeeded or failed |
Viewing the Activity Log
Project-Scoped View
- Navigate to your Project in the dashboard
- Select the Activity tab
- View all actions across every resource in the project
Instance-Scoped View
- Navigate to a specific instance's detail page
- Select the Activity tab
- View actions related to that instance only
Filtering
Use filters to narrow down the activity log:
- Resource type — Show only instance, volume, snapshot, or firewall events
- Date range — Focus on a specific time window
- Action type — Filter by create, delete, power, or configuration actions
Activity logs are paginated. Click Load More at the bottom of the list to fetch older entries. Logs are retained for 90 days.
Use Cases
| Scenario | How the Activity Log Helps |
|---|---|
| Troubleshooting | Determine when an instance was rebooted or a firewall rule was changed |
| Audit | Track who created or destroyed resources and when |
| Cost analysis | Identify when instances were created and destroyed to correlate with billing |
| Change management | Review what changed before and after an incident |
| Team coordination | See what actions teammates have taken on shared projects |
Activity logs are read-only and cannot be modified or deleted. This ensures a tamper-proof audit trail for compliance and troubleshooting purposes.
Next Steps
- Organize resources with Labels & Tags for easier filtering
- Review Getting Started for an overview of cloud resource management
- Explore Storage documentation for volume and snapshot operations