Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.xloud.tech/llms.txt

Use this file to discover all available pages before exploring further.

Overview

Launching an instance creates a virtual machine on an Xloud Compute host. The Dashboard provides a 4-step wizard that walks you through base configuration, networking, system settings, and a confirmation review. Once active, the instance can be accessed via SSH, console, or RDP depending on the guest OS.

Windows VM from ISO

ISO boot with VirtIO driver injection, Sysprep, and image creation

Linux VM from ISO

Custom Linux installation from ISO with disk setup and image creation
Prerequisites
  • An active image in the Xloud Image Service (or an existing bootable volume)
  • A flavor appropriate for your workload
  • At least one network available in your project
  • An SSH key pair for Linux instances, or a configured password for Windows
  • A security group with the required inbound rules

Create an Instance

The Instance Create wizard has 4 steps: Base Config, Network Config, System Config, and Confirm Config. An Instance Count input and real-time quota display are shown in the footer throughout all steps.
1

Open the Create Instance wizard

Navigate to Compute > Instances in the sidebar. Click Create Instance in the top-right corner.
2

Step 1 — Base Config

Configure the boot source, flavor, and storage.Available Zone (required) — Select the availability zone for host placement.
Administrators see an additional Pin to Host group that allows selecting a specific physical hypervisor (zone:hostname format). Regular users see only the zone names.
Specification (Flavor) (required) — Select the virtual hardware profile. The flavor table supports filtering by architecture and category:
ArchitectureCategories
X86 ArchitectureGeneral Purpose, Compute Optimized, Memory Optimized, Big Data, Local SSD, High Clock Speed
Heterogeneous ComputingGPU Compute, Visualization Compute
Bare Metal
ARM Architecture
The table shows columns: Name, CPU, Memory, Internal Network Bandwidth, Ephemeral Disk (if applicable), and IOPS (if applicable). Filter by Name, CPU, or Memory.Start Source (required) — Select the boot source type:
SourceDescription
ImageBoot from an OS image in the Xloud Image Service
Instance SnapshotRestore from a previously captured instance snapshot
Bootable VolumeBoot from an existing persistent block storage volume (only shown if block storage is enabled)
When Image is selected, choose the operating system from tabs organized by distribution (CentOS, Ubuntu, Fedora, Windows, Debian, CoreOS, Arch, FreeBSD, Others).Boot From Volume — When source is Image or Instance Snapshot:
OptionDescription
YesCreate a new system disk (persistent boot volume)
NoBoot directly from image (ephemeral root disk)
System Disk — Shown when Boot From Volume is Yes. Select:
  • Volume Type from available storage backends
  • Size (GiB) — minimum is determined by the flavor disk size, image minimum disk, and image size (whichever is largest)
  • Delete on Termination — whether to delete the boot volume when the instance is deleted
Data Disk (optional) — Add additional data disks. Click Add Data Disks to add one or more disks, each with Volume Type, Size, and Delete on Termination settings.
When source is Bootable Volume, the instance count is limited to 1 and the Data Disk section is shown for additional disks.
CD-ROM Source (optional) — Attach an ISO image or existing volume as a CD-ROM device:
OptionDescription
NoneNo CD-ROM attached (default)
ImageSelect an image to mount as CD-ROM
VolumeSelect an existing volume to mount as CD-ROM
3

Step 2 — Network Config

Configure networking and security.Networks (required if no ports selected) — Select one or more networks from the available list. Networks without subnets are disabled.After selecting networks, a Virtual LAN section appears for each selected network with:
FieldDescription
NetworkAuto-populated from selection
SubnetDropdown of subnets in the selected network
IP TypeAutomatically Assigned Address or Manually Assigned Address
IP AddressManual IPv4 or IPv6 input (only when IP Type is manual)
If you specify a manual IP address AND set the instance count to more than 1, the wizard will block submission — manual IPs cannot be used with batch creation.
Ports (required if no networks selected) — Alternatively, select pre-created ports (only ports with status DOWN are shown). At least one network or port must be selected.Security Group (required when shown) — Select one or more security groups. This field is hidden if any selected network or port has port security disabled.
The security group rules apply to all virtual network interfaces of the instance, not just the primary interface.
4

Step 3 — System Config

Configure the instance name, login credentials, and advanced options.Name (required) — The instance display name. When launching multiple instances (count > 1), instances are named {name}-1, {name}-2, etc.Login Type (required) — Choose the authentication method:
TypeDescription
KeypairSelect an existing SSH key pair or create a new one. Disabled for Windows images
PasswordSet a login username and password. Required for Windows images
When Keypair is selected, choose from the key pair table or click Create Keypair to generate a new one.When Password is selected:
  • Login Name — Auto-populated from the image’s os_admin_user property if available, otherwise enter manually
  • Login Password — Must meet password complexity requirements
  • Confirm Password — Must match the login password
For Windows images, the Keypair option is automatically disabled. Password login is the only option for Windows instances.
Advanced Options — Click to expand additional settings:
FieldVisibilityDescription
Physical NodeAdmin onlySmart Scheduling (default) or Manually Specify a hypervisor
Server GroupAll usersSelect an existing server group for affinity/anti-affinity placement
User DataAll usersCloud-init script (text area with file upload, ASCII only, max 1000 characters)
Virtual TPMAll usersAttach a virtual TPM device (requires Xloud KMS). See vTPM and Secure Boot
Secure BootAll usersRequire UEFI Secure Boot (requires Xloud KMS). See vTPM and Secure Boot
Virtual TPM and Secure Boot both require the Xloud Key Management service to be enabled on the cluster — both checkboxes are disabled otherwise. Full walkthrough: vTPM and Secure Boot.
5

Step 4 — Confirm Config

Review all settings before launching. The confirmation page shows a read-only summary organized into three sections:
  • Base Config — Source, system disk, data disks, availability zone, flavor, project
  • Network Config — Virtual LANs with subnet/IP assignments, selected ports, security groups
  • System Config — Instance name, login type, physical node, server group
Click any section heading to navigate back to that step for corrections.The footer shows the Instance Count and real-time quota usage:
QuotaTracked
InstanceCount against instance limit
CPUvCPUs x count against cores limit
Memory (GiB)RAM x count against RAM limit
VolumeNew volumes against volume limit
Volume Capacity (GiB)Total new volume size against storage limit
Server Group MemberMembers against group limit (when server group selected)
If any quota would be exceeded, a red badge is displayed and the Confirm button is disabled. Free up resources or contact your administrator to increase quotas.
Click Confirm to launch the instance.
The instance appears in the list with status Build, transitioning to Active within seconds to minutes depending on image size and host availability.

Post-Launch Verification

After the instance reaches ACTIVE status, confirm it is fully operational:
1

Open the instance detail

Navigate to Compute > Instances and click the instance name. The detail page shows 8 tabs: Detail, Volumes, Instance Snapshots, Interfaces, Floating IPs, Security Groups, Action Logs, and Logs.
2

Check console output

Click the Logs tab to view the serial console output. A successful boot shows login prompts or cloud-init completion messages.
3

Open the console

Click the Console action (the first row action) to open a VNC console in a new browser tab.

Next Steps

Security Groups

Create and manage firewall rules to control traffic to your instances

Manage IP Addresses

Allocate and associate floating IPs for external instance access

Resize an Instance

Change the flavor of a running instance to adjust vCPU and RAM

Server Groups

Control instance placement with affinity and anti-affinity policies