Overview
Containers group related secrets into a named bundle. The most common use case is bundling a TLS certificate, its private key, and the CA chain for use with the Load Balancer service. Containers reference secrets by UUID — they do not copy secret payloads.Prerequisites
- An active Xloud account with appropriate permissions
- Access to the Xloud Dashboard (
https://connect.<your-domain>) or CLI configured with credentials - API credentials sourced (
source admin-openrc.sh)
Container Types
| Container Type | Contents | Primary Use Case |
|---|---|---|
certificate | Certificate + private key + intermediates + passphrase | TLS for Load Balancer HTTPS listeners |
rsa | Public key + private key + passphrase | RSA key pair management |
generic | Any secrets | API credentials, configuration bundles |
Create a Certificate Container
- Dashboard
- CLI
Select container type
Select certificate for TLS use cases. This type enforces the correct secret
role assignments (certificate, private key, intermediates).
Assign secrets to container
For a certificate container, assign previously stored secrets:
| Role | Secret | Requirement |
|---|---|---|
| Certificate | Stored certificate secret | Required |
| Private Key | Stored private key secret | Required |
| Intermediates | CA chain secret | Recommended |
| Private Key Passphrase | Passphrase if key is encrypted | Optional |
Manage Containers
Deleting a container does not delete the secrets it references. The secrets remain in
Key Manager and must be deleted separately if no longer needed.
Next Steps
Certificates
Store externally issued certificates or order new ones via a CA plugin
ACL
Control access to containers and the secrets they reference
Store Secrets
Create the individual secrets to populate containers
Troubleshooting
Resolve Load Balancer TLS container configuration issues