Documentation Index
Fetch the complete documentation index at: https://docs.xloud.tech/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Containers group related secrets into a named bundle. The most common use case is bundling a TLS certificate with its private key for use with the Load Balancer service. Containers reference secrets by UUID — they do not copy secret payloads. Like secrets, containers are project-scoped — they are visible only to users within the project that created them unless shared via ACL.Prerequisites
- An active Xloud account with appropriate permissions
- Access to the Xloud Dashboard or CLI configured with credentials
- API credentials sourced (
source openrc.sh)
Project Scope — Containers belong to the project that created them.
The Load Balancer service accesses containers through the project’s service
credentials. If you create a container in Project A and configure a listener
in Project B, the listener cannot access the container unless an ACL is set.
Container Types
| Container Type | Contents | Primary Use Case |
|---|---|---|
| certificate | Certificate + private key + intermediates + passphrase | TLS termination for Load Balancer HTTPS listeners |
| rsa | Public key + private key + passphrase | RSA key pair management |
| generic | Any combination of secrets | API credential bundles, configuration groups |
Create a Certificate Container
The Dashboard provides a dedicated Create Certificate workflow that creates both the secrets and the container in a single step. This is the recommended approach for TLS certificate management.- Dashboard
- CLI
Navigate to Certificate Manager
Navigate to Network > Certificates in the sidebar.Click Create Certificate in the upper-right corner.
Enter the certificate name
Enter a Certificate Name for the container. This name identifies the
certificate bundle in the Load Balancer listener configuration.
The name must contain only letters, numbers, and hyphens. Special characters
and spaces are not permitted.
Select the certificate type
Choose the Certificate Type:
| Type | Description | Required Fields |
|---|---|---|
| Server | A server certificate with its private key for TLS termination | Certificate Content, Private Key |
| CA | A Certificate Authority certificate for client certificate validation | Certificate Content only |
Provide the certificate content
Paste the certificate content into the Certificate Content text area,
or click the upload button to load it from a
.crt or .pem file.The certificate must be in PEM format:Expected format
Provide the private key (Server type only)
For Server type certificates, paste the private key into the Private Key
text area, or upload a
.key or .pem file.The key must be in PEM format:Expected format
This field is hidden for CA type certificates. The private key must be
in RSA format — ECDSA and Ed25519 keys must be converted first.
Add domain names (optional, Server type only)
For SNI (Server Name Indication) certificates, enter the Domain Name(s)
that this certificate covers.
| Rule | Limit |
|---|---|
| Multiple domains | Separated by commas |
| Maximum domains | 30 per certificate |
| Single domain length | 100 characters max |
| Total length | 1024 characters max |
| Valid characters | Letters, numbers, hyphens, dots |
Set an expiration date (optional)
Use the Expires At date picker to set an optional expiration date.
Only future dates are selectable.
Create the certificate
Click Confirm to create the certificate container. The system stores the
certificate and private key as separate secrets and bundles them into a
container automatically.
The certificate container appears in the Certificates list and is ready
to reference in Load Balancer HTTPS listener configuration.
View Container Details
- Dashboard
- CLI
Navigate to containers
Go to Project > Key Manager > Containers. The list shows all
containers in your current project.
| Column | Description |
|---|---|
| Name | Container identifier (clickable to view details) |
| Type | Container type: certificate, rsa, or generic |
| Status | Active or Error |
| Secrets | Number of secret references in the container |
| Created | Creation timestamp |
Delete a Container
- Dashboard
- CLI
Select containers to delete
Navigate to Project > Key Manager > Containers. Select one or more
containers using the checkboxes, then click Delete in the batch actions bar.Alternatively, click the More menu on a single container row and
select Delete Container.
Project Scope and Access
Containers follow the same project-scoping rules as secrets:| Behavior | Description |
|---|---|
| Ownership | Containers belong to the project that created them |
| Visibility | Only visible to users within the same project |
| Service access | The Load Balancer accesses containers through the project’s service credentials |
| Cross-project sharing | Requires an ACL on the container |
| Contained secrets | Secrets within the container must also be accessible to the consuming service |
Next Steps
Certificates
Manage the full certificate lifecycle from storage to renewal
Access Control (ACL)
Share containers and secrets across projects
Store Secrets
Create individual secrets to populate containers
Load Balancer
Use certificate containers for HTTPS listener configuration