Overview
Securing the Xloud Load Balancer infrastructure protects both the management plane (controller-to-appliance communication) and the data plane (client traffic). This guide covers network isolation of the management plane, appliance TLS certificate lifecycle, quota auditing, and access log configuration.Management Plane Isolation
The load balancing management network carries control traffic between the controller and appliances. This network must be isolated from tenant and provider networks to prevent unauthorized appliance access.Assign a dedicated management network
The management network should use a non-routable CIDR not reachable from tenant
networks or the internet. Configure in XDeploy globals:
Load balancer management network
Apply security group rules
The management security group should allow only the controller IP to reach
appliance management ports:
- TCP 9443 — appliance API (controller → appliance only)
- UDP 5555 — health manager heartbeat (bidirectional)
Verify management security group rules
TLS Certificate Lifecycle
Appliances use TLS certificates for secure controller-to-appliance communication. Monitor and rotate certificates before expiry.Check all appliance certificate expiration dates
Trigger certificate rotation via failover
Certificate rotation via failover replaces the appliance with a fresh instance using
a new certificate. In ACTIVE_STANDBY topology, this is non-disruptive. In SINGLE
topology, expect a brief interruption.
Quota Auditing
Regularly review quota consumption to identify projects with unusual resource usage:Audit all project quotas
Find projects using more than 80% of their load balancer quota
Access Log Configuration
Configure load balancer access logs to forward to your centralized logging platform. Access logs capture source IPs, request URIs, response codes, and latency — essential data for compliance auditing and security incident investigation.Enable access logging in XDeploy globals
Apply access log configuration
Security Checklist
Management network isolated
Management network isolated
Verify the management network CIDR is not reachable from tenant VMs or external networks.
Appliance certificates valid
Appliance certificates valid
All appliances have
cert_expiration dates more than 30 days in the future.Quota limits configured
Quota limits configured
All projects have explicit quota limits set — none are using unlimited defaults
in a multi-tenant environment.
Access logs forwarded
Access logs forwarded
Access logs are configured and flowing to the centralized logging platform.
Verify by creating a test load balancer and checking for log entries.
Next Steps
Monitoring
Set up proactive alerts for certificate expiry and appliance health.
Quotas
Configure per-project resource limits to prevent over-consumption.
Admin Troubleshooting
Resolve security-related configuration and access failures.
Architecture
Review the management and data plane boundaries for security design.