Getting an API Key
- Sign up at dashboard.solixdb.xyz
- Navigate to the API Keys section
- Create a new API key
- Copy your API key (you’ll only see it once!)
Using Your API Key
You can provide your API key in two ways:Header (Recommended)
Include your API key in thex-api-key header:
Query Parameter
Alternatively, you can pass the API key as a query parameter:Best Practice: Use the header method for better security, as query parameters may be logged in server access logs.
Authentication Errors
If your API key is invalid or missing, you’ll receive a401 Unauthorized response:
401 Unauthorized
Common causes:
- Missing API key header
- Invalid or inactive API key
- API key has been revoked
Subscription Plans
Rate limits are based on your subscription plan:| Plan | Requests per Minute | Features |
|---|---|---|
| Free | 100 | Basic access to all endpoints |
| x402 | 500 | Higher rate limits, priority support |
| Enterprise | 2000 | Highest rate limits, dedicated support, custom features |
For details on rate limiting, see our Rate Limiting guide.
Rate Limit Headers
Every API response includes rate limit information in the headers:Header Descriptions
- X-RateLimit-Limit: Maximum requests allowed per minute for your plan
- X-RateLimit-Remaining: Remaining requests in the current window
- X-RateLimit-Reset: ISO 8601 timestamp when the rate limit window resets
- X-RateLimit-Plan: Your current subscription plan (free/x402/enterprise)
- Retry-After: Seconds to wait before retrying (only present on 429 responses)
Example: Checking Rate Limits
Security Best Practices
Never commit API keys
Never commit API keys
Use environment variables or secure secret management systems. Never commit API keys to version control.
Rotate keys regularly
Rotate keys regularly
Periodically rotate your API keys, especially if you suspect they may have been compromised.
Use different keys for different environments
Use different keys for different environments
Use separate API keys for development, staging, and production environments.
Monitor key usage
Monitor key usage
Regularly check your API key usage in the dashboard to detect any unauthorized access.
Revoke compromised keys immediately
Revoke compromised keys immediately
If you suspect your key is compromised, revoke it immediately in the dashboard and create a new one.
