Skip to content

Commit 06cebb7

Browse files
authored
Merge pull request #8133 from ovh/feat-landing-zone-guide
Feat(landing zone): create guide
2 parents 8d52371 + 5ccc1ee commit 06cebb7

File tree

4 files changed

+187
-0
lines changed

4 files changed

+187
-0
lines changed

pages/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -616,6 +616,7 @@
616616
+ [Healthcare (HDS) compliance activation](public_cloud/public_cloud_cross_functional/activate-hds-certification)
617617
+ [Migration](public-cloud-cross-functional-migration)
618618
+ [Public Cloud IaaS Migration - Steps and Best Practices](public_cloud/public_cloud_cross_functional/iaas-migration-steps)
619+
+ [Architecture Reference - Building a Landing Zone with OVHcloud Public Cloud](public_cloud/public_cloud_cross_functional/landing_zone_migration)
619620
+ [Tutorials](public-cloud-cross-functional-tutorials)
620621
+ [How to use Terraform](public_cloud/public_cloud_cross_functional/how_to_use_terraform)
621622
+ [Services management](public-cloud-cross-functional-services-management)
Lines changed: 184 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,184 @@
1+
---
2+
title: "Architecture Reference - Building a Landing Zone with OVHcloud Public Cloud"
3+
excerpt: "A practical guide to design a secure and scalable Landing Zone on OVHcloud Public Cloud, covering networking, IAM, backups, and more."
4+
updated: 2025-07-24
5+
---
6+
7+
## Objective
8+
9+
This guide helps OVHcloud Public Cloud users design and deploy a secure, scalable Landing Zone by outlining key components and best practices.
10+
11+
It covers core networking setup (vRack, subnets, gateways, floating IPs), traffic management (load balancer), and security layers (firewall, WAAP, Bastion).
12+
13+
It also includes guidance on infrastructure choices, IAM, backups, logging, private connectivity, and cost-control, offering a clear foundation for production-ready cloud environments.
14+
15+
## Requirements
16+
17+
- Access to the [OVHcloud Control Panel](/links/manager).
18+
- [Setting OpenStack environment variables](/pages/public_cloud/public_cloud_cross_functional/loading_openstack_environment_variables).
19+
- Being familiar with [Terraform](/pages/public_cloud/public_cloud_cross_functional/how_to_use_terraform), if you intend using it.
20+
- Basic understanding of [cloud networking concepts](/links/public-cloud/network) (e.g., subnets, gateways, Floating IPs).
21+
22+
## Instructions
23+
24+
To help you design a secure, scalable, and production-ready cloud foundation, the following diagram illustrates the key steps in building a Landing Zone on the OVHcloud Public Cloud:
25+
26+
![Landing zone architecture diagram](images/landing_zone_architecture.png){.thumbnail}
27+
28+
Each numbered step corresponds to a component or action in the setup process. Below are detailed explanations for each:
29+
30+
### 0. vRack setup
31+
32+
A vRack (Virtual Rack) is the foundational component that allows private networking between resources.
33+
34+
When you create a Public Cloud project, OVHcloud automatically provisions a vRack for you. This virtual layer isolates your internal communication and enables secure interconnections between services (instances, databases, gateways, etc.) across regions and even between different OVHcloud services (Bare Metal, Hosted Private Cloud).
35+
36+
You will use the vRack to attach all private subnets and connect public and private-facing services securely.
37+
38+
### 1. Create a private subnet
39+
40+
Inside the vRack, define private subnets to segment your network. For example, you can have separate subnets for frontend, backend, databases, and bastions.
41+
42+
- Subnets can be created in different regions.
43+
- Choose appropriate CIDR blocks to avoid overlap and ease future scaling.
44+
- Subnets can be layer 2 (flat) or layer 3 (routed with gateway).
45+
46+
Subnet creation is done from the OVHcloud Control Panel, via the OpenStack API, or using Terraform.
47+
48+
### 2. Set up a Gateway
49+
50+
To enable outbound or cross-zone communication for your private subnet, set up a Network Gateway for Public Cloud. It acts as a NAT device to allow traffic from your private subnet to the internet or other public resources.
51+
52+
- Required for downloading packages, external API calls, etc.
53+
- You can route traffic through the gateway to a firewall or WAAP if needed.
54+
- Each gateway is regional and connects only subnets from that region.
55+
56+
Follow [this guide](/pages/public_cloud/public_cloud_network_services/getting-started-02-create-private-network-gateway) to set up a gateway.
57+
58+
### 3. Assign Floating IPs
59+
60+
A Floating IP is a public IP that you can attach to a resource (usually an instance or load balancer) within a private network.
61+
62+
Use cases include:
63+
64+
- Exposing a single VM for SSH access (e.g., for a bastion)
65+
- Public-facing applications hosted inside a private subnet
66+
- Failover and migration between zones
67+
68+
Use Floating IPs to expose selected private resources (e.g., instances, services) to the public internet securely. Follow [this guide](/pages/public_cloud/public_cloud_network_services/getting-started-03-attach-floating-ip-to-instance) to link a Floating IP.
69+
70+
### 4. Set up a Load Balancer
71+
72+
An OVHcloud Load Balancer lets you distribute traffic between multiple backend instances in different availability zones.
73+
74+
- Choose the load balancing mode: HTTP(S), TCP, or passthrough.
75+
- Supports health checks, SSL termination, and sticky sessions.
76+
- Integrated with Floating IPs for public exposure or stays private.
77+
78+
This is essential for creating highly available applications and distributing load intelligently.
79+
80+
Follow [this guide](/pages/public_cloud/public_cloud_network_services/getting-started-01-create-lb-service) to set up and use a Load Balancer.
81+
82+
### 5. Implement firewall rules
83+
84+
Although OVHcloud doesn’t provide a built-in firewall-as-a-service, you can:
85+
86+
- Use Security Groups on each instance (similar to AWS)
87+
- Deploy a third-party virtual firewall like Stormshield in your vRack
88+
- Firewall solutions should inspect north-south (ingress/egress) and east-west (internal) traffic where applicable.
89+
90+
Follow [this guide](/pages/public_cloud/public_cloud_network_services/tutorial-stormshield_network_security_vrack) to set up and use a Stormshield firewall.
91+
92+
### 6. Add WAAP protection
93+
94+
To protect your web and API applications, deploy a Web Application and API Protection (WAAP) service like Ubika.
95+
96+
- Shields against DDoS, SQL injection, XSS, and OWASP Top 10 threats
97+
- Offers bot management, WAF, API gateway, and rate limiting
98+
- Can be inserted transparently between your Load Balancer and backend services
99+
100+
Follow [this guide](/pages/public_cloud/public_cloud_network_services/tutorial-ubika_vrack) to deploy a WAAP protection with Ubika.
101+
102+
### 7. Configure a Bastion Host
103+
104+
A Bastion is a secure access point to manage instances located in private subnets. OVHcloud provides a hardened, audited open-source bastion tool for this purpose.
105+
106+
Use it to:
107+
108+
- Enforce secure, audited SSH access
109+
- Define fine-grained user permissions (LDAP, AD, IAM)
110+
- Monitor access logs and session replay
111+
112+
See [documentation about Bastion](https://ovh.github.io/the-bastion/index.html){.external} on our GitHub account.
113+
114+
### 8. Enable private connectivity (OCC)
115+
116+
If you need to connect your on-premise infrastructure or other OVHcloud services securely to the Landing Zone, use OVHcloud Connect (OCC).
117+
118+
- Dedicated Layer 2 or Layer 3 link between your site and OVHcloud POPs
119+
- Bypasses the public internet, ideal for compliance and latency-sensitive apps
120+
- Integrated into the vRack
121+
122+
See [this documentation](/pages/network/ovhcloud_connect/occ-direct-control-panel).
123+
124+
### 9. Deploy your infrastructure
125+
126+
With networking and security in place, deploy your core services:
127+
128+
- Compute: Public Cloud Instances (GP/CPU/GPU)
129+
- Containers: Managed Kubernetes Service
130+
- Storage:
131+
- Block storage (via volumes)
132+
- Object Storage (S3<sup>1</sup>-compatible)
133+
- Public Cloud File Storage (NFSv4)
134+
- Databases: Managed MongoDB, PostgreSQL, MySQL, Kafka
135+
136+
These services can be managed using the Control Panel, OpenStack CLI, or Terraform.
137+
138+
### 10. Set up Identity and Access Management (IAM)
139+
140+
IAM is essential for defining who can access what and under which conditions. With OVHcloud IAM, you can:
141+
142+
- Create and assign roles and policies per user/group
143+
- Integrate with SAML, OIDC, or use native IAM
144+
- Isolate access by project, service, or region
145+
146+
See the [related documentation](/pages/public_cloud/public_cloud_cross_functional/securing_and_structuring_projects).
147+
148+
### 11. Define backup policies
149+
150+
Ensure business continuity by protecting critical data and workloads:
151+
152+
- Snapshots: Ideal for short-term recovery or pre-update backups
153+
- Instance backups: Full images for rollback or cloning
154+
- Veeam Enterprise: Available for advanced backup/restore workflows
155+
156+
Define a backup strategy aligned with your RPO (Recovery Point Objective) and RTO (Recovery Time Objective).
157+
158+
### 12. Centralize logging with Logs Data Platform
159+
160+
Logs Data Platform (LDP) allows you to:
161+
162+
- Aggregate logs from apps, systems, and network devices
163+
- Create dashboards and alerts (Kibana, Grafana-compatible)
164+
- Retain logs based on compliance needs (GDPR, ISO 27001, etc.)
165+
166+
This is key for observability, security audits, and troubleshooting. Follow [this documentation](/pages/manage_and_operate/observability/logs_data_platform/getting_started_quick_start).
167+
168+
### 13. Implement cost control and monitoring
169+
170+
Keep control of your cloud spending with:
171+
172+
- Budget alerts and consumption dashboards
173+
- API access to cost usage reports
174+
- Daily/hourly resource tracking
175+
176+
Use tagging, IAM roles, and alerts to link costs to teams, environments, or services. For more information, read [this documentation](/pages/public_cloud/public_cloud_cross_functional/analyze_billing).
177+
178+
## Go Further
179+
180+
If you need training or technical assistance to implement our solutions, contact your sales representative or click on [this link](/links/professional-services) to get a quote and ask our Professional Services experts for assisting you on your specific use case.
181+
182+
Join our [community of users](/links/community) and visit our [Discord channel](https://discord.gg/ovhcloud).
183+
184+
<sup>1</sup>: S3 is a trademark of Amazon Technologies, Inc. OVHcloud’s service is not sponsored by, endorsed by, or otherwise affiliated with Amazon Technologies, Inc.
327 KB
Loading
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
id: 3a894dca-4e73-471a-887f-337ca19a7b10
2+
full_slug: public-cloud-landing-zone

0 commit comments

Comments
 (0)