|
| 1 | +--- |
| 2 | +title: "Architecture Reference - Building a Landing Zone with OVHcloud Public Cloud" |
| 3 | +excerpt: "A practical guide to design a secure and scalable Landing Zone on OVHcloud Public Cloud, covering networking, IAM, backups, and more." |
| 4 | +updated: 2025-07-24 |
| 5 | +--- |
| 6 | + |
| 7 | +## Objective |
| 8 | + |
| 9 | +This guide helps OVHcloud Public Cloud users design and deploy a secure, scalable Landing Zone by outlining key components and best practices. |
| 10 | + |
| 11 | +It covers core networking setup (vRack, subnets, gateways, floating IPs), traffic management (load balancer), and security layers (firewall, WAAP, Bastion). |
| 12 | + |
| 13 | +It also includes guidance on infrastructure choices, IAM, backups, logging, private connectivity, and cost-control, offering a clear foundation for production-ready cloud environments. |
| 14 | + |
| 15 | +## Requirements |
| 16 | + |
| 17 | +- Access to the [OVHcloud Control Panel](/links/manager). |
| 18 | +- [Setting OpenStack environment variables](/pages/public_cloud/public_cloud_cross_functional/loading_openstack_environment_variables). |
| 19 | +- Being familiar with [Terraform](/pages/public_cloud/public_cloud_cross_functional/how_to_use_terraform), if you intend using it. |
| 20 | +- Basic understanding of [cloud networking concepts](/links/public-cloud/network) (e.g., subnets, gateways, Floating IPs). |
| 21 | + |
| 22 | +## Instructions |
| 23 | + |
| 24 | +To help you design a secure, scalable, and production-ready cloud foundation, the following diagram illustrates the key steps in building a Landing Zone on the OVHcloud Public Cloud: |
| 25 | + |
| 26 | +{.thumbnail} |
| 27 | + |
| 28 | +Each numbered step corresponds to a component or action in the setup process. Below are detailed explanations for each: |
| 29 | + |
| 30 | +### 0. vRack setup |
| 31 | + |
| 32 | +A vRack (Virtual Rack) is the foundational component that allows private networking between resources. |
| 33 | + |
| 34 | +When you create a Public Cloud project, OVHcloud automatically provisions a vRack for you. This virtual layer isolates your internal communication and enables secure interconnections between services (instances, databases, gateways, etc.) across regions and even between different OVHcloud services (Bare Metal, Hosted Private Cloud). |
| 35 | + |
| 36 | +You will use the vRack to attach all private subnets and connect public and private-facing services securely. |
| 37 | + |
| 38 | +### 1. Create a private subnet |
| 39 | + |
| 40 | +Inside the vRack, define private subnets to segment your network. For example, you can have separate subnets for frontend, backend, databases, and bastions. |
| 41 | + |
| 42 | +- Subnets can be created in different regions. |
| 43 | +- Choose appropriate CIDR blocks to avoid overlap and ease future scaling. |
| 44 | +- Subnets can be layer 2 (flat) or layer 3 (routed with gateway). |
| 45 | + |
| 46 | +Subnet creation is done from the OVHcloud Control Panel, via the OpenStack API, or using Terraform. |
| 47 | + |
| 48 | +### 2. Set up a Gateway |
| 49 | + |
| 50 | +To enable outbound or cross-zone communication for your private subnet, set up a Network Gateway for Public Cloud. It acts as a NAT device to allow traffic from your private subnet to the internet or other public resources. |
| 51 | + |
| 52 | +- Required for downloading packages, external API calls, etc. |
| 53 | +- You can route traffic through the gateway to a firewall or WAAP if needed. |
| 54 | +- Each gateway is regional and connects only subnets from that region. |
| 55 | + |
| 56 | +Follow [this guide](/pages/public_cloud/public_cloud_network_services/getting-started-02-create-private-network-gateway) to set up a gateway. |
| 57 | + |
| 58 | +### 3. Assign Floating IPs |
| 59 | + |
| 60 | +A Floating IP is a public IP that you can attach to a resource (usually an instance or load balancer) within a private network. |
| 61 | + |
| 62 | +Use cases include: |
| 63 | + |
| 64 | +- Exposing a single VM for SSH access (e.g., for a bastion) |
| 65 | +- Public-facing applications hosted inside a private subnet |
| 66 | +- Failover and migration between zones |
| 67 | + |
| 68 | +Use Floating IPs to expose selected private resources (e.g., instances, services) to the public internet securely. Follow [this guide](/pages/public_cloud/public_cloud_network_services/getting-started-03-attach-floating-ip-to-instance) to link a Floating IP. |
| 69 | + |
| 70 | +### 4. Set up a Load Balancer |
| 71 | + |
| 72 | +An OVHcloud Load Balancer lets you distribute traffic between multiple backend instances in different availability zones. |
| 73 | + |
| 74 | +- Choose the load balancing mode: HTTP(S), TCP, or passthrough. |
| 75 | +- Supports health checks, SSL termination, and sticky sessions. |
| 76 | +- Integrated with Floating IPs for public exposure or stays private. |
| 77 | + |
| 78 | +This is essential for creating highly available applications and distributing load intelligently. |
| 79 | + |
| 80 | +Follow [this guide](/pages/public_cloud/public_cloud_network_services/getting-started-01-create-lb-service) to set up and use a Load Balancer. |
| 81 | + |
| 82 | +### 5. Implement firewall rules |
| 83 | + |
| 84 | +Although OVHcloud doesn’t provide a built-in firewall-as-a-service, you can: |
| 85 | + |
| 86 | +- Use Security Groups on each instance (similar to AWS) |
| 87 | +- Deploy a third-party virtual firewall like Stormshield in your vRack |
| 88 | +- Firewall solutions should inspect north-south (ingress/egress) and east-west (internal) traffic where applicable. |
| 89 | + |
| 90 | +Follow [this guide](/pages/public_cloud/public_cloud_network_services/tutorial-stormshield_network_security_vrack) to set up and use a Stormshield firewall. |
| 91 | + |
| 92 | +### 6. Add WAAP protection |
| 93 | + |
| 94 | +To protect your web and API applications, deploy a Web Application and API Protection (WAAP) service like Ubika. |
| 95 | + |
| 96 | +- Shields against DDoS, SQL injection, XSS, and OWASP Top 10 threats |
| 97 | +- Offers bot management, WAF, API gateway, and rate limiting |
| 98 | +- Can be inserted transparently between your Load Balancer and backend services |
| 99 | + |
| 100 | +Follow [this guide](/pages/public_cloud/public_cloud_network_services/tutorial-ubika_vrack) to deploy a WAAP protection with Ubika. |
| 101 | + |
| 102 | +### 7. Configure a Bastion Host |
| 103 | + |
| 104 | +A Bastion is a secure access point to manage instances located in private subnets. OVHcloud provides a hardened, audited open-source bastion tool for this purpose. |
| 105 | + |
| 106 | +Use it to: |
| 107 | + |
| 108 | +- Enforce secure, audited SSH access |
| 109 | +- Define fine-grained user permissions (LDAP, AD, IAM) |
| 110 | +- Monitor access logs and session replay |
| 111 | + |
| 112 | +See [documentation about Bastion](https://ovh.github.io/the-bastion/index.html){.external} on our GitHub account. |
| 113 | + |
| 114 | +### 8. Enable private connectivity (OCC) |
| 115 | + |
| 116 | +If you need to connect your on-premise infrastructure or other OVHcloud services securely to the Landing Zone, use OVHcloud Connect (OCC). |
| 117 | + |
| 118 | +- Dedicated Layer 2 or Layer 3 link between your site and OVHcloud POPs |
| 119 | +- Bypasses the public internet, ideal for compliance and latency-sensitive apps |
| 120 | +- Integrated into the vRack |
| 121 | + |
| 122 | +See [this documentation](/pages/network/ovhcloud_connect/occ-direct-control-panel). |
| 123 | + |
| 124 | +### 9. Deploy your infrastructure |
| 125 | + |
| 126 | +With networking and security in place, deploy your core services: |
| 127 | + |
| 128 | +- Compute: Public Cloud Instances (GP/CPU/GPU) |
| 129 | +- Containers: Managed Kubernetes Service |
| 130 | +- Storage: |
| 131 | + - Block storage (via volumes) |
| 132 | + - Object Storage (S3<sup>1</sup>-compatible) |
| 133 | + - Public Cloud File Storage (NFSv4) |
| 134 | +- Databases: Managed MongoDB, PostgreSQL, MySQL, Kafka |
| 135 | + |
| 136 | +These services can be managed using the Control Panel, OpenStack CLI, or Terraform. |
| 137 | + |
| 138 | +### 10. Set up Identity and Access Management (IAM) |
| 139 | + |
| 140 | +IAM is essential for defining who can access what and under which conditions. With OVHcloud IAM, you can: |
| 141 | + |
| 142 | +- Create and assign roles and policies per user/group |
| 143 | +- Integrate with SAML, OIDC, or use native IAM |
| 144 | +- Isolate access by project, service, or region |
| 145 | + |
| 146 | +See the [related documentation](/pages/public_cloud/public_cloud_cross_functional/securing_and_structuring_projects). |
| 147 | + |
| 148 | +### 11. Define backup policies |
| 149 | + |
| 150 | +Ensure business continuity by protecting critical data and workloads: |
| 151 | + |
| 152 | +- Snapshots: Ideal for short-term recovery or pre-update backups |
| 153 | +- Instance backups: Full images for rollback or cloning |
| 154 | +- Veeam Enterprise: Available for advanced backup/restore workflows |
| 155 | + |
| 156 | +Define a backup strategy aligned with your RPO (Recovery Point Objective) and RTO (Recovery Time Objective). |
| 157 | + |
| 158 | +### 12. Centralize logging with Logs Data Platform |
| 159 | + |
| 160 | +Logs Data Platform (LDP) allows you to: |
| 161 | + |
| 162 | +- Aggregate logs from apps, systems, and network devices |
| 163 | +- Create dashboards and alerts (Kibana, Grafana-compatible) |
| 164 | +- Retain logs based on compliance needs (GDPR, ISO 27001, etc.) |
| 165 | + |
| 166 | +This is key for observability, security audits, and troubleshooting. Follow [this documentation](/pages/manage_and_operate/observability/logs_data_platform/getting_started_quick_start). |
| 167 | + |
| 168 | +### 13. Implement cost control and monitoring |
| 169 | + |
| 170 | +Keep control of your cloud spending with: |
| 171 | + |
| 172 | +- Budget alerts and consumption dashboards |
| 173 | +- API access to cost usage reports |
| 174 | +- Daily/hourly resource tracking |
| 175 | + |
| 176 | +Use tagging, IAM roles, and alerts to link costs to teams, environments, or services. For more information, read [this documentation](/pages/public_cloud/public_cloud_cross_functional/analyze_billing). |
| 177 | + |
| 178 | +## Go Further |
| 179 | + |
| 180 | +If you need training or technical assistance to implement our solutions, contact your sales representative or click on [this link](/links/professional-services) to get a quote and ask our Professional Services experts for assisting you on your specific use case. |
| 181 | + |
| 182 | +Join our [community of users](/links/community) and visit our [Discord channel](https://discord.gg/ovhcloud). |
| 183 | + |
| 184 | +<sup>1</sup>: S3 is a trademark of Amazon Technologies, Inc. OVHcloud’s service is not sponsored by, endorsed by, or otherwise affiliated with Amazon Technologies, Inc. |
0 commit comments