Skip to content

Commit 5ccc1ee

Browse files
committed
Proofreading + Image addition + Index edition
1 parent bd1a45b commit 5ccc1ee

File tree

4 files changed

+32
-29
lines changed

4 files changed

+32
-29
lines changed

pages/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -605,6 +605,7 @@
605605
+ [Healthcare (HDS) compliance activation](public_cloud/public_cloud_cross_functional/activate-hds-certification)
606606
+ [Migration](public-cloud-cross-functional-migration)
607607
+ [Public Cloud IaaS Migration - Steps and Best Practices](public_cloud/public_cloud_cross_functional/iaas-migration-steps)
608+
+ [Architecture Reference - Building a Landing Zone with OVHcloud Public Cloud](public_cloud/public_cloud_cross_functional/landing_zone_migration)
608609
+ [Tutorials](public-cloud-cross-functional-tutorials)
609610
+ [How to use Terraform](public_cloud/public_cloud_cross_functional/how_to_use_terraform)
610611
+ [Services management](public-cloud-cross-functional-services-management)
Lines changed: 30 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: "Architecture Reference: Building a Landing Zone with OVHcloud Public Cloud"
3-
excerpt: "A practical guide to designing a secure and scalable Landing Zone on OVHcloud Public Cloud, covering networking, IAM, backups, and more."
4-
updated: 2025-06-16
2+
title: "Architecture Reference - Building a Landing Zone with OVHcloud Public Cloud"
3+
excerpt: "A practical guide to design a secure and scalable Landing Zone on OVHcloud Public Cloud, covering networking, IAM, backups, and more."
4+
updated: 2025-07-24
55
---
66

77
## Objective
@@ -10,32 +10,32 @@ This guide helps OVHcloud Public Cloud users design and deploy a secure, scalabl
1010

1111
It covers core networking setup (vRack, subnets, gateways, floating IPs), traffic management (load balancer), and security layers (firewall, WAAP, Bastion).
1212

13-
It also includes guidance on infrastructure choices, IAM, backups, logging, private connectivity, and cost controloffering a clear foundation for production-ready cloud environments.
13+
It also includes guidance on infrastructure choices, IAM, backups, logging, private connectivity, and cost-control, offering a clear foundation for production-ready cloud environments.
1414

1515
## Requirements
1616

1717
- Access to the [OVHcloud Control Panel](/links/manager).
1818
- [Setting OpenStack environment variables](/pages/public_cloud/public_cloud_cross_functional/loading_openstack_environment_variables).
1919
- Being familiar with [Terraform](/pages/public_cloud/public_cloud_cross_functional/how_to_use_terraform), if you intend using it.
20-
- Basic understanding of [cloud networking concepts](/links/public-cloud/network) (e.g., subnets, gateways, floating IPs).
20+
- Basic understanding of [cloud networking concepts](/links/public-cloud/network) (e.g., subnets, gateways, Floating IPs).
2121

2222
## Instructions
2323

2424
To help you design a secure, scalable, and production-ready cloud foundation, the following diagram illustrates the key steps in building a Landing Zone on the OVHcloud Public Cloud:
2525

26-
![Landing zone architecture diagram](images/landing_zone_architecuture.png)
26+
![Landing zone architecture diagram](images/landing_zone_architecture.png){.thumbnail}
2727

28-
Each numbered step corresponds to a component or action in the setup process. Below is a detailed explanation for each:
28+
Each numbered step corresponds to a component or action in the setup process. Below are detailed explanations for each:
2929

30-
0. vRack Setup
30+
### 0. vRack setup
3131

3232
A vRack (Virtual Rack) is the foundational component that allows private networking between resources.
3333

3434
When you create a Public Cloud project, OVHcloud automatically provisions a vRack for you. This virtual layer isolates your internal communication and enables secure interconnections between services (instances, databases, gateways, etc.) across regions and even between different OVHcloud services (Bare Metal, Hosted Private Cloud).
3535

3636
You will use the vRack to attach all private subnets and connect public and private-facing services securely.
3737

38-
1. Create a Private Subnet
38+
### 1. Create a private subnet
3939

4040
Inside the vRack, define private subnets to segment your network. For example, you can have separate subnets for frontend, backend, databases, and bastions.
4141

@@ -45,7 +45,7 @@ Inside the vRack, define private subnets to segment your network. For example, y
4545

4646
Subnet creation is done from the OVHcloud Control Panel, via the OpenStack API, or using Terraform.
4747

48-
2. Set Up a Gateway
48+
### 2. Set up a Gateway
4949

5050
To enable outbound or cross-zone communication for your private subnet, set up a Network Gateway for Public Cloud. It acts as a NAT device to allow traffic from your private subnet to the internet or other public resources.
5151

@@ -55,7 +55,7 @@ To enable outbound or cross-zone communication for your private subnet, set up a
5555

5656
Follow [this guide](/pages/public_cloud/public_cloud_network_services/getting-started-02-create-private-network-gateway) to set up a gateway.
5757

58-
3. Assign Floating IPs
58+
### 3. Assign Floating IPs
5959

6060
A Floating IP is a public IP that you can attach to a resource (usually an instance or load balancer) within a private network.
6161

@@ -65,9 +65,9 @@ Use cases include:
6565
- Public-facing applications hosted inside a private subnet
6666
- Failover and migration between zones
6767

68-
Use floating IPs to expose selected private resources (e.g., instances, services) to the public internet securely. Follow [this guide](/pages/public_cloud/public_cloud_network_services/getting-started-03-attach-floating-ip-to-instance) to link a floating IP.
68+
Use Floating IPs to expose selected private resources (e.g., instances, services) to the public internet securely. Follow [this guide](/pages/public_cloud/public_cloud_network_services/getting-started-03-attach-floating-ip-to-instance) to link a Floating IP.
6969

70-
4. Set Up a Load Balancer
70+
### 4. Set up a Load Balancer
7171

7272
An OVHcloud Load Balancer lets you distribute traffic between multiple backend instances in different availability zones.
7373

@@ -79,17 +79,17 @@ This is essential for creating highly available applications and distributing lo
7979

8080
Follow [this guide](/pages/public_cloud/public_cloud_network_services/getting-started-01-create-lb-service) to set up and use a Load Balancer.
8181

82-
5. Implement Firewall Rules
82+
### 5. Implement firewall rules
8383

8484
Although OVHcloud doesn’t provide a built-in firewall-as-a-service, you can:
8585

8686
- Use Security Groups on each instance (similar to AWS)
8787
- Deploy a third-party virtual firewall like Stormshield in your vRack
8888
- Firewall solutions should inspect north-south (ingress/egress) and east-west (internal) traffic where applicable.
8989

90-
Follow [this guide](/pages/public_cloud/public_cloud_network_services/tutorial-stormshield_network_security_vrack) to set up and use a Stormshield Firewall.
90+
Follow [this guide](/pages/public_cloud/public_cloud_network_services/tutorial-stormshield_network_security_vrack) to set up and use a Stormshield firewall.
9191

92-
6. Add WAAP Protection
92+
### 6. Add WAAP protection
9393

9494
To protect your web and API applications, deploy a Web Application and API Protection (WAAP) service like Ubika.
9595

@@ -99,7 +99,7 @@ To protect your web and API applications, deploy a Web Application and API Prote
9999

100100
Follow [this guide](/pages/public_cloud/public_cloud_network_services/tutorial-ubika_vrack) to deploy a WAAP protection with Ubika.
101101

102-
7. Configure a Bastion Host
102+
### 7. Configure a Bastion Host
103103

104104
A Bastion is a secure access point to manage instances located in private subnets. OVHcloud provides a hardened, audited open-source bastion tool for this purpose.
105105

@@ -111,7 +111,7 @@ Use it to:
111111

112112
See [documentation about Bastion](https://ovh.github.io/the-bastion/index.html){.external} on our GitHub account.
113113

114-
8. Enable Private Connectivity (OCC)
114+
### 8. Enable private connectivity (OCC)
115115

116116
If you need to connect your on-premise infrastructure or other OVHcloud services securely to the Landing Zone, use OVHcloud Connect (OCC).
117117

@@ -121,31 +121,31 @@ If you need to connect your on-premise infrastructure or other OVHcloud services
121121

122122
See [this documentation](/pages/network/ovhcloud_connect/occ-direct-control-panel).
123123

124-
9. Deploy Your Infrastructure
124+
### 9. Deploy your infrastructure
125125

126126
With networking and security in place, deploy your core services:
127127

128128
- Compute: Public Cloud Instances (GP/CPU/GPU)
129129
- Containers: Managed Kubernetes Service
130130
- Storage:
131131
- Block storage (via volumes)
132-
- Object Storage (S3-compatible)
132+
- Object Storage (S3<sup>1</sup>-compatible)
133133
- Public Cloud File Storage (NFSv4)
134134
- Databases: Managed MongoDB, PostgreSQL, MySQL, Kafka
135135

136136
These services can be managed using the Control Panel, OpenStack CLI, or Terraform.
137137

138-
10. Set Up Identity and Access Management (IAM)
138+
### 10. Set up Identity and Access Management (IAM)
139139

140140
IAM is essential for defining who can access what and under which conditions. With OVHcloud IAM, you can:
141141

142142
- Create and assign roles and policies per user/group
143143
- Integrate with SAML, OIDC, or use native IAM
144144
- Isolate access by project, service, or region
145145

146-
See [related documentation](/pages/public_cloud/public_cloud_cross_functional/securing_and_structuring_projects).
146+
See the [related documentation](/pages/public_cloud/public_cloud_cross_functional/securing_and_structuring_projects).
147147

148-
11. Define Backup Policies
148+
### 11. Define backup policies
149149

150150
Ensure business continuity by protecting critical data and workloads:
151151

@@ -155,7 +155,7 @@ Ensure business continuity by protecting critical data and workloads:
155155

156156
Define a backup strategy aligned with your RPO (Recovery Point Objective) and RTO (Recovery Time Objective).
157157

158-
12. Centralize Logging with Logs Data Platform
158+
### 12. Centralize logging with Logs Data Platform
159159

160160
Logs Data Platform (LDP) allows you to:
161161

@@ -165,18 +165,20 @@ Logs Data Platform (LDP) allows you to:
165165

166166
This is key for observability, security audits, and troubleshooting. Follow [this documentation](/pages/manage_and_operate/observability/logs_data_platform/getting_started_quick_start).
167167

168-
13. Implement Cost Control and Monitoring
168+
### 13. Implement cost control and monitoring
169169

170-
Keep control of your cloud spend with:
170+
Keep control of your cloud spending with:
171171

172172
- Budget alerts and consumption dashboards
173173
- API access to cost usage reports
174174
- Daily/hourly resource tracking
175175

176-
Use tagging, IAM roles, and alerts to link costs to teams, environments, or services. To more informations, see [this documentation](/pages/public_cloud/public_cloud_cross_functional/analyze_billing).
176+
Use tagging, IAM roles, and alerts to link costs to teams, environments, or services. For more information, read [this documentation](/pages/public_cloud/public_cloud_cross_functional/analyze_billing).
177177

178178
## Go Further
179179

180180
If you need training or technical assistance to implement our solutions, contact your sales representative or click on [this link](/links/professional-services) to get a quote and ask our Professional Services experts for assisting you on your specific use case.
181181

182-
Join our [community of users](/links/community) and visit our [Discord channel](https://discord.gg/ovhcloud).
182+
Join our [community of users](/links/community) and visit our [Discord channel](https://discord.gg/ovhcloud).
183+
184+
<sup>1</sup>: S3 is a trademark of Amazon Technologies, Inc. OVHcloud’s service is not sponsored by, endorsed by, or otherwise affiliated with Amazon Technologies, Inc.
327 KB
Loading
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
id: 3a894dca-4e73-471a-887f-337ca19a7b10
2-
full_slug: public-cloud-landinz-zone
2+
full_slug: public-cloud-landing-zone

0 commit comments

Comments
 (0)