this deploys a new project in an Org with one pfsense as VPN Gateway.
Find a file
2025-08-11 09:50:40 +00:00
project remove org id and update readme 2025-07-07 08:55:58 +00:00
.gitignore initial setup -- needs to be changed 2025-05-26 16:32:15 +02:00
00-provider.tf initial setup -- needs to be changed 2025-05-26 16:28:32 +02:00
01-network.tf remove prefix_length 2025-08-11 08:20:21 +00:00
02-pfSense-image.tf add depends on 2025-06-03 05:44:54 +00:00
03-pfSense-appliance.tf add depends on 2025-06-03 05:44:54 +00:00
04-attachment.tf add depends on 2025-06-03 05:44:54 +00:00
05-server.tf rename commvault to backup 2025-07-07 08:41:55 +00:00
06-security-group.tf add security rule for ssh and change project for object storage 2025-06-02 13:42:51 +00:00
07-object-storage.tf add security rule for ssh and change project for object storage 2025-06-02 13:42:51 +00:00
08-ske.tf add cidr for ske creation 2025-08-11 09:48:22 +00:00
80-keypair.tf change path for pubkey 2025-06-02 12:45:56 +00:00
99-variables.tf remove org id and update readme 2025-07-07 08:55:58 +00:00
README.md add readme 2025-08-11 09:50:40 +00:00

🌐 Infrastructure Deployment: Landing Zone, Core, Backup and SKE

This repository contains Terraform code to deploy the following infrastructure projects:


📦 Projects Overview

1. Landing Zone

  • Deploys a single pfSense VM as the central firewall/router.
  • Acts as the entry point for the environment.
  • Configures WAN and multiple LAN networks:
    • wan_network: 10.220.0.0/24
    • lan_network1: 10.220.1.0/24
    • lan_network2: 10.220.2.0/24
    • lan_network3: 10.220.3.0/24 (non-routed)
  • Interfaces:
    • WAN interface with static IP 10.220.0.254
    • LAN13 interfaces, each connected to corresponding networks

2. Core

  • Deploys a single Virtual Machine (VM) for core services or testing purposes.
  • Network setup includes:
    • p2_lan_network: 10.220.5.0/24 (routed)
    • p2_wan_network: 10.220.6.0/24 (routed)
  • Interfaces:
    • LAN interface with attached security group
    • WAN interface without additional security

3. Backup

  • Used for backup and disaster recovery scenarios.
  • Creates an Object Storage Bucket.
  • Relevant access credentials are provisioned for use with other services.

4. SKE

  • Deploys a managed SKE (STACKIT Kubernetes Engine) cluster.
    • ske_network: 10.220.10.0/24

🚀 Getting Started

Prerequisites

  • Terraform ≥ 1.3
  • Valid STACKIT credentials
  • Access to STACKIT APIs (IaaS, Kubernetes, Object Storage)

Deployment Steps

  1. Clone this repository:

    git clone https://professional-service.git.onstackit.cloud/professional-service-best-practices/landingzone.git
    cd <repo-name>
    
  2. Initialize Terraform:

    terraform init
    
  3. Review and adjust variables if needed:

    99-variables.tf
    set organization id (also in project module)
    touch pfsense.qcow2
    
  4. Plan and apply the configuration:

    terraform apply
    

🔐 Output

The deployment will output:

  • VM IP addresses
  • Kubernetes cluster information (kubeconfig)
  • Object Storage credentials (access/secret key)

🔒 Make sure to store credentials securely and never commit them to version control.


📝 Notes

  • This setup is optimized for a test or POC environment.
  • pfSense must be manually configured after deployment. (User: admin, Passwort: STACKIT123!)
  • Kubernetes workloads are not included in this deployment but can be added later.
  • LVM striping (RAID0) can be used for temporary IOPS/performance improvement — but requires attention to backups.

⚠️ Limitations

  • The infrastructure is not auto-scaled or HA-enabled by default.
  • No automated DNS or certificate management is configured.
  • lan_network3 is non-routed and might require manual routing adjustments if used.

📬 Support

For issues, please create a Ticket or contact professional-service@stackit.cloud


Author: Michael Sodan
License: MIT