Prototyping Enterprise Infrastructure in Proxmox: 11+ VMs, 8 VLANs, and Ansible Automation

Published: (January 4, 2026 at 12:53 PM EST)
2 min read
Source: Dev.to

Source: Dev.to

Why Test in VMs First?

  • Network misconfigurations caught in VLANs before buying physical switches.
  • Resource constraints identified before ordering hardware.
  • Backup failures discovered during testing instead of during a disaster.
  • Automation issues debugged in isolated environments.
  • Disaster‑recovery drills practiced without real outages.

VLAN Design

VLANSubnetPurpose
10.0.100.0/24Management & monitoring
10.0.110.0/24Base infrastructure servers
10.0.120.0/24Application servers
10.0.130.0/24General workstations
10.0.131.0/24Manager workstations
10.0.132.0/24IT workstations
10.0.140.0/24Guest Wi‑Fi & IoT
10.0.150.0/24Public‑facing services

All inter‑VLAN routing is handled by an OPNSense VM, allowing me to test firewall rules, routing policies, and network segmentation before moving to physical hardware.

Authentication & Access Control

  • PAM admin – SSH access + web UI (root disabled).
  • PVE users – Limited permissions, no shell access.
  • Ansible user – API‑only access for automation.

Pro tip: Stop the web UI when not in use

# Stop the web UI
systemctl stop pveproxy

# Restart it when needed
systemctl start pveproxy

Resource Pools (Not Tags)

I previously misused resource pools as tags. They are actually for delegation and access control:

  • smb-servers – Core infrastructure
  • smb-workstations – Desktop/Laptop VMs
  • smb-project-admin@pve – Full access across pools
  • smb-admin@pve – Server pool only

Backup Strategy

Local (10 TB)

  • 7 daily backups
  • 4 weekly backups
  • 2 monthly backups

External (4 TB)

  • 1 daily backup
  • 2 weekly backups
  • 1 monthly backup

I regularly test restore procedures; backups are worthless if never validated.

Ansible‑Driven Infrastructure as Code

The Ansible user with Proxmox API access enables:

  • VM provisioning from templates
  • Network configuration (VLAN assignments)
  • Resource management
  • Backup scheduling

All configurations are stored in GitHub, allowing a full destroy‑and‑rebuild from source.

“For a homelab? Yes. For learning? Absolutely not.” – Over‑engineering in the lab teaches enterprise concepts (VLANs, RBAC, disaster recovery, automation) without production risk. When something breaks, fixing it builds real‑world troubleshooting skills.

Hardware Platform

Dual‑socket Lenovo D20 (24 cores)

  • CPU host passthrough for VMs
  • Memory ballooning across VMs
  • Initial allocation: 4 GB for servers, 8 GB for workstations

Documentation Roadmap (3–6 months)

  1. SMB infrastructure planning
  2. Ansible automation setup
  3. Samba Active Directory deployment
  4. File and print services
  5. Linux workstation configuration
  6. SELinux hardening
  7. Monitoring and backup automation

Further Reading

Tags: #virtualization #infrastructure #linux #devops #networking #ansible

Back to Blog

Related posts

Read more »