Table of Contents

Reverse Proxy VM (NGINX)

This virtual machine is the gateway of the Trash Panda ecosystem. It manages external access to internal services, handles SSL termination, and enforces secure routing policies. While it is internet-facing, its sole function is to run a reverse proxy and manage certificates. Proper VM design ensures reliable access and minimal exposure risk.

This page covers only the VM setup and deployment. NGINX configuration, CERTBOT setup, and site routing are covered in their own guide.

Role of This VM in the Ecosystem

The Reverse Proxy VM:

By isolating this service into a dedicated VM, we:

This VM should operate quietly and securely mediate traffic between the internet and internal services.

Base Operating System

Ubuntu LTS provides:

This VM should run headless and be administered via SSH.

Virtual Hardware Allocation

Memory (RAM)

Why 2 GB?

Avoid memory overcommit to maintain responsiveness for web requests.

CPU Allocation

Traffic handling is:

Two vCPUs provide sufficient parallelism for proxy and certificate tasks.

Storage Allocation

This storage is used for:

No media or user data is stored here. This VM’s sole purpose is proxying and certificate management.

Network Configuration

This VM requires one network interface, optimized for controlled exposure.

NIC 1 — DMZ VLAN

Purpose:

Characteristics:

Placing the VM in the DMZ ensures:

VMware Workstation Pro Configuration Notes

Assuming VMware Workstation Pro 17:

Do not connect this VM to the Primary LAN VLAN.

Design Philosophy Recap

This VM is designed to be:

If it ever fails, you should be able to:
1. Recreate the VM
2. Restore NGINX configuration and SSL certificates
3. Resume secure proxy operations

No irreplaceable data should live on the VM itself.

What Comes Next

Once the VM is deployed and reachable:

Each of these topics is covered in their respective guides.

A well-configured Reverse Proxy VM keeps services accessible and secure without fuss.