This virtual machine is the gateway of the Trash Panda ecosystem. It manages external access to internal services, handles SSL termination, and enforces secure routing policies. While it is internet-facing, its sole function is to run a reverse proxy and manage certificates. Proper VM design ensures reliable access and minimal exposure risk.
This page covers only the VM setup and deployment. NGINX configuration, CERTBOT setup, and site routing are covered in their own guide.
The Reverse Proxy VM:
By isolating this service into a dedicated VM, we:
This VM should operate quietly and securely mediate traffic between the internet and internal services.
Ubuntu LTS provides:
This VM should run headless and be administered via SSH.
Why 2 GB?
Avoid memory overcommit to maintain responsiveness for web requests.
Traffic handling is:
Two vCPUs provide sufficient parallelism for proxy and certificate tasks.
This storage is used for:
No media or user data is stored here. This VM’s sole purpose is proxying and certificate management.
This VM requires one network interface, optimized for controlled exposure.
Purpose:
Characteristics:
Placing the VM in the DMZ ensures:
Assuming VMware Workstation Pro 17:
Do not connect this VM to the Primary LAN VLAN.
This VM is designed to be:
If it ever fails, you should be able to:
1. Recreate the VM
2. Restore NGINX configuration and SSL certificates
3. Resume secure proxy operations
No irreplaceable data should live on the VM itself.
Once the VM is deployed and reachable:
Each of these topics is covered in their respective guides.
A well-configured Reverse Proxy VM keeps services accessible and secure without fuss.