Scalable Virtual Network Lab

Mihhail RatovMihhail Ratov
2 min read

Introduction

Building your own virtualised network forces you to learn the hard stuff—routing, high availability kubernetes cluster, monitoring—without waiting for budget sign-off. I spent 358 hours on a diploma project to prove it. Here’s the what-and-why before we dive into the how.

1. The pain points with traditional monoliths

  • Tight coupling, ugly scaling, vendor lock-in.

  • Real-world risk: one box dies, everything dies. (Ask me about that server that fell over at 2 AM.)

2. Design restrictions I set myself

RestrictionsHow I met it
Budget ≈ €0100 % FOSS stack (pfSense, K3S, Zabbix, Ubuntu Landscape).
Must survive node loss3-node control plane + HAProxy VRRP fail-over.
Must be observableZabbix

3. Planning & risk snapshot

  • 358 h total effort split across research, build, test and writing.

  • Biggest risk: rookie mistakes + lab hardware dying. Mitigated via snapshots and lots of caffeine.

4. High-level architecture

  • pfSense firewall/IDS on the edge.

  • VMware layer hosting ten VMs (firewall, repo, GUI, 2×Load Balancer, 3×control-plane, 2×worker node).

  • K3S cluster inside a flat LAN, fronted by HAProxy virtual IP.

  • Zabbix server in DMZ.

5. What’s next

Part 2 drops next week—full VM build script and pfSense rule-set.

Call to action: Have you built something similar? Drop a comment or DM me on LinkedIn.

0
Subscribe to my newsletter

Read articles from Mihhail Ratov directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Mihhail Ratov
Mihhail Ratov

IT Specialist who is gathering knowledge of System and Network Administration through homelabs, in order to succeed professionally. ☑️ Ideas for projects are self invented and knowledge gained through documentations, youtube, researches and mistakes. ☑️ Eager for new technologies. ☑️ Self-motivated and never complain. Looking for role as IT SysAdim or IT Network Administrator.