Infrastructure architecture

Multi-Node & Private Infrastructure Architecture

Recommended VMNexor deployment patterns for multi-node Proxmox hosting infrastructure, including private backend nodes, secure provisioning communication, console relay routing and multi-location scalability.

VMNexor documentation is actively evolving. Some features, wording, and screenshots may change during beta.

Infrastructure-first design

VMNexor is designed around provider-operated infrastructure patterns rather than single-node hobby deployments.

Why infrastructure separation matters

Production VPS platforms commonly separate public-facing services from backend hypervisor infrastructure. This reduces attack surface, improves operational control and allows infrastructure to scale more cleanly over time.

  • Separate customer-facing ingress from backend nodes
  • Reduce direct exposure of hypervisor infrastructure
  • Centralise provisioning and lifecycle automation
  • Support operational growth across multiple locations
  • Improve infrastructure security boundaries

Public ingress vs backend nodes

Many providers operate VMNexor using dedicated frontend systems for customer access while keeping Proxmox hypervisors on private or restricted backend networks.

  • Frontend systems may handle HTTPS, APIs and customer traffic
  • Backend Proxmox nodes may remain private
  • Infrastructure communication can occur over secure private networking
  • Customer access can remain isolated from hypervisor management interfaces

Private networking approaches

VMNexor does not require a specific networking technology. Providers may use whichever infrastructure model matches their operational environment.

  • Private VLANs
  • WireGuard overlays
  • GRE or VXLAN networking
  • Private datacenter networking
  • Dedicated management networks
  • Hybrid multi-location routing

Multi-location deployments

VMNexor is designed around infrastructure-aware provisioning workflows suitable for geographically distributed Proxmox environments.

  • Provision services to specific locations
  • Separate templates by region or node group
  • Apply infrastructure-specific provisioning rules
  • Scale beyond single-node deployments
  • Support regional infrastructure expansion

Shared storage considerations

Providers operating multiple Proxmox nodes commonly standardise template and provisioning workflows across shared storage or replicated environments.

  • Shared template repositories
  • Centralised ISO management
  • Cluster-aware provisioning workflows
  • Consistent template availability
  • Validation of storage accessibility before provisioning

Console relay routing

VMNexor uses relay-based console workflows to avoid exposing raw Proxmox console interfaces directly to customers.

  • Authenticated customer console sessions
  • Controlled console routing
  • Short-lived access handling
  • Controlled console access workflows
  • Reduced exposure of backend infrastructure

Proxmox API communication

VMNexor communicates with Proxmox infrastructure using API-driven automation workflows designed around provider-controlled infrastructure management.

  • Scoped API authentication
  • Infrastructure-aware provisioning actions
  • Lifecycle automation
  • Template management
  • Infrastructure validation workflows

Security boundaries

Infrastructure separation should be combined with operational security controls and production validation procedures.

  • Restrict Proxmox management exposure
  • Protect API credentials
  • Separate customer and infrastructure networks
  • Validate relay security configuration
  • Review firewall and routing rules regularly

Recommended deployment patterns

VMNexor can be adapted to multiple provider environments ranging from small deployments to larger multi-node infrastructure layouts.

  • Single frontend with private backend nodes
  • Multi-location Proxmox clusters
  • Dedicated provisioning environments
  • Separated management infrastructure
  • Infrastructure scaling through additional node groups

Production validation checklist

  • Provisioning works across all intended nodes
  • Console access works through relay infrastructure
  • Templates exist on expected storage
  • API communication works from VMNexor to all nodes
  • Firewall policies match infrastructure design
  • Customer traffic remains separated from backend infrastructure

Related guides