🖥️ Roadmap IT Systems Engineer / Infrastructure Administrator — Bare-Metal On-Prem

> Filosofi: Jangan hanya “install” — kamu harus bisa “operate.” Bedanya besar: install Proxmox itu 30 menit, tapi operate 4-node cluster dengan ZFS, Corosync quorum, dan PBS restore verification itu skill yang ditanya waktu interview. Rekruter akan tanya: “Oke, node 3 down, apa yang terjadi dengan VM di node 1 dan 2?” Kalau kamu jawab: “Corosync tetap quorum karena 3 dari 4 node hidup, VM HA failover ke node healthy berdasarkan resource score, dan PBS restore saya verifikasi mingguan dengan automated test restore ke isolated VM” — itu yang menutup pertanyaan.


🎯 Checkpoint Awal — Sebelum Mulai

  • Stack: Proxmox VE 8 (single-node atau nested) → Ubuntu 24.04 VMs
  • Jalur: IT Systems Engineer / Infrastructure Administrator (On-Prem)
  • Spek: i7 Gen7, 8GB RAM, GTX 1050 (⚠️ Upgrade ke 32GB+ RAM sangat direkomendasikan)
  • Target Karir: Systems Engineer → Infrastructure Lead → Platform Engineer

Homelab Strategy untuk 8GB RAM:

  • Fase 1-2: Single-node Proxmox, ZFS compression=lz4, 2-3 VM saja, swap di ZVOL
  • Fase 3-4: Nested virtualization matikan, jalankan service native di VM minimal (1GB each)
  • Fase 5-6: Cloud VPS trial / low-cost ($20/bulan) untuk komponen RAM-heavy (Wazuh, Vault HA)
  • Prioritas: Belajar konfigurasi & operasi, bukan scale-out horizontal

Urutan belajar:

  • Fase 1 (foundation): Proxmox + Ubuntu golden image + Ansible base
  • Fase 2 (network): pfSense + Unbound/chrony + Cloudflare edge
  • Fase 3 (trust): EJBCA + step-ca + HashiCorp Vault + OIDC
  • Fase 4 (resilience): HAProxy + Keepalived + Patroni/etcd + Redis Sentinel
  • Fase 5 (observe): Prometheus/Grafana/Alertmanager + Wazuh + Vector + OpenVAS
  • Fase 6 (operate): Docker/Compose + MinIO + RabbitMQ + IaC maturity + compliance

Next step: Install Proxmox VE 8 di bare metal atau nested, buat VM template Ubuntu 24.04, aktifkan ZFS dengan compression, siapkan Ansible control node

Aturan Emas

Satu layer dulu. Selesaikan sampai bisa failover, restore, atau rebuild tanpa dokumentasi, baru loncat ke layer berikutnya. Infrastructure adalah tumpukan kartu — fondasi goyang, semua runtuh.


Fase 1 — Virtualization & OS Foundation (Minggu 1–4)

Goal: Kuasai hypervisor, buat golden image yang reproducible, dan otomasi provisioning dasar. RAM Impact: Proxmox host ~2GB, 2-3 VM @ 1GB each. Total aman untuk 8GB.

Tool/StackRAMYang DipelajariCombo A+B yang Membuktikan
Proxmox VE 8Host ~2GBCluster Corosync, ZFS tuning (compression, recordsize, atime=off), cloud-init template lifecycle, qm CLI, PBS datastore + GCM-256 encryptionProxmox + automated cloud-init deploy = kamu bisa spin VM dari template dalam 60 detik tanpa GUI
Ubuntu 24.04 Golden Image~1GBsystemd hardening, CIS L1 (SSH, fail2ban, auditd, AppArmor, sysctl, UFW, unattended-upgrades), ZFS on root, TLS/PKI trust storeGolden Image + CIS benchmark remediation = kamu punya VM template siap audit
AnsibleControl node ~512MBInventory design, group_vars, roles: base-hardening, node-exporter, chrony, wazuh-agent, UFW, step-clientAnsible + idempotent site playbook = kamu bisa rebuild 10 VM identik dalam 1 command
Terraform~256MBtelmate Proxmox provider, reusable VM modules, cloud-init user-data, state managementTerraform + Ansible provisioner = kamu punya VM lifecycle end-to-end (create → configure)

Cara Belajar Fase 1

Build Proxmox di bare metal. Buat 1 VM “Ansible control node,” 1 VM “web-server-test.” Tulis playbook site.yml yang hardening VM, install node_exporter, register ke NTP. Hapus VM web-server, recreate via Terraform + Ansible. Ulangi sampai tidak perlu buka dokumentasi.

Proyek Portofolio Fase 1: Bare-Metal Proxmox Homelab + CIS-Hardened Ubuntu Template — dokumentasi lengkap: skema ZFS pool, cloud-init template build script, Ansible role tree, Terraform module source. Sertakan terraform plan output dan hasil lynis audit before/after hardening.


Fase 2 — Networking & Edge Foundation (Minggu 5–8)

Goal: Pahami traffic flow antar tenant, bangun perimeter defense, dan kuasai DNS/NTP sebagai backbone. RAM Impact: pfSense VM ~2GB, 3-4 Ubuntu VM client @ 512MB. Total ~5GB.

Tool/StackRAMYang DipelajariCombo A+B yang Membuktikan
pfSense~2GBVLAN creation (210-215, 220/470-473), interface assignment, firewall rule matrix antar-VLAN, NAT outbound, DHCP static mapping, Wazuh syslog forwarding, pfBlockerNG, config backup + git versioningpfSense + documented rule matrix spreadsheet = kamu bisa justify setiap allow/deny ke auditor
Unbound DNS~128MBSplit-horizon zones, DNSSEC validation, local overrides, forwarder configurationUnbound + per-tenant zone isolation = kamu paham internal name resolution multi-tenant
chrony NTP~64MBStratum configuration, peer synchronization, leap-second handlingchrony + Proxmox + VM sync = kamu eliminasi clock drift di cluster
Tailscale~128MBSubnet route advertising, ACL policies, exit node, MagicDNSTailscale + pfSense integration = kamu punya VPN overlay tanpa buka port inbound
CloudflareN/A (edge)Zero Trust Tunnel (cloudflared on DMZ), WAF custom rules, Access policies (OIDC), Origin CA, rate limiting, admin panel isolation 4-layerCloudflare + Origin CA + mTLS planning = kamu paham zero-trust edge architecture

RAM Management

Matikan VM Fase 1 yang tidak dipakai. pfSense butuh dedicated 2GB untuk VLAN routing simulation. Gunakan managed switch atau VLAN tagging di NIC untuk test fisik.

Proyek Portofolio Fase 2: Multi-Tenant Network Foundation + Cloudflare Edge — diagram jaringan (VLAN 210-215, 220/470-473), pfSense rule matrix Excel/CSV, Cloudflare Access policy YAML, admin panel isolation test report (4 layer verification), Unbound zone config.


Fase 3 — PKI, Identity & Secrets (Minggu 9–12)

Goal: Bangun trust fabric. Tanpa PKI yang benar, semua TLS adalah teater. RAM Impact: EJBCA ~1.5GB, step-ca ~512MB, Vault ~512MB. Jalankan bergantian jika RAM 8GB.

Tool/StackRAMYang DipelajariCombo A+B yang Membuktikan
EJBCA Community~1.5GBOffline Root CA build, key generation ceremony, CRL publication schedule, certificate profiles, CA hierarchy designEJBCA + ceremony runbook = kamu bisa buat Root CA yang air-gapped dan auditable
step-ca~512MBPer-spoke intermediate CAs, ACME provisioners, policy-based issuance (name constraints), systemd auto-renewal, client bootstrapstep-ca + ACME for 43 profiles = kamu otomasi sertifikat tanpa manual CSR
HashiCorp Vault~512MBRaft storage, transit auto-unseal, KV v2 secrets engine, AppRole auth, OIDC integration, Vault Agent template injection, audit loggingVault + AppRole + Agent = aplikasi kamu bisa baca secret tanpa hardcode token
Google Workspace OIDCN/ASSO configuration, group mapping, SAML vs OIDC, admin console setupGoogle Workspace + Grafana/Proxmox/Vault = single sign-on untuk semua admin tools

Trik PKI

Dokumentasikan setiap command saat EJBCA install. Screenshot setiap dialog. Root CA private key hanya dibuat sekali — kalau hilang, rebuild dari nol. Ini bukan latihan, ini produksi.

Proyek Portofolio Fase 3: Enterprise PKI + Secrets Management Stack — CA hierarchy diagram (Root → Intermediate → Leaf), Vault architecture doc, auto-renewal systemd timer config, trust store distribution script, OIDC integration screenshot, Vault Agent template example.


Fase 4 — High Availability & Data Layer (Minggu 13–16)

Goal: Eliminate single point of failure. RPO = 0 bukan jargon, itu angka yang harus kamu buktikan. RAM Impact: Patroni+etcd ~2GB, Redis Sentinel ~1GB, HAProxy+Keepalived ~512MB. Total berat, jalankan di cloud VPS jika perlu.

Tool/StackRAMYang DipelajariCombo A+B yang Membuktikan
HAProxy + Keepalived~512MBFrontend/backend design, ACLs, health checks (http/tcp), VRRP VIP failover, stickiness, SSL terminationHAProxy + Keepalived = traffic tidak putus meski 1 load balancer mati
Patroni + etcd~2GBPostgres HA cluster bootstrap, synchronous replication (RPO=0), failover trigger, REST API health, timeline managementPatroni + documented failover test = kamu bisa recover dari primary failure dalam <30 detik
Redis Sentinel~1GBPrimary/replica setup, 3-node Sentinel quorum, automatic failover, client reconfigurationRedis + Sentinel + TLS = session/cache layer yang survive node loss
PgBouncer~256MBConnection pooling, transaction mode vs session mode, per-tenant auth, max_client_conn tuningPgBouncer + Patroni = kamu scale connection tanya overload Postgres
RabbitMQ~512MBCluster formation, vhost per tenant, queue mirroring, management UI, Prometheus plugin, TLS inter-nodeRabbitMQ + per-tenant vhost ACL = messaging layer yang isolated dan observable

Critical

Failover test harus terdokumentasi. Buat skenario: “Matikan primary Postgres” → catat RTO/RPO. “Matikan HAProxy master” → catat VIP migration time. Tanpa dokumentasi, itu hanya install.

Proyek Portofolio Fase 4: HA Stack with Failover Certification — architecture diagram, failover test matrix (skenario × expected result × actual result × RTO), DR runbook, Patroni failover log screenshot, Redis Sentinel SENTINEL get-master-addr-by-name output.


Fase 5 — Observability & Security Operations (Minggu 17–20)

Goal: Kalau kamu tidak melihatnya, kamu tidak mengelolanya. Security tanpa log adalah mitos. RAM Impact: Wazuh ~3GB, Prometheus/Grafana ~1GB, OpenVAS ~1.5GB. Jalankan bergantian. Gunakan VPS untuk Wazuh AIO.

Tool/StackRAMYang DipelajariCombo A+B yang Membuktikan
Prometheus + Grafana + Alertmanager~1GBScrape config (static_file + file_sd), 14+ alerting rules, 30-day retention (Thanos/Cortex konsep), dashboard import + custom panels, routing tree ke Slack/emailPrometheus + Alertmanager routing = alert P1 ke on-call, P3 ke email digest
Vector~256MBDual sink architecture (Wazuh + Loki), tenant-tagged structured logs, transform/filter, source scraping dari file/journaldVector + structured JSON logs = kamu bisa korelasikan event antar tenant
Exporters~128MB eachnode_exporter, postgres_exporter, redis_exporter, haproxy_exporter, blackbox_exporter, patroni_exporterExporters + Grafana dashboard = visibility full-stack dari hardware ke aplikasi
Wazuh SIEM~3GBAll-in-one deploy, agent registration (group-based), custom detection rules (decoder + rules XML), active response (firewall-drop, custom script), MITRE ATT&CK mappingWazuh + custom rule + TheHive case = SOC pipeline dari deteksi sampai investigasi
OpenVAS/Greenbone~1.5GBAuthenticated scan setup, target configuration, CVSS-based triage, remediation SLA tracking, scheduled scanOpenVAS + remediation report = kamu bisa buktiin vulnerability management program

Wazuh di RAM Terbatas

Deploy Wazuh single-node dengan docker-compose, limit Elasticsearch: ES_JAVA_OPTS=-Xms1g -Xmx1g. Atau gunakan cloud VPS $20/bulan khusus untuk Wazuh manager.

Proyek Portofolio Fase 5: SOC-in-a-Box: SIEM + Observability + Vuln Management — Grafana dashboard JSON, Wazuh custom rule XML, Vector config TOML, OpenVAS scan report dengan CVSS triage table, incident response playbook (P1: 15-min acknowledge / 4-hour resolve).


Fase 6 — Application Infra, IaC Maturity & Compliance (Minggu 21–24)

Goal: Operasionalisasi. Phase 1 adalah build, Phase 2 adalah own. Fase ini menyiapkanmu untuk own. RAM Impact: Docker services ~2GB, Ansible/Terraform local. Total tergantung jumlah container.

Tool/StackRAMYang DipelajariCombo A+B yang Membuktikan
Docker / docker-compose~2GBImage registry operation (push/pull/tag), multi-stage build konsep, compose file v3, network isolation, volume management, secrets di compose (bukan hardcode)Docker + Vault Agent = container baca secret dari file yang di-inject Vault
MinIO S3~512MBBucket setup, bucket policy, TLS, lifecycle policy (transition/expiry), Prometheus integration, erasure coding konsepMinIO + tenant-isolated bucket = storage backend yang scalable dan compliant
Ansible AdvancedControl nodesite/harden/deploy/patch playbooks, tag-based execution (--tags patch), rolling update strategy, vault-encrypted vars, dynamic inventoryAnsible + patch playbook = monthly patch cycle terotomasi dan terdokumentasi
Terraform AdvancedLocalRemote state (S3/MinIO backend), workspace per tenant, module versioning, terraform plan di CITerraform + GitHub Actions = infrastructure change review sebelum apply
Git + CI/CDN/ARepository strategy (monorepo vs polyrepo), pfSense XML git versioning, GitHub Actions workflow: lint → plan → approve → applyGit + Terraform Cloud/Actions = IaC dengan approval gate dan audit trail
ComplianceN/ASOC 2 evidence collection, GDPR/CCPA control mapping (Stage 10 framework), change management log, access review, backup verification evidenceCompliance + automated evidence = kamu bisa jawab auditor tanpa panic gathering

Proyek Portofolio Fase 6: End-to-End Tenant Deploy via IaC + Compliance Evidence Pack — repo structure screenshot, GitHub Actions workflow YAML, ansible-playbook site.yml --check output, patch cycle SOP document, SOC 2 evidence sample (access review log, backup verification log, change ticket).


Roadmap Visual — Timeline 6 Bulan

Bulan 1Bulan 2Bulan 3Bulan 4Bulan 5Bulan 6
FASE 1
Virtualization
FASE 2
Network & Edge
FASE 3
PKI & Identity
FASE 4
HA & Data
FASE 5
Observability
FASE 6
Ops & Compliance
ProxmoxpfSenseEJBCAHAProxyWazuhDocker
UbuntuUnboundstep-caPatroniProm/GrafMinIO
AnsibleCloudflareVaultRedisVectorRabbitMQ
TerraformTailscaleOIDCPgBouncerOpenVASIaC + Compliance
Golden ImageVLAN MatrixPKI CeremonyRabbitMQ FailoverExporter SOC SimCI/CD
Portfolio 1:Portfolio 2:Portfolio 3:Portfolio 4:Portfolio 5:Portfolio 6:
Proxmox Homelab
+ CIS Image
Network Foundation
+ Edge
PKI Stack + Vault
+ Secrets
HA Failover
+ DR Runbook
+ Data Layer
SOC-in-a-Box
+ Observ
+ Vuln Mgmt
Tenant Deploy
+ Compliance
+ IaC Repo

Sertifikasi yang Cocok per Fase

FaseSertifikasiKenapa
Setelah Fase 1CompTIA Server+ atau LPI Linux EssentialsValidasi fondasi Linux & virtualization
Setelah Fase 2CompTIA Network+VLAN, DNS, NAT, firewall — fondasi networking on-prem
Setelah Fase 3HashiCorp Vault Associate + EJBCA training (unofficial)PKI dan secrets management adalah differentiator
Setelah Fase 4Linux Foundation Certified Sysadmin (LFCS)HA clustering dan troubleshooting Linux
Setelah Fase 5CompTIA CySA+ atau Blue Team Level 1 (BTL1)SOC analyst skill untuk Wazuh + IR
Setelah Fase 6Terraform Associate + Ansible AutomationIaC dan automation adalah core Phase 2
Jangka panjangGIAC GCIA atau RHCEGold standard untuk infrastructure dan security operations

Yang TIDAK Perlu Dipelajari Sekarang

Jangan Buang Waktu

  • AWS/Azure/GCP managed services — role ini eksplisit bare-metal on-prem, tidak ada cloud underneath
  • Kubernetes (K8s) — tidak disebutkan di stack; mereka pakai Docker Compose untuk container orchestration
  • Red Team tools (Metasploit, Burp Suite, Kali Linux) — ini infrastructure defense & operations, bukan penetration testing
  • Application development (React, Node.js, Python web frameworks) — kamu operate infrastructure, bukan write application code
  • Windows Server / Active Directory — identity pakai Google Workspace OIDC, tidak ada AD domain
  • Entry-level helpdesk skills (ticketing, desktop support) — role ini expert-level build-from-scratch, bukan Tier-1 support
  • CISSP — butuh 5 tahun experience, bukan untuk target Phase 1 build

đź”— Lihat Juga


Roadmap IT Systems Engineer | Fase 1 (Virtualization) → Fase 6 (Ops Maturity) · 6 Bulan Homelab · Bare-Metal On-Prem Focus