Skip to content

Evidence Slot 4 – Source of Truth & Automation (OC1)

Criteria: Optional Criteria 1 (OC1) – innovation / significant technical contributions.
Scope: NetBox-based source of truth and multi-tool automation (Terraform, Ansible, Nornir) for HybridOps.Studio.
Note (working copy only): [IMG-XX] placeholders will be replaced with final diagrams and screenshots before submission.


1. Summary – NetBox-Driven Source of Truth & Automation Blueprint

This evidence shows how I designed and implemented a NetBox-driven source of truth (SoT) and automation layer for HybridOps.Studio.

The design treats NetBox as the authoritative model for:

  • Sites, racks, devices and interfaces.
  • VLANs, prefixes and IP assignments.
  • Services, roles and tagging for automation intent.

Terraform, Ansible and Nornir then consume this data to drive:

  • Network configuration (for example, pfSense, switches).
  • Infrastructure provisioning (for example, Proxmox, RKE2 nodes).
  • Application placement and connectivity (for example, NetBox itself, observability tools).

This is documented in the Source of Truth & NetBox Automation evidence pack and related ADRs, HOWTOs and runbooks.

[IMG-01 – High-level diagram: NetBox at the centre, feeding Terraform/Ansible/Nornir and infra components – ~8 lines]


2. Problem & Context – From Static Configs to Data-Driven Infra

Without a source of truth, network and infrastructure configuration tends to drift:

  • IP plans live in spreadsheets or people’s heads.
  • Firewall rules are copied around by hand.
  • New nodes are added without a clear view of dependencies.

For HybridOps.Studio to work as a platform blueprint, I needed:

  • A single place where services, addresses and relationships are recorded.
  • A way for automation tools to read that state and apply changes consistently.
  • A pattern that could be adopted by startups and engineering teams who want to escape “spreadsheet networking”.

NetBox provides the data model; the automation stack turns it into real configuration.


3. Implementation – NetBox as the Source of Truth

3.1 Data model in NetBox

In HybridOps.Studio, NetBox is structured to represent:

  • Sites – physical/logical locations (on-prem, cloud region, DR).
  • Racks & devices – Proxmox hosts, pfSense firewalls, switches, RKE2 nodes.
  • Interfaces – mapped to VLANs and IP addresses.
  • Prefixes & IP addresses – for management, workload, observability and edge subnets.
  • Services & roles – used to tag workloads (for example, “db-primary”, “dr-secondary”, “observability”, “edge-service”).

Custom fields and tags are used where needed to encode automation intent (for example, “include-in-dr”, “cost-sensitive”).

[IMG-02 – Screenshot of NetBox view showing a site with devices, interfaces and prefixes – ~6 lines]

3.2 Linking NetBox to automation tools

Automation tools integrate with NetBox via:

  • Terraform – reading from NetBox to derive:
  • Addressing, VLAN assignments and interface parameters.
  • Metadata for instances and network resources.

  • Ansible – using dynamic inventory from NetBox to:

  • Build host groups based on roles (for example, “rke2_controlplane”, “db_primary”, “edge_fw”).
  • Apply playbooks to the right scope.

  • Nornir – for network-specific tasks, using NetBox as the backend inventory.

[ART-01 – Small snippet of Terraform or Ansible code using NetBox data (redacted) – ~6 lines]

This means that when I change something in NetBox:

  • The data model is updated first.
  • Automation then pulls from NetBox and applies changes, rather than making one-off edits directly to devices.

4. Examples of NetBox-Driven Automation

4.1 Provisioning RKE2 nodes and db-01

When provisioning RKE2 nodes and the db-01 PostgreSQL LXC, NetBox provides:

  • The IP ranges for management and workload VLANs.
  • The roles for each node (control-plane, worker, database).
  • The associations to sites and racks.

Terraform and Ansible then use this to:

  • Create Proxmox VMs/LXCs with the correct IPs and VLANs.
  • Install and configure RKE2.
  • Attach db-01 to the right storage and networks.

[IMG-03 – Screenshot/diagram showing NetBox objects for RKE2 nodes and db-01 – ~6 lines]

4.2 Network configuration via SoT

For network devices (for example, pfSense and switches):

  • NetBox holds:
  • VLAN definitions and descriptions.
  • IP addresses for router interfaces.
  • Expected relationships between subnets and services.

Nornir and/or Ansible playbooks then:

  • Generate configuration snippets based on NetBox data.
  • Push those configs to devices in a controlled manner.
  • Optionally record the changes and resulting state in evidence folders.

[IMG-04 – Screenshot of pfSense config view and related NetBox VLAN/prefix entries – ~6 lines]

This keeps the network config tied to an explicit model, not just CLI history.


5. Integration with Evidence, ADRs and Runbooks

5.1 ADRs – SoT & automation decisions

The SoT and automation approach is captured in:

  • ADRs that define:
  • NetBox as the authoritative SoT for network and infra.
  • The split of responsibilities between Terraform, Ansible and Nornir.
  • How SoT is used in DR and cost-aware workflows.

Each ADR links to:

  • Relevant HOWTOs (for example, “Populate NetBox for a new environment”).
  • Runbooks (for example, “Recover from SoT drift or incorrect entries”).
  • Evidence directories with automation logs and artefacts.

[IMG-05 – Screenshot of ADR list filtered for SoT/NetBox/automation – ~6 lines]

5.2 HOWTOs & runbooks

Key supporting documents include:

  • HOWTOs:
  • How to onboard a new environment into NetBox.
  • How to model new services and roles for automation.

  • Runbooks:

  • What to do when NetBox and reality diverge (SoT drift).
  • How to safely correct SoT entries and re-run automation.

This helps turn the SoT design into operational practice, not just a diagram.


6. Innovation & Reusability

The SoT and automation work in HybridOps.Studio is innovative beyond basic “I installed NetBox” in several ways:

  • It treats NetBox as the centre of gravity for network and infrastructure state, with automation tools as consumers of that model.
  • It uses a multi-tool automation stack (Terraform, Ansible, Nornir) that each draw from the same SoT, rather than having separate, conflicting inventories.
  • It ties SoT directly into:
  • Hybrid networking (VLANs, IPsec edges).
  • Platform provisioning (RKE2, db-01, Proxmox).
  • DR and cost-aware workflows (tagging which services are DR-eligible or cost-sensitive).

[IMG-06 – Optional collage: NetBox UI, Terraform/Ansible snippet, infra diagram – ~6 lines]

As a blueprint, it is reusable for:

  • Teams that want to adopt NetBox as a SoT without creating an over-complicated model.
  • Startups that want a pragmatic, automation-friendly SoT for hybrid infrastructure.
  • Teaching labs within HybridOps Academy, where learners can see SoT-driven automation in action.

7. How This Meets Optional Criteria 1 (Innovation)

This evidence supports Optional Criteria 1 by showing that I have:

  • Designed and implemented a NetBox-based source of truth that drives real network and infrastructure automation.
  • Integrated multiple automation tools around a single data model instead of creating fragmented inventories.
  • Documented the approach through evidence packs, ADRs, HOWTOs and runbooks so that other engineers can understand, validate and reuse it as a pattern.

It demonstrates that I can think beyond individual scripts and instead architect and operate a reusable SoT + automation blueprint suitable for modern platform, SRE and networking work.


Context & navigation

For easier cross-referencing, this PDF is mirrored on the HybridOps.Studio documentation portal and linked from the Tech Nation assessors’ guide. The docs site adds navigation only, not new evidence.