Proxmox: Difference between revisions

From Omnia
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
== Subpages ==
{{subpages}}
{{subpages}}


Line 6: Line 8:


  pveversion --verbose
  pveversion --verbose
== Virtualization Management ==
Virtual Machines vs Containers
Proxmox can create and manage both fully-fledged Virtual Machines (VMs) and light-weight Linux Containers (LCX).
=== VM Managemnet ===
qm - QEMU/KVM Virtual Machine Manager
List VMs:
qm list
Stop VM:
qm stop [VMID]
Start VM:
qm start [VMID]
=== LCX Container Management ===
pct - Tool to manage Linux Containers (LXC) on Proxmox VE
List Containers:
pct list
Stop Container:
pct stop [VMID]
Start Container:
pct start [VMID]


== NFS in Container ==
== NFS in Container ==

Revision as of 22:41, 2 August 2024

Subpages

Subpage Table of Contents


Get Version from Command Line

pveversion
pveversion --verbose

Virtualization Management

Virtual Machines vs Containers

Proxmox can create and manage both fully-fledged Virtual Machines (VMs) and light-weight Linux Containers (LCX).

VM Managemnet

qm - QEMU/KVM Virtual Machine Manager

List VMs:

qm list

Stop VM:

qm stop [VMID]

Start VM:

qm start [VMID]

LCX Container Management

pct - Tool to manage Linux Containers (LXC) on Proxmox VE

List Containers:

pct list

Stop Container:

pct stop [VMID]

Start Container:

pct start [VMID]

NFS in Container

Mark "NFS" in features, but first it will need to be a "Privileged" container.

PDEvmuJ.png

To convert to Priveleged, simply run a backup, then restore and mark the "priveleged" checkbox. Pretty easy.

4MQUFLm.png

---


NFS requires extra permissions to run in a Container (CT), which uses LXC.

Deselect "Unprivileged container", and add the Features "mount=nfs"

# mount 192.168.108.30:/nfs/ken /mnt
mount.nfs: access denied by server while mounting 192.168.108.30:/nfs/ken

When trying to add the "mount=nfs" feature:

Permission check failed (changing feature flags for privileged container is only allowed for root@pam) (403)

Login as root and:

pct set 112 -features mount=nfs
# pct set 112 -features mount=nfs --save  # is this needed?


ref [1] [2]

---

List Data Stores

List data stores and status:

pvesm status

Free Subscription Repositories

  1. Disable ceph Enterprise
  2. Disable pve-enterprise
  3. Add pve-no-subscription repo - deb http://download.proxmox.com/debian/pve bookworm pve-no-subscription

/etc/apt/sources.list :

deb http://ftp.us.debian.org/debian bookworm main contrib

deb http://ftp.us.debian.org/debian bookworm-updates main contrib

# security updates
deb http://security.debian.org bookworm-security main contrib

deb http://download.proxmox.com/debian/pve bookworm pve-no-subscription

/etc/apt/sources.list.d/ceph.list :

# deb https://enterprise.proxmox.com/debian/ceph-quincy bookworm enterprise

/etc/apt/sources.list.d/pve-enterprise.list :

# deb https://enterprise.proxmox.com/debian/pve bookworm pve-enterprise

Note: this can be configured from the web interface too.

5zaSWgz.png

Install sudo

apt update
apt install sudo

LXC - Linux Containers

To use the LC options you first need to download a LC template.

First update the list:

pveam update

Note: The list of available templates is updated daily through the pve-daily-update timer

To list images:

pveam available

To list only system images:

pveam available --section system

Example:

root@proxmox1:~# pveam available --section system
system          almalinux-9-default_20221108_amd64.tar.xz
system          alpine-3.18-default_20230607_amd64.tar.xz
system          archlinux-base_20230608-1_amd64.tar.zst
system          centos-9-stream-default_20221109_amd64.tar.xz
system          debian-11-standard_11.7-1_amd64.tar.zst
system          debian-12-standard_12.2-1_amd64.tar.zst
system          devuan-4.0-standard_4.0_amd64.tar.gz
system          fedora-38-default_20230607_amd64.tar.xz
system          fedora-39-default_20231118_amd64.tar.xz
system          gentoo-current-openrc_20231009_amd64.tar.xz
system          opensuse-15.4-default_20221109_amd64.tar.xz
system          opensuse-15.5-default_20231118_amd64.tar.xz
system          rockylinux-9-default_20221109_amd64.tar.xz
system          ubuntu-20.04-standard_20.04-1_amd64.tar.gz
system          ubuntu-22.04-standard_22.04-1_amd64.tar.zst
system          ubuntu-23.04-standard_23.04-1_amd64.tar.zst
system          ubuntu-23.10-standard_23.10-1_amd64.tar.zst

Download to data store:

pveam download mydatastore ubuntu-22.04-standard_22.04-1_amd64.tar.zst

List images on data store:

pveam list mydatastore
# example
NAME                                                                 SIZE
mydatastore:vztmpl/ubuntu-22.04-standard_22.04-1_amd64.tar.zst       123.81MB

To remove:

pveam remove mydatastore:vztmpl/ubuntu-22.04-standard_22.04-1_amd64.tar.zst

See https://pve.proxmox.com/wiki/Linux_Container

Upgrade Proxmox 7 to Proxmox 8

Upgrade from 7 to 8 - Proxmox VE
https://pve.proxmox.com/wiki/Upgrade_from_7_to_8

Update to latest v7:

apt update
apt dist-upgrade

Checks:

pve7to8

All checks:

pve7to8 --full

Switch to Bookworm:

sed -i 's/bullseye/bookworm/g' /etc/apt/sources.list
sed -i 's/bullseye/bookworm/g' /etc/apt/sources.list.d/*

Add VE 8:

# echo "deb https://enterprise.proxmox.com/debian/pve bookworm pve-enterprise" > /etc/apt/sources.list.d/pve-enterprise.list
sed -i -e 's/bullseye/bookworm/g' /etc/apt/sources.list.d/pve-install-repo.list 

Update system to v8:

apt update
apt dist-upgrade

Issues

ping - Operation not permitted

Fix with:

setcap cap_net_raw+ep /bin/ping

or:

chmod u+s /sbin/ping

"I suspect the setuid workaround would likely work and is how ping was shipped in distros for a very long time (and so not particularly risky)." [1]

ref [2] [3]

sudo - setrlimit(RLIMIT_CORE): Operation not permitted

Inside of Ubuntu 20 LXC...

$ sudo hello > /dev/null
sudo: setrlimit(RLIMIT_CORE): Operation not permitted

Bug in sudo version. Just update sudo.

apt update
apt upgrade sudo

Alt workaround:

echo "Set disable_coredump false" >> /etc/sudo.conf

ref [4]

References

keywords