Provides comprehensive management of Proxmox VE environments, allowing for the creation, cloning, configuration, and management of virtual machines (VMs) and LXC containers.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Proxmox MCP Serverlist all running VMs and show their current resource usage"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Proxmox MCP Server
Enterprise-grade Proxmox VE management for Claude Code with bulletproof security
Quick Start
Get running in 10 minutes: Quick Start Guide
Key Features
š Single-command installation - Deploy in minutes with
sudo ./install.shš”ļø 85+ security controls with bulletproof protection against all attack vectors
š§ Universal Claude Code access - Use from any project directory
š Enterprise monitoring with health checks and auto-healing
š Compliance ready - SOC 2 / ISO 27001 / NIST framework support
š³ Containerized - Docker-based deployment with production hardening
ā” Full VM/LXC management - Create, clone, configure, and manage containers
Installation Preview
Documentation Navigation
šÆ I want to...
Goal | Documentation Path |
Get started quickly | |
Complete installation | |
Manage in production | |
Integrate with systems | |
Understand security | |
Troubleshoot issues |
š„ Role-Based Documentation
š New Users: Start with Getting Started
š§ Administrators: Go to Administration
š©āš» Developers: See Integration
š”ļø Security Teams: Review Security
Architecture Overview
Key Components:
MCP Server: FastMCP-based HTTP server with enterprise security
Security Layer: 85+ controls with bulletproof privilege restrictions
Container Runtime: Hardened Docker environment with resource limits
API Integration: Full Proxmox API access with token authentication
SSH Gateway: Secure command execution with audit logging
Security Features
š”ļø Zero Critical Vulnerabilities - Complete security validation with 85/85 tests passed
š Root Protection - Bulletproof prevention of root user modification
š Command Filtering - Whitelist-only approach with comprehensive dangerous command blocking
š Audit Logging - Complete I/O logging and security event monitoring
š¢ Enterprise Compliance - SOC 2, ISO 27001, CIS Controls, NIST CSF ready
š« Privilege Isolation - Restricted claude-user with minimal necessary permissions
Production Ready
ā
Tested Environments: Proxmox VE 7.x, 8.x
ā
Container Security: Non-root execution, read-only filesystem, capability dropping
ā
Resource Management: CPU/memory limits, health checks, auto-restart
ā
Network Security: Isolated container networks, firewall integration
ā
Backup/Recovery: Automated backup with rollback procedures
ā
Monitoring: Health endpoints, log aggregation, performance metrics
System Requirements
Proxmox VE: Version 7.0+ (tested on 8.4)
Operating System: Debian-based (Proxmox default)
Resources: 2GB RAM, 10GB disk space
Network: Internet access for package installation
Permissions: Root access for installation
Quick Commands
Support & Community
š Documentation: Comprehensive guides in
docs/š Issues: Report bugs and request features
š¬ Discussions: Community support and questions
š Security: Report security issues privately to security@your-domain.com
Contributing
We welcome contributions! Please see our Contributing Guide for details on:
Code standards and review process
Documentation requirements
Security guidelines
Development environment setup
License
MIT License - Enterprise-friendly open source
Built with ā¤ļø for the Claude Code community
This project provides enterprise-grade Proxmox VE management through Claude Code with bulletproof security and production-ready deployment.