Enables comprehensive management of Proxmox Virtual Environment (VE) clusters, allowing for the control of virtual machines, LXC containers, storage, networking, and firewall rules via the Proxmox REST API.
Provides a dedicated set of tools for managing QEMU-based virtual machines, including power state management, configuration updates, snapshots, cloning, and VM migrations.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@MCP PVElist all running virtual machines and their current resource usage"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
MCP PVE
MCP server for Proxmox VE. Manage virtual machines, containers, storage, networking, and clusters through natural language in Cursor, Claude Code, and Claude Desktop.
Features
105 tools across 12 categories covering the Proxmox VE REST API
Three access tiers (
read-only,read-execute,full) for granular controlCategory filtering via
PVE_CATEGORIESto expose only the tools you needZero HTTP dependencies -- uses native
fetch(Node 18+)Self-signed cert support via
PVE_VERIFY_SSL=falseDocker images for
linux/amd64andlinux/arm64on GHCRRemote MCP via HTTP transport (
MCP_TRANSPORT=http) using the Streamable HTTP protocolTypeScript/ESM with full type safety
Quick Start
Run the server directly with npx:
PVE_BASE_URL="https://pve.example.com:8006" \
PVE_TOKEN_ID="root@pam!mcp" \
PVE_TOKEN_SECRET="xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" \
npx -y @samik081/mcp-pveThe server validates your PVE connection on startup and fails immediately with a clear error if credentials are missing or invalid.
Docker
Run with Docker (stdio transport, same as npx):
docker run --rm -i \
-e PVE_BASE_URL=https://pve.example.com:8006 \
-e PVE_TOKEN_ID=root@pam!mcp \
-e PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx \
-e PVE_VERIFY_SSL=false \
ghcr.io/samik081/mcp-pveTo run as a remote MCP server with HTTP transport:
docker run -d -p 3000:3000 \
-e MCP_TRANSPORT=http \
-e PVE_BASE_URL=https://pve.example.com:8006 \
-e PVE_TOKEN_ID=root@pam!mcp \
-e PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx \
-e PVE_VERIFY_SSL=false \
ghcr.io/samik081/mcp-pveThe MCP endpoint is available at http://localhost:3000 and a health check at http://localhost:3000/health.
Configuration
Claude Code CLI (recommended):
# Using npx
claude mcp add --transport stdio pve \
--env PVE_BASE_URL=https://pve.example.com:8006 \
--env PVE_TOKEN_ID=root@pam!mcp \
--env PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx \
--env PVE_VERIFY_SSL=false \
-- npx -y @samik081/mcp-pve
# Using Docker
claude mcp add --transport stdio pve \
--env PVE_BASE_URL=https://pve.example.com:8006 \
--env PVE_TOKEN_ID=root@pam!mcp \
--env PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx \
--env PVE_VERIFY_SSL=false \
-- docker run --rm -i ghcr.io/samik081/mcp-pve
# Using remote HTTP (connect to a running Docker container or HTTP server)
claude mcp add --transport http pve http://localhost:3000JSON config (works with Claude Code .mcp.json, Claude Desktop claude_desktop_config.json, Cursor .cursor/mcp.json):
{
"mcpServers": {
"pve": {
"command": "npx",
"args": ["-y", "@samik081/mcp-pve"],
"env": {
"PVE_BASE_URL": "https://pve.example.com:8006",
"PVE_TOKEN_ID": "root@pam!mcp",
"PVE_TOKEN_SECRET": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"PVE_VERIFY_SSL": "false"
}
}
}
}Docker (stdio):
{
"mcpServers": {
"pve": {
"command": "docker",
"args": ["run", "--rm", "-i",
"-e", "PVE_BASE_URL=https://pve.example.com:8006",
"-e", "PVE_TOKEN_ID=root@pam!mcp",
"-e", "PVE_TOKEN_SECRET=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"-e", "PVE_VERIFY_SSL=false",
"ghcr.io/samik081/mcp-pve"
]
}
}
}Remote MCP (connect to a running Docker container or HTTP server):
{
"mcpServers": {
"pve": {
"type": "streamable-http",
"url": "http://localhost:3000"
}
}
}Access Tiers
Control which tools are available using the PVE_ACCESS_TIER environment variable:
Tier | Tools | Description |
| 105 | Read, execute, and write -- full control |
| 68 | Read and execute -- no resource creation/deletion |
| 51 | Read only -- safe for exploration, no state changes |
Tier details:
full: All 105 tools. Includes creating/deleting VMs, containers, storage, users, firewall rules, and more.
read-execute: 68 tools. All read tools plus power actions (start, stop, migrate), backup execution, and task management.
read-only: 51 tools. List, get, status, and log tools only. No state changes.
Tools that are not available in your tier are not registered with the MCP server. They will not appear in your AI tool's tool list, keeping the context clean.
Environment Variables
Variable | Required | Default | Description |
| Yes | -- | URL of your PVE instance (e.g. |
| Yes | -- | API token ID ( |
| Yes | -- | API token UUID secret |
| No |
|
|
| No | (all) | Comma-separated category allowlist |
| No | (none) | Comma-separated list of tool names to exclude (e.g., |
| No | (none) | Comma-separated list of tool names to force-include, bypassing access tier and category filters |
| No |
| Set |
| No |
| Enable debug logging to stderr |
| No |
| Transport mode: |
| No |
| HTTP server port (only used when |
| No |
| HTTP server bind address (only used when |
| No |
| Set |
Create API tokens in the PVE UI under Datacenter > Permissions > API Tokens. Make sure to uncheck "Privilege Separation" if you want the token to inherit the user's full permissions.
Available Categories
nodes, qemu, lxc, storage, cluster, access, pools, network, firewall, backup, tasks, ha
Tools
mcp-pve provides 105 tools organized by category. Each tool's Access column shows the minimum tier required: read-only (available in all tiers), read-execute (requires read-execute or full), or full (requires full tier only). The Hints column shows tool behavior: read-only (no state changes), destructive (modifies existing state), idempotent (same result if called twice).
Tool | Description | Access | Hints |
| List all nodes in the cluster | read-only | read-only, idempotent |
| Get detailed node status (CPU, memory, uptime, load) | read-only | read-only, idempotent |
| Get PVE version info for a node | read-only | read-only, idempotent |
| Get DNS settings for a node | read-only | read-only, idempotent |
| Get time and timezone info for a node | read-only | read-only, idempotent |
| Get system log entries from a node | read-only | read-only, idempotent |
| List all system services on a node | read-only | read-only, idempotent |
| Start, stop, restart, or reload a node service | read-execute | destructive |
Tool | Description | Access | Hints |
| List all QEMU VMs on a node | read-only | read-only, idempotent |
| Get current VM status (CPU, memory, disk, network) | read-only | read-only, idempotent |
| Get VM configuration | read-only | read-only, idempotent |
| Get RRD statistics over a time period | read-only | read-only, idempotent |
| List all VM snapshots | read-only | read-only, idempotent |
| Start a VM | read-execute | destructive |
| Stop a VM (immediate) | read-execute | destructive |
| Gracefully shut down a VM | read-execute | destructive |
| Reboot a VM | read-execute | destructive |
| Suspend a VM | read-execute | destructive |
| Resume a suspended VM | read-execute | destructive |
| Reset a VM (hard) | read-execute | destructive |
| Migrate a VM to another node | read-execute | destructive |
| Create a new VM | full | — |
| Delete a VM and all its data | full | destructive |
| Update VM configuration | full | destructive, idempotent |
| Clone a VM | full | — |
| Create a VM snapshot | full | — |
| Delete a VM snapshot | full | destructive |
| Rollback a VM to a snapshot | full | destructive, idempotent |
Tool | Description | Access | Hints |
| List all LXC containers on a node | read-only | read-only, idempotent |
| Get current container status | read-only | read-only, idempotent |
| Get container configuration | read-only | read-only, idempotent |
| Get RRD statistics over a time period | read-only | read-only, idempotent |
| List all container snapshots | read-only | read-only, idempotent |
| Start a container | read-execute | destructive |
| Stop a container (immediate) | read-execute | destructive |
| Gracefully shut down a container | read-execute | destructive |
| Reboot a container | read-execute | destructive |
| Suspend (freeze) a container | read-execute | destructive |
| Resume (unfreeze) a container | read-execute | destructive |
| Create a new container | full | — |
| Delete a container and all its data | full | destructive |
| Update container configuration | full | destructive, idempotent |
| Clone a container | full | — |
| Create a container snapshot | full | — |
| Delete a container snapshot | full | destructive |
| Rollback a container to a snapshot | full | destructive, idempotent |
Tool | Description | Access | Hints |
| List all configured storage backends | read-only | read-only, idempotent |
| Get storage backend configuration | read-only | read-only, idempotent |
| List available storage on a node with usage info | read-only | read-only, idempotent |
| Get storage status and usage on a node | read-only | read-only, idempotent |
| List storage content (images, ISOs, backups) | read-only | read-only, idempotent |
| Create a new storage backend | full | — |
| Update storage configuration | full | destructive, idempotent |
| Delete a storage backend | full | destructive |
Tool | Description | Access | Hints |
| Get cluster status (membership, quorum) | read-only | read-only, idempotent |
| List all cluster resources with optional type filter | read-only | read-only, idempotent |
| Get the next available VMID | read-only | read-only, idempotent |
| Get recent cluster log entries | read-only | read-only, idempotent |
| Get datacenter options | read-only | read-only, idempotent |
| List guests not covered by backup jobs | read-only | read-only, idempotent |
| Get HA manager status | read-only | read-only, idempotent |
| List all replication jobs | read-only | read-only, idempotent |
| Update datacenter options | full | destructive, idempotent |
Tool | Description | Access | Hints |
| List all users | read-only | read-only, idempotent |
| Get user details | read-only | read-only, idempotent |
| List all roles and privileges | read-only | read-only, idempotent |
| List all user groups | read-only | read-only, idempotent |
| List all ACL entries | read-only | read-only, idempotent |
| List authentication domains/realms | read-only | read-only, idempotent |
| Create a new user | full | — |
| Update user properties | full | destructive, idempotent |
| Delete a user | full | destructive |
| Grant or revoke ACL permissions | full | destructive, idempotent |
Tool | Description | Access | Hints |
| List all resource pools | read-only | read-only, idempotent |
| Get pool details and members | read-only | read-only, idempotent |
| Create a resource pool | full | — |
| Update pool members and settings | full | destructive, idempotent |
| Delete a resource pool | full | destructive |
Tool | Description | Access | Hints |
| List all network interfaces on a node | read-only | read-only, idempotent |
| Get network interface configuration | read-only | read-only, idempotent |
| Create a network interface | full | — |
| Update network interface configuration | full | destructive, idempotent |
| Delete a network interface | full | destructive |
Tool | Description | Access | Hints |
| Get cluster firewall options | read-only | read-only, idempotent |
| List cluster firewall rules | read-only | read-only, idempotent |
| List firewall aliases | read-only | read-only, idempotent |
| List firewall IP sets | read-only | read-only, idempotent |
| Update cluster firewall options | full | destructive, idempotent |
| Create a firewall rule | full | — |
| Update a firewall rule | full | destructive, idempotent |
| Delete a firewall rule | full | destructive |
Tool | Description | Access | Hints |
| List all scheduled backup jobs | read-only | read-only, idempotent |
| Get backup job configuration | read-only | read-only, idempotent |
| Run an immediate backup (vzdump) | read-execute | — |
| Create a scheduled backup job | full | — |
| Delete a scheduled backup job | full | destructive |
Tool | Description | Access | Hints |
| List recent tasks on a node | read-only | read-only, idempotent |
| Get task status by UPID | read-only | read-only, idempotent |
| Get task log output by UPID | read-only | read-only, idempotent |
| Stop a running task | read-execute | destructive |
Tool | Description | Access | Hints |
| List all HA-managed resources | read-only | read-only, idempotent |
| Get HA configuration for a resource | read-only | read-only, idempotent |
| Add a VM/container to HA management | full | — |
| Update HA resource configuration | full | destructive, idempotent |
| Remove a resource from HA management | full | destructive |
Verify It Works
After configuring your MCP client, ask your AI assistant:
"What nodes are in my Proxmox cluster?"
If the connection is working, the assistant will call pve_list_nodes and return your nodes with their current status.
Usage Examples
Once configured, ask your AI tool questions in natural language:
"List all VMs on node pve1" -- calls
pve_list_qemu_vmsto show VMs with their status, CPU, and memory usage."What's the status of VM 100?" -- calls
pve_get_qemu_statusto show real-time resource utilization."Start container 200 on pve1" -- calls
pve_start_lxc_containerto start the container and returns the task UPID."Create a snapshot of VM 100 called pre-upgrade" -- calls
pve_create_qemu_snapshotto create a snapshot before changes."Show me the cluster resources" -- calls
pve_list_cluster_resourcesto show all VMs, containers, storage, and nodes."Migrate VM 100 to node pve2" -- calls
pve_migrate_qemu_vmto live-migrate the VM to another node.
Troubleshooting
Connection refused / ECONNREFUSED
Check that PVE_BASE_URL is correct and includes the port (default: 8006). Ensure the PVE host is reachable from where the MCP server is running.
SSL certificate errors
If your PVE instance uses a self-signed certificate, set PVE_VERIFY_SSL=false. This disables TLS verification for all requests.
Tools not showing up
Check your access tier setting. In read-only mode, only 51 tools are registered. In read-execute mode, 68 tools are registered. Use full (or omit PVE_ACCESS_TIER) for all 105 tools. Check PVE_CATEGORIES -- only tools in listed categories are registered. Also verify the server started without errors by checking stderr output.
Development
# Install dependencies
npm install
# Build the project
npm run build
# Run in development mode (auto-reload)
npm run dev
# Open the MCP Inspector for interactive testing
npm run inspectLicense
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.