A tour of the Solace appliance UI. All data shown is from a live Proxmox cluster with anonymised hostnames.
Node health, CPU, RAM, subscription status, patch and snapshot summaries, and recent background activity.
Per-node metrics including uptime, CPU cores, RAM, OS disk usage, subscription status, and license keys.
Backup task summary with success rates, datastore usage, and subscription status. Track verification, prune, sync, and garbage collection jobs.
Scans all cluster nodes for available updates, cross-references with Debian Security Tracker and PVE advisories. Shows security vs bugfix classification per package.
Expand any node to see every pending update with version details and security classification. Packages are tagged as security, bugfix, or standard based on Debian Security Tracker cross-referencing.
Filtered view of security-only updates with CVE references and advisory links. See at a glance which nodes have outstanding security patches.
Create and manage patch plans for rolling out updates across cluster nodes. Each plan tracks target nodes, VM behaviour rules, validation status, and execution progress.
Select which cluster nodes to include in the patch plan. Nodes show current update counts and can be individually toggled.
Define how VMs are handled during patching. Set per-VM rules for migration, shutdown, or skip. Configure trigger rules to auto-assign behaviour based on VM name patterns or tags.
Configure Ceph handling, node processing order, and advanced options for the patch run. Settings control how the orchestrator sequences node updates.
Run validation checks before executing: SSH connectivity, sudo access, PVE API permissions, Ceph health, and VM migration feasibility. Fix issues before they cause problems mid-patch.
Real-time execution tracking as nodes are patched one by one. Each node progresses through drain, upgrade, reboot, and restore stages with live status updates.
Expand any node to see the full step-by-step execution log: VM migrations, package upgrades, reboot timing, and VM restoration. Each step shows duration and status.
Preview what would happen without making any changes. Dry run simulates the full execution sequence so you can verify the plan before committing to a real patch run.
Identifies VM snapshots across the cluster, flags stale ones older than the configured threshold, and lets you dismiss known-good snapshots.
Expand any VM to see individual snapshots with age, description, and RAM state. Dismiss known-good snapshots to reduce noise.
One-click install for monitoring (Grafana, InfluxDB, Prometheus, Pulse), management (ProxLB, PVE Load Balancer), and more. Each app gets its own subdomain via HAProxy.
Configure automatic VM load balancing across cluster nodes. Memory or CPU-based balancing with dry-run simulation before applying changes.
Preview Migrations runs a dry-run simulation showing which VMs would move between nodes to achieve optimal balance, with before/after resource distribution.
Submit support requests that create tickets in your partner's system. Secure reverse SSH tunnels for remote access — you control when to connect and disconnect.
Every operation is tracked — patch scans, app installs, upgrades, snapshot scans. See status, duration, and output for each job.
Create and manage migration plans from VMware to Proxmox VE. Each plan tracks source vCenter, target PVE cluster, VM count with OS breakdown, and overall status.
Select source vCenter connection and target Proxmox cluster. Plans support multiple VMs with independent settings per VM.
Manage vCenter connections with test verification, guest credentials (SSH for Linux, WinRM for Windows), and connection editing. Credentials stored in HashiCorp Vault.
Discover VMs from vCenter, see OS type badges (Windows/Linux/EFI), resource specs, migration mode, and hardware profile. Override target storage and node per VM.
Configure NFS transit storage, target storage and node defaults, boot-from-NFS for reduced downtime, concurrency, VMID range, hardware profiles, and Windows VirtIO strategy.
Map VMware port groups to Proxmox VE bridges. VMs without an explicit mapping will use the default bridge.
Connection-level defaults for SSH (Linux) and WinRM (Windows) with plan-level and per-VM overrides. Supports password and SSH key authentication.
Configure a dedicated PVE API token for migration operations. Includes a setup guide with the exact pveum commands to create the required role and token.
Comprehensive pre-flight checks: VMware connectivity, PVE token privileges, NFS configuration, network mappings, guest credentials, VirtIO ISO availability, and VM reachability.
Real-time migration progress with per-VM status cards. Shows overall completion, duration, and individual VM states (completed, running, pending, failed).
Expand any VM card to see the full migration timeline: cold copy, guest preparation, VirtIO driver installation, VMware Tools removal, network reconfiguration, and online disk conversion.
Overview of NetBox sync state per cluster. See new, changed, removed, and pending change counts. Trigger manual syncs or enable scheduled sync for automatic drift detection.
Review proposed changes before pushing to NetBox. Filter by status, entity type, and cluster. Accept or reject individual changes, or bulk-accept and push all at once.
Browse the full PVE hierarchy mapped to NetBox: clusters, nodes (devices), VMs, interfaces, MACs, and IPs. Colour-coded sync indicators show what's synced, outdated, or missing from NetBox.
Configure NetBox URL and API token (stored in Vault), custom field names, scheduled sync interval, and one-click setup for custom fields and PVE custom links.