Solace is a lightweight appliance that lives inside your Proxmox cluster. It monitors your nodes, runs diagnostics on demand, and gives you a direct line to expert support — all without sharing a single password.
Get Solace for your clusterMonitoring, diagnostics, remote support, and a full app store — deployed as a single VM, managed from one dashboard.
See the health of every node at a glance — CPU, memory, storage, backup status, and patch levels across your entire PVE and PBS infrastructure.
One-click health reports covering your entire cluster — no SSH required. Send them to your support partner instantly, or review them yourself.
One URL for your entire cluster. HAProxy routes you to healthy nodes automatically, with built-in SPICE console proxy support. No more bookmarking individual nodes.
Deploy Grafana, load balancers, and more with one click. Each app gets automatic TLS certificates and HAProxy routing — no manual configuration.
You control when your support partner connects — and when they disconnect. Every session requires your approval, and you can end it with one click.
Get help in minutes, not hours. Raise a support request, chat live with your partner, and track progress — all from within the appliance.
Your credentials never leave your hardware. Everything is stored locally in HashiCorp Vault, wrapped in LUKS encryption — two layers of protection, entirely under your control.
See every pending update across all nodes — Debian security fixes and Proxmox packages, classified automatically. Track CVEs, identify which nodes need rebooting, and know your patch posture at a glance.
Solace sits inside your cluster and connects outbound to your support partner. No inbound ports, no VPN, no firewall changes.
Solace deploys as a small VM in your existing Proxmox environment. No agents on your hosts, no firewall changes.
A lightweight Debian VM is provisioned in your cluster and the Solace installer runs automatically. Takes about 10 minutes.
Enter your Proxmox API token through the Solace web UI. It's stored locally in Vault — never sent anywhere.
Solace establishes an outbound SSH tunnel to your support partner's headend. All connections originate from your network.
Your cluster is now monitored, patches are tracked, reports are available on demand, and expert support is a click away — whenever you need it.
Unlike generic RMM tools, Solace understands Proxmox. It speaks the PVE and PBS APIs natively.
All connections are outbound SSH tunnels initiated by the appliance. No ports to open, no VPN to manage, no attack surface to worry about.
You decide when to connect, what to share, and when to disconnect. Remote sessions require your explicit approval. End them with one click.
Built specifically for PVE and PBS. Node health, storage utilisation, backup status, patch levels, subscription tracking, and license management — all in one place.
Your passwords and API tokens never leave your network. Solace's dual shared session technology lets your support partner work alongside you — without ever needing your credentials.
Deploy observability and management tools directly from the Solace UI. Each app gets automatic TLS and HAProxy routing.
Dashboards & visualisation
Time-series metrics store
Cluster load balancing
Health monitoring agent
Solace integrates with your existing identity infrastructure. No separate user database to manage — authenticate with what you already have.
Authenticate via any OIDC-compliant provider — Entra ID, Okta, Keycloak, Google Workspace, or your own. Standard claims, standard flow, no proprietary lock-in.
Bind directly to your AD or LDAP directory for authentication. Supports LDAPS, STARTTLS, custom base DNs, and nested group resolution out of the box.
Map your AD groups or OIDC claims to Solace roles. Infrastructure Admins get full control, Support Engineers get monitoring — define the boundaries once, enforce them everywhere.
SP-initiated SSO with signed assertions and encrypted attribute statements.
Solace honours your IdP's MFA policies. If your provider requires a second factor, so does Solace.
Every login, role change, and session is logged with the authenticated identity. Exportable to your SIEM.
Every layer of Solace is designed with security as a default, not an afterthought.
All secrets and sensitive configuration live on a LUKS-encrypted volume. Boot requires a passphrase — no one accesses your data without it.
API tokens and secrets are managed by an embedded Vault instance with scoped policies. No plaintext credentials on disk.
The appliance connects out to the headend — never the other way around. No inbound ports, no listening services exposed to your network.
Remote access requires your explicit approval. You see exactly what's shared, and you can disconnect at any time. Full audit trail included.
Know exactly which nodes have outstanding security updates. Debian and Proxmox packages are classified automatically, with CVE cross-referencing from the Debian Security Tracker.
Solace checks for updates automatically and can upgrade itself in-place. You're always running the latest version — no manual intervention required.
Deploys in minutes, runs on your hardware, and keeps you in control. Talk to Sol1 to get Solace running in your environment.
Sol1 has been building open-source infrastructure since 1999.
We'll have Solace running in your environment within the hour.