A modern web-based management interface for Proxmox VE with multi-cluster support and focus on desktop and mobile experience.
ProxUI isn't a replacement for Proxmox web interface, but a light-weight addition to represent available information in more user friendy way as well as filling some gaps. It has essential functionality to manage single instance(s) or cluster(s).
- Represents VM and container status and performance metrics in more readable way
- Creation VMs and containers from templates
- Built-in configuration editor
- QEMU Guest Agent integration for disk usage monitoring
- Consolidated configuration single-page view incluing cloud-init params (like ssh keys)
- Unified storage view across all cluster nodes
- Group shared media
- Real-time storage usage monitoring
- Dashboard with cluster overview and statistics
- Task monitoring
- Network configuration viewing
- Real-time basic resource usage charts
- Connect and manage multiple Proxmox clusters or individual servers from a single interface
- Easy cluster switching with persistent user preferences
- Cluster connection management and status monitoring
- Focus on desktop and mobile devices
- Clone the repository:
git clone https://github.com/greenlogles/proxui
cd proxui- Start the application:
docker-compose up -d-
Access the web interface at
http://localhost:8080 -
Configure your first Proxmox cluster through the connect page
- Install dependencies:
pip install -r requirements.txt- Run the application:
python app.py- Access the web interface at
http://localhost:8080
The application stores configuration in /app/data/config.toml (or ./data/config.toml in development). The configuration file supports multiple clusters:
[[clusters]]
id = "homelab"
name = "Home Lab"
[[clusters.nodes]]
host = "192.168.1.100:8006"
user = "root@pam"
password = "your-password"
verify_ssl = falseConfiguration file can be managed manually or by application.
If you are willing to use ProxUI with read-only user, create new one by running next command on one of the ProxMox servers:
# Create new user
pveum user add proxui-readonly@pve --password yourpassword --comment "ProxUI read-only user"
# Assign built-in PVEAuditor role to root path with propagation
pveum acl modify / --users proxui-readonly@pve --roles PVEAuditor --propagate 1The application is designed for Docker deployment with persistent volume mounting. Docker images are automatically built and published via CI/CD pipeline.
ghcr.io/greenlogles/proxui:latest- Latest stable release (recommended for production)ghcr.io/greenlogles/proxui:testing- Latest development build from main branchghcr.io/greenlogles/proxui:v1.2.3- Specific version tags for releases
version: '3.8'
services:
proxui:
image: ghcr.io/greenlogles/proxui:latest # or :testing for latest development
container_name: proxui
ports:
- "8080:8080"
volumes:
- ./data:/app/data
environment:
- CONFIG_FILE_PATH=/app/data/config.toml
restart: unless-stopped# Latest stable release
docker run -d \
--name proxui \
-p 8080:8080 \
-v ./data:/app/data \
-e CONFIG_FILE_PATH=/app/data/config.toml \
ghcr.io/greenlogles/proxui:latest
# Latest development build
docker run -d \
--name proxui \
-p 8080:8080 \
-v ./data:/app/data \
-e CONFIG_FILE_PATH=/app/data/config.toml \
ghcr.io/greenlogles/proxui:testingProxUI uses GitHub Actions for automated testing and Docker image building with GitHub Container Registry:
- Testing Images: Built automatically on every push to
mainbranch (:testingtag) - Release Images: Built automatically when GitHub releases are created (
:latest+ version tags) - Multi-platform: Images support both
linux/amd64andlinux/arm64 - No Setup Required: Uses built-in GitHub authentication and permissions
Images are published to GitHub Container Registry at ghcr.io/greenlogles/proxui.
- Python 3.7+
- Flask 2.3.3
- proxmoxer 2.0.1
- Access to Proxmox VE cluster(s)
- Configuration files contain sensitive credentials
- Use strong passwords and consider API tokens instead of root passwords
- SSL certificate verification can be disabled for self-signed certificates
- Ensure proper network security when exposing the web interface
If you have any questions, need assistance, please open issue or discussion here on GitHub.
Alex Shut @greenlogles (https://github.com/greenlogles/ProxUI)











