proxmux is a Proxmox VE fleet discovery and maintenance toolkit.
It allows you to discover, inventory, visualize, and audit updates for Proxmox VMs and LXCs directly from the Proxmox host.
This toolkit is intended to run ONLY on Proxmox VE hosts.
Before using proxmux, please read carefully:
- ✅ Must be run on a Proxmox VE node
- ✅ Requires root privileges (or equivalent permissions)
- ✅ Relies on Proxmox CLI tools:
pct,qm,ip,bash ⚠️ VM guest inspection requires QEMU Guest Agent⚠️ Some features are skipped for offline guests
Running proxmux on non-Proxmox systems is not supported.
- 🔍 Discover all Proxmox VMs and LXCs
- 📄 Generate a structured YAML inventory
- 🌐 Produce an interactive HTML visualization
- 📦 Detect package managers inside guests
- 🔎 Audit pending system updates (dry-run only)
- 🧱 Designed for future lifecycle operations (updates, reboots, maintenance)
proxmux is distributed via PyPI and is designed to be installed using pipx, ensuring a clean and isolated Python environment.
This method installs pipx if needed and then installs proxmux.
curl -fsSL https://raw.githubusercontent.com/ingles98/proxmux/main/install.sh | bash
proxmux --helpapt update
apt install -y pipxpipx install proxmuxproxmux --helpUpdate to the latest version:
pipx upgrade proxmuxUninstall:
pipx uninstall proxmuxDiscover Proxmox environment and generate inventory + HTML
proxmux discover -i prox_stack.yml -o stack_view.htmlRegenerate HTML from an existing inventory
proxmux html -i prox_stack.yml -o stack_view.htmlCheck pending updates on guests
proxmux updatesList individual packages pending update:
proxmux updates --listprox_stack.yml — structured inventory of the Proxmox environment
stack_view.html — interactive HTML visualization
Both files are safe to version-control or archive.
Offline guests are skipped automatically
VM inspection requires QEMU Guest Agent
Updates are audit-only for now (no changes applied)
proxmux is designed to be safe by default
Please find the changelog here: CHANGELOG.md
-
proxmux upgrade--dry-run/--apply -
Guest reboot orchestration
-
JSON / machine-readable output modes
-
Plugin hooks per guest
-
CI-friendly non-interactive mode
MIT License - see the LICENSE file for details
Issues, ideas, and pull requests are welcome. proxmux aims to remain simple, safe, and transparent.