Still no plans to provide an LTS version of Proxmox 7? Debian 11 will go until 2026 with security updates.
It doesn't hurt to ask if things changed since 4 years ago.
It doesn't hurt to ask if things changed since 4 years ago.
No plans for a longer term support, Proxmox VE 7 is still planned to become end-of-life after the 31st of July 2024.Still no plans to provide an LTS version of Proxmox 7? Debian 11 will go until 2026 with security updates.
It doesn't hurt to ask if things changed since 4 years ago.
Plans? Yes, we always plan ahead, but as the toolchain freeze for Trixie only happened a few days ago and the soft-freeze is still three weeks away we see no reason to release anything public yet. We will do a post in this forums once there is something available to test, I'd expect that to happen later in Q2, but at this point we cannot give any guarantees for a timeline here.Are there already any plans on supporting Debian 13 / Trixie?
thanks for clarification. I'll monitor the forum. I'll be happy to try out prerelease software, as this is a special case as follows:Plans? Yes, we always plan ahead, but as the toolchain freeze for Trixie only happened a few days ago and the soft-freeze is still three weeks away we see no reason to release anything public yet. We will do a post in this forums once there is something available to test, I'd expect that to happen later in Q2, but at this point we cannot give any guarantees for a timeline here.
Yes, but in my case, it's something special i am trying. Because it's highly experimental and unsupported, i didn't mention it at all.I am curious why the underlying Debian version matters to you? Hardware support is mostly contingent on the kernel version, and kernel images are maintained separately by the Proxmox developers. Support software packages such as LXC and QEmu are directly managed by Proxmox. And as long as the Proxmox team provides all the up-to-date security patches for the host's OS, the rest of the system software has relatively little impact on anything. It's not as if you would install a lot of end-user software on the host. All of that goes into containers or VMs.
FWIW, you might get away with using a very privileged/uncontained LXC container to run a clean Proxmox VE itself while being able to use latest unstable Debian on the machine itself, I used that in the past to get a PVE system on a private workstation running Arch Linux.I'm using a frankenstein-debian-proxmox on my desktop.
Debian 12, proxmox repo on top as in the manual, KDE plasma, etc.
Works great for what i am doing, i can migrate VMs from my other regular proxmox hosts to my desktop and vice versa.
Helpful for debugging and other stuff.
For some reason, that had never occurred to me. But yes, that works. In fact, it works so well that I now have Proxmox VE running directly on my Chromebook. Took a bit of work to make the the different virtualizations work seamlessly. But with a little effort, I can now access files on my Chromebook from within containers, and I can even open X11 applications in the container that will then render as an app in ChromeOS.FWIW, you might get away with using a very privileged/uncontained LXC container to run a clean Proxmox VE
For my use case, the Debian version matters because I want access to the latest Debian userland repos without having to hack up my repo configuration file and risk instability.I am curious why the underlying Debian version matters to you? Hardware support is mostly contingent on the kernel version, and kernel images are maintained separately by the Proxmox developers. Support software packages such as LXC and QEmu are directly managed by Proxmox. And as long as the Proxmox team provides all the up-to-date security patches for the host's OS, the rest of the system software has relatively little impact on anything. It's not as if you would install a lot of end-user software on the host. All of that goes into containers or VMs.
intel-gpu-tools
package on Proxmox to install the intel_gpu_top
application to monitor what the iGPU is doing to make sure it's actually accelerating my VMs and LXCs. We pull that package from the Debian repos, so we get the version of the tool that's in whatever repo we're using. The version in the Debian 12 (1.27.1-1) repo is over two years old. It's not exactly stable or fully featured when using a bleeding edge feature like SR-IOV, which is still getting driver updates and related tweaks every couple of months. Trixie is up at 2.0-1. See: https://packages.debian.org/search?keywords=intel-gpu-toolsthank you for the detailed reply, makes total sense.We constantly release updates in a rolling release fashion, the ISOs are point releases to summarize the bug fix and feature work and accompany them with polished release notes and some additional testing, both focused for new changes but also for existing features all over the place.
We do not publish a strict plan for planned ISO releases as we want to retain the flexibility to release them as we see fit and users get new fixes already constantly anyway, so waiting for a new point release is not a requirement.
But for most of our projects we target two such stable point releases per year, and FWIW, the next one will be due very soon.
FWIW, you can get the roadmap with changes and intended features on [1] and get detailed changelog of every component checking the debian/changelog file in each git repo, i.e. for pve-manager check [2]. Keep in mind that newest packages might not be present in any repo yet, just be patientWhilst not strictly 'support' related, is there a roadmap for VE 8.x published anywhere? Last ISO was Nov 24 so curious when we can expect a new release.
hi,Hi, I'm slightly confused by "supported at least as long as the corresponding Debian Version is oldstable".
Debian 11 Bullseye was still oldstable until 2025 when Debian 13 Trixie was released, wasn't it? I checked archived versions of https://web.archive.org/web/20250720170857/https://wiki.debian.org/DebianOldStable/ and they still read "Bullseye is the current oldstable" up until recently. My understanding is that "oldstable" only becomes "oldoldstable" when a new "stable" version is released, so 4 years after the initial release.
And yet Proxmox VE 7 only supported until 2024 (3 years after the initial release)? Shouldn't the FAQ point to https://www.debian.org/security/faq#lifespan instead and state that Proxmox is "supported at least as long as the corresponding Debian version is supported"?
has somebody already verified if Proxmox VE 8.x and 9.0 are impacted by the Shai-Hulud supply chain attack, which Socket and some other channels have reported on since August?
Due to the number of packages, which have apparently been found to being compromised our partner wanted a confirmation, whether Proxmox includes or references any of these packages.
We do not rely on npm for our user interfaces; the current Proxmox VE web interface uses only ExtJS and our own libraries.Hi,
has somebody already verified if Proxmox VE 8.x and 9.0 are impacted by the Shai-Hulud supply chain attack, which Socket and some other channels have reported on since August?
Due to the number of packages, which have apparently been found to being compromised, our partner wanted a confirmation whether Proxmox includes or references any of these packages.
Thank you for the quick and thorough explanation. That confirmation was enough for our partner. Best regards, FlorianWe do not rely on npm for our user interfaces; the current Proxmox VE web interface uses only ExtJS and our own libraries.
Some of the projects we reuse use npm themselves though, such as xterm.js and noVNC, but we also vendor these completely and only update them when there is a new release, after vetting and testing the newly pulled-in code internally first. Neither of these projects has been updated in the last three months, so they cannot be affected by the attacks you mention even if we had missed something, as those attacks only occurred in the last month, and mainly in the last two weeks.
We mirror anything we rely on internally and publicly on https://git.proxmox.com/. We do not pull any dependencies directly from the internet when building; rather, we use Debian packages as dependencies, which are hosted on our infrastructure and that of Debian.
In other words, while there are always things to re-evaluate and improve as time goes on and attacks become more sophisticated, we try hard to avoid supply chain attacks by strictly controlling and mirroring our dependencies.
For the sake of completeness: The next-generation web user interfaces – i.e. those used for PDM and the new mobile UI for PVE – are based on Yew and written in the Rust programming language. Here, we also mirror relevant dependencies or write and host the code ourselves.
We use essential cookies to make this site work, and optional cookies to enhance your experience.