Search results

  1. M

    VM network rate limit

    I highly doubt this. If I set rate limit to 60, I get 500 Mbps....
  2. M

    Guest API clarification (network-get-interfaces)

    Hi, This question is about https://pve.proxmox.com/pve-docs/api-viewer/#/nodes/{node}/qemu/{vmid}/agent/network-get-interfaces. Can someone explain to me what these represent? "statistics": { "rx-packets": 501361, "tx-bytes": 15465504, "tx-dropped": 0, "tx-errs": 0, "rx-errs": 0...
  3. M

    List of all Virtual Machine statuses

    Can we get all possible values for status and qmpstatus? The API does not specify these.
  4. M

    [SOLVED] PVEFW Logs with custom rules

    Hi, I'm not sure if I asked the question already, checked but cannot find in my posts. Basically I have some custom iptables rules per VM/adapter and I do logging. These logs go into the main node logs instead of the VM Firewall logs. /sbin/iptables -N ... /sbin/iptables -A ... -m limit...
  5. M

    [TUTORIAL] PMG 7/Debian 11 with fail2ban

    This is a very misleading and cumbersome thread. The default tutorial from https://pve.proxmox.com/wiki/Fail2ban works perfectly fine even on the latest 7.3. When I see stuff like "you can remove iptables using command apt-get remove iptables" I get sick. There is no need to do anything...
  6. M

    VM Blacklist IPset

    Thanks, I was hoping they added a blacklist ipset for vm's as well...
  7. M

    Set virtual machine meta info

    No plans to add such feature?
  8. M

    VM Blacklist IPset

    Does PVEFW read this if we add it to VM firewall config? [IPSET blacklist] I would like to have a blacklist per VM. Thanks
  9. M

    Backup of VM failed: unable to connect to qmeventd socket

    Thank you! It seems to have worked: root@:~# systemctl daemon-reload root@:~# systemctl start qmeventd.service root@:~# systemctl status qmeventd.service ● qmeventd.service - PVE Qemu Event Daemon Loaded: loaded (/lib/systemd/system/qmeventd.service; enabled; vendor pres> Active...
  10. M

    Backup of VM failed: unable to connect to qmeventd socket

    stat: cannot statx '/run/systemd/units/invocation:qmeventd.service': No such file or directory The other command returns a lot of non-formatted data.
  11. M

    Backup of VM failed: unable to connect to qmeventd socket

    ● qmeventd.service - PVE Qemu Event Daemon Loaded: loaded (/lib/systemd/system/qmeventd.service; enabled; vendor preset: enabled) Active: inactive (dead) Nov 08 13:32:50 host-5017329 systemd[1]: qmeventd.service: Failed to set invocation ID for unit: File exists Nov 08 13:32:50...
  12. M

    Backup of VM failed: unable to connect to qmeventd socket

    proxmox-ve: 7.2-1 (running kernel: 5.15.64-1-pve) pve-manager: 7.2-11 (running version: 7.2-11/b76d3178) pve-kernel-5.15: 7.2-13 pve-kernel-helper: 7.2-13 pve-kernel-5.15.64-1-pve: 5.15.64-1 ceph-fuse: 14.2.21-1 corosync: 3.1.5-pve2 criu: 3.15-1+pve-1 glusterfs-client: 9.2-1 ifupdown2...
  13. M

    PVEFW NFLOG with custom rules

    Hi, I have created my own LOG chains for specific rules added for each guest. My first question is how can I log in separate log file like PVEFW does per guest? Currently all logs go into the Node's firewall log. Second question is, how can I format the log output to be similar to PVEFW? At...
  14. M

    Backup of VM failed: unable to connect to qmeventd socket

    Hi, Proxmox 7.2.11 INFO: starting new backup job: vzdump 100 --compress zstd --mode snapshot --mailnotification always --notes-template '{{guestname}}' --quiet 1 --storage backups --prune-backups 'keep-last=1' INFO: Starting Backup of VM 100 (qemu) INFO: Backup started at 2022-11-13 22:30:04...
  15. M

    Guest iptables rules

    After a bit of research, it seems the rule ordering is the problem. Basically -A will append at the end of the iptables chain, which is after PVEFW-Drop so it will have no effect. Rules order can be seen with iptables -t filter -L tap100i0-IN --line-numbers -n -v. Now another problem remains...
  16. M

    Guest iptables rules

    I`m trying to add some custom iptables rules (like connlimit) for guest machines. Example rule is: -A tap101i0-IN -p tcp -m connlimit --connlimit-above 30 --connlimit-mask 32 --connlimit-saddr -j REJECT --reject-with tcp-reset As seen tap101i0 is the vm 101 adapter. The rule has no effect, I...
  17. M

    Using iptables-persistent for custom rules

    I'm having a really hard time trying to add and keep some custom iptables rules. Reading across several threads, iptables-persistent came to light. With that being said I have installed it with apt-get install -y iptables-persistent and all the rules got saved into the corresponding files...
  18. M

    Using raw iptables rules

    Did you manage to add rules per guest machine? Can you please share some details? Many thanks.
  19. M

    Monitor total bandwidth consumed by VM?

    Indeed, after some research I found this. However, again, I thought there might be something built it and easy to use.