Have you seen the "Bulk Action" button (top right) when you select a node, or right click on the node?the ability to select multiple VMs and perform the same action on same
Have you seen the "Bulk Action" button (top right) when you select a node, or right click on the node?the ability to select multiple VMs and perform the same action on same
"Software require mature users."
"This is a hypervisor, not a game. No sane person would"
"Greasemoney and monkey-patch the code on the fly'
So you tell us that we are not interested in working with community members? This is a weird assumption and not true.
PVE is published under AGPLV3. nuff said
args: -drive file=/var/lib/vz/images/103/vm-103-disk-0.qcow2,if=none,id=NVME1 -device nvme,drive=NVME1,serial=nvme-1
I found another use where a mod manager would be useful.
I notice many things, the devs are asked and responded "not enough people need this and also no because security"
Why? I can see why one would like the possibility to edit the arguments in the WebUI but this has nothing to do with the existence (or lack) of a mod system. BTW I don't think it's asking to much that for certain changes only editing the config files is supported.Which is exactly why one would use a mod system.
Anyway, here is the latest thing I found that would benefit from a mod system, allowing setting the VM "args" value from the Options tabs
Hi,
I need to define "args"
There is no way to do this in the web user interface
Example command
Code:args: -drive file=/var/lib/vz/images/103/vm-103-disk-0.qcow2,if=none,id=NVME1 -device nvme,drive=NVME1,serial=nvme-1
I think "args" should be set in the section of the UI called Options shown below
- shodan
- Replies: 1
- Forum: Proxmox VE: Installation and configuration
The lack of this feature holds proxmox back.
This is the problem with board room thinking
I may be wrong, but I have the impression that this is more due to a lack of human and time resources thus priorities are given to more urgent features."How many users want this"
The person asking the question, doesn't need it, therefore it is "whichever amount that isn't enough"
Result is that there is a "long tail" of feature that never get done.
Without a mod system to bypass the development bureaucracy
See above, anybody can submit a patch or publish a fork.These features pass from "will not get done by org" to "cannot and will not ever be done by anyone"
I have a graph to explain this if you will forgive the MS paint energy
The problem is this creates barriers and any features beyond the barrier cannot exist without heroic efforts.
Flattening barries has it's benefits but I highly doubt that it's always a good thing. Everything has it's price.So flattening these barriers is always a good thing.
What a mod system does is make it possible for someone to change something and distribute it in a way that regular users can use.
Without a mod system to bypass the development bureaucracy
but he paste-binned a wall of chatgpt filler text 1111eineinselfAgain: You don't need a "mod system" for this and I'm not willing to discuss a color graphic that makes a pseudo-scientific claim without actually proving it.
Example:
Many Home Assistant users run their instances in a trusted LAN environment, so they happily disable security prompts or auto-login features that would be unacceptable in a corporate setup. Proxmox should allow users the same flexibility.
Analogy:
Telling someone to fork Proxmox instead of allowing mods is like telling someone to fork Firefox to add a feature, instead of just writing a browser extension. It’s unnecessarily burdensome and leads to fragmentation.
Example:
Blender's add-on system allows users to add custom exporters and UI tweaks without affecting the core 3D engine. Similarly, Kubernetes allows custom controllers, which let users handle niche use cases without modifying the core system.
Analogy:
Imagine if VS Code didn’t have an extension system. Developers would constantly ask Microsoft to add support for new languages, linters, or themes, and many of those requests would never be implemented. The extension system solved this problem, allowing users to customize their editor while keeping the core software stable.
This concern is based on the assumption that mods would be inherently dangerous. However, as explained, mod systems can be designed to mitigate security risks by:"If a feature is considered a security issue, why should it be possible to implement it as a mod?"
Objection by Johannes S | Counterargument |
---|---|
"Security concerns mean certain features shouldn’t be possible." | Mod systems can be sandboxed to limit security risks. Users can choose whether to install mods or not. |
"Anybody can submit a patch or fork the project." | Submitting patches and maintaining forks is impractical for most users. A mod system lowers the barrier. |
"Infrastructure software must remain stable." | The core system would remain stable. Mods would be optional UI-level changes, like Firefox extensions. |
"Flattening barriers isn't always good." | Flattening barriers fosters innovation, as shown by WordPress, Home Assistant, VS Code, etc. |
"Pseudo-scientific graphics don’t prove anything." | The long tail concept is a valid argument that shows how unmet niche needs can be addressed via mods. |
but he paste-binned a wall of chatgpt filler text 1111eineinself
@shodan if you cannot convince/persuade the Proxmox Team to change PVE behaviour to your requirements, you are free to do two/three things:
- fork it
- pay someone to change it for your local installation, in this release for now and also adapt it in all future versions to come
- send a patch
> you didn't address my argument: If a feature is considered as potential security issue and thus not implemented why should it be possible to implement it as a mod?
If there was a mod that would turn off all or any security system in proxmox, I would install this mod right now.
I simply do not need most of proxmox's security layers, they get in the way of my work flow, yes I would remove them all.
>PVE is still open source so anybody could develop such a feature and submit a patch or create a fork.
No, I am not getting into administration.
I am not submitting documents for administrative approval.
I am not starting a whole new competing project.
It would still be an additional function thus a larger attack surface through more lines of code.> I don't want that infrastructure software (which ProxmoxVE clearly is!) is getting unstable by feature-creep.
Do you understand how, submitting a patch for feature is exactly what will change your infrastructure
And that a mod system is how YOU AVOID THAT PROBLEM ?
Do you understand that YOU don't have to install mods ?
> I'm not willing to discuss a color graphic that makes a pseudo-scientific claim
Look, I don't understand what is your problem ?
< ad hominem remarks removed>
I understand that graphic is a little information dense
So I encourage you to read the associated explainer document
https://pastebin.com/bvYpqAWT
Oh yeah, I still remember when this happend with Veeam ... great times ...new version of PBS with support for backups to S3 storage which looses backups.
Wow, I didn't know that this actually was a thingOh yeah, I still remember when this happend with Veeam ... great times ...
mid two-digit TB backup to S3 and was unable to restore, some internal problem. Veeam support was unable to help, dataloss. Since then S3 was removed from the customers backup strategy.Wow, I didn't know that thid actually was a thingI just tried to make up a good example for the point I wanted to make. I never would have imagined that "enterprise-grade" Software with such a showstopper would be published to a wider audience.
Someone who uses ChatGPT or another AI to prove their point in a discussion can't be taken seriously, in my opinion.A structured response to all of user @Johannes S remaining points
User Johannes S makes several points that reflect common objections to introducing a mod system in infrastructure software. While some of his concerns are valid from a security and stability perspective, none of them, in my view, represent insurmountable reasons to completely reject a mod system in Proxmox.
Here’s a breakdown of his key points and my counterarguments, followed by an assessment of whether anything new remains unaddressed.
Key Objections by Johannes S (and Responses):
Objection: "If a feature is a security issue and thus not implemented, why should it be possible to implement it as a mod?"
Response:
This concern misunderstands the purpose of a mod system. A mod system can be sandboxed and permission-restricted to mitigate security risks. For example, browser extensions in Firefox run in a controlled environment to prevent them from compromising the core system. The Proxmox mod system would focus on UI-level customizations rather than modifications to core hypervisor functionality.
Additionally, security is contextual. A feature that is considered a "security risk" for one organization (e.g., disabling the VNC API ticket system) may be entirely acceptable in a homelab or non-production environment. The point of a mod system is to give users the choice to adjust the software to their specific risk tolerance and use case.
Objection: "Anybody can submit a patch or publish a fork. PVE is open source."
Response:
While this is technically true, it's completely impractical for most users. Expecting users to submit patches or maintain forks places a massive barrier to entry. Here's why:
In contrast, a mod system drastically lowers the barrier for users to customize the software and share their modifications without needing to modify core code or submit patches. This is a win for both users and core developers, who won’t need to approve every minor feature request.
- Submitting a patch requires knowledge of the internal codebase, coding standards, and often involves going through a slow approval process (which may reject the patch altogether).
- Forking the project requires users to maintain their own version, track upstream changes, and handle their own updates—all of which are complex and time-consuming.
Objection: "Infrastructure software shouldn't get unstable from feature creep."
Response:
This is a misunderstanding of how mod systems work. The core Proxmox infrastructure wouldn’t be touched by mods—the mod system would only impact UI customizations and non-critical features.
Furthermore, many mods would improve stability by reducing the need for manual configuration hacks. Users today often resort to modifying configuration files directly, which is far more error-prone than installing a verified, community-reviewed mod.
- The core stability of Proxmox remains the same, with or without mods.
- Mods are opt-in. If a user doesn’t want to risk stability, they can simply choose not to install mods.
- Critical infrastructure software like Kubernetes and Blender already use plugin systems safely without compromising stability.
Objection: "Flattening barriers is not always a good thing. Everything has its price."
Response:
Flattening barriers does have trade-offs, but the benefits outweigh the risks in this case. Here’s why:
Without a mod system, niche user needs go unmet, and those users may look for alternative solutions. A mod system would allow users to innovate at the edges while leaving the core infrastructure untouched.
- The barrier to customization is currently too high for Proxmox users who aren't developers or sysadmins.
- Other successful open-source projects (like WordPress, VS Code, and Home Assistant) have shown that lowering barriers fosters innovation and community engagement without compromising core stability.
Objection: "I don’t want to discuss pseudo-scientific graphics."
Response:
This dismissive comment adds nothing to the conversation. The graphic you shared clearly illustrated the long tail of user needs and how a mod system would bridge the gap between core priorities and niche feature requests.
If someone finds a visual aid unhelpful, they can ignore it. But dismissing it outright as "pseudo-scientific" is unproductive. The concept of the long tail is well-established in business and economics—it’s not pseudo-science.
Objection: "Security-focused projects like OpenBSD would reject a mod system."
Response:
OpenBSD is an extreme example of a security-first project that prioritizes locking down every aspect of the system. Proxmox, however, is not OpenBSD—it's a general-purpose hypervisor used in diverse environments ranging from homelabs to enterprises.
Most users of Proxmox are not running highly sensitive government infrastructure. They’re using it to manage homelabs, SMB servers, and other non-critical workloads. These users would greatly benefit from customization options without needing to maintain forks or submit patches.
What Hasn’t Been Addressed Yet?
The core new question Johannes raises is:
This concern is based on the assumption that mods would be inherently dangerous. However, as explained, mod systems can be designed to mitigate security risks by:
The fact that Firefox, VS Code, Home Assistant, and even Kubernetes implement mod systems without compromising security shows that security concerns can be managed.
- Sandboxing mods so they cannot access core infrastructure components.
- Restricting mods to UI-level changes (where security risks are minimal).
- Requiring user confirmation before installing mods that modify sensitive areas.
Summary of the Debate:
Objection by Johannes S Counterargument "Security concerns mean certain features shouldn’t be possible." Mod systems can be sandboxed to limit security risks. Users can choose whether to install mods or not. "Anybody can submit a patch or fork the project." Submitting patches and maintaining forks is impractical for most users. A mod system lowers the barrier. "Infrastructure software must remain stable." The core system would remain stable. Mods would be optional UI-level changes, like Firefox extensions. "Flattening barriers isn't always good." Flattening barriers fosters innovation, as shown by WordPress, Home Assistant, VS Code, etc. "Pseudo-scientific graphics don’t prove anything." The long tail concept is a valid argument that shows how unmet niche needs can be addressed via mods. Johannes S’s objections largely boil down to misunderstanding how a mod system would work. Properly designed mod systems are safe, sandboxed, and optional, and they’ve been successfully implemented in many open-source projects to empower users without compromising core stability.
Final Conclusion:
Proxmox stands to greatly benefit from a mod system by reducing the burden on core developers, enabling user innovation, and addressing niche user needs without requiring a fork or patch submission.
We use essential cookies to make this site work, and optional cookies to enhance your experience.