https://github.com/devnullvoid/pvetui
Terminal UI for Proxmox VE
https://github.com/devnullvoid/pvetui
go proxmox proxmox-ve pve terminal-ui tui virtualization
Last synced: 29 days ago
JSON representation
Terminal UI for Proxmox VE
- Host: GitHub
- URL: https://github.com/devnullvoid/pvetui
- Owner: devnullvoid
- License: mit
- Created: 2025-05-03T17:18:27.000Z (11 months ago)
- Default Branch: master
- Last Pushed: 2026-02-10T05:59:43.000Z (about 1 month ago)
- Last Synced: 2026-02-10T10:48:41.927Z (about 1 month ago)
- Topics: go, proxmox, proxmox-ve, pve, terminal-ui, tui, virtualization
- Language: Go
- Homepage: https://pvetui.org
- Size: 126 MB
- Stars: 569
- Watchers: 4
- Forks: 16
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Contributing: CONTRIBUTING.md
- Funding: FUNDING.yml
- License: LICENSE
- Agents: AGENTS.md
Awesome Lists containing this project
- awesome-proxmox-ve - ๐งฐ pvetui
README
pvetui
A Terminal User Interface For Proxmox Virtual Environment
Features โข
Screenshots โข
Installation โข
Configuration โข
Usage โข
Theming โข
VNC Console
## ๐ Features
- **Lightning Fast**: Intelligent caching for responsive performance
- **Complete Management**: VMs, containers, nodes, and cluster resources
- **Multi-Profile Support**: Manage multiple Proxmox connections with profile switching
- **Automatic Migration**: Legacy configs seamlessly migrate to modern profile-based format
- **Secure Authentication**: API tokens or password-based auth with automatic renewal
- **Integrated Shells**: SSH directly to nodes, VMs, and containers
- **VNC Console Access**: Embedded noVNC client with automatic authentication
- **Plugin System**: Opt-in extensions including the Community Scripts installer; enable via Manage Plugins dialog or config file
- **Modern Interface**: Vim-style navigation with customizable key bindings
- **Flexible Theming**: Automatic adaptation to terminal emulator color schemes
- **Comprehensive Documentation**: Detailed guides for configuration, theming, and development
- **Group Mode (multi-cluster)**: Combine multiple Proxmox profiles into one unified view with routed actions per cluster
## ๐ธ Screenshots

Node Management - Real-time cluster monitoring and control

Guest Management - VM and container operations
**๐ธ See [docs/SCREENSHOTS.md](docs/SCREENSHOTS.md) for a complete showcase of all available screenshots and interface features**
## ๐ฆ Installation
### Quick Start
### **Install via Go** (Go 1.24+)
> **Recommended for Go users**: pvetui now supports one-command install using Go modules!
```bash
go install github.com/devnullvoid/pvetui/cmd/pvetui@latest
```
**From Pre-compiled Binaries:**
1. Download from [Releases](https://github.com/devnullvoid/pvetui/releases)
2. Extract and run: `./pvetui`
> **macOS Users**: You may encounter Gatekeeper warnings with pre-compiled binaries. See [Troubleshooting Guide](docs/TROUBLESHOOTING.md#-macos-issues) for solutions including bypassing the warning or building from source.
### Package Managers
**Arch Linux (AUR):**
[](https://aur.archlinux.org/packages/pvetui-git/)
[](https://aur.archlinux.org/packages/pvetui/)
[](https://aur.archlinux.org/packages/pvetui-git/)
```bash
# Binary package (recommended)
yay -S pvetui-bin
# Build release package from source
yay -S pvetui
# OR build from source
yay -S pvetui-git
```
**macOS (Homebrew Cask):**
```bash
# Install directly from the tap (brew will auto-clone devnullvoid/homebrew-pvetui)
brew install --cask devnullvoid/pvetui/pvetui
```
**Windows (Scoop):**
```bash
# Add the bucket
scoop bucket add pvetui https://github.com/devnullvoid/scoop-pvetui
# Install pvetui
scoop install pvetui
```
**From Source:**
```bash
git clone https://github.com/devnullvoid/pvetui.git
cd pvetui
make install # Build and install from source
# or: make install-go # Install via Go toolchain
```
## ๐ง Configuration
### First Run & Interactive Config Wizard
- On first run, the app will offer to create and edit a config file in a user-friendly TUI wizard
- Launch the wizard anytime with `--config-wizard`
- Create and manage multiple connection profiles with validation
- Edit, validate, and save your config (supports SOPS-encrypted files)
- Only one authentication method (password or token) per profile is allowed
- All errors and confirmations are shown in clear, interactive modals
### Configuration Format
pvetui uses a modern multi-profile configuration format that supports multiple Proxmox connections:
```yaml
profiles:
default:
addr: "https://your-proxmox-host:8006"
user: "your-user"
realm: "pam"
# Choose one authentication method:
password: "your-password" # Method 1: Password auth
# OR
token_id: "your-token-id" # Method 2: API token (recommended)
token_secret: "your-secret"
insecure: false
ssh_user: "your-ssh-user"
vm_ssh_user: "vm-login-user" # Optional: overrides ssh_user for QEMU VM shells
ssh_jump_host: # Optional: configure a bastion host for SSH
addr: "jump.example.com"
user: "jumpuser"
keyfile: "/path/to/jump.key"
port: 2222
groups:
- all-servers
work:
addr: "https://work-proxmox:8006"
user: "workuser"
token_id: "worktoken"
token_secret: "worksecret"
realm: "pam"
insecure: false
ssh_user: "workuser"
vm_ssh_user: "work-vm-user"
ssh_jump_host:
addr: "work-jump.example.com"
port: 2222
groups:
- all-servers
default_profile: "all-servers" # Can be a profile name or a group name
debug: false
show_icons: true
```
`vm_ssh_user` is optional; when omitted, pvetui reuses `ssh_user`. Set it if your Proxmox host SSH account differs from the accounts you use to log into QEMU guests so VM shells work without duplicating profiles. `ssh_jump_host` is optional and lets you route SSH connections through a bastion host when your Proxmox nodes or VMs are not directly reachable.
Guest tags can be edited from the VM/LXC **Edit Configuration** form using a semicolon-separated list (for example: `prod;monitoring;db`).
### Plugins
pvetui includes an opt-in plugin system for optional features. Plugins are **disabled by default** and must be explicitly enabled.
#### Built-in Plugins
- **`community-scripts`**: Adds the popular Community Scripts installer to node context menus
- **`command-runner`**: Execute whitelisted commands on Proxmox hosts via SSH (requires SSH key setup)
- **`guest-insights`** *(legacy alias: `demo-guest-list`)*: Full guest insights modal (filter/sort/jump-to-guest)
#### Enabling Plugins
**Method 1: Manage Plugins Dialog (Recommended)**
1. Press `g` to open the Global Menu
2. Select **Manage Plugins**
3. Use arrow keys or `j`/`k` to navigate the plugin list
4. Press `Space` to toggle plugins on/off
5. Press `Enter` to save changes
6. Restart pvetui for changes to take effect
**Method 2: Configuration File**
Add plugin IDs to your config file:
```yaml
plugins:
enabled:
- "community-scripts"
- "command-runner"
- "guest-insights" # Guest Insights plugin (legacy alias: demo-guest-list)
```
**๐ For plugin development and advanced details, see [docs/PLUGINS.md](docs/PLUGINS.md)**
### Profile Management
The built-in profile manager allows you to:
- **Switch between profiles** (e.g., home, work, development)
- **Add new profiles** with different Proxmox connections
- **Edit existing profiles** with validation
- **Delete profiles** with confirmation
- **Set default profile** for automatic connection
Access the profile manager through the global menu.
### Group Mode (multi-cluster)
Combine several profiles into a named group to see a unified cluster view (CPU/mem/storage/tasks/guests). Actions are routed to each guestโs source profile/cluster; migration targets are limited to the VMโs own cluster.
Launch directly into a group:
```bash
pvetui --profile="my-group"
```
Notes:
- Group names must not conflict with profile names (validation enforced).
- Refreshes fetch fresh data from all member profiles; pending states are tracked per source profile.
- Migrations stay within the VMโs original cluster; groups of standalone nodes will show โNo other online nodes available.โ
### API Token Setup (Recommended)
1. In Proxmox web interface: **Datacenter โ Permissions โ API Tokens**
2. Click **Add** โ Set user (e.g., `root`) โ Enter token ID
3. Copy the generated **Token ID** and **Secret** to your config
> Note: Proxmox displays the Token ID in the form `user@realm!tokenid` (for example: `root@pam!mytoken`). When configuring pvetui, split those parts into separate fields:
```yaml
profiles:
default:
addr: "https://your-proxmox-host:8006"
user: "root" # from user@realm!tokenid โ user
realm: "pam" # from user@realm!tokenid โ realm
token_id: "mytoken" # from user@realm!tokenid โ tokenid
token_secret: "YOUR_SECRET"
```
### Encrypted Configuration
Supports [SOPS](https://github.com/getsops/sops) encrypted config files. Point to an encrypted YAML file with `--config` and it will decrypt automatically.
Not using SOPS yet? pvetui now auto-detects cleartext `password` and `token_secret` values in plain YAML configs and rewrites the file with encrypted blobs (while updating the running config) as soon as you connect successfully. That keeps legacy configs safe without forcing you to adopt a new workflow.
**๐ For detailed configuration options, key bindings, theming, and advanced features, see [docs/CONFIGURATION.md](docs/CONFIGURATION.md)**
**๐ Complete documentation is available in the [docs/](docs/) folder**
## ๐ Usage
```bash
# Auto-detects config at ~/.config/pvetui/config.yml
./pvetui
# Or specify custom config
./pvetui --config /path/to/config.yml
```
Default paths:
- Linux/macOS config: `~/.config/pvetui/config.yml`
- Linux/macOS cache: `~/.cache/pvetui`
- Windows config: `%APPDATA%/pvetui/config.yml`
- Windows cache: `%LOCALAPPDATA%/pvetui`
Windows legacy fallback:
- Existing `~/.config/pvetui/config.yml` is still auto-detected.
- Existing `~/.cache/pvetui` is still used if the newer `%LOCALAPPDATA%/pvetui` path does not exist.
### Command Line Options
| Flag | Short | Environment Variable | Description |
|------|-------|----------------------|-------------|
| `--config` | `-c` | n/a | Path to YAML config file |
| `--profile` | `-p` | n/a | Connection profile to use (overrides default_profile) |
| `--no-cache` | `-n` | n/a | Disable caching |
| `--version` | `-v` | n/a | Show version information |
| `--config-wizard` | `-w` | n/a | Launch interactive config wizard and exit |
| `--list-profiles` | | n/a | List available connection profiles/groups and exit |
| `--addr` | | `PVETUI_ADDR` | Proxmox API URL |
| `--user` | | `PVETUI_USER` | Proxmox username |
| `--password` | | `PVETUI_PASSWORD` | Proxmox password |
| `--token-id` | | `PVETUI_TOKEN_ID` | Proxmox API token ID |
| `--token-secret` | | `PVETUI_TOKEN_SECRET` | Proxmox API token secret |
| `--realm` | | `PVETUI_REALM` | Proxmox realm |
| `--insecure` | | `PVETUI_INSECURE` | Skip TLS verification |
| `--api-path` | | `PVETUI_API_PATH` | Proxmox API path |
| `--ssh-user` | | `PVETUI_SSH_USER` | SSH username |
| `--vm-ssh-user` | | `PVETUI_VM_SSH_USER` | QEMU VM SSH username (defaults to ssh-user) |
| `--ssh-jumphost-addr` | | `PVETUI_SSH_JUMPHOST_ADDR` | SSH jump host address |
| `--ssh-jumphost-user` | | `PVETUI_SSH_JUMPHOST_USER` | SSH jump host user |
| `--ssh-jumphost-keyfile` | | `PVETUI_SSH_JUMPHOST_KEYFILE` | SSH jump host identity file |
| `--ssh-jumphost-port` | | `PVETUI_SSH_JUMPHOST_PORT` | SSH jump host port |
| `--debug` | | `PVETUI_DEBUG` | Enable debug logging |
| `--cache-dir` | | `PVETUI_CACHE_DIR` | Cache directory path |
| `--age-dir` | | `PVETUI_AGE_DIR` | Age key directory path |
| `--show-icons` | | `PVETUI_SHOW_ICONS` | Show icons/emojis in UI |
**Environment Variables**: All flags can also be set via environment variables with `PVETUI_` prefix (e.g., `PVETUI_ADDR`, `PVETUI_USER`).
### Key Bindings
| Key | Action | Key | Action |
|-----|--------|-----|--------|
| `h j k l` | Navigate | `Alt+1/2/3` | Switch views |
| `Enter` | Select | `[ ]` | Previous/Next view |
| `s` | SSH Shell | `v` | VNC Console |
| `m` | Context Menu | `g` | Global Menu |
| `/` | Search | `a` | Auto-refresh |
| `?` | Help | `q` | Quit |
Customize keys via the `key_bindings` section in your config. See [docs/CONFIGURATION.md#key-bindings](docs/CONFIGURATION.md#key-bindings) for all options (including macOS `Opt` key support).
## ๐จ Theming
pvetui supports semantic theming with automatic adaptation to your terminal's color scheme.
**๐ For detailed theming options, built-in themes, and color customization, see [docs/CONFIGURATION.md#theming](docs/CONFIGURATION.md#theming) and [docs/THEMING.md](docs/THEMING.md)**
## ๐บ VNC Console Access
Built-in noVNC client provides seamless console access:
- **Zero Configuration**: Works out of the box
- **Automatic Authentication**: No separate login required
- **Universal Support**: VMs, containers, and node shells
- **Secure Proxy**: Local WebSocket proxy handles connections
**Note**: Node VNC shells require password authentication (Proxmox limitation).
**Important**: VNC ports must be opened and accessible on the connected Proxmox server. The TUI creates a local WebSocket proxy that connects to the Proxmox VNC endpoint, so ensure your Proxmox server's VNC ports are properly configured and accessible from your client machine.
## ๐ง Requirements
- Access to Proxmox VE cluster
- SSH access for shell functionality
- Go 1.24+ (for building from source)
## ๐ก Tips
- **Use SSH keys for authentication**: For best security and convenience, set up SSH key-based authentication with your Proxmox hosts. Avoid password-based SSH logins.
- **Passwordless pct access**: Add a sudoers rule on your Proxmox hosts to allow your user to run `pct enter` and `pct exec` without being prompted for a password. Proxmox VE does **not** install `sudo` by default, so either install it (and grant your non-root `ssh_user` rights) or connect as `root` so commands run without `sudo`. Example sudoers line:
```
youruser ALL=(ALL) NOPASSWD: /usr/sbin/pct enter *, /usr/sbin/pct exec *
```
### ๐ ๏ธ Troubleshooting
Check our **[Troubleshooting Guide](docs/TROUBLESHOOTING.md)** for solutions to common problems including:
- ๐ **macOS Gatekeeper warnings** (`zsh: killed` errors)
- ๐ช **Windows SmartScreen** and antivirus issues
- ๐ง **Linux permission** problems
- ๐ง **General installation** and configuration issues
## ๐ณ Docker Usage
```bash
git clone https://github.com/devnullvoid/pvetui.git
cd pvetui
cp .env.example .env # Edit with your Proxmox details
docker compose run --rm pvetui
```
See [docs/DOCKER.md](docs/DOCKER.md) for advanced usage.
## ๐ค Contributing
Contributions welcome! Check the [issues page](https://github.com/devnullvoid/pvetui/issues).
## ๐ License
MIT License - see [LICENSE](LICENSE) file for details.
This repository vendors assets from [noVNC](https://github.com/novnc/noVNC) under MPL-2.0, BSD, SIL OFL, MIT, and CC BY-SA licenses. Refer to [THIRD_PARTY_LICENSES.md](THIRD_PARTY_LICENSES.md) for a full breakdown and include that file plus `internal/vnc/novnc/LICENSE.txt` (and sub-licenses) with any binary release artifacts to satisfy attribution and redistribution requirements.
## โข๏ธ Trademark Notice
**Proxmoxยฎ** is a registered trademark of Proxmox Server Solutions GmbH in the EU, the U.S., and other countries. This project is not affiliated with, endorsed by, or sponsored by Proxmox Server Solutions GmbH. "Proxmox" is used solely to describe compatibility with Proxmox Virtual Environment software.
---
### Upgrading Embedded noVNC
This repository includes the noVNC HTML/JS client under `internal/vnc/novnc` via [git subtree](https://www.atlassian.com/git/tutorials/git-subtree). To upgrade to a newer noVNC version, run:
```bash
git subtree pull --prefix=internal/vnc/novnc https://github.com/novnc/noVNC.git --squash
```
Replace `` with the desired version. After updating, prune unnecessary files if you only need the built assets. Commit the results to share the update with all users.