syselement's Blog
🏠 Home BlogXGitHub📚 Buy Me a Book📧 Contact
  • 🏠Home
  • 🔳Operating Systems
    • 🐧Linux
      • 📃Everything Linux
      • Linux Distros
        • Kali Linux - VM
        • ParrotOS - VM
        • Rocky Linux
        • Ubuntu Desktop - VM
        • Ubuntu Server - VM
      • Linux Tools
        • BookStack
        • Nessus Essentials
        • SysReptor
        • Terminator
        • UniFi
        • Zsh & Oh-My-Zsh
    • 🪟Windows
      • 📃Everything Windows
      • Windows Tools
        • Hashcat
        • Vagrant
      • Windows Virtual Machines
        • Windows 11 - VM
        • Windows Server 2025 - VM
  • 📝Courses Notes
    • eLearnSecurity / INE
      • eJPT - PTSv2
      • eMAPT
      • ICCA
    • Practical Networking
      • Practical TLS
        • TLS/SSL Overview
        • Cryptography
        • x509 Certificates and Keys
        • Security through Certificates
        • Cipher Suites
        • TLS/SSL Handshake
        • TLS Defenses
        • TLS Attacks & Vulnerabilities
        • What's new in TLS 1.3?
        • TLS 1.3 Under the Hood
        • TLS 1.3 Extensions
        • 🌐Practical TLS References
    • TCM Security
      • Linux101
      • MAPT
      • PEH
  • 🖥️Cyber Everything
    • 📌Generic Resources
      • Cryptography
      • CVSS 3.1
      • Cyber Threat Intelligence (CTI)
    • 📱Mobile
      • Apps Lab
        • Android Rooting Guide
        • iOS Jailbreak Guide
        • Intercepting Android App Traffic
      • OWASP MAS
        • MASTG Techniques
        • MASTG Tests
        • MASTG Theory
        • MASVS Notes
      • Tools
        • MobSF
    • 🧬Network
      • Commands
        • Linux Privesc Commands
        • Networking Commands
    • 🌐Web
      • API
        • API Sec Fundamentals
        • API Penetration Testing
      • PortSwigger Academy
        • Server-Side Topics
        • Client-Side Topics
        • Advanced topics
        • 🔬Vulnerability Labs
    • ✍️Writeups & Walkthroughs
      • 🌩️TryHackMe
        • 📖Learn
          • Cyber Threat Intelligence
          • Intro to Defensive Security
          • Juice Shop
          • Upload Vulnerabilities
        • 🎯Practice
          • Easy
            • Blaster
            • Blue
            • Bolt
            • Chill Hack
            • Ice
            • Ignite
            • Retro
            • Startup
          • Medium
            • Blog
      • 📦HackTheBox
      • 🚩Capture The Flag
  • ♾️DevOps Everything
    • 🔗DevOps Resources
      • Introduction to DevOps
      • Ansible
      • Docker
      • Git
      • Kubernetes
      • Terraform
      • Vim
  • 🔬Home Lab
    • 🖥️Hypervisors
      • Hyper-V
        • Windows WSL
      • Proxmox
        • Proxmox VE
        • Proxmox Upgrade 7 to 8
      • VMware
        • VMware Workstation Pro
    • 🔴Offensive Labs
      • Hashcat Password Cracking
      • Metasploitable3
    • 🔵Defensive Labs
      • Detection Lab
    • ⚪Misc Labs
      • Bitwarden On-Premise
      • OpenWrt & WiFi Exploitation
      • Passbolt CE - Ubuntu Server
Powered by GitBook
On this page
  • 🌐 Resources 🔗
  • Updating PVE - Manually
  • Post Install
  • Kernel Clean
  • Processor Microcode
  • Network configuration
  • Software on PVE
  • bash Config
  • Netdata
  • Backup Proxmox Config
  • Proxmox Backup Server LXC
  • PBS post install
  • LXC
  • LXCs - Undo Autologin
  • LXCs - Cleaner
  • LXCs - Updater
  • LXC - Filesystem Trim
  • Uptime Kuma
  • AdGuard Home
  • Vaultwarden
  • Zoraxy
  • Wiki.js
  • Technitium DNS
  • PiHole
  • Homepage
  • Runtipi
  • Prometheus
  • Jellyfin Media Server
  • BookStack
  • phpIPAM
  • Cosmos Cloud
  • Kavita
  • NetBox
  • Checkmk
  • Kasm
  • Ubuntu Server VM
  • Resize disk
  • First Config
  • Software
  • Zsh & Oh-My-Zsh
  • Docker
  • Tailscale
  • microk8s
  • BookStack (only on fresh Ubuntu)
  • Alpine VM

Was this helpful?

Edit on GitHub
  1. Home Lab
  2. Hypervisors
  3. Proxmox

Proxmox VE

PreviousProxmoxNextProxmox Upgrade 7 to 8

Last updated 2 months ago

Was this helpful?

Proxmox Virtual Environment (Proxmox VE) is an open-source server virtualization platform that lets you manage both virtual machines and containers in a unified environment. It utilizes the Type 1 (bare-metal) KVM hypervisor for full hardware virtualization, providing robust and efficient management of diverse workloads while also offering lightweight container-based virtualization through LXC.


🌐 Resources 🔗


❗ Use the Proxmox shell on the main node via the pve web GUI

Updating PVE - Manually

  • Open the Proxmox shell on the main node (or SSH into PVE -> risky)

apt update && apt -y dist-upgrade

Post Install

  • Use this Proxmox VE Helper-script to

    • Correct Proxmox VE Sources

    • Disable pve-enterprise repository

    • Enable pve-no-subscription repository

    • Enable ceph package repositories

    • Add pvetest repository

    • Disable subscription nag (Delete browser cache)

    • Disable high availability

    • Update Proxmox VE

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/misc/post-pve-install.sh)"

# It is recommended to answer “yes” (y) to all options presented during the process.

Kernel Clean

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/misc/kernel-clean.sh)"

Processor Microcode

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/misc/microcode.sh)"

Network configuration

cat /etc/network/interfaces
auto lo
iface lo inet loopback

iface enp2s0 inet manual

auto vmbr0
iface vmbr0 inet static
        address 192.168.5.2/24
        gateway 192.168.5.254
        bridge-ports enp2s0
        bridge-stp off
        bridge-fd 0

iface wlp3s0 inet manual
cat /etc/resolv.conf
search lan.syselement.com
nameserver 9.9.9.9
nameserver 1.1.1.1
 cat /etc/hosts
127.0.0.1 localhost.localdomain localhost
192.168.5.2 pve.lan.syselement.com pve

# The following lines are desirable for IPv6 capable hosts

::1     ip6-localhost ip6-loopback
fe00::0 ip6-localnet
ff00::0 ip6-mcastprefix
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
ff02::3 ip6-allhosts

Software on PVE

apt install -y btop duf exa nano net-tools tree

bash Config

  • Set custom aliases

nano ~/.bashrc
# Custom aliases

alias ipa='ip -br -c a'
alias l='exa -lah'
alias la='ls -A'
alias ll='l -T'
alias ls='ls -lh --color=auto'
alias ports='ss -lpntu'
alias updatepve='apt update && apt -y dist-upgrade'

Netdata

Backup Proxmox Config

Backup

cd /root/; wget -qO- https://raw.githubusercontent.com/DerDanilo/proxmox-stuff/master/prox_config_backup.sh
  • Set the permanent backups directory environment variable or edit the script to set the $DEFAULT_BACK_DIR variable to your preferred backup directory

export BACK_DIR="/path/to/backup/directory"
  • Make the script executable

 chmod +x ./prox_config_backup.sh
  • Shut down ALL VMs + LXC Containers if you want to go the safe way. (Not required)

  • Run the script

./prox_config_backup.sh

Notification

  • Set the $HEALTHCHECK variable to 1

  • Set the $HEALTHCHECK_URL variable to the full ping URL for your check. Do not include anything after the UUID, the status flag will be added by the script.


PROXMOX - Network > edit eth0 and set the Static IP.

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/proxmox-backup-server.sh)"

# PBS Interface <IP>:8007

# Set a root password if using autologin. This will be the PBS password.
# Login to WebGUI and open PBS shell
sudo passwd root

PBS post install

  • Disable the Enterprise Repo

  • Add/Correct PBS Sources

  • Enable the No-Subscription Repo

  • Add Test Repo

  • Disable Subscription Nag

  • Update and reboot Proxmox Backup Server

Run the command below in the Proxmox Backup Server Shell and answer "yes" to all options presented

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/misc/post-pbs-install.sh)"

LXC

If you don't set a root password first, you will not be able to login to the container again, ever.

  1. set the root password sudo passwd root

  2. remove --autologin root from /etc/systemd/system/container-getty@1.service.d/override.conf

  3. reboot

LXCs - Cleaner

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/misc/clean-lxcs.sh)"

LXCs - Updater

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/misc/update-lxcs.sh)"

LXC - Filesystem Trim

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/misc/fstrim.sh)"

DELETED

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/uptimekuma.sh)"

PROXMOX - Network > edit eth0 and set the Static IP.

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/adguard.sh)"

# Setup interface <IP>:3000

# To Manually Update AdGuard Home, run the command above (or type update) in the AdGuard LXC Console.
  • Based on Alpine Linux

bash -c "$(wget -qO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/alpine-vaultwarden.sh)"

# To Update Alpine-Vaultwarden, or Set the Admin Token, run the command above in the Vaultwarden LXC Console.
# or run
apk update && apk upgrade

PROXMOX - Network > edit eth0 and set the Static IP.

PROXMOX - Network > edit eth0 and set the Static IP.

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/zoraxy.sh)"

# To Manually Update Zoraxy, run the command above (or type update) in the Zoaxy LXC Console.
  • Set Proxy Root to localhost:8080

  • Status - set Use TLS to serve proxy request and Start Service

  • Create Proxy Rules - new proxy rule for Vaultwarden

    • Proxy Type - Sub-domain

    • Subdomain Matching Keyword - vaultwarden.lab.syselement.com

    • Target IP - 192.168.5.7:8000 (Vaultwarden LXC IP)

    • Create Endpoint

Local HOST/DNS - set vaultwarden.lab.syselement.com to Zoraxy LXC IP (or forward port 80 and 443 from your router to your Zoraxy LXC IP).

# e.g. C:\Windows\System32\drivers\etc\hosts
192.168.5.6 vaultwarden.lab.syselement.com
192.168.5.6 wiki.lab.syselement.com

PROXMOX - Network > edit eth0 and set the Static IP.

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/wikijs.sh)"

# Wiki.js Interface <IP>:3000

# To Manually Update Wiki.js, run the command above (or type update) in the Wiki.js LXC Console.

PROXMOX - Network > edit eth0 and set the Static IP.

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/technitiumdns.sh)"

# Technitium DNS Interface <IP>:5380

# To Manually Update Technitium DNS, run the command above (or type update) in the Technitium DNS LXC Console.

Open the webpage and navigate to Zones

  • Add Zone - Primary Zone: lab.syselement.com

  • Enter the lab.syselement.com zone

    • Add Record

      • Name: vaultwarden

      • IPv4 Address: 192.168.5.6

      • Save it

    • Add another record for wiki with the same IP

Settings - Blocking

  • Enable Blocking

  • Allow/Block List URLs - Quick Add - e.g. Steven Black...

  • Save Settings

Settings - Proxy & Forwarders

  • Forwarders - Quick Select - e.g. Quad9 Secure (DNS-over-HTTPS)

  • Save Settings

📌 To use Techitium as a DNS server, set its IP 192.168.5.11 as DNS server in the client PC network configuration

# e.g. Windows
ipconfig /all

DNS Servers . . . : 
	192.168.5.11
	9.9.9.9
		DoH: https://dns.quad9.net/dns-query

OFF

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/pihole.sh)"

# Reboot Pi-hole LXC after install
#P i-hole Interface <IP>/admin

# To set your password:
pihole -a -p

PROXMOX - Network > edit eth0 and set the Static IP.

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/homepage.sh)"

# Homepage Interface: IP:3000

# To Manually Update Homepage, run the command above (or type update) in the Homepage LXC Console.
  • Configuration (bookmarks.yaml, services.yaml, widgets.yaml) path

cd /opt/homepage/config/

PROXMOX - Network > edit eth0 and set the Static IP.

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/runtipi.sh)"

PROXMOX - Network > edit eth0 and set the Static IP.

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/prometheus.sh)"
bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/jellyfin.sh)"

Windows

  • Update

    1. Download the latest version.

    2. Close or Stop Jellyfin (service) if it is running.

    3. Run the installer.

    4. If everything was completed successfully, the new version is installed.

    5. Run services.msc

      • open Jellyfin Server service properties

      • set Log On to Local System account

      • save and start the service

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/bookstack.sh)"

# BookStack Interface <IP>:80

# Bookstack works only with static ip. If you Change the IP of your LXC, you Need to edit the .env File nano /opt/bookstack/.env

# To Manually Update BookStack, run the command above (or type update) in the BookStack LXC Console.
# Default Login Credentials
# Username:
admin@admin.com
# Password:
password
bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/phpipam.sh)"

# Run the "3 Advanced Setting" to set static IP
# phpIPAM Interface <IP>:80

# To Manually Update phpIPAM, run the command above (or type update) in the phpIPAM LXC Console.
# Default Login Credentials
# Username:
Admin
# Password:
ipamadmin
bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/cosmos.sh)"

# Cosmos Interface <IP>:80

# To Manually Update Cosmos, run the command above (or type update) in the Cosmos LXC Console.
bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/kavita.sh)"

# Kavita Interface <IP>:5000

# To enable folder adding append your lxc.conf on your host with 'lxc.environment: DOTNET_SYSTEM_GLOBALIZATION_INVARIANT=1'

# To Manually Update Kavita, run the command above (or type update) in the Kavita LXC Console.
bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/netbox.sh)"

Checkmk

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/checkmk.sh)"

Kasm

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/checkmk.sh)"

Ubuntu Server VM

bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/vm/ubuntu2404-vm.sh)"

Turn OFF the VM (if ON).

  • User

  • Password

  • SSH public key for SSH Key login

  • Upgrade packages - No

  • Static IP (may need DHCP)

  • Click Regenerate Image

Start the VM.

  • Open the VM Console using xterm.js

Resize disk

PROXMOX - Hardware > Hard Disk (scsi0) > Disk Action > Resize

In the VM Console:

sudo parted /dev/sda
resizepart 1
# Fix
# Partition number: 1
# Yes
# End? -0
quit

sudo reboot

First Config

  • SSH

### Settings for SSH with Password
sudo sed -i -e 's/^PasswordAuthentication.*/PasswordAuthentication yes/' /etc/ssh/sshd_config && sudo systemctl restart sshd

#### Settings SSH with SSH Key + Disable root login
# Paste your SSH Public Key into ~/.ssh/authorized_keys (if not set by Proxmox Cloud-Init) and set sshd_config accordingly
sudo nano /etc/ssh/sshd_config
# Paste these lines
PermitRootLogin no
ChallengeResponseAuthentication no
PasswordAuthentication no
UsePAM no
AuthenticationMethods publickey
PubkeyAuthentication yes
PermitEmptyPasswords no


# Save and exit the file
# Restart the sshd service
sudo systemctl restart sshd

# Check sshd config with
sudo sshd -T
  • Timezone and Updates

# TIMEZONE
sudo timedatectl set-timezone Europe/Rome

# DISABLE AUTOMATIC UPDATES
sudo nano /etc/apt/apt.conf.d/20auto-upgrades
# make sure all the directives are set to “0”
sudo systemctl disable apt-daily-upgrade.timer
sudo systemctl mask apt-daily-upgrade.service
sudo systemctl disable apt-daily.timer
sudo systemctl mask apt-daily.service

# Change "root" user password
sudo passwd root

Software

  • SSH into the VM

sudo apt update -y && sudo apt -y upgrade

sudo apt install -y btop curl duf eza iftop locate nano ncdu fastfetch net-tools nload npm pipx qemu-guest-agent sysstat ugrep wget zsh
sudo apt-add-repository ppa:zanchey/asciinema
sudo apt update && sudo apt install asciinema

Zsh & Oh-My-Zsh

Docker

sudo su

# Docker Engine
sh <(curl -sSL https://get.docker.com)

# Docker Compose
LATEST=$(curl -sL https://api.github.com/repos/docker/compose/releases/latest | grep '"tag_name":' | cut -d'"' -f4)
DOCKER_CONFIG=${DOCKER_CONFIG:-$HOME/.docker}
mkdir -p $DOCKER_CONFIG/cli-plugins
curl -sSL https://github.com/docker/compose/releases/download/$LATEST/docker-compose-linux-x86_64 -o ~/.docker/cli-plugins/docker-compose
chmod +x $DOCKER_CONFIG/cli-plugins/docker-compose
docker compose version

# Add a user to the "docker" group to let it run Docker
sudo groupadd docker

sudo gpasswd -a "${USER}" docker
mkdir -p /opt/{dockge,stacks}
wget -q -O /opt/dockge/compose.yaml https://raw.githubusercontent.com/louislam/dockge/master/compose.yaml
cd /opt/dockge
docker compose up -d
# Install Portainer
docker volume create portainer_data
docker run -d \
  -p 8000:8000 \
  -p 9443:9443 \
  --name=portainer \
  --restart=always \
  -v /var/run/docker.sock:/var/run/docker.sock \
  -v portainer_data:/data \
  portainer/portainer-ce:latest
    • Go to Settings > Back up Portainer - Download backup file

    • Proceed with updating

# Update Portainer
docker stop portainer
docker rm portainer
docker pull portainer/portainer-ce:2.20.2
docker run -d -p 8000:8000 -p 9443:9443 --name=portainer --restart=always -v /var/run/docker.sock:/var/run/docker.sock -v portainer_data:/data portainer/portainer-ce:2.20.2
sudo mkdir -p ~/docker/mobsf

sudo chown 9901:9901 ~/docker/mobsf

docker run -it --rm --name mobsf -p 8010:8010 -v ~/docker/mobsf:/home/mobsf/.MobSF opensecurity/mobile-security-framework-mobsf:latest
docker run -d --name wyl \
        -e "IFACE=eth0" \
        -e "TZ=Europe/Rome" \
        --network="host" \
        -v watchyourlan_data:/data \
    aceberg/watchyourlan
  • Open the VM shell and run:

curl -fsSL https://tailscale.com/install.sh | sh

sudo tailscale up

# Follow the instruction to register the device
  • On the host being connected to, you need to advertise that Tailscale is managing SSH connections which originate from the Tailscale network to this host

sudo tailscale up --ssh

# This generates a host keypair, shares its public half with the Tailscale control plane for distribution to clients, and configures tailscaled to intercept all traffic from your tailnet that is routed to port 22 on the Tailscale IP address. This SSH initialization only needs to be done once per host.
  • Install microk8s

sudo snap install microk8s --classic

###
sudo usermod -a -G microk8s $USER
sudo mkdir -p ~/.kube
sudo chmod 0700 ~/.kube
sudo chown -f -R $USER ~/.kube

# Close SSH session and reopen it

microk8s status --wait-ready
  • Some commands

microk8s stop
microk8s start

microk8s kubectl get nodes
microk8s kubectl get services
microk8s kubectl get pods

microk8s enable dns
microk8s enable hostpath-storage
microk8s enable ingress
microk8s enable core/metrics-server

# Community Add-ons repository
microk8s enable community
microk8s enable portainer
# microk8s disable portainer
microk8s.kubectl config view --raw > $HOME/.kube/config

# Install k9s
 brew install derailed/k9s/k9s
 # Run it and check microk8s cluster
 k9s

BookStack (only on fresh Ubuntu)

  • SSH into the Ubuntu VM and run the BookStack Ubuntu Installation script

❗ A script to install BookStack on a fresh instance of Ubuntu 24.04 is available. This script is ONLY FOR A FRESH OS, it will install Apache, MySQL 8.0 & PHP 8.3 and could OVERWRITE any existing web setup on the machine. It also does not set up mail settings or configure system security so you will have to do those separately. You can use the script as a reference if you’re installing on a non-fresh machine.

# Download the script
wget https://raw.githubusercontent.com/BookStackApp/devops/main/scripts/installation-ubuntu-22.04.sh

# Make it executable
chmod a+x installation-ubuntu-22.04.sh

# Run the script with admin permissions
sudo ./installation-ubuntu-22.04.sh

# Set the VM IP as domain during the first run of BookStack

📌 Default login: admin@admin.com:password


bash -c "$(wget -qLO - https://github.com/community-scripts/ProxmoxVE/raw/main/ct/alpine.sh)"
# To update
apk update && apk upgrade

🔗

➡️

📌 Some of the following commands are based on the

Download the

The script supports notifications, either to the hosted service, or a self-hosted instance. The notification sends during the final cleanup stage, and either returns 0 to tell Healthchecks that the command was successful, or the exit error code (1-255) to tell Healthchecks that the command failed. To enable:

LXCs -

Set https://vaultwarden.lab.syselement.com in the General settings - Domain URL admin menu .

Vaultwarden needs to be behind a proxy (e.g. ) to obtain HTTPS and to allow clients to connect.

Check configuration too and use the Technitium server IP as DNS Server.

Installed on Windows via exe at

🔗 ➡️ My additional/updated guide

Follow the instruction at to set up Cloud-Init on the VM:

Follow the guide here to setup ZSH with Oh-My-Zsh -

Login to

Set .kube/config file for

🔗

​ 🔗

​ 🔗

Install a fresh

🔬
🖥️
Proxmox Virtual Environment (PVE) Administration Guide
Proxmox Virtual Environment - Open-Source Server Virtualization Platform
Proxmox VE Helper-Scripts
Proxmox VE Helper-Scripts
Netdata - http://192.168.5.2:19999/
https://github.com/DerDanilo/proxmox-stuff
script
healthchecks.io
Proxmox Backup Server LXC
Proxmox Backup Server - https://192.168.5.3:8007
Undo Autologin
Uptime Kuma
AdGuard Home
AdGuard - http://192.168.5.5:3080
Vaultwarden
Vaultwarden - http://192.168.5.7:8000
Vaultwarden Admin - http://192.168.5.7:8000/admin
https://vaultwarden.lab.syselement.com/#/login
https://vaultwarden.lab.syselement.com/admin
http://192.168.5.7:8000/admin
Zoraxy
Zoraxy - http://192.168.5.6:8000/
Wiki.js
Wiki.js - http://192.168.5.10:3000/
https://wiki.lab.syselement.com/login
Technitium DNS
Technitium - http://192.168.5.11:5380/
PiHole
Homepage
Homepage - http://192.168.5.13:3000/
Runtipi
Runtipi - http://192.168.5.14/dashboard
Prometheus
Prometheus - http://192.168.5.15:9090/
Jellyfin Media Server
https://repo.jellyfin.org/?path=/server/windows/latest-stable/amd64
BookStack
BookStack - http://192.168.5.164/
phpIPAM
phpIPAM - http://192.168.5.8
Cosmos Cloud
Cosmos Cloud - http://192.168.5.159/
Kavita
Kavita - http://192.168.5.145:5000/
NetBox
Useful Ubuntu 22.04 VM Commands
Zsh & Oh-My-Zsh - syselement
Dockge
Dockge - http://192.168.5.200:5001
Portainer
Portainer - https://192.168.5.200:9443
Updating Docker Standalone Portainer
MobSF
WatchYourLan
WatchYourLan - http://192.168.5.200:8840/
Tailscale
Tailscale
Tailscale SSH
microk8s
k9s
BookStack Admin Documentation - Installation
docker-bookstack
Ubuntu 24.04 Installation Script
Alpine VM
10 Alpine Linux apk Command Examples - nixCraft
Zoraxy
Technitium DNS
Ubuntu Server VM
Ubuntu Server - VM
proxmox.com