Skip to main content
  1. 2023/
  2. Posts from January/

Monitoring Proxmox via API

Create a monitoring group Add PVEAuditor role to monitoring group Create lpar2rrd user under monitoring group

The following is taken almost verbatim from the PVE User Management Documentation1

Permission Management #

In order for a user to perform an action (such as listing, modifying or deleting parts of a VM’s configuration), the user needs to have the appropriate permissions.

Proxmox VE uses a role and path based permission management system. An entry in the permissions table allows a user, group or token to take on a specific role when accessing an object or path. This means that such an access rule can be represented as a triple of (path, user, role), (path, group, role) or (path, token, role), with the role containing a set of allowed actions, and the path representing the target of these actions.

Roles #
Privileges #
Objects and Paths #
Inheritance #
Pools #

Pools can be used to group a set of virtual machines and datastores.
You can then simply set permissions on pools (/pool/{poolid}), which are inherited by all pool members.
This is a great way to simplify access control.

Which Permissions Do I Need? #

The required API permissions are documented for each individual method, and can be explored interactively with the PVE-api-viewer2

Command Line Tool #

Proxmox Default Roles #