Proxmox VE 4.1 provides an open source, enterprise virtualization platform on which to host virtual servers as either virtual machines or containers.
This book will support your practice of the requisite skills to successfully create, tailor, and deploy virtual machines and containers with Proxmox VE 4. Following a survey of PVE's features and characteristics,this book will contrast containers with virtual machines and establish cases for both. It walks through the installation of Proxmox VE, explores the creation of containers and virtual machines, and suggests best practices for virtual disk creation, network configuration, and Proxmox VE host and guest security.Throughout the book, you will navigate the Proxmox VE 4 web interface and explore options for command-line management.
Learning Proxmox VE is a practical exploration of the different processes and procedures, which are essential in beginning your journey to fluent creation and optimization of effective containers and virtual machines.
This book is intended for server and system administrators and engineers who are eager to take advantage of the potential of virtual machines and containers to manage servers more efficiently and make the best use of resources, from energy consumption to hardware utilization and physical real estate.
- Install and configure Proxmox VE
- Create new virtual machines and containers
- Import container templates and virtual appliances
- Optimize virtual machine performance for common use cases
- Apply the latest security patches to a Proxmox VE host
- Contrast PVE virtual machines and containers to recognize their respective use cases
- Secure virtual machines and containers
- Assess the benefits of virtualization on budgets, server real estate, maintenance, and management time
"Proxmox VE Fundamentals" outlines Proxmox VE's features and distinguishing characteristics and briefly compares and contrasts virtual machines and containers.
- Proxmox VE in brief
- Virtualization with Proxmox VE
Chapter 2: Installing Proxmox VE
"Installing Proxmox VE" goes through the Proxmox VE installation process after covering Proxmox VE's hardware requirements and discussing minimal and optimal hardware specifications.
- Hardware requirements and recommendations for Proxmox VE
- Downloading Proxmox VE
- Verifying the downloaded image
- Ensuring hardware virtualization extensions are installed
- Preparing for the Proxmox VE Installer
- Installing Proxmox VE
- Upgrading PVE from the command line
Chapter 3: Creating Containers
"Creating Containers" starts with a primer on containers and their uses before providing a walk-through of the container creation processes, including choosing and downloading an OS or virtual appliance template.
- Understanding the container advantage
- Container templates
- Downloading templates
- From template to container
- Starting and stopping containers
Chapter 4: Creating Virtual Machines
Chapter 4, "Creating Virtual Machines," first elaborates on the functional differences between virtual machines and suggests prospective use cases and the inherent benefits and drawbacks of full virtualization. It then walks through the process of creating and configuring virtual machines intended for Microsoft Windows Server and Fedora Server.
- Distinguishing features of virtual machines
- Creating a virtual machine
- Practicing the creation of virtual machines
Chapter 5: Working with Virtual Disks
Chapter 5, "Working with Virtual Disks," compares and contrasts virtual hard disk options, including disk image types, virtual bus/interfaces, and cache types.
- Understanding virtual disks
- Learning more
Chapter 6: Networking with Proxmox VE
Chapter 6, "Networking with Proxmox VE," contrasts common virtual Ethernet adapter options provided by Proxmox VE and works to articulate use cases for each.
- Proxmox VE network model
- Network configuration for virtual servers
Chapter 7, "Securing Proxmox VE," enumerates strategies for mitigating security threats to virtualized datacenters in general, and Proxmox VE hosts and guests in particular.
- Security benefits of virtualization
- Aggravated vulnerabilities
- Taking action