Salvation, a free and open-source solution for beloved PVE! If you love it, REVIEW & SHARE IT! Cheers. โค๏ธ
TNC Dev are looking for a co-developer to assist with finishing the project overhaul.
If you have proven and public git-logged experience, or similar, please say g'day.
Please note: We are only looking for high-quality applicants with spare time.
As it stands, we won't have much spare dev time for this Module in 2025/NY.
- Configure VM/CT plans with custom CPU/RAM/VLAN/On-boot/Bandwidth/etc
- Automatically Provision VMs & CTs in Proxmox VE from WHMCS easily
- Allow clients to view/manage VMs using the WHMCS Client Area
- Create/Suspend/Unsuspend/Terminate via WHMCS Admin Area
- Statistics/Graphing is available in the Client Area for services :)
- Leverage the power of QEMU & LXC with PVE's convenience
- Import existing VM/CT Guest from Proxmox into WHMCS
- Choose PVE VMID start & integrate to your schema
- 128GB+ RAM & 128+ CPU cores per Guest!
https://github.com/The-Network-Crew/Proxmox-VE-for-WHMCS/
Client Area GUI - Landing:
Admin Area GUI - Landing:
Please read the entire README.md file before getting started with Proxmox VE for WHMCS (pvewhmcs).
Please review the module! https://marketplace.whmcs.com/product/6935-proxmox-ve-for-whmcs#reviews
If you want it to remain free and fabulous, it could use a moment of your time in reviewing it. Thanks!
- (WHMCS) v8.x.x stable (HTTPS)
- (NET) WAN Access: WHMCS to PVE
- (VNC) Special Requirements: PTR, etc.
- (PHP) v8.x.x (latest stable version)
- (PHP) max_execution_time = 300
- (Proxmox) 2 users (API & VNC)
- (Proxmox) VE v8.x.x (current)
Please note specific VNC & Network requirements below - read 100% of the README.md. :-)
Warning
DON'T SKIP ANY PART OF THIS README.md & please don't raise pointless Issues - thank you!
First, read the above System Requirements, and resolve any blockers to using Proxmox VE for WHMCS.
You must have a root account to use the Module at all. Configured via WHMCS > Servers.
This is configured in the pam realm.
Additionally, to improve security, for VNC you must also have a Restricted User.
Configured in the Module as detailed below, once you've added/restricted it in PVE.
First up, get the basics sorted out:
- Upload the Module to your WHMCS installation, ensuring correct permissions/ownership.
- Activate it via WHMCS > Addon Modules > Proxmox VE for WHMCS > Activate.
- In the same spot post-activation, expose the Module to Administrators.
- Make sure your Proxmox host has a valid SSL Certificate installed.
- Ensure you've TCP/8006 connectivity between WHMCS & PVE.
Once you've done all of that, in order to get the module working properly, you need to:
- Proxmox VE > Create an additional VNC-only user, per instructions below
- WHMCS Admin > Config > Servers > Add (Advanced) > PVE Host/s (User:
root; IPv4:PVE's; no port suffix!) - WHMCS Admin > Addons > Proxmox VE for WHMCS > Module Config > VNC Secret (see below)
- WHMCS Admin > Addons > Proxmox VE for WHMCS > Add QEMU/LXC Plan/s
- WHMCS Admin > Addons > Proxmox VE for WHMCS > Add an IPv4 Pool
- WHMCS Admin > Config > Products/Services > New Service (create offering)
- " " > Newly-added Service > Tab 3 > SAVE (links Module Plan to WHMCS Service type)
- (Optional) WHMCS Admin > Addons > Proxmox VE for WHMCS > Import Guest
After forking the module, we considered how to improve security of Console Tunneling via WHMCS. We decided to implement a routing method which uses a secondary user in Proxmox VE with very restrictive permissions.
This is due to be re-built again in 2026 to further enhance security.
- Install & configure the module properly
- Follow the PVE User Requirement info below
- Routed IPv4 for PVE (or TLS-proxy to LAN)
- PVE and WHMCS on the same 1x Domain Name*
- Have valid PTR/rDNS set on the PVE Address
If proxying, that is your sole responsibility to configure & diagnose.
Otherwise, PVE must be WAN-accessible and all other configs/reqs satisfied.
- Create User Group "VNC" via PVE >
Datacenter / Permissions / Group - Create new User "vnc" >
Datacenter / Permissions / Users- Group: "VNC", Realm: pve - Create new Role ->
Datacenter / Permissions / Roles- Name: "VNC", Privileges: VM.Console (only) - Permit VNC Access ->
Datacenter / Permissions / Add Group Permissions- Group: "VNC", Role: "VNC" - WHMCS > Modules > Proxmox VE for WHMCS > Module Config > VNC Secret = 'vnc' password (PVE) you set
Caution
Do NOT set less restrictive permissions. The above is designed for interim security.
However, if you wish for proper security: wait for VNC to be further improved.
noVNC has been overhauled. It isn't guaranteed, nor the project at all. :-)
Once you have it configured, clicking noVNC in Client Area provides direct link - click it:
Here are most of the critical requirements for VNC tunnelling:
- PVE must be at an IPv4 which has PTR the exact same as PVE's hostname.
- You must use different Subdomains on the 1x Domain Name, for the cookie (anti-CSRF).
- If your Domain Name has a 2-part TLD (ie. co.uk) then you will need to fork & amend
novnc_router.php- ideally we/someone will optimise this down the track. - You must configure a VNC Secret in the Module Settings, after creating it in PVE.
- You must have a stable and "relatively" static IPv4 fixed/routed WAN address for each PVE host. CGNAT, Cellular & other "fast DHCP" style configurations cannot be worked with due to a variety of external network issues. We will not support anything except a perfectly-configured
pvewhmcs. Thank you! - Cookies must be properly usable and not manipulated by htaccess or similar rules, to ensure that
PVEAuthCookieis properly set in-browser, for same-domain cross-subdomain access.
Tip
To troubleshoot noVNC errors like "Connection Closed (1006)":
Load noVNC with logging=debug added to the query string, ie. vnc.html?logging=debug
Or in Settings change Logging to debug-level, then open JS Console before reloading noVNC.
Typically, 401 No Ticket from PVE (1006 Connection Closed via noVNC) is due to cross-domain attempts being made, ie. WHMCS on domain1.com and PVE on domain2.com. You must use subdomains on the same Domain, with PTR, etc - else it won't work. Please take the time to read this documentation.
Please make sure you create an IPv4 Pool with sufficient scope/size to be able to deploy addresses within it to your guest VMs and CTs. Else it won't be able to create a Service for you.
Note that VNC may be problematic without work due to the strict requirements introduced in Proxmox v8.0 (strict same-site attribute). Just as SSL/TLS Certificates are no longer trusted for Public IP Addresses, there is increasing work to make the web secure-by-default which makes VNC/etc safer.
Take note that during the Guest Import process, there is no association ensured to an IP Pool, rather we take your inputs and use them verbatim due to existing/current nature of the Guest's configuration.
Available options:
- SLAAC (2nd vNIC)
- DHCP (2nd vNIC)
- Off (v4-only)
You may add different config via PVE/pvesh manually of course, if you need to specify a prefix etc.
This depends on your configuration on the PVE Host/s - bridge (vmbr0 etc) or software-defined (SDN).
- If normal (bridged) - use
vmbras the Network, then use0as the Interface ID - this makes upvmbr0. - If SDN (Software Defined Network) - use SDN Name for Network, leave Interface ID blank (= no suffix).
These steps explain the unique requirements for QEMU & LXC guests.
Custom Fields: Values need to go in Name & Select Options.
This needs configuring for each WHMCS Admin > Products & Services entry.
Firstly, create the Template VM in PVE. You need its unique PVE ID.
Use that ID in the Custom Field KVMTemplate, as in ID|Name.
Note:
IDis the Unique ID that your Template VM has in PVE.
Note:Nameis what will be displayed to your Clients in WHMCS.
Firstly, create the Plan in WHMCS Module. Then too in WHMCS Config > Services.
Under the Service, you need to add a Custom Field
ISOwith the full location.
This ISO must be located on the PVE Host, and not on the WHMCS installation side.
Firstly, store the Template in PVE. You need its storage, folder & File Name.
Use that prefixed file name in the Custom Field
Template, as in:
local:vztmpl/ubuntu-99.99-standard_amd64.tar.gz|Ubuntu 99
You can associate an existing PVE Guest through the WHMCS Module too, like this:
Caution
All module-imported services need to be checked and amended to ensure configs such as Billing Cycle, Price, Discount, Assigned IPs, NS1/2, etc, are properly set!
localis the name of the file-system that you have the Template onvztmplis the directoty name per convention, with the ISO withinubuntu-99.99-...etc is the Template file name, exactly as-is
If using ZFS for Templates, substitute local with the volume name.
Create a 2nd Custom Field Password for the Container's root user on all CT Services.
WHMCS Admin -> Addon Modules -> Proxmox VE for WHMCS -> Support/Health
- Download the new version
- Upload it over the top (FTP)
- Login to WHMCS Admin
- Verify all working OK
- Watch the repo!
Logging in should trigger the self-upgrade procedure for the SQL database.
(Beta in v1.2.x: for now, verify yourself that updates were successful)
Important
Since v1.3.0, logging into WHMCS Admin & opening the module should run any needed SQL Ops.
v1.2.9 & below, consult the _docs/UPDATE-SQL.md file, open your SQL DB & run statements.
Then you're done with each update!
Note: db.sql file currently contains new tables for v1.3.x releases as well
Warning
We will not support ANY set-ups which do not follow ALL of the set-up processes 100%.
Read the ENTIRE README, understand it, follow it, and submit detailed Issues.
Else, do not expect any form of Support. Respect our time. Thank you!
- The Wiki.
- The README.md.
- Open GitHub Issues on the repo.
- HTTP, PHP, WHMCS & debug logs (see below).
- PVE logs; best practices; network; etc.
- Read the errors. Do they explain it?
Logs: We work to ensure that Proxmox VE for WHMCS passes through error details to you.
Hence, we ask that you are as verbose and thorough as possible when reporting Issues. Thanks!
- (Logs: PHP)
error_logcontents - (Logs: WHMCS) Module Debug Logging*
- (Logs: Config) WHMCS Display/Log Errors = ON
- (Logs: PVE) Logs from Proxmox Host/s (
pveproxyetc)
- (Visibility) Screenshots of the issue
- (Configs) WHMCS/PHP/Module/Proxmox/etc
- (Reproduction)
pveshetc variants of failing calls - (Network) Proof WHMCS Server can talk to PVE OK
- (PEBKAC) PROOF THAT YOU'VE FOLLOWED THIS README!
The more info & context you provide up-front, the quicker & easier it will be!
* Debug: Also enable Debug Logging in Proxmox VE for WHMCS > Settings, as needed.
Tip
Please note that this is FOSS and Support is not guaranteed at all.
If you don't read, listen or actively try, no help will be provided.
https://github.com/The-Network-Crew/Proxmox-VE-for-WHMCS/issues/new/choose
There are new features deployed into PVE upstream which are exciting and may be integrated.
PVE Roadmap: https://pve.proxmox.com/wiki/Roadmap
- VM snapshots on thick LVM, snapshots as volume chains
- Fabrics for software networking (SDN) Open/OSPF/Ceph/VPN
- Major upgrade to Debian Trixie (testing status in 2025)
- Live migrate with mediated devices
- Support for external Backup providers
- Host dir's, share with guests (virtiofs)
- Firewall into Software-defined Networking
- Webhook target for system alerting
- Better change detection for PBS
- (โ ) Import Wizard for VMware/etc Guests
- Unattended PVE Install (via answer file)
- Backup Fleecing (local disk as data block buffer)
- Secure Boot support
- (โ ) Software Defined Networking (SDN)
- New flexible notification system (SMTP & Gotify)
- MAC Organizationally Unique Identifier (OUI) BC:24:11: prefix!
- Create, manage & assign resource mappings for PCI & USB devices for use in VMs via API and GUI
- (โ ) Add CPUs (x86-64 psABI Micro-Architecture Levels) & adopt default x86-64-v2-AES
- Cross-cluster guest migrations
- Cluster Resource Scheduling (CRS) launched
- Re-balance CRS on fresh start-up, not just on-recovery
- CRM into HA Manager, as a node maintenance switch
| License | Dependency | In-use Ver. | Link to Repository, etc. |
|---|---|---|---|
| (MIT) | PHP Client for PVE2 API | 2022/Dec/05 | https://github.com/CpuID/pve2-api-php-client |
| (MPLv2) | noVNC HTML5 Viewer | v1.6.0 | https://github.com/novnc/noVNC/ |
| (MIT) | IPv4/SN Validation | August 2012 | https://github.com/tapmodo/php-ipv4/ |
| Developer | Link to Documentation, etc. |
|---|---|
| (PVE) | https://pve.proxmox.com/pve-docs/api-viewer/ |
| (noVNC) | https://github.com/novnc/noVNC/wiki |
| (WHMCS) | https://developers.whmcs.com & https://classdocs.whmcs.com |
| (psABIs) | https://gitlab.com/x86-psABIs/x86-64-ABI/-/jobs/artifacts/master/raw/x86-64-ABI/abi.pdf?job=build |
This module has been overhauled and remains functionally-OK but not thoroughly tested nor reviewed.
Your support and assistance is always welcomed per the spirit of FOSS (Free Open-source Software)!
If you cannot accept this, do not download nor use the code. Complaints, nasty reviews, and similar behaviour is against the spirit of FOSS and will not be tolerated.
Be grateful & considerate - thank you!
If you'd like to contribute to the Module, please open a Pull on GitHub >> The-Network-Crew/Proxmox-VE-for-WHMCS >> cheers! The original module was written in 2 months by @cybercoder for sale online in 2016, though didn't sell any copies so they kindly open-sourced it and removed the licensing requirement.
Thank you to psyborgยฎ for the module's logo design! We love it.
FOSS is only possible thanks to dedicated people around the world! :-)
See CONTRIBUTORS.md for those who've made PVEWHMCS possible.
The Network Crew Pty Ltd :: https://tnc.works
๐ท Merlot Digital :: https://merlot.digital
AS138521 :: Australian family owned
Note
This module is licensed under the GNU General Public License (GPL) v3.0.
GPLv3: https://www.gnu.org/licenses/gpl-3.0.txt (by the Free Software Foundation)














