1. DIY HOME SERVER - PROXMOX Installation
This guide is my implementation of the official Proxmox VE Installation Guide.
At first, installing PROXMOX VE 6.4 seemed to be a walk in the park. But then…
I choose to install Proxmox in ZFS Raid 1 mirror on the 2 Crucial MX500 500 GB SATA SSD drives connected directly to the SUPERMICRO X10SRi-F motherboard. I did not want to occupy the whole drives but only use a 64 GB partition. The rest of the SSD drives will be used to run the VMs.
I downloaded the latest ISO Installer and flashed it to an USB drive using Etcher.
Booting your server from the USB drive, you’ll get the welcome screen. Select the first option.
Set the compression to lz4. Then reduce the hdsize to about 80% of the SSD size. This way you enable overprovisioning. In my case, I use 400 GB of the available 500 GB.
Click OK and then Next.
2. DIY HOME SERVER - PROXMOX Log in
3. DIY HOME SERVER - PROXMOX Prepare upgrades
Let’s prepare Proxmox VE for upgrading.
Open up a ssh session to the server, either from your computers terminal
C:\>ssh root@xxx.xxx.xxx.xxx
or use Putty.
Log in as user root and enter the password.
nano /etc/apt/sources.list
Remove all content by pressing CTRL + K to delete each line.
Paste into the editor :
deb http://ftp.debian.org/debian buster main contrib
deb http://ftp.debian.org/debian buster-updates main contrib
# PVE pve-no-subscription repository provided by proxmox.com,
# NOT recommended for production use
deb http://download.proxmox.com/debian/pve buster pve-no-subscription
# security updates
deb http://security.debian.org buster/updates main contrib
Then press CTRL + O to save. Confirm.
Then press CTRL + X to exit.
4. DIY HOME SERVER - PROXMOX Configuration
a. Enabling applying network configuration without reboot
Log in to Proxmox and browse to your PVE. Then select Shell.
Enther the command :
apt install ifupdown2 -y
b. Activating network interfaces
In case your motherboard has multiple NICs, not all network interfaces will be activated by default. The primary network interface, the one specified during installation, will of course be activated. All other NICs will stay deactivated in case the do’nt recieve an IP address during boot time.
Log in to Proxmox and browse to your PVE. Then select System → Network and double-click a deactivated network device. Enter an valid IP address and click the Autostart option. Then click OK. Do the same for all other deactivated NICs. Then click the Apply Configuration button.
In my case, the NIC’s are activated but not configured. I use a Virtual Bridge to access the home server over a SFP+ 10 Gbps NIC.
c. Configuring E-mail alerts using GMail
Follow this excellent article on how to set up e-mail alerts on your Proxmox VE server.
d. Configuring E-mail alerts using another e-mail provider
Log in to Proxmox and browse to your PVE. Then select Shell.
Install the required packages :
apt update && apt install -y libsasl2-modules
Configure a relay account :
echo "[mailserver]:port username:password" > /etc/postfix/sasl_passwd
Replace mailserver, port, username and password with your own values.
Create a hash from the sasl_passwd file :
postmap /etc/postfix/sasl_passwd
Secure your sasl_passwd files :
chown root:root /etc/postfix/sasl_passwd*
chmod 0600 /etc/postfix/sasl_passwd*
Configure postfix to use the relay account :
nano /etc/postfix/main.cf
Delete the line :
relayhost =
Add the lines :
relayhost = [mailserver.somecompany.com]:587
# enable SASL authentication
smtp_sasl_auth_enable = yes
# disallow methods that allow anonymous authentication.
smtp_sasl_security_options = noanonymous
# where to find sasl_passwd
smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd
# Enable STARTTLS encryption
smtp_use_tls = yes
# where to find CA certificates
smtp_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
Restart the postfix service :
systemctl restart postfix
Test your new configuration :
echo "My first test message" | mail -s "Proxmox alert test" somebody@somewhere.com
5. DIY HOME SERVER - PROXMOX Boot problem
This article shows how to fix the problem by inserting a short wait (SLEEP parameter).
Open up a ssh session to the server, either from your computers terminal
C:\>ssh root@xxx.xxx.xxx.xxx
or use Putty.
Log in as user root and enter the password.
6. DIY HOME SERVER - PROXMOX PCIe Pass-through
PCI passthrough allows you to use a physical PCI device (hba controller, graphics card, network card) inside a VM (KVM virtualization only). If you “PCI passthrough” a device, the device is not available to the host anymore.
Follow one of the following articles to configure your system :
In the next episode, we’ll install TRUENAS CORE as a virtual machine and passthrough the PCie HBA controller to it.