proxmox-mcp
MCP ServerFreeMinimal Proxmox VE MCP server - one Docker command, read-only by default
Capabilities6 decomposed
proxmox ve resource enumeration via mcp protocol
Medium confidenceExposes Proxmox VE infrastructure (nodes, VMs, containers, storage) as MCP tools that Claude and other LLM clients can invoke. Uses the MCP server specification to translate Proxmox REST API responses into structured tool definitions, enabling LLMs to query cluster state without direct API knowledge. Implements read-only access by default with optional credential-based authentication to the Proxmox API endpoint.
Minimal Docker-based MCP server that directly wraps Proxmox REST API without intermediate abstraction layers, enabling single-command deployment ('one Docker command') while maintaining read-only safety defaults and MCP protocol compliance
Simpler deployment and lower operational overhead than building custom Proxmox integrations in Python/Go, and safer by default (read-only) compared to exposing raw Proxmox API to LLMs
mcp tool schema generation from proxmox api endpoints
Medium confidenceAutomatically generates MCP tool definitions (name, description, input schema, output schema) by introspecting Proxmox REST API endpoints and translating them into LLM-callable tools. Maps Proxmox API parameters to JSON Schema for input validation and structures responses as typed outputs that Claude can parse and act upon. Handles authentication headers and endpoint routing transparently.
Leverages Proxmox API structure to programmatically generate MCP tool schemas rather than requiring manual tool definition, reducing maintenance burden and keeping tool definitions aligned with API versions
Avoids hand-written tool definitions that drift from API reality, unlike static MCP server implementations that require code changes for each new endpoint
credential-based authentication to proxmox api with token support
Medium confidenceManages authentication to Proxmox VE REST API using either API tokens (preferred, fine-grained permissions) or username/password credentials. Stores credentials securely (environment variables or config files) and injects them into all outbound Proxmox API requests as Bearer tokens or Basic Auth headers. Validates credentials at server startup and fails fast if authentication fails.
Supports both Proxmox API tokens (fine-grained, revocable) and legacy username/password auth, with read-only default configuration that prevents accidental infrastructure modifications through the MCP interface
More secure than embedding credentials in MCP tool definitions, and supports Proxmox's modern token-based auth unlike older integration approaches that rely solely on user accounts
docker containerized mcp server deployment with single-command startup
Medium confidencePackages the Proxmox MCP server as a Docker image with pre-configured entrypoint, environment variable injection, and network binding. Enables deployment via a single 'docker run' command with credential and endpoint configuration passed as environment variables. Includes health checks and graceful shutdown handling for container orchestration systems.
Advertises 'one Docker command' deployment model, eliminating installation complexity and dependency conflicts by bundling the entire MCP server runtime and Proxmox client libraries into a single container image
Faster to deploy and more reproducible than manual installation from source, and requires less operational knowledge than building and running the server natively
read-only access control with optional write capability configuration
Medium confidenceEnforces read-only access to Proxmox infrastructure by default, preventing Claude or other LLM clients from accidentally (or maliciously) modifying VMs, containers, or cluster state through MCP tools. Provides configuration option to selectively enable write operations (VM power control, container management) for trusted deployments, with audit logging of all state-modifying operations.
Defaults to read-only access, requiring explicit opt-in for write operations, which is a safer-by-default approach than exposing full API capabilities and relying on LLM judgment to avoid destructive actions
Prevents accidental infrastructure damage that could occur with unrestricted API access, and provides a clear security boundary that can be audited and enforced at the MCP server level rather than relying on Proxmox RBAC alone
mcp protocol compliance and client compatibility
Medium confidenceImplements the Model Context Protocol (MCP) specification, enabling the Proxmox server to be discovered and invoked by any MCP-compatible client (Claude Desktop, LLM frameworks, custom applications). Handles MCP message serialization/deserialization, tool invocation routing, and response formatting according to the MCP standard. Supports both stdio and HTTP transport modes for flexible client integration.
Adheres to the MCP specification, enabling seamless integration with Claude and other MCP-aware clients without requiring custom protocol adapters or client-specific code
More interoperable than proprietary integration approaches, and enables future compatibility with new MCP clients as the ecosystem grows
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with proxmox-mcp, ranked by overlap. Discovered automatically through the match graph.
mcp-client
** MCP REST API and CLI client for interacting with MCP servers, supports OpenAI, Claude, Gemini, Ollama etc.
@ivotoby/openapi-mcp-server
An MCP server that exposes OpenAPI endpoints as resources
klavis
Klavis AI: MCP integration platforms that let AI agents use tools reliably at any scale
mcp-use
The fullstack MCP framework to develop MCP Apps for ChatGPT / Claude & MCP Servers for AI Agents.
secure-mcp-server
MCP server: secure-mcp-server
Mastra/mcp
** - Client implementation for Mastra, providing seamless integration with MCP-compatible AI models and tools.
Best For
- ✓DevOps teams integrating Proxmox infrastructure with Claude-based automation
- ✓Solo developers building LLM agents that need real-time visibility into hypervisor state
- ✓Organizations standardizing on MCP for infrastructure tooling across multiple LLM clients
- ✓Teams maintaining Proxmox infrastructure who want low-friction LLM integration
- ✓Developers building extensible MCP servers that adapt to API changes automatically
- ✓Production deployments requiring credential isolation and audit trails
- ✓Teams using Proxmox RBAC to limit MCP server permissions to read-only operations
- ✓DevOps teams already using Docker/Kubernetes for infrastructure
Known Limitations
- ⚠Read-only by default — no VM creation, deletion, or state modification without explicit configuration
- ⚠Requires network connectivity to Proxmox API endpoint (typically port 8006)
- ⚠No built-in caching — each tool invocation queries live Proxmox API, adding ~500ms-2s latency per request
- ⚠Single-cluster support per MCP server instance — separate deployments needed for multi-cluster environments
- ⚠Schema generation accuracy depends on Proxmox API documentation completeness
- ⚠Complex nested Proxmox responses may require manual schema refinement for optimal LLM comprehension
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
About
Minimal Proxmox VE MCP server - one Docker command, read-only by default
Categories
Alternatives to proxmox-mcp
Search the Supabase docs for up-to-date guidance and troubleshoot errors quickly. Manage organizations, projects, databases, and Edge Functions, including migrations, SQL, logs, advisors, keys, and type generation, in one flow. Create and manage development branches to iterate safely, confirm costs
Compare →AI-optimized web search and content extraction via Tavily MCP.
Compare →Scrape websites and extract structured data via Firecrawl MCP.
Compare →Are you the builder of proxmox-mcp?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →