Proxmox
Integrating Proxmox Virtual Environment (VE) with vScope provides a detailed inventory of your virtual infrastructure, collecting data on hosts, virtual machines, and networking.
Requirements
Section titled “Requirements”To connect vScope to a Proxmox environment, you will need:
- Proxmox User Account & API Token: A user account with at least read permissions to the assets you want to inventory. The recommended role is
PVEAuditorover/to allow vScope to see all assets. You will also need to create an API token for this user. - Network Access: Ensure vScope can reach the Proxmox API endpoint over the network (typically port 8006/TCP).
- QEMU Guest Agent: For vScope to collect detailed information from virtual machines, such as guest OS information and IP addresses, the QEMU Guest Agent must be installed and running on the VMs.
Creating an API Token
Section titled “Creating an API Token”To create an API token in Proxmox VE:
- Log in to the Proxmox VE web interface.
- Navigate to Datacenter > Permissions > API Tokens.
- Click Add.

- Select the User (e.g.
vscope@pam) and assign a Token ID (e.g.vscope-inventory-token). The user does not need to be in thepamrealm. - Keep Privilege Separation checked.
- Optional: add a Comment (e.g.
Used by vScope) and leave Expire asnever. - Click Add.
- A window will appear showing the Token ID and Secret.

- Important: Copy the Secret and store it securely, as it will not be shown again. You will use the full Token ID (
<user@realm>!<tokenId>) and the Secret to authenticate in vScope.
Assigning permissions
Section titled “Assigning permissions”Now you need to assign permissions to the token:
- Stay in the same view. Navigate to Permissions.
- Click Add > API Token Permission.
- Set path to
/. - Select your newly created token from the list.
- Select role
PVEAuditor. - Ensure the Propagate box is checked.
- Click Add.

How to add the credential in vScope
Section titled “How to add the credential in vScope”- Navigate to Discovery > Credentials and click Create Credential.
- Select Proxmox as credential type.
- Enter the Proxmox server URL (e.g.,
https://proxmox-server:8006). - In the Authorization Header field, provide the Token ID and Secret prefixed with
PVEAPITOKEN=.
For example:
PVEAPIToken=vscope@pam!vscope-inventory-token=your-secret- Toggle on
Accept all server certificatesonly if the Proxmox server uses a self-signed certificate. - Click Test Credential to verify the connection and Save.
Troubleshooting
Section titled “Troubleshooting”Connection reset
Section titled “Connection reset”- From the vScope machine, open a browser and go to
https://proxmox-server:8006/api2/json/version. - Expect an
HTTP 401response because no authentication is provided. This confirms the API is reachable. - If there is no response, open a shell on the Proxmox server and run:
curl -vk https://127.0.0.1:8006/api2/json/versionYou should see output similar to:
* Connected to 127.0.0.1 (127.0.0.1) port 8006* using HTTP/1.x> GET /api2/json/version HTTP/1.1> Host: 127.0.0.1:8006- If there is no response locally, confirm the API services are running:
systemctl status pveproxy --no-pagersystemctl status pvedaemon --no-pagerIf the API is reachable locally on the Proxmox server but not from vScope, a firewall or network policy is likely blocking access to port 8006/TCP.
Guest OS information or IP addresses are missing
Section titled “Guest OS information or IP addresses are missing”The QEMU Guest Agent is likely not installed, running, or enabled on the VMs. Install and enable the QEMU Guest Agent on your virtual machines to allow vScope to fetch this detailed information.