Operating systems

Template Guide

Build reliable Linux and Windows templates for automated provisioning, OS reinstalls, password handling, and customer use.

VMNexor documentation is actively evolving. Some features, wording, and screenshots may change during beta.

Template purpose

Templates are the base images VMNexor clones when creating or reinstalling virtual machines. A good template should boot cleanly, accept network configuration, support guest actions where required, and avoid machine-specific state being copied into every new VM.

General Proxmox checklist

  • Use VirtIO where possible for disk and network devices
  • Enable QEMU Guest Agent on the VM options
  • Install the QEMU Guest Agent inside the guest OS
  • Keep storage and network bridge names consistent across nodes
  • Boot and test the VM before converting it to a template

Linux template checklist

  • Install cloud-init where supported
  • Install and enable qemu-guest-agent
  • Enable SSH access
  • Clean old machine IDs where appropriate
  • Confirm networking applies correctly after clone
  • Test DNS resolution after provisioning

Ubuntu baseline notes

Ubuntu is the recommended Linux baseline for early VMNexor template testing because its cloud-init and netplan behaviour is predictable when the template is prepared cleanly.

Debian baseline notes

Debian templates may need extra attention around interfaces.d, resolv.conf, dhcpcd, and systemd-resolved depending on how the base image was built. Always test routed /32 networking and DNS after deployment.

Example Linux prep commands

apt update\napt install -y qemu-guest-agent cloud-init\nsystemctl enable --now qemu-guest-agent\nsystemctl status qemu-guest-agent --no-pager

Windows template checklist

  • Install VirtIO drivers
  • Install QEMU Guest Agent
  • Install and configure Cloudbase-Init
  • Use Sysprep where required
  • Confirm the guest agent reports running in Proxmox
  • Test password handling before making the template available to customers

Windows account guidance

  • Windows 10 and Windows 11 should use a dedicated local admin user such as Admin
  • Disable the built-in Administrator account on Windows desktop templates where appropriate
  • Windows Server templates may standardise on the built-in Administrator account if that matches your support model

Windows guest agent check

Get-Service *qemu* -ErrorAction SilentlyContinue

Convert to template

qm shutdown <vmid>\nqm template <vmid>

VMNexor validation checklist

  • Template appears in the correct VMNexor template list
  • Template is assigned to the correct plans
  • Reinstall policy allows only safe templates
  • Provisioning works on a disposable test service
  • Reinstall works on a disposable test service
  • Customer password or first-login flow behaves as expected

Do not publish a template until

  • A fresh VM provisions successfully
  • Networking works after reboot
  • DNS works inside the guest
  • Console access works
  • Guest agent actions work where required
  • Reinstall has been tested from VMNexor