Update Strategy
Proxmox VE receives regular updates including security patches, bug fixes, and feature releases. This guide ensures updates are applied safely without disrupting production services. Update Schedule:- Security patches: Apply within 7 days of release
- Minor updates: Monthly maintenance window
- Major version upgrades (e.g., 8.x → 9.x): Planned maintenance with testing
Pre-Update Checklist
Review Proxmox Changelog
Check official Proxmox release notes:
https://pve.proxmox.com/wiki/RoadmapLook for:- Breaking changes
- Known issues
- Recommended procedures
Verify Backups are Current
PBS Dashboard (
https://192.168.30.12:8007):- Last successful backup < 24 hours old
- All critical VMs backed up:
docker-prod-01auth-prod-01immich-prod-01pbs-prod-01dns-prod-01anddns-prod-02(LXCs)
Check Cluster Health
Proxmox UI → Datacenter → ClusterVerify:
- Both nodes show green status
- Quorum is healthy (2 nodes + QDevice = 3 votes)
- No split-brain warnings
Review Active VMs and Resource Usage
Datacenter → Summary
- Note which VMs are running on each node
- Check if any VMs can be temporarily migrated or shut down
- Verify no resource-intensive tasks running (PBS backups, large file transfers)
Updating Proxmox (Standard Process)
Update pve-prod-02 First (Secondary Node)
Why secondary first?:pve-prod-02 runs fewer critical services (PBS + dns-prod-02). If update causes issues, primary services remain unaffected.
Check Available Updates
pve-manager(Proxmox core)proxmox-ve(meta-package)- Kernel updates (
pve-kernel-*)
Review Update Output
Watch for:
- Kernel installation messages
- Service restart prompts
- Any error messages (rare but possible)
Reboot Node
If kernel was updated (check output above):If only userspace packages updated:Recommendation: Reboot anyway to ensure clean state.
Verify Node After Reboot
Wait 2-3 minutes for boot, then:
- Proxmox UI → Check
pve-prod-02shows green status - SSH back in:
ssh [email protected] - Check kernel version:
uname -r - Verify VMs auto-started:
pct listandqm list
Update pve-prod-01 (Primary Node)
Review pve-prod-02 Stability
Confirm no issues from previous update:
- Check Proxmox logs: pve-prod-02 → System → Syslog
- Verify PBS backups completed successfully overnight
- No unexpected reboots or service failures
Optional: Migrate Critical VMs
If you want zero downtime for critical services:Proxmox UI → [Select VM] → MigrateMigrate
docker-prod-01 to pve-prod-02 temporarily.Verify Node After Reboot
- Check
pve-prod-01status in cluster - Verify all VMs/LXCs auto-started
- Test service access via Traefik (
https://homarr.giohosted.com)
Post-Update Verification
Check Proxmox Version
Proxmox UI → Datacenter → SummaryVerify both nodes show identical versions:
- Proxmox VE:
X.Y-Z - Kernel:
X.Y.Z-pve
Verify Cluster Quorum
Datacenter → ClusterExpected votes: 3 (node1 + node2 + QDevice on Pi)If quorum is broken:
Run PBS Backup Manually
Test that backups still work post-update:Datacenter → Backup → [Select Job] → Run NowVerify backup completes without errors.
Check VM Performance
Monitor for 24-48 hours:
- Beszel metrics for CPU/RAM usage anomalies
- Service response times in Uptime Kuma
- Docker container logs for errors
Major Version Upgrades (e.g., Proxmox 8.x → 9.x)
Major version upgrades require additional planning.Review Official Upgrade Guide
Proxmox publishes detailed upgrade guides:
https://pve.proxmox.com/wiki/Upgrade_from_X.Y_to_Z.0Read completely before proceeding.Run pve8to9 Checklist Tool
Proxmox provides pre-upgrade checkers:Review output for blockers or warnings.
Snapshot Critical VMs
Before starting upgrade:Proxmox UI → [Select VM] → Snapshots → Take Snapshot
docker-prod-01-pre-upgradeauth-prod-01-pre-upgradeimmich-prod-01-pre-upgrade
Troubleshooting Update Issues
Issue: Held Packages Prevent Update
Symptom:Issue: Repository Errors (No Subscription)
Symptom:Issue: Cluster Split-Brain After Reboot
Symptom: Nodes show as offline in each other’s UI, but both are actually running. Fix:Issue: VMs Don’t Auto-Start After Reboot
Fix: Check VM config for auto-start:Issue: Web UI Unreachable After Update
Check:Emergency Rollback
If an update causes critical issues:Boot Previous Kernel
At GRUB boot menu:
- Select “Advanced options for Proxmox VE”
- Choose previous kernel version
Update Automation (Optional)
For automated security updates only (not major upgrades):/etc/apt/apt.conf.d/50unattended-upgrades:
Update Maintenance Schedule
Monthly (First Sunday, 02:00-06:00):- Update
pve-prod-02 - Wait 7 days, then update
pve-prod-01
- Critical security patches (review CVE severity)
- Major version upgrades (e.g., Proxmox 8.x → 9.x)
- Debian base OS upgrades (e.g., Bullseye → Bookworm)