- ADD_CHAIN138_TO_LEDGER_LIVE: Ledger form done; public code review repo bis-innovations/LedgerLive; init/push commands - CONTRACT_DEPLOYMENT_RUNBOOK: Chain 138 gas price 1 gwei, 36-addr check, TransactionMirror workaround - CONTRACT_*: AddressMapper, MirrorManager deployed 2026-02-12; 36-address on-chain check - NEXT_STEPS_FOR_YOU: Ledger done; steps completable now (no LAN); run-completable-tasks-from-anywhere - MASTER_INDEX, OPERATOR_OPTIONAL, SMART_CONTRACTS_INVENTORY_SIMPLE: updates - LEDGER_BLOCKCHAIN_INTEGRATION_COMPLETE: bis-innovations/LedgerLive reference Co-authored-by: Cursor <cursoragent@cursor.com>
15 KiB
Proxmox VE GUI Issues and Errors - Comprehensive Review
Date: 2026-01-06
Status: ✅ REVIEW COMPLETE
Executive Summary
This document provides a comprehensive review of all Proxmox VE GUI (web interface) issues and errors found in the codebase. The review covers:
- SSL certificate errors (Error 596)
- pveproxy worker crashes
- Web interface accessibility issues
- Hostname resolution problems
- Cluster filesystem issues
- Browser connection errors
Key Findings:
- ✅ Most issues have been resolved
- ⚠️ Some nodes may still have connectivity issues (r630-03, r630-04)
- ✅ Fix scripts available for common issues
- ✅ Comprehensive documentation exists for troubleshooting
1. SSL Certificate Error 596
Issue Description
Error Message: Connection error 596: error:0A000086:SSL routines::certificate verify failed
Symptoms:
- Proxmox VE UI displays connection error 596
- Web interface cannot connect to Proxmox API
- Browser shows SSL certificate verification failure
Affected Nodes:
- ml110 (192.168.11.10)
- r630-01 (192.168.11.11)
- r630-02 (192.168.11.12)
- r630-03 (192.168.11.13) - potentially
- r630-04 (192.168.11.14) - potentially
Status: ✅ FIXED (on ml110, r630-01, r630-02)
Root Causes
- SSL certificates expired or invalid
- Cluster certificates out of sync
- Certificate chain broken
- System time incorrect (certificates are time-sensitive)
Solution Applied
Command:
pvecm updatecerts -f
systemctl restart pveproxy pvedaemon
What it does:
- Forces regeneration of all cluster SSL certificates
- Updates certificate chain
- Regenerates node-specific certificates
- Updates root CA certificate if needed
- Syncs certificates across cluster nodes
Fix Script: scripts/fix-ssl-certificate-error-596.sh
Usage:
# Fix all nodes
./scripts/fix-ssl-certificate-error-596.sh all
# Fix specific node
./scripts/fix-ssl-certificate-error-596.sh ml110
./scripts/fix-ssl-certificate-error-596.sh r630-01
After Fixing
-
Clear browser cache and cookies
- Chrome/Edge: Settings → Privacy → Clear browsing data → Advanced → "Cached images and files"
- Firefox: Settings → Privacy & Security → Clear Data → "Cached Web Content"
-
Access Proxmox UI
- URL:
https://<node-ip>:8006 - Example:
https://192.168.11.10:8006
- URL:
-
Accept certificate warning (if prompted)
- First-time access may show a security warning
- Click "Advanced" → "Proceed to site"
- This is normal for self-signed certificates in Proxmox
Documentation
docs/archive/reports/SSL_CERTIFICATE_ERROR_596_FIX.mdreports/PROXMOX_SSL_CERTIFICATE_FIX_COMPLETE.mdreports/PROXMOX_SSL_FIX_COMPLETE.md
2. pveproxy Worker Crashes
Issue Description
Error: pveproxy workers are crashing/exiting
Symptoms:
- Web interface not accessible (HTTP Status: 000)
- pveproxy service shows workers exiting
- Port 8006 may not be listening
- Browser cannot connect to Proxmox web interface
Affected Nodes:
- r630-01 (192.168.11.11) - RESOLVED
- r630-02 (192.168.11.12) - RESOLVED
- r630-04 (192.168.11.14) - POTENTIALLY AFFECTED
Status: ✅ RESOLVED (on r630-01, r630-02)
Root Causes
2.1 SSL Certificate/Key Loading Failure
Error: /etc/pve/local/pve-ssl.key: failed to load local private key
Causes:
- Cluster filesystem not mounted (
/etc/pveis a FUSE filesystem) - Corrupted SSL certificates
- Wrong file permissions
- pve-cluster service down
2.2 Hostname Resolution Failure
Error: Unable to resolve node name 'pve' to a non-loopback IP address - missing entry in '/etc/hosts' or DNS?
Impact:
- pve-cluster service fails
- /etc/pve filesystem not mounting
- SSL certificates not accessible
- pveproxy workers crashing
Solution: Fixed by adding proper entries to /etc/hosts
Solution Applied
Fix 1: Hostname Resolution
Script: scripts/fix-proxmox-hostname-resolution.sh
What it did:
- Added proper entries to
/etc/hostson both hosts - Ensured hostnames resolve to their actual IP addresses (not loopback)
- Added both current hostname (pve/pve2) and correct hostname (r630-01/r630-02)
Example /etc/hosts entries:
192.168.11.11 pve pve.sankofa.nexus r630-01 r630-01.sankofa.nexus
192.168.11.12 pve2 pve2.sankofa.nexus r630-02 r630-02.sankofa.nexus
Fix 2: SSL and Cluster Service
Script: scripts/fix-proxmox-ssl-cluster.sh
What it did:
- Regenerated SSL certificates
- Restarted all Proxmox services in correct order
- Verified service status
Results:
- ✅ All services running
- ✅ Web interface accessible (HTTP 200)
- ✅ No worker exit errors
Diagnostic Commands
# Check pveproxy service status
systemctl status pveproxy --no-pager -l
# Check recent logs
journalctl -u pveproxy --no-pager -n 100
# Check for worker exits
journalctl -u pveproxy -n 50 | grep -E "worker exit|failed to load"
# Check port 8006
ss -tlnp | grep 8006
# Check cluster status
pvecm status
Documentation
docs/archive/historical/PROXMOX_PVE_PVE2_ISSUES.mddocs/archive/completion/PROXMOX_PVE_PVE2_FIX_COMPLETE.mddocs/09-troubleshooting/R630-04-PROXMOX-TROUBLESHOOTING.md
3. Cluster Filesystem Issues
Issue Description
Error: pve-cluster service failed
Symptoms:
pmxcfsexited with status 255/EXCEPTION/etc/pvefilesystem not mounted- SSL certificates not accessible
- Cluster configuration not accessible
Affected Nodes:
- r630-01 (192.168.11.11) - RESOLVED
- r630-02 (192.168.11.12) - RESOLVED
Status: ✅ RESOLVED
Root Cause
Hostname resolution failure - The pve-cluster service could not resolve the hostname to a non-loopback IP address.
Error Message:
Unable to resolve node name 'pve' to a non-loopback IP address - missing entry in '/etc/hosts' or DNS?
Solution Applied
- Fixed hostname resolution in
/etc/hosts - Restarted pve-cluster service
- Verified /etc/pve filesystem mounted
Verification
# Check cluster service
systemctl status pve-cluster
# Check /etc/pve mount
mount | grep /etc/pve
df -h /etc/pve
# Check cluster status
pvecm status
Documentation
docs/archive/completion/PROXMOX_PVE_PVE2_FIX_COMPLETE.md
4. Web Interface Accessibility Issues
Issue Description
Symptoms:
- Web interface not accessible on port 8006
- Browser shows connection refused or timeout
- HTTP Status: 000
- Cannot access Proxmox UI
Affected Nodes:
- r630-03 (192.168.11.13) - NOT REACHABLE (server appears unplugged)
- r630-04 (192.168.11.14) - ACCESSIBILITY ISSUES (pveproxy issue)
Status: ⚠️ ONGOING (r630-03, r630-04)
Root Causes
4.1 Server Not Reachable (r630-03)
- Ping Status: ❌ NOT REACHABLE
- SSH Status: ❌ Not accessible
- Web UI Status: ❌ Not accessible
- Issue: Server appears to be unplugged or powered off
Action Required:
- Verify power cable is connected
- Verify network cable is connected
- Check network switch port status
- Wait 1-2 minutes for server to boot after plugging in
4.2 pveproxy Issue (r630-04)
- Ping Status: ✅ REACHABLE
- SSH Status: ⚠️ Authentication failing
- Web UI Status: ⚠️ Not accessible (pveproxy issue)
Action Required:
- Access server via console/iDRAC
- Reset root password
- Fix SSH configuration
- Fix Proxmox Web UI (pveproxy)
- Verify cluster membership
Diagnostic Commands
# Check connectivity
ping -c 3 192.168.11.13
ping -c 3 192.168.11.14
# Check SSH
ssh root@192.168.11.13
ssh root@192.168.11.14
# Check web interface
curl -k -I https://192.168.11.13:8006/
curl -k -I https://192.168.11.14:8006/
# Check pveproxy service
ssh root@192.168.11.14 "systemctl status pveproxy"
Documentation
reports/status/R630_03_04_CONNECTIVITY_STATUS.mddocs/09-troubleshooting/R630-04-PROXMOX-TROUBLESHOOTING.md
5. Browser Connection Errors
Issue Description
Common Browser Errors:
- Connection refused
- Connection timeout
- SSL certificate error
- HTTP Status: 000
- ERR_CONNECTION_REFUSED
- ERR_CONNECTION_TIMED_OUT
Solutions
5.1 Clear Browser Cache
Chrome/Edge:
- Settings → Privacy → Clear browsing data
- Advanced → Select "Cached images and files"
- Clear data
Firefox:
- Settings → Privacy & Security → Clear Data
- Select "Cached Web Content"
- Clear Now
5.2 Clear SSL State
Chrome/Edge:
- Settings → Privacy → Clear browsing data
- Advanced → Select "Cached images and files"
- Clear data
Firefox:
- Settings → Privacy & Security → Clear Data
- Select "Cached Web Content"
- Clear Now
5.3 Access via IP Address
Instead of using hostname, try accessing directly via IP:
https://192.168.11.10:8006
https://192.168.11.11:8006
https://192.168.11.12:8006
5.4 Check System Time
# Check system time
date
# If wrong, sync time
systemctl restart systemd-timesyncd
5.5 Accept Certificate Warning
- First-time access may show a security warning
- Click "Advanced" → "Proceed to site"
- This is normal for self-signed certificates in Proxmox
6. Fix Scripts Available
6.1 SSL Certificate Fix Scripts
scripts/fix-ssl-certificate-error-596.sh
Purpose: Fix SSL certificate error 596
Usage:
# Fix all nodes
./scripts/fix-ssl-certificate-error-596.sh all
# Fix specific node
./scripts/fix-ssl-certificate-error-596.sh ml110
./scripts/fix-ssl-certificate-error-596.sh r630-01
scripts/fix-proxmox-ssl-cluster.sh
Purpose: Comprehensive SSL and cluster service fix
Usage:
# Fix both hosts
./scripts/fix-proxmox-ssl-cluster.sh both
# Fix individual host
./scripts/fix-proxmox-ssl-cluster.sh pve
./scripts/fix-proxmox-ssl-cluster.sh pve2
scripts/fix-ssl-certificate-all-hosts.sh
Purpose: Fix SSL certificates on all hosts
Usage:
./scripts/fix-ssl-certificate-all-hosts.sh
6.2 Hostname Resolution Fix Scripts
scripts/fix-proxmox-hostname-resolution.sh
Purpose: Fix hostname resolution issues
Usage:
./scripts/fix-proxmox-hostname-resolution.sh
What it does:
- Adds proper entries to
/etc/hosts - Ensures hostnames resolve to actual IP addresses
- Updates both current and correct hostnames
6.3 General Fix Scripts
scripts/fix-r630-04-pveproxy.sh
Purpose: Fix pveproxy issues on r630-04
Usage:
./scripts/fix-r630-04-pveproxy.sh
scripts/run-fixes-on-proxmox.sh
Purpose: Run multiple fixes on Proxmox nodes
Usage:
./scripts/run-fixes-on-proxmox.sh
7. Node Status Summary
✅ Operational Nodes
| Node | IP | Web UI Status | SSL Status | Notes |
|---|---|---|---|---|
| ml110 | 192.168.11.10 | ✅ Accessible | ✅ Fixed | Cluster master |
| r630-01 | 192.168.11.11 | ✅ Accessible | ✅ Fixed | All services running |
| r630-02 | 192.168.11.12 | ✅ Accessible | ✅ Fixed | All services running |
⚠️ Issues Detected
| Node | IP | Web UI Status | SSL Status | Issues |
|---|---|---|---|---|
| r630-03 | 192.168.11.13 | ❌ Not accessible | ⚠️ Unknown | Server not reachable (unplugged?) |
| r630-04 | 192.168.11.14 | ⚠️ Not accessible | ⚠️ Unknown | pveproxy issue, SSH auth failing |
8. Troubleshooting Guide
Step 1: Check Service Status
ssh root@<node-ip>
systemctl status pveproxy pvedaemon pvestatd pve-cluster
Step 2: Check Logs
# Check pveproxy logs
journalctl -u pveproxy -n 100
# Check for worker exits
journalctl -u pveproxy -n 50 | grep "worker exit"
# Check cluster logs
journalctl -u pve-cluster -n 50
Step 3: Check Port 8006
# Check if port is listening
ss -tlnp | grep 8006
# Test web interface
curl -k -I https://<node-ip>:8006/
Step 4: Check SSL Certificates
# Check certificate files
ls -la /etc/pve/local/
# Check certificate validity
openssl x509 -in /etc/pve/pve-root-ca.pem -noout -dates
Step 5: Check Cluster Status
# Check cluster status
pvecm status
# Check cluster filesystem
mount | grep /etc/pve
df -h /etc/pve
Step 6: Apply Fixes
# Fix SSL certificates
pvecm updatecerts -f
systemctl restart pveproxy pvedaemon
# Or use automated scripts
./scripts/fix-ssl-certificate-error-596.sh <node>
9. Prevention and Best Practices
9.1 Regular Maintenance
-
Monitor SSL certificate expiration
- Check certificate dates regularly
- Renew certificates before expiration
-
Monitor service status
- Set up monitoring for pveproxy, pvedaemon, pvestatd, pve-cluster
- Alert on service failures
-
Keep system time synchronized
- Use NTP for time synchronization
- SSL certificates are time-sensitive
9.2 Configuration Best Practices
-
Hostname Resolution
- Ensure
/etc/hostshas proper entries - Hostnames must resolve to non-loopback IPs
- Keep hostname entries updated
- Ensure
-
Cluster Configuration
- Maintain cluster quorum
- Monitor cluster filesystem health
- Keep cluster certificates in sync
-
Network Configuration
- Ensure port 8006 is accessible
- Check firewall rules
- Verify network connectivity
9.3 Documentation
- Keep troubleshooting guides updated
- Document any custom configurations
- Maintain fix scripts and procedures
10. Related Documentation
Issue Reports
docs/archive/historical/PROXMOX_PVE_PVE2_ISSUES.md- Original issue analysisdocs/archive/reports/SSL_CERTIFICATE_ERROR_596_FIX.md- SSL error fix guidereports/PROXMOX_SSL_CERTIFICATE_FIX_COMPLETE.md- SSL fix completion reportreports/status/R630_03_04_CONNECTIVITY_STATUS.md- Connectivity status report
Fix Documentation
docs/archive/completion/PROXMOX_PVE_PVE2_FIX_COMPLETE.md- Complete fix documentationdocs/09-troubleshooting/R630-04-PROXMOX-TROUBLESHOOTING.md- Troubleshooting guidedocs/archive/reports/PROXMOX_SSL_FIX_VERIFIED.md- SSL fix verification
Scripts
scripts/fix-ssl-certificate-error-596.sh- SSL error 596 fixscripts/fix-proxmox-ssl-cluster.sh- SSL and cluster fixscripts/fix-proxmox-hostname-resolution.sh- Hostname resolution fixscripts/fix-r630-04-pveproxy.sh- r630-04 pveproxy fix
11. Summary
Resolved Issues ✅
- ✅ SSL Certificate Error 596 - Fixed on ml110, r630-01, r630-02
- ✅ pveproxy Worker Crashes - Fixed on r630-01, r630-02
- ✅ Hostname Resolution - Fixed on r630-01, r630-02
- ✅ Cluster Filesystem Issues - Fixed on r630-01, r630-02
- ✅ Web Interface Accessibility - Fixed on ml110, r630-01, r630-02
Ongoing Issues ⚠️
- ⚠️ r630-03 Web Interface - Server not reachable (unplugged?)
- ⚠️ r630-04 Web Interface - pveproxy issue, needs console access
Available Solutions ✅
- ✅ Automated fix scripts available
- ✅ Comprehensive troubleshooting documentation
- ✅ Step-by-step fix procedures
- ✅ Diagnostic commands documented
Review Completed: January 6, 2026
Total Issues Documented: 11
Resolved Issues: 5
Ongoing Issues: 2
Status: ✅ COMPREHENSIVE REVIEW COMPLETE