Remote Support Start download

Proxmox VE 9.2 — Dynamic Load Balancer, WireGuard SDN & Kernel 7.0

ProxmoxVirtualizationLinuxCephSDN
Proxmox VE 9.2 — Dynamic Load Balancer, WireGuard SDN & Kernel 7.0

On May 21, 2026, Proxmox Server Solutions released Proxmox VE 9.2 — the second minor release of the 9.x line and the most substantial update since the 9.0 jump in summer 2025. The headline features: a true dynamic load balancer for HA clusters, WireGuard as an encrypted SDN fabric protocol, Ceph Tentacle 20.2 as the new default and the move to Linux Kernel 7.0. Plus more than fifty smaller improvements across the VM, container, storage and backup stack.

Technical Foundation

ComponentVersion
DebianTrixie 13.5
Linux Kernel7.0 (new default)
QEMU11.0
LXC7.0
ZFS2.4
CephTentacle 20.2.1 (default) — Squid 19.2.3 still available

The Kernel 7.0 jump is bigger than the 6.17 step in 9.1 — refreshed driver stack, MBEC and GMET support for hardware virtualization branch targets, Spectre / VMScape hardening and reworked AppArmor paths.

The Five Big Highlights

1. Dynamic Load Balancer for the Cluster Resource Scheduler

The new Dynamic Load Balancer (DLB) is the biggest cluster feature since CRS rules were introduced. Until now, the CRS decided statically where an HA guest is started. Now the CRS monitors real-time metrics (CPU and memory pressure per node) and actively migrates HA guests when a node falls out of balance.

What this means in practice:

  • No more manual live migrations after failover or load spikes
  • Automatic rebalancing after maintenance reboots
  • Configurable thresholds (hysteresis and cool-down so nothing “ping-pongs”)

2. HA Arm / Disarm for Planned Maintenance

Two new CRM commands — arm-ha and disarm-ha — fix a chronic pain point in the HA stack: planned maintenance without unwanted fencing.

ha-manager disarm-ha <node>
# … maintenance on the node …
ha-manager arm-ha <node>

In the “disarmed” state the HA stack still detects temporary node outages but won’t fence. For rolling upgrades, firmware patches or network rework this is a real win — before, the only safe option was to stop the HA service entirely.

Important: A node must be armed again before a cluster upgrade, or HA resource migration must be complete — otherwise the HA manager can stall during the upgrade. Already addressed in 5.2.4+.

3. WireGuard as an SDN Fabric Protocol

SDN gets encrypted underlays. In addition to the existing OSPF and BGP fabrics, WireGuard is now available as a fabric protocol:

  • Automatic key management between cluster nodes
  • Encrypted node-to-node tunnels — ideal for multi-site clusters over public WAN or hosting providers without L2 connectivity
  • BGP/EVPN fabric runs transparently on top

Add to that eBGP unnumbered underlay with per-ASN configuration per node, and OSPF route redistribution for connected, local, kernel and BGP routes.

4. BGP/EVPN Filtering with Route Maps and Prefix Lists

For everyone running SDN seriously in the data centre: fine-grained filtering lands natively in the Proxmox web UI. Route maps and prefix lists can be defined per fabric — perfect for multi-tenant setups where not every tenant should see all EVPN routes. Complemented by multi-EVPN controller support for inter-AS scenarios and IPv6 underlays for EVPN.

A new dry-run mode lets you validate SDN changes before going live — EVPN misconfigurations are notoriously hard to undo.

5. Ceph Tentacle 20.2 as the New Default

Fresh clusters default to Ceph Tentacle 20.2.1 from 9.2 onwards. Squid 19.2.3 remains available and continues to receive security patches. Tentacle brings:

  • Improved RGW performance
  • More stable OSD recovery in large clusters
  • Consolidated telemetry and crash reporters

9.2 also fixes several Ceph-specific GUI bugs: the pool edit dialog replication size, incorrectly assigned monitor log owners on fresh clusters and more robust OSD creation when auth_client_required is missing from ceph.conf.

Virtual Machines (QEMU 11.0)

AreaImprovement
Custom CPU ModelsCustom CPU models can now be managed through the web UI — including cluster-wide compatibility indicators
TPM SnapshotsTPM state storage now also on storages with volume chains
VNC ClipboardLive migration of the VNC clipboard (machine version 10.1+)
Intel TDXInitial support for Trust Domain Extensions (confidential computing)
Nested-Virt FlagSelective CPU feature exposure without the full host CPU type
OVMF Boot MenuBoot menu now takes precedence over the firmware setup
UEFI 2023 KeysNew EFI disks ship with Microsoft UEFI CA 2023 keys
PCI PassthroughDriver targeting for passthrough devices via the new driver option

LXC 7.0 — Possibly the Biggest Container Jump in Years

LXC 7.0 is the main reason for the version bump:

  • OCI image support for both system and application containers
  • Per-mountpoint UID/GID mapping via the idmap option — the clean way to share volumes between containers with different user mappings
  • Per-mountpoint attribute inheritance via keepattrs
  • cgroup v1 deprecation warnings — the final step before cgroup v1 support is removed
  • OCI image User property enforcement
  • AF_ALG seccomp filtering — prevents a known privilege-escalation class in unprivileged containers (see PSA-2026-00018-1)
  • systemd-networkd support for SUSE-based distros
  • tmpfs mount at /dev/shm for application containers

Storage and Backup

  • Shared LVM with qcow2 volumes: Size queries without activation — faster with many snapshots
  • ZFS blocksize validation: 512 B to 16 MiB, power-of-two enforced — no more broken datasets from typos
  • CIFS with Kerberos: Detection and native auth path
  • PBS API tokens: Better name and realm validation
  • Volume chains for thick LVM provisioning: Snapshots-as-volume-chains for classic LVM setups without thin pools

The guest selection dialog for backup jobs has been reworked (search, review toggle, selection counter), and the legacy parameters starttime / dow are deprecatedschedule is now the only officially supported way.

Security — Including Some Critical Patches

9.2 addresses several serious findings:

  • PSA-2026-00014-1: VNC session hijacking and password guessing (VNC API clients may need adjustments)
  • PSA-2026-00015-1: HA resource creation now requires the Sys.Console privilege
  • PSA-2026-00018-1: AF_ALG socket privilege escalation in containers
  • Cloud-init password dump requires VM.Config.Cloudinit
  • VM start after create/restore requires VM.PowerMgmt

Plus kernel CVE backports (vblank timeout, vmalloc warnings, mpt3sas crashes, USB HID regression, ZFS cgroup OOM, AppArmor NULL deref) and patches for Crackarmor, copy.fail, DirtyFrag, Fragnesia, ssh-keysign-pwn and pintheft.

Installer and Auto-Installer

FeatureDescription
PXE/iPXE Auto-InstallNew flags --pxe and --pxe-loader for ISO generation
HTTP Auth TokenProtect answer files via authentication
IPv6-onlySLAAC and Router Advertisement support
inspect-isoNew subcommand for ISO verification
subscription-keyAnswer file property for automatic subscription activation
Post-hookData lands in /run/proxmox-installer/post-hook-data.json
Debug ShellCtrl-C opens a debug shell during installation

GUI / UX

Many small improvements across the interface that pay off in daily use:

  • Parallel worker count for all bulk actions (default: auto)
  • Task viewer download without a popup
  • Deep link fragments survive an OpenID login
  • Snapshot and backup creation directly from the context menu
  • Nested pool grouping in the resource view
  • Architecture column in the resource store
  • Mobile UI: firewall view, container network panels, OIDC redirect decoding
  • Correct Europe/Kyiv time zone (IANA name)
  • Bond without bond-primary can be created
  • CPU utilisation dashboard displays correct values again

Known Issues

  • HA Disarm and upgrade: Cluster upgrade with a disarmed HA stack can hang — workaround: keep HA armed or wait for migration. Fixed in 5.2.4+.
  • VNC API clients: Breaking change due to PSA-2026-00014-1 — review custom integrations.
  • cgroup v1: Raw entries are deprecated. Anyone still maintaining old LXC configurations should migrate now — one of the next releases drops support.
  • Legacy backup job parameters: starttime and dow are deprecated in favour of schedule.

Support Timeline

VersionSecurity updates until
Proxmox VE 8.4August 2026
Proxmox VE 9.xat least 2030 (along Debian Trixie LTS)

iX/Proxmox is giving roughly one year of overlap between 8.4 updates and 9.x — enough time for most production clusters.

Upgrade Path

From 9.1 → 9.2: Standard update via apt update && apt full-upgrade from the enterprise (recommended) or no-subscription repo. The web-GUI-based update works as well.

From 8.4 → 9.2: First move to 8.4 with all current updates, then run pve8to9, then upgrade to 9.x — a direct jump from 8.4 to 9.2 is supported.

If you want to bring Tentacle to existing clusters: Squid stays the safe default for upgrades. Tentacle migration only on fresh pools or after thorough testing.

Conclusion

Proxmox VE 9.2 is not a maintenance release but a real feature update with two heavyweights: dynamic load balancing closes the last big gap to commercial hypervisors like vSphere DRS, and WireGuard SDN fabric makes multi-site clusters without a dedicated backbone practical. On top: Kernel 7.0, Ceph Tentacle and a grown-up LXC 7.0.

For existing 9.1 clusters this is a clear upgrade recommendation. If you are still on 8.4, plan the jump to 9.x now — the overlap phase ends in August 2026.

DATAZONE for Upgrade and Migration

We run Proxmox clusters from 3-node SMB setups to multi-site EVPN fabrics. Whether upgrade planning, Ceph migration to Tentacle, SDN design with WireGuard fabric or the move from VMware to Proxmox 9.2 — we advise vendor-neutrally. More on our Proxmox services or request a free consultation.

Need IT consulting?

Contact us for a no-obligation consultation on Proxmox, OPNsense, TrueNAS and more.

Get in touch