Infrastructure Overview
All nodes, services, and daemon status β live
Proxmox Nodes
β
Checking...
Active LXC Containers
β
Loading...
Telecom Services Up
β
Probing...
MacGuard Status
β
Loading...
Pending Commands
β
Daemon queue
Daemon Last Seen
β
Polling...
π§ Node Registry
| Node | Type | Status | Last Ping | Agent Token |
|---|---|---|---|---|
| Loading... | ||||
π¦ LXC Containers
| VMID | Name | Status | IP | Stack | Actions |
|---|---|---|---|---|---|
| Loading... | |||||
LXC Provisioning
Create and manage Proxmox LXC containers via daemon relay
β‘ One-Click Full Deploy
Click "Check Status" to see deployment readiness.
Deploy orchestrator ready.
π§ Create New LXC
π Provisioning Log
Create LXC Container
Provision container on Proxmox node0 via daemon
Deploy Telecom Stack
Install Kamailio, FreeSWITCH, Asterisk, Jasmin, Osmocom, Open5GS
Get Container IP
Retrieve LXC IP for FluxMobile integration
Wire FluxMobile
Link SIP endpoint to FluxMobile dashboard
Ready to provision. Click "Create & Deploy Stack" to begin.
π¦ Existing Containers
| VMID | Name | Status | IP Address | Actions |
|---|---|---|---|---|
| Loading... | ||||
Telecom Services Health
Live TCP probe status for all 6 telecom services in the LXC stack
π Routing Architecture
Free-First Routing Order
P1
VoIP (FreeSWITCH on-network β free)
P2
GSM (OpenBTS/Osmocom β free)
P3
PSTN fallback (paid β last resort only)
Routing Layers
FluxSwitch (Render) β routing brain
KamRouter (Render) β LCR / cheapest path
Kamailio (LXC) β SIP proxy execution
FreeSWITCH (LXC) β media bridging
Deploy Telecom Software
Install all 6 telecom components into an existing LXC via daemon relay
π Deploy to LXC
Components to Install
π Deployment Log
Awaiting deployment command...
LXC Console
Execute commands inside any LXC container via daemon relay
Ready. Enter a command above.
MacGuard β MAC Address Security
Monitor ARP tables across all 3 Proxmox nodes. Alerts on unknown MAC addresses.
Auto-scan interval:
Loading node scan results...
Security Alerts
Unknown MAC addresses detected by MacGuard across all nodes
π¨ Alert History
No alerts on record
Kernel Hardening Audit
Read-only sysctl security parameter check across all Proxmox nodes
π Sysctl Security Audit
Read-only check. Queues
sysctl read commands on all connected nodes via daemon relay. No changes are made. Results show pass/fail against security baselines. If already hardened by your team, this will confirm it.
Click "Run Audit" to check kernel hardening state
Call Routing Status
Current routing path and FluxSwitch / KamRouter state
π Recent Calls
| Time | From | To | Path | Duration | Status |
|---|---|---|---|---|---|
| Loading... | |||||
π¬ Recent SMS
| Time | From | To | Gateway | Status |
|---|---|---|---|---|
| Loading... | ||||
Daemon Relay
fp_daemon_commands queue β all commands sent to Proxmox nodes
π¨ Command Queue
| ID | Command | Node | Status | Queued | Completed |
|---|---|---|---|---|---|
| Loading... | |||||