⚑

Server-AI Console

Infrastructure access. Admins only.

Infrastructure Overview
ADMIN ONLY
Infrastructure Overview
All nodes, services, and daemon status β€” live
Proxmox Nodes
β€”
Checking...
Active LXC Containers
β€”
Loading...
Telecom Services Up
β€”
Probing...
MacGuard Status
β€”
Loading...
Pending Commands
β€”
Daemon queue
Daemon Last Seen
β€”
Polling...
πŸ–§ Node Registry
NodeTypeStatusLast PingAgent Token
Loading...
πŸ“¦ LXC Containers
VMIDNameStatusIPStackActions
Loading...
LXC Provisioning
Create and manage Proxmox LXC containers via daemon relay
⚑ One-Click Full Deploy
Click "Check Status" to see deployment readiness.
Deploy orchestrator ready.
πŸ”§ Create New LXC
πŸ“‹ Provisioning Log
1
Create LXC Container
Provision container on Proxmox node0 via daemon
2
Deploy Telecom Stack
Install Kamailio, FreeSWITCH, Asterisk, Jasmin, Osmocom, Open5GS
3
Get Container IP
Retrieve LXC IP for FluxMobile integration
4
Wire FluxMobile
Link SIP endpoint to FluxMobile dashboard
Ready to provision. Click "Create & Deploy Stack" to begin.
πŸ“¦ Existing Containers
VMIDNameStatusIP AddressActions
Loading...
Telecom Services Health
Live TCP probe status for all 6 telecom services in the LXC stack
πŸ”€ Routing Architecture
Free-First Routing Order
P1 VoIP (FreeSWITCH on-network β€” free)
P2 GSM (OpenBTS/Osmocom β€” free)
P3 PSTN fallback (paid β€” last resort only)
Routing Layers
FluxSwitch (Render) β€” routing brain
KamRouter (Render) β€” LCR / cheapest path
Kamailio (LXC) β€” SIP proxy execution
FreeSWITCH (LXC) β€” media bridging
Deploy Telecom Software
Install all 6 telecom components into an existing LXC via daemon relay
πŸš€ Deploy to LXC
Components to Install
πŸ“‹ Deployment Log
Awaiting deployment command...
LXC Console
Execute commands inside any LXC container via daemon relay
Ready. Enter a command above.
MacGuard β€” MAC Address Security
Monitor ARP tables across all 3 Proxmox nodes. Alerts on unknown MAC addresses.
Auto-scan interval:
Loading node scan results...
Security Alerts
Unknown MAC addresses detected by MacGuard across all nodes
🚨 Alert History
πŸ›‘οΈ
No alerts on record
Kernel Hardening Audit
Read-only sysctl security parameter check across all Proxmox nodes
πŸ”’ Sysctl Security Audit
Read-only check. Queues sysctl read commands on all connected nodes via daemon relay. No changes are made. Results show pass/fail against security baselines. If already hardened by your team, this will confirm it.
πŸ”’
Click "Run Audit" to check kernel hardening state
Call Routing Status
Current routing path and FluxSwitch / KamRouter state
πŸ“Š Recent Calls
TimeFromToPathDurationStatus
Loading...
πŸ’¬ Recent SMS
TimeFromToGatewayStatus
Loading...
Daemon Relay
fp_daemon_commands queue β€” all commands sent to Proxmox nodes
πŸ“¨ Command Queue
IDCommandNodeStatusQueuedCompleted
Loading...