Back to blogTechnical guide

    Add a Proxmox Backup Server to your PVE: step-by-step guide

    February 27, 2026
    8 min read

    You just subscribed to a NimbusBackup plan and received your PBS credentials by email. This guide walks you step-by-step through connecting your remote Proxmox Backup Server to your Proxmox VE infrastructure, configuring your first backup job, and verifying everything works. Estimated time: 10 minutes.

    Prerequisites

    What you need:

    • Proxmox VE 7.x or higher — installed and accessible via the web interface
    • PBS credentials — received by email when your NimbusBackup plan was activated
    • Administrator access to PVE (root role or equivalent)

    Your PBS credentials (activation email)

    The NimbusBackup activation email contains the following information:

    Server: pbs-XX.nimbus.rdem-systems.com
    Port: 8007
    Username: backup@pbs
    Password: ••••••••••••
    Datastore: ds-your-company

    Keep this email safe. These credentials are required for the configuration below.

    Encryption: enable it before the first backup

    Client-side encryption (AES-256-GCM) must be enabled before your first backup. Once backups have been run without encryption, it is no longer possible to encrypt existing backups.

    Enabling and saving the encryption key is the client's responsibility. Without this key, your backups are permanently unreadable — neither you nor RDEM Systems can decrypt them. Store it in a password manager or digital vault.

    Step 1 — Access the Proxmox VE interface

    Open your browser and log in to your Proxmox VE web interface:

    https://your-pve-server:8006

    Authenticate with an account that has administrator rights (typically root@pam).

    Step 2 — Add PBS storage

    In the left panel, click on Datacenter (at the top of the tree), then go to the Storage tab.

    1. 1
      Click "Add" at the top of the storage list.
    2. 2
      Select "Proxmox Backup Server" from the dropdown menu.
    PVE interface: Datacenter > Storage > Add menu showing the Proxmox Backup Server option

    Datacenter → Storage → Add → Proxmox Backup Server

    Step 3 — Fill in the connection form

    A form appears. Enter the fields with the information from your activation email:

    FieldValue to enterExample
    IDFree name to identify this storagenimbus-backup
    ServerPBS server addresspbs-01.nimbus.rdem-systems.com
    UsernamePBS user IDbackup@pbs
    PasswordPassword received by email••••••••
    DatastoreDedicated datastore nameds-your-company

    SSL Certificate: Our PBS servers use valid SSL certificates (Let's Encrypt). The Fingerprint field can be left empty — Proxmox VE will verify the certificate automatically.

    Add: Proxmox Backup Server form filled with ID, Server, Username, Password, Datastore and Fingerprint

    "Add: Proxmox Backup Server" form with fields filled in

    Click "Add" to validate. Proxmox VE will test the connection to the remote PBS.

    Step 4 — Verify the connection

    If the connection is established, the new nimbus-backup storage appears:

    • In the storage list (Datacenter → Storage) with type "pbs"
    • In the left tree, under each PVE node, with available space displayed
    Proxmox VE 9.1.2 storage list showing the NIMBUS storage of type Proxmox Backup Server successfully added

    NIMBUS storage appears in Datacenter → Storage (PVE 9.1.2)

    In case of connection error

    Check that port 8007 is open in your outbound firewall. The PBS protocol uses TCP port 8007 for communication between PVE and the backup server. Also verify the server name and credentials are correct.

    Step 5 — Create an automatic backup job

    Now that the PBS storage is connected, configure a scheduled backup job to protect your VMs automatically.

    1. 1
      Click on Datacenter in the left panel.
    2. 2
      Go to the Backup tab.
    3. 3
      Click "Add" to create a new job.
    4. 4
      Configure the job with the following parameters:
    ParameterRecommended value
    Storagenimbus-backup
    ScheduleEvery day at 01:00 (outside production hours)
    Selection modeAll (all VMs / containers)
    ModeSnapshot (no service interruption)
    CompressionZSTD (best speed/compression ratio)
    Send email toYour email (notification on error)
    NotificationOn failure only (avoid noise)
    Create: Backup Job dialog in PVE with NIMBUS storage, Snapshot mode, ZSTD compression and VM list

    Creating a backup job: NIMBUS storage, Snapshot mode, ZSTD

    Click "Create" to save the job. It will run automatically according to the defined schedule.

    Datacenter > Backup view showing scheduled backup jobs with NIMBUS storage

    Datacenter → Backup: the scheduled job appears in the list

    Tip: Snapshot mode performs the backup while VMs are running, without stopping them. This is the recommended mode for production environments. If your VMs use the QEMU agent (qemu-guest-agent), snapshots will be application-consistent (filesystem freeze).

    Step 6 — Run a test backup

    Before waiting for the next automatic trigger, test immediately with a manual backup:

    1. 1
      Select a test VM in the left tree.
    2. 2
      Go to that VM's Backup tab.
    3. 3
      Click "Backup now".
    4. 4
      Select nimbus-backup as the destination storage, Snapshot mode, ZSTD compression.
    5. 5
      Click "Backup" and watch the progress in the task window.
    Backup VM 100 dialog: NIMBUS storage, Snapshot mode, ZSTD compression

    "Backup now" dialog: NIMBUS selected, Snapshot, ZSTD

    Task viewer showing a backup in progress to PBS: progress, transfer speed, fs-freeze guest-agent

    Backup in progress: 30 GiB transferred, fs-freeze via guest-agent

    Backup completed successfully: 30 GiB in 2 min 16 s, transfer speed ~300 MiB/s

    Backup complete: 30 GiB in ~2 min, deduplication and validation OK

    PBS deduplication: The first backup transfers all data. Subsequent backups only transfer modified blocks thanks to PBS client-side deduplication. You will notice a significant reduction in time and bandwidth from the second backup onward.

    Step 7 — Verify the restore

    A backup that has never been tested for restoration is not a backup. Verify that restoration works:

    1. 1
      Go to the nimbus-backup storage in the left tree.
    2. 2
      Content tab — you see the list of your backups.
    3. 3
      Select a backup and click "Restore".
    4. 4
      Choose a different VMID to avoid overwriting the original VM (e.g., temporary VMID 9999).
    5. 5
      Verify the restored VM starts correctly, then delete it.
    Content view of NIMBUS storage in PVE showing available backups with Restore and File Restore buttons

    Storage NIMBUS → Content: your backups are listed with Restore options

    Important: test regularly

    Schedule a restore test at least once per quarter. An untested backup may contain corrupted data without you knowing.

    Best practices

    Client-side encryption

    To enable client-side encryption (AES-256-GCM), add an encryption key in the Encryption tab of the PBS storage. Your data will be encrypted before leaving your server. Store the encryption key safely.

    Backup retention

    The retention policy is configured on the PBS side by NimbusBackup. Default: 7 daily, 4 weekly, 3 monthly backups. Contact us to adapt retention to your needs.

    QEMU Agent

    Install qemu-guest-agent in your VMs for application-consistent snapshots. On Debian/Ubuntu: apt install qemu-guest-agent.

    Firewall

    Make sure TCP port 8007 is open outbound to the PBS server. If you use a proxy, configure it to allow long connections (backups can last several minutes).

    Encryption tab of PBS storage in PVE: Do not encrypt, Auto-generate key, Upload existing key options

    Encryption tab: client-side encryption

    Permission check failed error: missing Datastore.Modify/Datastore.Prune — deletion from PVE is denied

    Protection: backup deletion is denied from the client side

    Save your encryption key!

    If you enable client-side encryption, the encryption key is the only way to read your backups. Without this key, your backups are permanently unusable — neither you nor RDEM Systems can decrypt them. Store it in a password manager, a digital vault, or print it and keep it in a safe place.

    Summary

    PBS storage added — connected to your NimbusBackup datastore
    Backup job scheduled — automatic daily backup of all your VMs
    Test backup successful — PBS transfer and deduplication validated
    Restore tested — you can recover your data in case of disaster

    Your Proxmox VMs are now automatically backed up to your NimbusBackup PBS. If you have any issues or questions, contact our support: support@rdem-systems.com.

    Sources and references

    Need help with the configuration?

    Our technical team can connect remotely to configure your PBS in minutes.

    Your Proxmox backups, secured

    PBS hosted in Equinix Paris datacenter, client-side encryption, French support. From EUR 12 to 149/TB/month depending on your protection level.