[PVE-User] Access VM with spice

mir at miras.org mir at miras.org
Mon May 12 15:29:26 CEST 2014


Sure. Get it here: http://ftp.datanom.net/pve/spice-cli.zip

On 2014-05-12 13:42, Gilberto Nunes wrote:
> Maybe...
> 
> I think install curl for windows and make some tricks with powershell
> or something similar maybe works to...
> Can you share the perl script??
> 
> I will share the results with powershell + curl later....
> 
> Thanks
> 
> 2014-05-12 8:33 GMT-03:00 Michael Rasmussen <mir at miras.org>:
> 
>> I have written a perl script for that. Might be easier on Windows?
>> 
>> On May 12, 2014 1:08:11 PM CEST, Gilberto Nunes
>> <gilberto.nunes32 at gmail.com> wrote:
>> 
>> Yes
>> 
>> I found it...
>> Now I need found a way to do that in a Windows client....
>> 
>> Thanks
>> 
>> 2014-05-12 1:09 GMT-03:00 Alexandre DERUMIER <aderumier at odiso.com>:
>> 
>> Hi, if your clients use linux, a bash script is available here:
>> 
>> /usr/share/doc/pve-manager/examples/spice-example-sh
>> 
>> (it's generate ticket from proxmox, generate the config file and
>> launch remote-viewer).
>> 
>> ----- Mail original -----
>> 
>> De: "Gilberto Nunes" <gilberto.nunes32 at gmail.com>
>> À: pve-user at pve.proxmox.com
>> Envoyé: Samedi 10 Mai 2014 18:55:20
>> Objet: [PVE-User] Access VM with spice
>> 
>> Hi
>> 
>> I wonder if there is a method to access a VM running with spice
>> different than using we interface!
>> I meant, I dont wanna give web access to my users...
>> 
>> how can I access spice without using web interface??
>> 
>> Thanks
>> 
>> --
>> Gilberto Ferreira
>> 
>> _______________________________________________
>> pve-user mailing list
>> pve-user at pve.proxmox.com
>> http://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-user [1]
> 
>  --
>  Sent from my Android phone with K-9 Mail. Please excuse my brevity.
>  ---- This mail was virus scanned and spam checked before delivery.
> This mail is also DKIM signed. See header dkim-signature.
> 
> --
> Gilberto Ferreira
> 
> 
> Links:
> ------
> [1] http://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-user

----

This mail was virus scanned and spam checked before delivery.
This mail is also DKIM signed. See header dkim-signature.




More information about the pve-user mailing list