Skip to content

Deploying a VM

Arrow Manager allows you to deploy virtual machines directly onto your Arrow device using pre-built templates. This guide walks through every step required to get a VM running.

Before deploying a VM, ensure:

  • You are logged into Arrow Manager
  • Proxmox credentials are configured (via Manage Credential button)
  • At least one VM template is installed

Encrypted storage uses LUKS encryption to securely store your deployed VMs. To set it up:

  1. Click Setup Encryption on the Proxmox page
  2. Enter a strong encryption key or passphrase
  3. Click Create Encrypted Storage

The system will create a LUKS-encrypted partition and mount it automatically. A Proxmox storage location called “encrypted” is configured for you.

Remember Your Key

Your encryption key is not saved on the system. You will need to re-enter it after every system reboot to unlock your VM storage. If you forget the key, you will need to wipe the encrypted storage and start over.

If the device has been rebooted, you will see an Encrypted Storage Not Mounted alert. Click Enter Encryption Key, provide your key, and click Unlock to remount the storage and regain access to your VMs.

If you haven’t already installed a template:

  1. Find the template you want in the template list
  2. Click Install to download it to your device
  3. Wait for the download to complete

Templates are stored on unencrypted storage and do not require the encrypted partition. You can install and update templates at any time.

Click Deploy on an installed template to open the deployment configuration dialog. You will need to configure four sections before deployment can begin.

Set the passwords that will be configured on the VM:

FieldRequiredDescription
Root PasswordYesRoot account password (minimum 8 characters)
Confirm Root PasswordYesMust match the root password
Arrow User PasswordYesPassword for the arrow user account (minimum 8 characters)
Confirm Arrow User PasswordYesMust match the arrow user password
SSH Public KeyNoOptional SSH public key for key-based authentication (ssh-rsa, ssh-ed25519, etc.)

Configure the VM’s VPN connection for remote management:

FieldRequiredDescription
NetBird Setup KeyYesSetup key from your NetBird dashboard to register the VM on your VPN network
NetBird Device NameAutoAutomatically generated based on your device hostname and OS. Can be customized.
Enable Arrow ControlNoToggle to provision an Arrow Control license for the VM (enabled by default)

The NetBird setup key connects your new VM to your organization’s VPN network, making it remotely accessible.

Configure how the VM connects to the local network:

FieldRequiredDescription
MAC AddressAutoAuto-generated from the host adapter. Can be manually changed if needed.
Use Static IPNoToggle between DHCP (default) and static IP configuration

When Use Static IP is enabled, additional fields appear:

FieldRequiredDescription
IP AddressYesStatic IP address for the VM
Subnet MaskYesSupports CIDR notation (/24) or decimal (255.255.255.0)
GatewayYesNetwork gateway address
Primary DNSYesPrimary DNS server
Secondary DNSNoOptional fallback DNS server

If you leave Use Static IP disabled, the VM will use DHCP to obtain its network configuration automatically.

Allocate hardware resources for the VM:

FieldDefaultDescription
Disk Size (GB)Template minimumSize of the VM disk. Cannot be smaller than the template’s disk size. Maximum 2000 GB.
CPU CoresHost cores - 1Number of CPU cores allocated to the VM
Memory (GB)Host memory - 2 GBAmount of RAM allocated to the VM

Resource defaults are calculated based on your device’s hardware, leaving headroom for the host system to operate.

After filling in all four sections, click Deploy to start the VM creation process. Arrow Manager will:

  1. Validate all your configuration settings
  2. Allocate a VM ID on Proxmox
  3. Clone the template with your resource settings
  4. Apply cloud-init configuration (passwords, network, VPN)
  5. Start the VM

You can monitor the deployment progress in real time. Once complete, the VM will appear in your VM list and begin booting.

Use this checklist to ensure everything is ready before deploying:

RequirementStatus
Logged into Arrow Manager
Proxmox credentials configured
Encrypted storage set up and mounted
Template installed
Root and arrow user passwords chosen
NetBird setup key obtained
Network configuration decided (DHCP or static)
Resource allocation reviewed

You need to set up or unlock encrypted storage before deploying. See Step 1.

The Deploy button is disabled when:

  • Encrypted storage is not mounted
  • A template is currently being installed
  • Proxmox credentials are not configured
  • If using static IP, verify the IP address, gateway, and DNS settings are correct for your network
  • If using DHCP, ensure a DHCP server is available on the network
  • Check that the MAC address is not conflicting with another device on the network

If you cannot remember your encryption key, your only option is to wipe the encrypted storage and set it up again. This will delete all deployed VMs. Use the Wipe Storage button to reset.

When an engagement is complete or you need to reset the device, you can wipe the encrypted storage to permanently destroy all deployed VMs and their data.

  • After an engagement — securely erase all VMs and data when the job is done
  • Forgot your encryption key — if you cannot unlock the storage after a reboot, wiping is the only way to reset
  • Free up disk space — remove the encrypted partition entirely

Wiping encrypted storage is a permanent, irreversible operation. It will:

  1. Stop all running VMs
  2. Delete all VMs from Proxmox
  3. Remove the “encrypted” storage from Proxmox configuration
  4. Unmount the encrypted filesystem
  5. Close the LUKS encrypted device
  6. Wipe the LUKS header (making data unrecoverable)
  7. Delete the encrypted partition from disk
  1. Navigate to the Proxmox page in Arrow Manager
  2. Click the Wipe Storage button (only enabled when encrypted storage exists)
  3. Review the warning dialog carefully
  4. If there are running VMs, you will see an additional warning that they will be stopped automatically
  5. Click Wipe Encrypted Storage to confirm

After the wipe completes, you can set up encryption again from scratch if needed by following Step 1.