VDS Hosting (KVM)
Virtual dedicated servers with full KVM hardware virtualization, hosted in our own Bucharest datacenter. Configure your resources below and run any operating system, Linux, Windows Server, FreeBSD, or a custom ISO, with dedicated resources and full root access. For lighter Linux-only workloads see LXC VPS instead.
Build Your VDS
Drag the sliders to configure your server. Prices update in real time.
Server Resources
Backups
System & Location
Ceph Cluster SSD
3x replication across nodes
Backup Available
Optional, billed per GB
KVM Full Virtualization
Complete hardware isolation
Upgrade to Dedicated
Seamless migration anytime
99.9% Uptime SLA
Guaranteed availability
Firewall & Custom Rules
Built-in protection
noVNC Web Console
Browser-based access
Resource Graphs
Real-time monitoring
Snapshots on Request
Point-in-time recovery
Your Configuration
Enterprise Ceph Storage with Live Migration and 3x Replication
Every KVM VDS boots from a Ceph distributed storage cluster backed by enterprise NVMe SSDs. Because the virtual disk lives in the cluster and not on a single host, your VM is decoupled from any one piece of hardware: 3x CRUSH replication keeps your data durable across separate physical nodes, and live migration lets us evacuate hosts with zero VDS downtime when we patch the hypervisor or replace a faulty server. The cluster spreads I/O across our 10 Gbps backbone for predictable performance under mixed read and write load.
When a node fails, the Ceph monitor quorum (Paxos) detects the outage within seconds and the cluster begins rebuilding the missing replicas onto healthy OSDs automatically. Your VDS keeps reading and writing the entire time, served by the surviving copies. This is how we deliver 99.9% uptime for Windows Server, BSD, custom-kernel and other non-Linux workloads that need the same storage guarantees as production Linux. For an extra off-cluster copy, pair this with a Proxmox Backup Server retention plan with content-defined deduplication, or step up to a dedicated server if you need single-tenant isolation.
Triple replication across hosts
Every block of your VM disk lands on 3 different OSDs across separate physical hosts. Your Windows, Linux or BSD VDS keeps running through the loss of a disk or even a whole hypervisor, with no data loss and no manual recovery.
Live migration ready
Because the VM disk lives in Ceph and not on a single host, we can live-migrate your VDS between hypervisors with zero downtime, no IP change and no reboot. Hardware maintenance, hypervisor patching and rebalancing happen with you online.
Self-healing on NVMe
When an OSD or a whole node fails, Ceph automatically re-replicates the affected placement groups onto healthy OSDs to restore the 3x replication target. Enterprise NVMe pools deliver predictable IOPS for production databases, Windows file shares, custom-kernel workloads and ISO-installed appliances alike.
The control panel you get with every VDS
Every KVM virtual dedicated server ships with a fully managed self-service panel, integrated with our WHMCS billing platform. Power actions, backups, firewall rules, snapshots, an in-browser noVNC console (full graphical screen, not just a shell), CD/DVD ISO mounting and a one-click reinstall, all without opening a ticket.
Below is a view-only preview. Click through the tabs to see what each section looks like. Real account → dreamserver.ro/client
Service Actions




Service Management












| IP Address | MAC Address | Subnet Mask | Gateway |
|---|---|---|---|
| 212.81.57.10 | BC:24:11:8A:42:E1 | 255.255.255.0 | 212.81.57.1 |
| 212.81.57.11 | BC:24:11:8A:42:E2 | 255.255.255.0 | 212.81.57.1 |
| 2a0c:b641:241::10 | BC:24:11:8A:42:E1 | 48 | 2a0c:b641:241::1 |
| File | Created | Type | Size | Status | |
|---|---|---|---|---|---|
| vzdump-qemu-18327-2026_04_25-03_00_00.vma.zst | 25/04/2026 03:00 | scheduled | 34.2 GiB | complete | Restore |
| vzdump-qemu-18327-2026_04_24-03_00_00.vma.zst | 24/04/2026 03:00 | scheduled | 34.0 GiB | complete | Restore |
| vzdump-qemu-18327-2026_04_23-03_00_00.vma.zst | 23/04/2026 03:00 | scheduled | 33.6 GiB | complete | Restore |
| vzdump-qemu-18327-2026_04_22-18_12_07.vma.zst | 22/04/2026 18:12 | manual | 33.1 GiB | complete | Restore |
| vzdump-qemu-18327-2026_04_21-03_00_00.vma.zst | 21/04/2026 03:00 | scheduled | 33.0 GiB | complete | Restore |
| Name | Description | Created | RAM | |
|---|---|---|---|---|
| pre-windows-update | before April security rollup | 22/04/2026 02:14 | included | Rollback |
| clean-base-deb13 | fresh install + cloud-init | 21/04/2026 12:42 | excluded | Rollback |
| pre-pveug-9 | before Proxmox VE 9 upgrade | 19/04/2026 23:06 | included | Rollback |
| # | Action | Direction | Source | Dest. port | Proto | Comment |
|---|---|---|---|---|---|---|
| 1 | ACCEPT | in | 10.0.0.0/8 | 22 | tcp | SSH from internal mgmt |
| 2 | ACCEPT | in | 0.0.0.0/0 | 80, 443 | tcp | web public |
| 3 | RATE LIMIT | in | 0.0.0.0/0 | 3389 | tcp | RDP, 3/min from any single IP |
RTBH DDoS Mitigation with sFlow Telemetry
We operate Remotely Triggered Black Hole (RTBH) filtering on our BGP uplinks, continuously monitored via sFlow telemetry on our edge routers. When traffic to a destination IP spikes above baseline, our sFlow collector detects the anomaly in real time and triggers a blackhole route over iBGP. The blackhole community is automatically announced to our upstream Transit Providers, so the attack traffic is dropped at their network edge before it ever reaches our network, while the rest of your infrastructure stays online.
Your other KVM VDS instances continue running unaffected while the targeted IP is blackholed. Each VDS has its own dedicated vCPU, RAM, storage and IPs, so the blackhole isolates exactly the flooded target without cross-VM impact. Simply ask our NOC to trigger the blackhole for a given IP. RTBH is effective against volumetric L3/L4 floods (UDP, SYN, amplification). Layer 7 application-layer attacks fall outside the scope of RTBH and require application-level defenses such as a WAF, rate limiting, or caching that you implement inside your VDS.
VDS hosting FAQ
Common questions about our KVM VDS service. For anything else, see the contact page.
What is a KVM VDS and how does it differ from an LXC VPS?
KVM (Kernel-based Virtual Machine) is full hardware virtualization. The VDS gets its own kernel, its own boot loader, its own virtual hardware. You can run Linux, Windows Server, FreeBSD or any custom ISO. LXC VPS is OS-level container virtualization sharing the host kernel: much lighter but Linux-only and no kernel-level changes.
Pick KVM VDS for Windows, kernel modules, custom kernels, or anything that needs hardware-level isolation; pick LXC VPS for cheaper Linux workloads where density and price-per-resource matter.
Where is the VDS hosted?
In our own DreamServer datacenter in Bucharest, Romania. EU jurisdiction, GDPR compliant. We are also a RIPE NCC LIR (AS57050) and operate the DSIX internet exchange, so the network path you get is the same one we run for our own production.
How fast is provisioning?
VDS instances are provisioned automatically within 10 minutes of payment. The customer panel is available immediately and gives you full self-service: power actions, backups, firewall rules, snapshots, an in-browser noVNC console (works for Windows, Linux, BSD, even before the network or SSH is up) and a one-click ISO reinstall.
How is VDS storage replicated?
Every KVM VDS uses an RBD volume in our Ceph distributed storage cluster with size=3. Each block of the virtual disk is split into placement groups, and CRUSH places three copies of every PG on separate OSDs across separate physical nodes. The cluster does not acknowledge a write until all three replicas are durable on disk, so you never lose data because of a single host or disk failure. With three replicas spread across three nodes, the cluster keeps serving reads and writes through the loss of two simultaneous nodes.
Does the VDS support live migration?
Yes. Because the VM disk lives in Ceph (not on a single host), we can live-migrate your VDS between hypervisors with zero downtime, no IP change and no reboot. This is how we patch hypervisors, replace failing servers and rebalance load while your Windows Server, Linux or BSD VDS stays online and serves traffic.
Live migration also means hardware maintenance is invisible to you: planned host evacuations, kernel updates and firmware upgrades happen during business hours with no service window required on your end.
What happens if a storage node fails?
The Ceph monitor quorum (Paxos) detects an OSD or full node failure within seconds and marks the affected OSDs out of the cluster map. CRUSH then rebalances the placement groups that lost a copy onto the remaining healthy OSDs, automatically rebuilding the missing replicas in the background. Your VDS continues to read and write the entire time, served by the surviving copies, and the rebuild rate is throttled so it does not impact production I/O.
For an extra off-cluster copy of your data, see Proxmox Backup Server. If you need single-tenant isolation on top of replicated storage, step up to a dedicated server.
Can I run Windows Server?
Yes. KVM full virtualization supports any Windows Server edition (2019, 2022, 2025) with VirtIO drivers for performance. Bring your own license (BYOL) or arrange a SPLA license through us. The noVNC console works during installation just like a physical KVM-over-IP, including for the initial product key and partition setup.
Can I mount my own ISO?
Yes. The customer panel exposes a CD/DVD Disc Image File option where you can choose from our ISO library (AlmaLinux, CloudLinux, Debian, Proxmox VE, Rocky, Ubuntu Desktop and Server) or request a custom ISO upload.
Are backups included free?
Backups are an optional add-on, configured per VDS in the customer panel. Stored on a separate Proxmox Backup Server with client-side AES-256 encryption and content-defined deduplication. Standard retention is 7 daily, 4 weekly, 3 monthly. Pricing is per GB of backup space used.
What about DDoS protection?
Every VDS is covered by RTBH (Remotely Triggered Black Hole) filtering on our BGP uplinks, fed by sFlow telemetry on our edge routers. When a destination IP is flooded, the blackhole community is automatically announced to upstream transit providers so the attack is dropped at their network edge.
Effective against L3/L4 volumetric floods (UDP, SYN, amplification). Layer 7 attacks need application-level defenses inside your VDS.
Can I get IPv6?
Yes. Every VDS includes IPv6 in dual-stack with IPv4. Larger IPv6 allocations are available on request and we run our own IPv6 PI space as a RIPE NCC LIR.
Can I upgrade resources later?
Yes. CPU, RAM, SSD, IPv4, IPv6, backup space and max backups are all configurable from the customer panel and the changes take effect on next reboot. Disk can be expanded online; CPU and RAM hot-plug is supported on most distributions. Need a heavier setup? Move to a dedicated server; we handle the migration.
What does the managed customer panel cover?
Power actions (start, reboot, stop, shut down), Backups + Backup Jobs + Schedules, Firewall + Firewall Options, Resource Graphs (CPU, Memory, Network, Disk I/O), one-click Reinstallation from the ISO library, Resource Notifications, Snapshots, Task History, VM Power Tasks and a full graphical noVNC Console. Read more about the managed administration bundle.
Which operating systems are available?
Out of the box: AlmaLinux 8.10 / 9.5 Minimal, CloudLinux 8.10 / 9.5, Debian 12.8 and 13.0, Proxmox VE 8.4.1 and 9.0.1, Rocky 8 and 9 Minimal, Ubuntu 20.04 / 22.04 / 24.04 in Desktop and Server variants. Anything else is a custom ISO upload, free of charge.
What network rate is included?
Default is 80 MB/s (640 Mbps). Steps up to 1 Gbps and uncapped (Unlimited) are available as a config option in the customer panel and reflected on the order form. Bandwidth is metered separately, with generous monthly quotas; uncapped traffic profiles are available on request.
Can I bring my own SSH key or ISO?
Yes for both. The customer panel accepts an SSH public key at deploy and on every reinstall, and the ISO library supports custom uploads. The matching private key never leaves your machine. We never need or store your private key.
Do you offer 24/7 support?
Yes, our NOC is on-call 24/7 for infrastructure incidents (datacenter, network, hypervisor, storage). Customer-application support during business hours is included; out-of-hours application-level support and escalation routing are part of the optional managed administration retainer.
What payment methods do you accept?
Stripe (cards), bank transfer in EUR or RON, and on-account billing for established customers. Self-service ordering issues a pro-forma invoice; the final fiscal invoice is generated automatically on payment.
Can I get RON invoices?
Yes. We invoice in EUR by default; RON invoices on request, converted at the BNR exchange rate of the invoice date. VAT is applied per Romanian / EU rules; reverse-charge VAT is available for valid VAT-registered EU customers outside Romania.
Do you sign NDAs and Data Processing Agreements?
Yes. NDA is standard before any technical scoping. For workloads that touch personal data we sign a GDPR-aligned DPA. We are an EU-based company; data we process on your behalf stays in the EU unless you explicitly direct us otherwise.
What is the SLA?
99.9% monthly uptime for the VDS service, with proportional service credits for breach. Scheduled maintenance windows are announced via the customer panel and the status blog. Network-side redundancy is provided by multi-homed BGP transit on our LIR (AS57050) plus DSIX peering.
Can I migrate from another provider?
Yes. Common paths: P2V or V2V image import (qcow2, vmdk, vhdx), live rsync of a Linux file system to a fresh VDS, or a vzdump restore from another Proxmox cluster. The optional managed administration team handles the entire migration as a fixed-scope project, including a written runbook and acceptance test.
Can I cancel anytime?
Yes. There is no minimum term. Cancellation takes effect at the end of the current billing cycle; we keep one final backup for 7 days after termination at no extra charge so you can pull data if needed. No exit fees, no clawbacks.
Do I get root access?
Yes. The VDS is yours; you get full root or Administrator inside the VM plus an in-browser noVNC console as an out-of-band fallback. We do not maintain a hidden management user inside the guest. Anything we run for managed customers is documented in your runbook in your repo.