Full KVM Virtualization

VDS Hosting (KVM)

Virtual dedicated servers with full KVM hardware virtualization, hosted in our own Bucharest datacenter. Configure your resources below and run any operating system, Linux, Windows Server, FreeBSD, or a custom ISO, with dedicated resources and full root access. For lighter Linux-only workloads see LXC VPS instead.

Configure Your VDS Or Choose VPS (LXC)
KVM-VDS on Proxmox

Build Your VDS

Drag the sliders to configure your server. Prices update in real time.

Server Resources

CPU Cores @2.4 GHz€0.002
RAM (GB)€0.004 GB
Ceph SSD Space (GB)€0.0050 GB
IPv4 Addresses€0.001
IPv6 Addresses€0.001

Backups

Backup Space (GB)€0.00100 GB
Max Backups Retained€0.005

System & Location

Operating System
Data Center
DreamServer DC, Bucharest, Romania, EU

Ceph Cluster SSD

3x replication across nodes

Backup Available

Optional, billed per GB

KVM Full Virtualization

Complete hardware isolation

Upgrade to Dedicated

Seamless migration anytime

99.9% Uptime SLA

Guaranteed availability

Firewall & Custom Rules

Built-in protection

noVNC Web Console

Browser-based access

Resource Graphs

Real-time monitoring

Snapshots on Request

Point-in-time recovery

Your Configuration

CPU Cores2 cores
RAM4 GB
Ceph SSD Space50 GB
IPv4 Addresses1
IPv6 Addresses1
Backup Space100 GB
Max Backups5
Operating SystemChoose after order
Data CenterBucharest, RO
Estimated price / month €0.00 / mo
Order Now
Activated within 10 min
Data 3x Ceph
Backup available
24/7 support
€0.00 / mo
Order Now
Distributed Storage on Every VDS

Enterprise Ceph Storage with Live Migration and 3x Replication

Every KVM VDS boots from a Ceph distributed storage cluster backed by enterprise NVMe SSDs. Because the virtual disk lives in the cluster and not on a single host, your VM is decoupled from any one piece of hardware: 3x CRUSH replication keeps your data durable across separate physical nodes, and live migration lets us evacuate hosts with zero VDS downtime when we patch the hypervisor or replace a faulty server. The cluster spreads I/O across our 10 Gbps backbone for predictable performance under mixed read and write load.

When a node fails, the Ceph monitor quorum (Paxos) detects the outage within seconds and the cluster begins rebuilding the missing replicas onto healthy OSDs automatically. Your VDS keeps reading and writing the entire time, served by the surviving copies. This is how we deliver 99.9% uptime for Windows Server, BSD, custom-kernel and other non-Linux workloads that need the same storage guarantees as production Linux. For an extra off-cluster copy, pair this with a Proxmox Backup Server retention plan with content-defined deduplication, or step up to a dedicated server if you need single-tenant isolation.

Ceph Storage Cluster (CRUSH placement, 3x size, NVMe pool, RBD-backed VM disks) MON Quorum (Paxos consensus) MON node-1 MON node-2 MON node-3 KVM VM guest OS VDS Client writes 1 block OSD-1 NVMe SSD node-1 OSD-2 NVMe SSD node-2 OSD-3 offline node-3 down OSD-4 rebuilding node-4 3x write replication (CRUSH) Self-healing rebuild Failed OSD MON consensus

Triple replication across hosts

Every block of your VM disk lands on 3 different OSDs across separate physical hosts. Your Windows, Linux or BSD VDS keeps running through the loss of a disk or even a whole hypervisor, with no data loss and no manual recovery.

Live migration ready

Because the VM disk lives in Ceph and not on a single host, we can live-migrate your VDS between hypervisors with zero downtime, no IP change and no reboot. Hardware maintenance, hypervisor patching and rebalancing happen with you online.

Self-healing on NVMe

When an OSD or a whole node fails, Ceph automatically re-replicates the affected placement groups onto healthy OSDs to restore the 3x replication target. Enterprise NVMe pools deliver predictable IOPS for production databases, Windows file shares, custom-kernel workloads and ISO-installed appliances alike.

Client area preview

The control panel you get with every VDS

Every KVM virtual dedicated server ships with a fully managed self-service panel, integrated with our WHMCS billing platform. Power actions, backups, firewall rules, snapshots, an in-browser noVNC console (full graphical screen, not just a shell), CD/DVD ISO mounting and a one-click reinstall, all without opening a ticket.

Below is a view-only preview. Click through the tabs to see what each section looks like. Real account → dreamserver.ro/client

dreamserver.ro/client/index.php?m=ProxmoxVeVpsCloud&a=clientarea&serviceid=18327 Read-only demo

Service Actions

Start
Reboot
Stop
Shut Down

Service Management

Backups
Backup Collection
Backup Jobs
Backup Schedules
Firewall
Firewall Options
Graphs
noVNC Console
Reinstallation
Resource Notifications
Snapshots
Task History
VM Power Tasks
Information
StatusRunning
Serverds-cloud-07
Namevds-18327-prod
Uptime3 days 23:06:40
Created At21/04/2026
CPU Usage42.10 % of 4 cores
Memory11.82 GiB / 16 GiB
Network Rate125 MB/s (1 Gbps)
CD/DVD Disc Image FileNone
Boot Ordersata0, scsi0, net0, net0
Root Disk120.4 GiB / 250 GiB
Bandwidth Usage412 GB / Unlimited
IP Addresses
IP AddressMAC AddressSubnet MaskGateway
212.81.57.10BC:24:11:8A:42:E1255.255.255.0212.81.57.1
212.81.57.11BC:24:11:8A:42:E2255.255.255.0212.81.57.1
2a0c:b641:241::10BC:24:11:8A:42:E1482a0c:b641:241::1
CPU
CPU Usage
Memory
Memory UsageTotal
Network Traffic
Net InNet Out
Disk I/O
Disk ReadDisk Write
ISO Images
Select the template for reinstallation. If you proceed, all data located on the virtual machine will be lost.
AlmaLinuxAlmaLinux 8.10 X86 64 Minimal
AlmaLinuxAlmaLinux 9.5 X86 64 Minimal
CloudLinuxCloudLinux 8.10 X86 64
CloudLinuxCloudLinux 9.5 X86 64
DebianDebian 12.8
DebianDebian 13.0
Proxmox VEProxmox Ve 8.4 1
Proxmox VEProxmox Ve 9.0 1
Rocky LinuxRocky 8 Minimal
Rocky LinuxRocky 9 Minimal
UbuntuUbuntu 20.04 Desktop
UbuntuUbuntu 20.04 Server
UbuntuUbuntu 22.04 Desktop
UbuntuUbuntu 22.04 Server
UbuntuUbuntu 24.04 Desktop
UbuntuUbuntu 24.04 Server
CancelReinstall
Backups + Create backup
FileCreatedTypeSizeStatus
vzdump-qemu-18327-2026_04_25-03_00_00.vma.zst25/04/2026 03:00scheduled34.2 GiBcompleteRestore
vzdump-qemu-18327-2026_04_24-03_00_00.vma.zst24/04/2026 03:00scheduled34.0 GiBcompleteRestore
vzdump-qemu-18327-2026_04_23-03_00_00.vma.zst23/04/2026 03:00scheduled33.6 GiBcompleteRestore
vzdump-qemu-18327-2026_04_22-18_12_07.vma.zst22/04/2026 18:12manual33.1 GiBcompleteRestore
vzdump-qemu-18327-2026_04_21-03_00_00.vma.zst21/04/2026 03:00scheduled33.0 GiBcompleteRestore
Stored on Proxmox Backup Server · client-side AES-256 encryption · daily retention 7 / weekly 4 / monthly 3
Snapshots + Create snapshot
NameDescriptionCreatedRAM
pre-windows-updatebefore April security rollup22/04/2026 02:14includedRollback
clean-base-deb13fresh install + cloud-init21/04/2026 12:42excludedRollback
pre-pveug-9before Proxmox VE 9 upgrade19/04/2026 23:06includedRollback
enabled3 rules · default policy DROP in / ACCEPT out
+ Add rule
#ActionDirectionSourceDest. portProtoComment
1ACCEPTin10.0.0.0/822tcpSSH from internal mgmt
2ACCEPTin0.0.0.0/080, 443tcpweb public
3RATE LIMITin0.0.0.0/03389tcpRDP, 3/min from any single IP
noVNC · full graphical console (works for Windows, Linux, BSD, even before the network or SSH is up) connected100%
[    OK   ] Started Network Manager.
[    OK   ] Reached target Network is Online.
[    OK   ] Started OpenSSH server daemon.
[    OK   ] Started Postfix Mail Transport Agent.
[    OK   ] Started Nginx HTTP and reverse proxy server.
[    OK   ] Reached target Multi-User System.
[    OK   ] Reached target Graphical Interface.
 
Debian GNU/Linux 13 vds-18327 tty1
 
vds-18327 login: root
Password:
Included on All VDS Plans

RTBH DDoS Mitigation with sFlow Telemetry

We operate Remotely Triggered Black Hole (RTBH) filtering on our BGP uplinks, continuously monitored via sFlow telemetry on our edge routers. When traffic to a destination IP spikes above baseline, our sFlow collector detects the anomaly in real time and triggers a blackhole route over iBGP. The blackhole community is automatically announced to our upstream Transit Providers, so the attack traffic is dropped at their network edge before it ever reaches our network, while the rest of your infrastructure stays online.

Your other KVM VDS instances continue running unaffected while the targeted IP is blackholed. Each VDS has its own dedicated vCPU, RAM, storage and IPs, so the blackhole isolates exactly the flooded target without cross-VM impact. Simply ask our NOC to trigger the blackhole for a given IP. RTBH is effective against volumetric L3/L4 floods (UDP, SYN, amplification). Layer 7 application-layer attacks fall outside the scope of RTBH and require application-level defenses such as a WAF, rate limiting, or caching that you implement inside your VDS.

Compromised Hosts 1 Attack launched Internet user192.0.2.5 Transit Provider Upstream ISP sp-router DreamServer AS57050 ce-router Your VDS (KVM) sFlow Telemetry Collector real-time anomaly detection attack dropped legit traffic sFlow 2 iBGP 3 BGP blackhole announcement (eBGP) automatically propagated to upstream 4
Attack traffic sFlow telemetry BGP blackhole announcement
Frequently asked questions

VDS hosting FAQ

Common questions about our KVM VDS service. For anything else, see the contact page.

What is a KVM VDS and how does it differ from an LXC VPS?

KVM (Kernel-based Virtual Machine) is full hardware virtualization. The VDS gets its own kernel, its own boot loader, its own virtual hardware. You can run Linux, Windows Server, FreeBSD or any custom ISO. LXC VPS is OS-level container virtualization sharing the host kernel: much lighter but Linux-only and no kernel-level changes.

Pick KVM VDS for Windows, kernel modules, custom kernels, or anything that needs hardware-level isolation; pick LXC VPS for cheaper Linux workloads where density and price-per-resource matter.

Where is the VDS hosted?

In our own DreamServer datacenter in Bucharest, Romania. EU jurisdiction, GDPR compliant. We are also a RIPE NCC LIR (AS57050) and operate the DSIX internet exchange, so the network path you get is the same one we run for our own production.

How fast is provisioning?

VDS instances are provisioned automatically within 10 minutes of payment. The customer panel is available immediately and gives you full self-service: power actions, backups, firewall rules, snapshots, an in-browser noVNC console (works for Windows, Linux, BSD, even before the network or SSH is up) and a one-click ISO reinstall.

How is VDS storage replicated?

Every KVM VDS uses an RBD volume in our Ceph distributed storage cluster with size=3. Each block of the virtual disk is split into placement groups, and CRUSH places three copies of every PG on separate OSDs across separate physical nodes. The cluster does not acknowledge a write until all three replicas are durable on disk, so you never lose data because of a single host or disk failure. With three replicas spread across three nodes, the cluster keeps serving reads and writes through the loss of two simultaneous nodes.

Does the VDS support live migration?

Yes. Because the VM disk lives in Ceph (not on a single host), we can live-migrate your VDS between hypervisors with zero downtime, no IP change and no reboot. This is how we patch hypervisors, replace failing servers and rebalance load while your Windows Server, Linux or BSD VDS stays online and serves traffic.

Live migration also means hardware maintenance is invisible to you: planned host evacuations, kernel updates and firmware upgrades happen during business hours with no service window required on your end.

What happens if a storage node fails?

The Ceph monitor quorum (Paxos) detects an OSD or full node failure within seconds and marks the affected OSDs out of the cluster map. CRUSH then rebalances the placement groups that lost a copy onto the remaining healthy OSDs, automatically rebuilding the missing replicas in the background. Your VDS continues to read and write the entire time, served by the surviving copies, and the rebuild rate is throttled so it does not impact production I/O.

For an extra off-cluster copy of your data, see Proxmox Backup Server. If you need single-tenant isolation on top of replicated storage, step up to a dedicated server.

Can I run Windows Server?

Yes. KVM full virtualization supports any Windows Server edition (2019, 2022, 2025) with VirtIO drivers for performance. Bring your own license (BYOL) or arrange a SPLA license through us. The noVNC console works during installation just like a physical KVM-over-IP, including for the initial product key and partition setup.

Can I mount my own ISO?

Yes. The customer panel exposes a CD/DVD Disc Image File option where you can choose from our ISO library (AlmaLinux, CloudLinux, Debian, Proxmox VE, Rocky, Ubuntu Desktop and Server) or request a custom ISO upload.

Are backups included free?

Backups are an optional add-on, configured per VDS in the customer panel. Stored on a separate Proxmox Backup Server with client-side AES-256 encryption and content-defined deduplication. Standard retention is 7 daily, 4 weekly, 3 monthly. Pricing is per GB of backup space used.

What about DDoS protection?

Every VDS is covered by RTBH (Remotely Triggered Black Hole) filtering on our BGP uplinks, fed by sFlow telemetry on our edge routers. When a destination IP is flooded, the blackhole community is automatically announced to upstream transit providers so the attack is dropped at their network edge.

Effective against L3/L4 volumetric floods (UDP, SYN, amplification). Layer 7 attacks need application-level defenses inside your VDS.

Can I get IPv6?

Yes. Every VDS includes IPv6 in dual-stack with IPv4. Larger IPv6 allocations are available on request and we run our own IPv6 PI space as a RIPE NCC LIR.

Can I upgrade resources later?

Yes. CPU, RAM, SSD, IPv4, IPv6, backup space and max backups are all configurable from the customer panel and the changes take effect on next reboot. Disk can be expanded online; CPU and RAM hot-plug is supported on most distributions. Need a heavier setup? Move to a dedicated server; we handle the migration.

What does the managed customer panel cover?

Power actions (start, reboot, stop, shut down), Backups + Backup Jobs + Schedules, Firewall + Firewall Options, Resource Graphs (CPU, Memory, Network, Disk I/O), one-click Reinstallation from the ISO library, Resource Notifications, Snapshots, Task History, VM Power Tasks and a full graphical noVNC Console. Read more about the managed administration bundle.

Which operating systems are available?

Out of the box: AlmaLinux 8.10 / 9.5 Minimal, CloudLinux 8.10 / 9.5, Debian 12.8 and 13.0, Proxmox VE 8.4.1 and 9.0.1, Rocky 8 and 9 Minimal, Ubuntu 20.04 / 22.04 / 24.04 in Desktop and Server variants. Anything else is a custom ISO upload, free of charge.

What network rate is included?

Default is 80 MB/s (640 Mbps). Steps up to 1 Gbps and uncapped (Unlimited) are available as a config option in the customer panel and reflected on the order form. Bandwidth is metered separately, with generous monthly quotas; uncapped traffic profiles are available on request.

Can I bring my own SSH key or ISO?

Yes for both. The customer panel accepts an SSH public key at deploy and on every reinstall, and the ISO library supports custom uploads. The matching private key never leaves your machine. We never need or store your private key.

Do you offer 24/7 support?

Yes, our NOC is on-call 24/7 for infrastructure incidents (datacenter, network, hypervisor, storage). Customer-application support during business hours is included; out-of-hours application-level support and escalation routing are part of the optional managed administration retainer.

What payment methods do you accept?

Stripe (cards), bank transfer in EUR or RON, and on-account billing for established customers. Self-service ordering issues a pro-forma invoice; the final fiscal invoice is generated automatically on payment.

Can I get RON invoices?

Yes. We invoice in EUR by default; RON invoices on request, converted at the BNR exchange rate of the invoice date. VAT is applied per Romanian / EU rules; reverse-charge VAT is available for valid VAT-registered EU customers outside Romania.

Do you sign NDAs and Data Processing Agreements?

Yes. NDA is standard before any technical scoping. For workloads that touch personal data we sign a GDPR-aligned DPA. We are an EU-based company; data we process on your behalf stays in the EU unless you explicitly direct us otherwise.

What is the SLA?

99.9% monthly uptime for the VDS service, with proportional service credits for breach. Scheduled maintenance windows are announced via the customer panel and the status blog. Network-side redundancy is provided by multi-homed BGP transit on our LIR (AS57050) plus DSIX peering.

Can I migrate from another provider?

Yes. Common paths: P2V or V2V image import (qcow2, vmdk, vhdx), live rsync of a Linux file system to a fresh VDS, or a vzdump restore from another Proxmox cluster. The optional managed administration team handles the entire migration as a fixed-scope project, including a written runbook and acceptance test.

Can I cancel anytime?

Yes. There is no minimum term. Cancellation takes effect at the end of the current billing cycle; we keep one final backup for 7 days after termination at no extra charge so you can pull data if needed. No exit fees, no clawbacks.

Do I get root access?

Yes. The VDS is yours; you get full root or Administrator inside the VM plus an in-browser noVNC console as an out-of-band fallback. We do not maintain a hidden management user inside the guest. Anything we run for managed customers is documented in your runbook in your repo.

Trusted By & Member Of

We are proud members of leading internet infrastructure organizations.

RIPE NCC MANRS PeeringDB RoTLD DSIX SBIX 4IXP LOCIX Euro-IX RIPE NCC MANRS PeeringDB RoTLD DSIX SBIX 4IXP LOCIX Euro-IX