About the Tech Haven Lab


Server Admin
Tech Haven is introducing a lab environment for users to test Linux & Windows virtual machines. Perfect for users that don’t have the resources to run VMs on their own machines. Lab is currently in open beta, available to all Tech Haven members.

The lab is running OpenNebula, a front end for KVM virtualization. Web interface available at https://lab.thetechhaven.com

Specifications for lab host are provided below:
  • CPU: 2 x Intel Xeon E5-2620 6c,12t @ 2.00 GHz
  • RAM: 120GB usable
  • Storage: 3.5TB RAID10 with SSD cache
  • Bandwidth: 100mbps download
  • DNS Server:
User created VMs are free to use and must follow fair use policy. Failure to comply with policies will result in termination of lab account and ban from the Discord.

Current features include:

Bot Features

  • Ability to login with Fox Bot to create and view VMs from the Discord
  • Add / Change your ssh public key through the bot. See Creating SSH Key Pair for Lab for more information regarding SSH keys and accessing the lab.
Register a Lab Account

Visit our Discord server and DM Foxy (bot) the following command: foxy! lab-register. An account and VPN file will be automatically generated.

Create VMs with the Bot

  1. Once logged in, you can create VMs with the foxy! create-server command. Use the foxy! show-images command to view different Linux Distros available to spawn.
  2. The bot will output information about the VM you created. Use OpenVPN to connect to the network, and ssh into the new VM using the IP address displayed by the bot. Username will be the name of the linux distro.

Fair Use Policy
By using the Tech Haven lab, you agree to the following terms and conditions. Failure to comply will result in your account being terminated.
  1. We do NOT collect data on users for advertising purposes. Log data, networking, and VM monitoring takes place to ensure users follow the fair use policy.
  2. Uptime is not guaranteed. This service is provided free of charge. The server, your VMs, and any data on them is not protected for data or uptime loss.
  3. VMs shall not be used for the following, but not limited to:
    1. Malware
    2. Cryptomining
    3. Pentesting other user's VMs without permission
Last edited: