#Tailscale rocks. From my hotel room I was able to setup a computer at home to be an exit node so that all my traffic flows through my tailnet and doesnโt rely solely on the open-to-the-world hotel WiFi.
I like the new #Tailscale feature to use #Mullvad exit notes.
But I absolutely dislike:
1. I cannot use my already paid existing Mullvad account.
2. Purchasing an account via Tailscale I cannot use this account outside Tailscale.
Using the new shining feature I am paying vor *two* Mullvad accounts. ๐ก
Can't believe how much stuff is blocked in #Turkey, thank christ for @tailscale so I can connect back to my Pi in the shed and carry on the way I normally would!
So much stuff blocked either straight up or soft blocks where stuff just doesn't load.
Dive into the future of DevOps with GitHub Actions and Tailscale SSH! ๐ Streamline workflows, enhance security, and watch your productivity soar. Don't miss this game-changing video! ๐๐ฅ https://youtu.be/WXCokV-FeFw #DevOps #GitHubActions #Tailscale
#devops #githubactions #Tailscale
Managed to lock myself out of my unraid server while traveling while trying to fix my komga docker app... (disabled all dockers, including tailscale)
Managed to fix it by using another machine in tailnet to ssh back to the server, edit the config file and restart.
Also enabled exit nodes on both so I can have encrypted traffic while traveling.
Then duct taped the komga thing by setting the container to host mode vs bridge.
Phew.
Thanks as always for amazing docs, #tailscale is the best.
Hi @tailscale, I would like to ask something. Can I assign static IP address to my devices? Thanks in advance! ๐ #tailscale #support #question #staticip
#Tailscale #support #question #staticip
Linkerd 2.14 has multi-cluster support for shared flat networks.
I've been using shared VPC subnets and Tailscale to create a shared flat network.
Let's see if Linkerd can work on top of a Cilium CNI connected via Tailscale as external/internal IP.
Even Buoyant thinks this is an awesome idea.
- https://buoyant.io/blog/kubernetes-network-policies-with-cilium-and-linkerd
- https://buoyant.io/blog/announcing-linkerd-2-14-flat-network-multicluster-gateway-api-conformance
#illumos / #solaris users: https://github.com/nshalman/tailscale/releases/tag/v1.48.1-sunos is available. #Tailscale
https://nvd.nist.gov/vuln/detail/CVE-2023-35838
Watching for #tunnelcrack issues with #wireguard
I hope #tailscale is watching too.
#tunnelcrack #wireguard #Tailscale
So I wanted to try something with #Tailscale while I was out for a few days. I left my MBP connected to the tailnet with the lid open but the screen off; tried to VNC to the machine from my phone on the same tailnet, and nothing. Timeout.
Was I doing it wrong?
I know I've been talking a lot about Tailscale recently, but this is important enough to involve another mention - the latest version of Tailscale in the app store now supports VPN On Demand, a feature that let's you inform iOS when the VPN should and should not be activated, including whitelisting or blacklisting wifi networks. This was the final feature that Tailscale was lacking that vanilla Wireguard for iOS has had for a very long time. https://tailscale.com/kb/1291/ios-vpn-on-demand/
#Tailscale #wireguard
Big thanks to @ironicbadger for the article on #Tailscale SplitDNS! It had the right steps for me to get over the last hump I had with getting services advertised on my tailnet! ๐ป
Will make sure a coffee is coming your way, once I'm next to my wallet <3
Tailscale's iOS app is a whole lot better in terms of accessibility after their move to SwiftUI. It still doesn't support automatic exit nodes when you switch off of wifi and back, but ennh, we can't get everything. P.S. #Tailscale is incredible.
Giving #Tailscale a try to facilitate getting access to my home machines from the road, primarily a MacBook Pro and a RaspberryPi Zero 2 W), without having to run my own VPN and nonsense with FiOS. So far, it's working pretty well - anyone else using it and have good results or otherwise?
#Tailscale version 1.46.1 for #illumos / #solaris has been tagged.
https://github.com/nshalman/tailscale/releases/tag/v1.46.1-sunos
Any #tailscale peeps out there? I have an exit node but I just want SOME of my nodes to use it, not others. Not sure how/where to get started.
Up to 39 "machines" in my #tailscale tailnet. Quite a few of those are individual services that listen on localhost and use tsnsrv[1] as a reverse proxy to get them onto my tailnet.
For example, I have a handful of small machines running zwave-js-ui and now each one has two proxies on my tailnet, one for the ui and another for the web socket.
Getting that put together seems like a pretty good use of a Friday evening, I'd say.
cc @cadey @tailscale
[1]: https://boinkor.net/2023/07/tsnsrv-or-easily-accessing-services-on-your-tailscale-network/
Hot on the heels of 1.44.2 is the 1.46.0 rebase of my port of #Tailscale for #illumos / #solaris
https://github.com/nshalman/tailscale/releases/tag/v1.46.0-sunos
new blog post featuring hachyderm's own @tailscale :blobhaj_heartslove: and how to manage tailscale ACLs in git automagically
https://arden.social/post/723229169486643200/tailscale-gitops-github-actions
Uptime Kuma tracks the uptime of services that you are monitoring. It's self-hosted (++) and looks good.
I got it running under MacOS in a few minutes, but a portable laptop is not the right place to put a monitoring system.
An appropriate spot for it could be fly.io, and I want to put it on my @tailscale tailnet, which means this repo from
https://github.com/SGprooo/Uptime-Kuma-Tailscale-Docker
might (?) work without too much fuss. Try next! Via