-
-
Notifications
You must be signed in to change notification settings - Fork 24
Tailscale
A frequently asked question we get from customers is if we have support for tailscale. At the time of writing, we don't officially support it, but it can be installed using a script a community member has written.
Tailscale an easy way to connect to your services securely via wireguard or relay traffic through your slot.
This setup assumes that you have a tailscale account already, and are ready to add the device to your tailnet. If you don't know what this means, I'd strongly advise you visit the Tailscale Website and start by getting an account and reading the documentation.
Important: ACLs - you can limit the amount of exposure devices have to each other with Access Control Lists. Consider learning about them via Tailscale ACL Documentation. More (useful) information on ACLs are available in the Grants section of the documentation
Important: Disabling Key Expiry - This will prevent your machine from going inaccessible due to the rotating nature of tailscale keys.
Of Note: Enabling HTTPS via Tailscale
Of Note: TailDrop
Before installation, please consider reading the installer script. You can read it on the GitHub Repo. This application will NOT be supported at any point either on Discord or from the vendor. They can and will reset your entire slot if you run into issues and ask for assistance.
You can run the script by using the following command:
bash <(curl -sL "https://github.com/brettpetch/hosted-scripts/raw/master/tailscale.sh")
:::tip If something goes wrong during your install, please consider checking the logs and the output in your console. You may find them by running the following:
less -r +G "$HOME/.logs/tailscale.log"
These can be helpful in cases where you need to see the output from installation. :::
For most troubleshooting, please consider consulting the Tailscale Documentation.
Note: THERE WILL BE NO SUPPORT FOR ANY ASPECT OF THIS APP FROM EITHER MYSELF OR THE VENDOR. IF YOU BREAK SOMETHING YOU ARE ON YOUR OWN.
You can expose other services via Tailscale (like the unofficial filebrowser).
To do this, you will need to know the ip of your subnet. You can find this by connecting to your slot via SSH, then running cat $HOME/.install/subnet.lock
. You can then get the port for the application either from its interface or from the command line in $HOME/.config/
- the port will be located in the configuration files for the application and may be referenced as the HTTP or HTTPS port.
You need to consult this page: https://tailscale.com/kb/1112/userspace-networking#configure-your-application-to-use-socks5-or-http
Your proxy info is located in the ExecStart
line of $HOME/.config/systemd/user/tailscaled.servcie
Your proxy info can be found
Additional Note: For these services, you may need to configure baseurl support. Note that you are responsible for any applications that you expose to the internet without authentication.