Skip to content

Tailscale

Brett Petch edited this page Apr 3, 2025 · 3 revisions

A frequently asked question we get from customers is if we have support for tailscale. At the time of writing, we don't officially support it, but it can be installed using a script a community member has written.

Tailscale an easy way to connect to your services securely via wireguard or relay traffic through your slot.

Tailscale

This setup assumes that you have a tailscale account already, and are ready to add the device to your tailnet. If you don't know what this means, I'd strongly advise you visit the Tailscale Website and start by getting an account and reading the documentation.

Generally Useful Tailscale Documentation

Important: ACLs - you can limit the amount of exposure devices have to each other with Access Control Lists. Consider learning about them via Tailscale ACL Documentation. More (useful) information on ACLs are available in the Grants section of the documentation

Important: Disabling Key Expiry - This will prevent your machine from going inaccessible due to the rotating nature of tailscale keys.

Of Note: Enabling HTTPS via Tailscale

Of Note: TailDrop

Installation

Before installation, please consider reading the installer script. You can read it on the GitHub Repo. This application will NOT be supported at any point either on Discord or from the vendor. They can and will reset your entire slot if you run into issues and ask for assistance.

You can run the script by using the following command:

bash <(curl -sL "https://github.com/brettpetch/hosted-scripts/raw/master/tailscale.sh")

:::tip If something goes wrong during your install, please consider checking the logs and the output in your console. You may find them by running the following:

less -r +G "$HOME/.logs/tailscale.log"

These can be helpful in cases where you need to see the output from installation. :::

Troubleshooting

For most troubleshooting, please consider consulting the Tailscale Documentation.

Note: THERE WILL BE NO SUPPORT FOR ANY ASPECT OF THIS APP FROM EITHER MYSELF OR THE VENDOR. IF YOU BREAK SOMETHING YOU ARE ON YOUR OWN.

Notes:

Exposing Services

You can expose other services via Tailscale (like the unofficial filebrowser).

To do this, you will need to know the ip of your subnet. You can find this by connecting to your slot via SSH, then running cat $HOME/.install/subnet.lock. You can then get the port for the application either from its interface or from the command line in $HOME/.config/ - the port will be located in the configuration files for the application and may be referenced as the HTTP or HTTPS port.

Accessing Tailnet Devices

You need to consult this page: https://tailscale.com/kb/1112/userspace-networking#configure-your-application-to-use-socks5-or-http

Your proxy info is located in the ExecStart line of $HOME/.config/systemd/user/tailscaled.servcie

Your proxy info can be found

Additional Note: For these services, you may need to configure baseurl support. Note that you are responsible for any applications that you expose to the internet without authentication.

Clone this wiki locally