Pretty pleased with myself over the last few days:

⁃ Intel #MacMini (IMM) brought back from retirement
⁃ IMM Repurposed as the main #Plex server
⁃ IMM #Docker installed and a custom #PiHole container installed
⁃ IMM PiHole now used to provide #DNS for my #Tailscale #Tailnet **
⁃ So I’m fully DNS’ed and de-advertised on all my Tailnet devices

The #Synology NAS has never had CPU and Memory loads so low, with taking Plex it.

The only issue I have is that only one client address shows in PiHole but I think that is a side effct on using Tailcale.

** - Means my good lady who doesn’t trust the technology (no Tailscale) can use her devices how she wishers

Pretty darned chuffed!

Got issues while keeping #nextdns as global #dns #server in my #tailnet running #headscale.
If I switch to #cloudflare resolver, everything works as expected, but I don't like it this way.
I aslo tried #ad-guard but looks like being not supported at all under headscale.

Any suggestion?

*banging head against wall*

#selfhosting #homelab

Once I'm comfortable with the basics of using tailscale. I'll probably try the netbird thing maybe in future.
Next thing I'm gonna try the serve, funnel features. So maybe at the end, I want a funnel connection to caddy (using podman) in my PC and act as a reverse proxy to a simple hello world program running in multiple nodes in my tailnet😄
Let's see how it goes.

Thanks to wireguard ❤️

Feel free to guide me

#tailscale #tailnet #funnel #server #caddy #reverseproxy #network #wireguard

Tailscale is way too easy to setup. I'm not a network expert, so this really helps me a lot in setting up a secure connection between my devices. Love the free tier - 100 devices and 3 users (really great). Connection between my devices is really seamless. Had to fiddle some tailscale options in nixos to avoid doing sudo, pretty simple too. Joined other tailnet(also mine) and shared the machines to my network. Super easy and fun.

#tailscale #networking #nixos #tailnet

Tạo giao đồ họa mạng Headscale trên Grafana nhờ exporter mới hỗ trợ toàn bộ các node, user và khóa. Cài đặt dễ dàng qua Prometheus và dashboard. [Nguồn: r/selfhosted]
#selfhosted #Grafana #Headscale #TailNet #Linux #TechVie

*No URLs, only essential info within 500 chars.*

https://www.reddit.com/r/selfhosted/comments/1pieayd/visualizing_your_headscale_network_in_grafana/

#HomeLab. The moment of enlightenment.

Every #docker container on the Tailnet member has access to your Tailnet.

For example, Uptime Kuma can send requests to any of your #Tailscale devices. Any service with server-side processing is a potential hole to your #Tailnet when it is public or someone has access there except you.

Be careful. ACL rules is a must in such cases.

#SelfHosted #SelfHost #SelfHosting #networking #security

Going in all directions today 😅🤪

How are you guys feeling with using #tailscale versus sticking to "plain vanilla" #wireguard for your #VPN between domestic systems (phone, tablet, home PC, #VPS, ...)?

I do see the value of #tailscale to avoid manually generating many keys when a new device joins the network, central view of your #tailnet ,...

But it's not #foss (at least not the coordination server), and its impact on battery (at least on iPhone) is quite significant.

Staying a "purist" or accepting the facility of a service running on top of a great protocol? 😅

Build a private, self-hosted LLM server with Proxmox, PCle passthrough, Ollama, Open WebUI & NixOS

YouTube

I did a thing - a simple docker container for getting a quick shell within your #tailscale #tailnet.

https://github.com/markallanson/tailnet-shell

Low effort, high impact (at least for me, being able to get a shell running inside my tailnet from anywhere with very little work)

GitHub - markallanson/tailnet-shell: A simple Tailscale tailnet shell for quick access to your tailnet.

A simple Tailscale tailnet shell for quick access to your tailnet. - markallanson/tailnet-shell

GitHub
Go happy with #tailscale and #tailnet lock!