hi @tailscale you updated your #Android client and i have issues with the xit nodes. first i thought it wasnt enabled, but green has been replaced with blue?!? but worse, it does not work at all. i havedowngraded to an earlier version as the exit node functionality in the client seems broken.
I really do like #Tailscale But I’m concerned that one day - once I’ve fully bought into their ecosystem- the fee plan will come to an end and I’ll have to learn how to deploy a vpn myself 🙈
#Tailscale is sorcery. It's amazing how easy it makes serving HTTPS from my machine at home to anywhere in the world, while staying private and secure.
I think I no longer have to continue paying for a VM provider. My server is descending from the cloud, and coming home.
I'm behind the curve but I'm finally experimenting with @tailscale to see if integrating it into #Dropserver could be a solution to the connectivity problem for a #selfhosted install.
Honestly, it's a great product! The onboarding is top notch. I ran into a few very minor technical glitches but it works very well. It didn't take long to set up and soon I was accessing an app I had running in ds-dev on my Mac at home while munching on a Poke Bowl at the mall. Super cool!
The only gotcha with #tailscale is that their "at home" plan is only for 3 users. As soon as you past that, you have to go to the Starter plan which is $6/user/month. So for four users you're looking at $24/month. That's not a small amount!
Of course, I get it: they're not in business to give their product away.
But for the Dropserver use-case, it means Tailscale can only be useful for limited situations, and I'll have to keep finding other solutions to connectivity challenges.
Nutzt hier jemand #headscale anstatt #tailscale VPN?
Oder gibt es eine andere freie Alternative?
Headscale scheint leider so ein bisschen "tot" zu sein..?
The new #tailscale beta update for #android adds auto start if the VPN is always on and adds all the new updates to the app. Also makes selecting a VPN from #mullvadvpn much easier!
I’m using the #tailscale#kubernetes operator for my #k3s cluster, and I would like for one particular workload to use a specific exit node. I don’t think that’s possible today via the operator, but does anyone know what change would be? Do I need a tailscale sidecar container on my workload pods?
This past month, I was talking about how I spent $528 to buy a machine with enough guts to run more demanding AI models in Ollama. That is good and all but if you are not on that machine (or at least on the same network), it has limited utility. So, how do you use it if you are at a library or a friend’s house? I just discovered Tailscale. You install the Tailscale app on the server and all of your client devices and it creates an encrypted VPN connection between them. Each device on your “tailnet” has 4 addresses you can use to reference it:
Machine name: my-machine
FQDN: my-machine.tailnet.ts.net
IPv4: 100.X.Y.Z
IPv6: fd7a:115c:a1e0::53
If you remember Hamachi from back in the day, it is kind of the spiritual successor to that.
There is no need to poke holes in your firewall or expose your Ollama install to the public internet. There is even a client for iOS, so you can run it on your iPad. I am looking forward to playing around with it some more.
I got sucked into an interesting ticket today at work. I learned a bunch more about #Docker and #Tailscale so that was awesome! :tailscale_white: :docker:
In fact, the #kubernetes operator is how you’re seeing this post! I’m running a #k3s cluster at home on two #OrangePi Pluses using the operator for ingress. I’m on T-Mobile home internet and it works great since I can’t forward ports.
Uploading images is killing my #mastodon self-hosted instance at the moment. Looks like it's because whenever an image is uploaded, thousands of servers then come to request it. I don't have any edge caching, so that's tons of requests to my origin.
My origin is a server in my office, exposed to the internet via a TCP reverse proxy on a #vps and a #Tailscale#VPN connection. And it looks like Tailscale is falling back to #DERP.
@tripplehelix Perfect except when picking an exit node on Android.
Scrolling the long list of exit nodes makes my phone almost unusable. Scroll for a while, then it ghost scrolls long after you've stopped, even affecting the system UI. I don't even bother trying to pick a US exit node for better latency anymore because it is too far down the list.
To make matters worse, it makes you re-select the exit node every time #Tailscale is toggled.