hi @tailscale you updated your #Android client and i have issues with the xit nodes. first i thought it wasnt enabled, but green has been replaced with blue?!? but worse, it does not work at all. i havedowngraded to an earlier version as the exit node functionality in the client seems broken.
I really do like #Tailscale But I’m concerned that one day - once I’ve fully bought into their ecosystem- the fee plan will come to an end and I’ll have to learn how to deploy a vpn myself 🙈
#Tailscale is sorcery. It's amazing how easy it makes serving HTTPS from my machine at home to anywhere in the world, while staying private and secure.
I think I no longer have to continue paying for a VM provider. My server is descending from the cloud, and coming home.
Nutzt hier jemand #headscale anstatt #tailscale VPN?
Oder gibt es eine andere freie Alternative?
Headscale scheint leider so ein bisschen "tot" zu sein..?
I’m using the #tailscale#kubernetes operator for my #k3s cluster, and I would like for one particular workload to use a specific exit node. I don’t think that’s possible today via the operator, but does anyone know what change would be? Do I need a tailscale sidecar container on my workload pods?
This past month, I was talking about how I spent $528 to buy a machine with enough guts to run more demanding AI models in Ollama. That is good and all but if you are not on that machine (or at least on the same network), it has limited utility. So, how do you use it if you are at a library or a friend’s house? I just discovered Tailscale. You install the Tailscale app on the server and all of your client devices and it creates an encrypted VPN connection between them. Each device on your “tailnet” has 4 addresses you can use to reference it:
Machine name: my-machine
FQDN: my-machine.tailnet.ts.net
IPv4: 100.X.Y.Z
IPv6: fd7a:115c:a1e0::53
If you remember Hamachi from back in the day, it is kind of the spiritual successor to that.
There is no need to poke holes in your firewall or expose your Ollama install to the public internet. There is even a client for iOS, so you can run it on your iPad. I am looking forward to playing around with it some more.
I got a very comfortable, free #Tailscale t-shirt in the mail the other day and I am definitely wearing it like some sort of chump. I'd take a picture but I'm too busy eating doughnuts and no one wants to see that. Anyway, thanks Tailscale developer relations for being cool.
Question for the #tailscale fans:
Say I have a bunch of services running on my NAS on various ports, is it possible to use a reverse proxy to have them accessible as via a subdomain without specifiying a port?
e.g. subdomain.shortdomain.taila111a.ts.net maps to shortdomain:5000 ?
Taking your Apple TV to another country and running TailScale on it works like a dream. As far as the AppleTv apps are concerned, they’re still in Washington State.
Caveats.
I tried using the (wired) Apple TV at home as the exit node and performance was a bit fuzzy (on a 4K tv). I didn’t try again, I just changed my exit node to my Synology at home and it’s been crystal clear.
Once you’ve turned on the exit node, restart the Apple TV. Some apps may have already run and they don’t check their location after startup (I mean, why would they?).
Guide: How to setup #SilverBullet on a 64-bit Linux machine (e.g. #RaspberryPi or cheap VPS), and expose to the Internet using @tailscale allowing you to access it from anywhere (or just your #TailScale VPN if you prefer).
Those using TailScale on Linux or Windows may wish to ensure that they are running the latest version.
On Windows before Tailscale version 1.52 and on Linux before Tailscale 1.54, the tailscale serve and tailscale funnel features allowed users to serve the contents of directories that their user account could not access, but which the tailscaled service process could.