I know I've been talking a lot about Tailscale recently, but this is important enough to involve another mention - the latest version of Tailscale in the app store now supports VPN On Demand, a feature that let's you inform iOS when the VPN should and should not be activated, including whitelisting or blacklisting wifi networks. This was the final feature that Tailscale was lacking that vanilla Wireguard for iOS has had for a very long time. https://tailscale.com/kb/1291/ios-vpn-on-demand/ #Tailscale#wireguard
Guide: How to setup #SilverBullet on a 64-bit Linux machine (e.g. #RaspberryPi or cheap VPS), and expose to the Internet using @tailscale allowing you to access it from anywhere (or just your #TailScale VPN if you prefer).
The Self-Hosted Podcast explores Nextcloud's #federation features you can use in creative ways to share users, files, and more between multiple Nextcloud instances. And bonus: Accessing your #Nextcloud privately via @tailscale mesh network!
I’m using the #tailscale#kubernetes operator for my #k3s cluster, and I would like for one particular workload to use a specific exit node. I don’t think that’s possible today via the operator, but does anyone know what change would be? Do I need a tailscale sidecar container on my workload pods?
A few days using #Obsidian, and I think I'm going to keep it. It's super polished, and I always wanted a personal #wiki, which is essentially what it is.
For me the main advantage over #Joplin is how good linking between notes works.
The biggest disappointment is that there's no built in #encryption
But the real star of this entire thing is #SyncThing, which is much better than I suspected when I glanced it a long time ago. Especially in combination with #TailScale.
I've been using this latter approach for half a year now.I have a couple of services exposed to the internet via Cloudflare Tunnels. For the rest of the #SelfHosted services I have on my #HomeLab,I access them remotely via Tailscale. It's working for me,but am I missing something? Are there any security risks with this approach?
Those using TailScale on Linux or Windows may wish to ensure that they are running the latest version.
On Windows before Tailscale version 1.52 and on Linux before Tailscale 1.54, the tailscale serve and tailscale funnel features allowed users to serve the contents of directories that their user account could not access, but which the tailscaled service process could.
Taking your Apple TV to another country and running TailScale on it works like a dream. As far as the AppleTv apps are concerned, they’re still in Washington State.
Caveats.
I tried using the (wired) Apple TV at home as the exit node and performance was a bit fuzzy (on a 4K tv). I didn’t try again, I just changed my exit node to my Synology at home and it’s been crystal clear.
Once you’ve turned on the exit node, restart the Apple TV. Some apps may have already run and they don’t check their location after startup (I mean, why would they?).
I love an android app called Autosync. I have used the one for Google Drive for some time now. I created Drive folders for my custom phone sounds (alarms, notifications, ring tones), my ebook collection that I read with Moon+Reader, and a misc folder of stuff I like to have on my phone. The point of this being both that if I get a new phone, I just have to install Autosync and set up the folders and all my stuff gets synced with the new phone or device, and, in the case of Ebooks, I copy new books into my Google Drive in the appropriate folder and it syncs automatically to my phone.. and my Onyx reader.
These all depend on a cloud service. Google, or there is one for Dropbox or others.
Today I took an #OrangePi, installed debian, set up #Tailscale, and Samba, and using the universal Autosync, I can sync from my own server over my private Tailscale VPN.
Now to build the server to house the rest of it, and contemplate the document sharing... Hmmmm. 🙂
This past month, I was talking about how I spent $528 to buy a machine with enough guts to run more demanding AI models in Ollama. That is good and all but if you are not on that machine (or at least on the same network), it has limited utility. So, how do you use it if you are at a library or a friend’s house? I just discovered Tailscale. You install the Tailscale app on the server and all of your client devices and it creates an encrypted VPN connection between them. Each device on your “tailnet” has 4 addresses you can use to reference it:
Machine name: my-machine
FQDN: my-machine.tailnet.ts.net
IPv4: 100.X.Y.Z
IPv6: fd7a:115c:a1e0::53
If you remember Hamachi from back in the day, it is kind of the spiritual successor to that.
There is no need to poke holes in your firewall or expose your Ollama install to the public internet. There is even a client for iOS, so you can run it on your iPad. I am looking forward to playing around with it some more.
Anyone using @tailscale#Tailscale on a Mac with an exit node? I'd love to know how to keep it from clobbering routes to local subnets. I have both RFC1918 subnets and public subnets that I need to leave routes in place for. "Allow Local Network Access" doesn't work.
If you love what @tailscale has to offer, but prefer the maximum privacy and autonomy that only comes by self-hosting, check out this project by Kristoffer Dalby (who works at Tailscale, btw):
So, the clock that we keep under the TV broke today after I corrected the drifting time (🙄). After attempting to shop for a replacement, I've now ordered a 64x32 RGB LED Matrix (https://www.adafruit.com/product/2278) and plan to build my own clock, with pretty colors, air quality & temp display, time, NTP time sync.
But as I'm installing #Tailscale on my #NixOS Raspberry PI... I'm starting to think I'm overengineering what could be a $15 Amazon purchase instead.
What do you do when you're on vacation and it's raining constantly and then a hurricane is heading your way too? Setup #Pihole to work with my #Unifi network and #Tailscale it. I wrote up some notes on setting it up.
In fact, the #kubernetes operator is how you’re seeing this post! I’m running a #k3s cluster at home on two #OrangePi Pluses using the operator for ingress. I’m on T-Mobile home internet and it works great since I can’t forward ports.