This is great ! I managed to setup traefik with tls proxy to headscale and headplane (ui), everithing on the same subdomain. At the minute 10:21 if you want to use that container as an exit node you need to add "--advertise-exit-node --exit-node-allow-lan-access" on line 40 at TS_EXTRA_ARGS, at the end of the line.
Thinking of buying a cheap intel n100 mini pc from AliExpress to set this up at home instead of cloud. Love that you are using caddy for the reverse proxy.
Do you mean the proxy server on the home server? I use Caddy with Cloudflare integration that can create certificates through letsencrypt via DNS challenge
Yes, but it's not recommended to run the Tailscale client alongside the Headscale server, as it may interfere with subnets. However, you can run a small VM using incus or qemu/kvm to host an isolated Headscale server.
Great video! This took me forever to figure out when I was open source advocate. I will say open ID connect works just fine.
This is great ! I managed to setup traefik with tls proxy to headscale and headplane (ui), everithing on the same subdomain.
At the minute 10:21 if you want to use that container as an exit node you need to add "--advertise-exit-node --exit-node-allow-lan-access" on line 40 at TS_EXTRA_ARGS, at the end of the line.
Brilliant video. Thanks!
Glad you liked it.
most excellent video, many thaks !
Cannot connect my phone to the server. After entering the URL, the sign in popup doesn't show up. How can I fix it?
Thinking of buying a cheap intel n100 mini pc from AliExpress to set this up at home instead of cloud. Love that you are using caddy for the reverse proxy.
Such a excelent video but, how do you gather the certificates in the client side?
Do you mean the proxy server on the home server? I use Caddy with Cloudflare integration that can create certificates through letsencrypt via DNS challenge
is it possible to make a client host as exit gateway? so another tailscale client can access the networks behind that exit node?
yes, headscale also supports exit node
Yes, but it's not recommended to run the Tailscale client alongside the Headscale server, as it may interfere with subnets. However, you can run a small VM using incus or qemu/kvm to host an isolated Headscale server.
If perhaps this had the Mulvad integration, I might just try this.