VMware
Headscale – Open Source, Self Hosted Wireguard Control
Headscale – Open Source, Self Hosted Wireguard Control Server for your Tailscale Network!
#Headscale #Open #Source #Hosted #Wireguard #Control
“Awesome Open Source”
=== Links ===
Show Notes
Headscale
Headscale Web UI
Tailscale Client…
source
To see the full content, share this page by clicking one of the buttons below |
Thank you Brian 🙏
I wonder how this would run for enterprise – like 100 users? Enterprise Tailscale at 20/user/month minimum for 100 users is a lot of cash.
I think i am one of the only people that cannot make this work no matter what. now im getting a private key error just trying to bring up the docker compose in the beginning. Back to regular tailscale i go
Like your vids
But one thing
# = hash or its called number sign
£ = pound sign
People may get confused when your doing the files, and your deleting or putting in the hash symbol which is #
£ = pound symbol
This is one of today's projects for me 🙂 excellent video!
I don't think it's permission problem. I get the same error when I build the container with root permissions……
Is this doable on a network without https?
Hi Brian, I am getting an error when I build the container:
FTL go/src/headscale/cmd/headscale/cli/server.go:21 > Error initializing error="failed to read or create private key: failed to save private key to disk: open : no such file or directory"
headscale_headscale_1 exited with code 1
Do you know how to fix it. Thanks
anyone else get? WRN Failed to read configuration from disk error="While parsing config: yaml: line 12: did not find expected key". I coped it right from the site. I also did the wget method. Thanks!
Awesome video. Thanks.
i wish tailscale was built into the nextcloud solution and app so you could run a vpn and still access your nextcloud without having to open a port on mobile.
Interested to hear thoughts of headscale vs netmaker?
i'm having issues with tailscale up hanging on ubuntu server (Let's call it #1). I'm using NPM (hosted on #1 and working for other subdomain containers) pointing to dedicated vm for headscale (#2). The only difference in my setup is I'm using the imported certificate that I got from cloudflare, which my domain is proxied through.
great Video! Thanks for that! worked like a charm!
Hi Brian I love your videos !!!! been a massive inspiration I have been learning a lot, could you maybe do a video on ACLs ?
Hey Brian,
Could you help me know what are the requirements to host Headscale? I can't seem to find that information. Is it okay to do so on a VPS, or a Raspberry Pi, or what other system?
Good one.
But unfortunately, its hard to get a public IP address in many regions and opting for a static IP address is the only option if this method is selected (which obviously costs extra, per month).
Majority of the ISP's now a days are choosing to provide CGNAT IP addresses. 😩
One more thing. In config.xml, the ip-prefix section, you should put the ip4 range before the ip6 range, otherwise, the copy ip function in Tailscale client will always copy ip6 address instead of ip4.
Hi Brian, great content, just 2 observatuons:
– it would be great if you add chapters to your video, very useful for reference after the first watch;
– maybe you explained in other videos, but why do you open docker ports instead of joining the containers to the same network as nginx proxy and just use the service name and its port? This will increase the security of the whole system. I like to use traefik as reverse proxy because I can set up the routing rules via label on the service container, very handy!
Hey, thankew man for sharing such a detailed info, impressive
years back you made a video on Frappe ERPNext but now it becomes enough old, kindly make an updated and detailed video on Frapper ERPNext, am looking deeply for it, thank you in advnace.
Does this configuration require a ip public sir ?
Thanks for the excellent guide.
Just for information, I use HAProxy on pfSense as a reverse proxy for all my backends. I also use Cloudflare as dns proxy. Websocket won't work unless I turn off cloudflare dns proxy for my headscale subdomain.
I think if you selfhost headscale and tailscale then you would have to open port to access tail-scale over the internet from outside ?!