Thinking of buying a cheap intel n100 mini pc from AliExpress to set this up at home instead of cloud. Love that you are using caddy for the reverse proxy.
This is great ! I managed to setup traefik with tls proxy to headscale and headplane (ui), everithing on the same subdomain. At the minute 10:21 if you want to use that container as an exit node you need to add "--advertise-exit-node --exit-node-allow-lan-access" on line 40 at TS_EXTRA_ARGS, at the end of the line.
Great video! This took me forever to figure out when I was open source advocate. I will say open ID connect works just fine.
Thinking of buying a cheap intel n100 mini pc from AliExpress to set this up at home instead of cloud. Love that you are using caddy for the reverse proxy.
This is great ! I managed to setup traefik with tls proxy to headscale and headplane (ui), everithing on the same subdomain.
At the minute 10:21 if you want to use that container as an exit node you need to add "--advertise-exit-node --exit-node-allow-lan-access" on line 40 at TS_EXTRA_ARGS, at the end of the line.
Such a excelent video but, how do you gather the certificates in the client side?
Brilliant video. Thanks!
Glad you liked it.
most excellent video, many thaks !
If perhaps this had the Mulvad integration, I might just try this.
is it possible to make a client host as exit gateway? so another tailscale client can access the networks behind that exit node?
yes, headscale also supports exit node