- Видео 74
- Просмотров 1 378 948
Tailscale
США
Добавлен 20 янв 2021
The official RUclips channel for all things Tailscale.
Use your Tailscale identity everywhere! Automatically login to Proxmox with tsidp
Did you know that you can use Tailscale to automatically login to your Proxmox instance? In today's video I'll show you how to use tsidp to do just that.
- github.com/tailscale-dev/video-code-snippets/tree/main/2024-12-tsidp
- github.com/tailscale/tailscale/tree/main/cmd/tsidp
Personal accounts are always free on Tailscale and can include up to 3 users and 100 devices. Get started today at tailscale.com/yt. If you'd like to speak to our sales team about using Tailscale at work, head over to tailscale.com/contact/sales
- github.com/tailscale-dev/video-code-snippets/tree/main/2024-12-tsidp
- github.com/tailscale/tailscale/tree/main/cmd/tsidp
Personal accounts are always free on Tailscale and can include up to 3 users and 100 devices. Get started today at tailscale.com/yt. If you'd like to speak to our sales team about using Tailscale at work, head over to tailscale.com/contact/sales
Просмотров: 10 294
Видео
Installing Tailscale on macOS
Просмотров 4,8 тыс.14 дней назад
Installing Tailscale on macOS is as simple as going to the Mac App Store and clicking "install" right? Wrong! In today's video Alex will walk you through the nuances of the various methods for installing Tailscale on MacOS. - tailscale.com/kb/1065/macos-variants Personal accounts are always free on Tailscale and can include up to 3 users and 100 devices. Get started today at tailscale.com/yt. I...
No more docker sidecars! TSDProxy for Tailscale
Просмотров 12 тыс.Месяц назад
In today's video we feature an awesome project by one of our community members. TSDProxy is a simple way to access your Tailscale services running docker without creating an individual sidecar container per service. Note that this is a community maintained and provided solution. We are very pleased to feature this project but it is not an officially supported solution by Tailscale. - almeidapau...
Replace Google with SearXNG - a privacy respecting, self-hosted search engine
Просмотров 38 тыс.Месяц назад
No ads. No trackers. Search the way it was in the good ol' days. SearXNG is a self-hostable, fully open-source, search engine aggregator which aggregates results from various search services and databases. Users are neither tracked nor profiled. In today's video, Alex will show you how to set this up in an LXC container atop Proxmox using docker. To make sure that you can access this software f...
Exit Nodes | Tailscale Explained
Просмотров 20 тыс.Месяц назад
In our "Tailscale Explained" series we show you all you need to know to get started on a particular area or feature of Tailscale. In today's video we cover Tailscale Exit Nodes. ERRATA: "Allow LAN access" permits the client system to access other clients on the current LAN when enabled. An easy test is to flip the exit node ON and ping a host in your current LAN at the same time. Watch the ping...
Factorio Remote Multiplayer server sharing made EASY!
Просмотров 7 тыс.2 месяца назад
Factorio Space Age is here! If you want to set up a Factorio multiplayer server using docker and Linux then today's video will walk you through the process. In the video, Alex will also cover sharing this server with your friends and family - for free - using Tailscale with no complex firewall rule configuration required. It's like magic! Congrats to Wube and team on a terrific release. Happy f...
Remotely access your Synology from anywhere with Tailscale
Просмотров 19 тыс.2 месяца назад
In today's video I'll walk you through setting up Tailscale on your Synology, including automated updates and TLS certificates. If you've been curious about how to remotely access your self-hosted storage box for free, then this is the video for you. - tailscale.com/kb/1131/synology Personal accounts are always free on Tailscale and can include up to 3 users and 100 devices. Get started today a...
Monitor anything from anywhere with Prometheus, Grafana and Tailscale
Просмотров 4,8 тыс.2 месяца назад
In today's video Alex shows you how to monitor a UPS on the other side of the planet using Prometheus, Tailscale and Grafana. Personal accounts are always free on Tailscale and can include up to 3 users and 100 devices. Get started today at tailscale.com/yt. If you'd like to speak to our sales team about using Tailscale at work, head over to tailscale.com/contact/sales
Tailscale Talk - Ask Alex your questions (Livestream)
Просмотров 3,8 тыс.3 месяца назад
Live Stream: Setting Up an LXC Container in Proxmox with Alex! Live Q&A: Bring your questions and get answers in real-time! Join us for an exciting live stream as we dive into the world of Tailscale and LXC containers! In this session, our expert Alex will guide you through the process of setting up an LXC container in Proxmox, making it easier than ever to manage your virtual environments secu...
ACLs 101 - An Introduction to Access Control Lists | Tailscale Explained
Просмотров 12 тыс.3 месяца назад
In our "Tailscale Explained" series we show you all you need to know to get started on a particular area or feature of Tailscale. In today's video we cover Tailscale ACLs. We'll discuss ACL tags, ACL tests, and much more. Personal accounts are always free on Tailscale and can include up to 3 users and 100 devices. Get started today at tailscale.com/yt. If you'd like to speak to our sales team a...
Tailscale Webinar - NAT Traversal explained with Lee Briggs
Просмотров 2,4 тыс.3 месяца назад
Tailscale will navigate all kinds of networks on your behalf, but sometimes it needs to use our DERP servers to traverse those trickier networks. Lee covers the basics of what NAT is, and why it can be such a pain point when it comes to connecting devices to each other. In this webinar, we'll take a deep dive into how Tailscale establishes those connections, how to determine what type of connec...
Remotely access anything from anywhere with a cloud VPS and Caddy - a comprehensive beginners guide
Просмотров 19 тыс.3 месяца назад
If you've ever wanted the ultimate cloud reverse proxy which could expose any service, anywhere in your infrastructure from one place, then today's video will be right up your street! We're going to use Caddy running on Digitalocean to reverse proxy a Jellyfin instance running behind a NAT'd firewall and use Tailscale as the connecting fabric behind the scenes to make it all work magically. In ...
An Ansible primer for Devops | Infrastructure as Code Series Part 3
Просмотров 6 тыс.4 месяца назад
Ansible is a fundamental Devops technology and relies heavily on SSH under the covers to connect from one place to another. In today's video, Alex discusses what Ansible is and why you might want to use it. Plus he'll walk you through configuring a reverse proxy on a cloud infrastructure VPS with Jellyfin, a popular open source media server. This is part 3 in our Infrastructure as Code playlist...
Automate your Tailscale cloud deployments with Terraform | Infrastructure as Code Series Part 2
Просмотров 3,3 тыс.4 месяца назад
Automate your Tailscale cloud deployments with Terraform | Infrastructure as Code Series Part 2
How to use cloud-init and Tailscale | Infrastructure as Code Series Part 1
Просмотров 7 тыс.5 месяцев назад
How to use cloud-init and Tailscale | Infrastructure as Code Series Part 1
Get started with Docker and Tailscale
Просмотров 38 тыс.5 месяцев назад
Get started with Docker and Tailscale
Subnet Routers | Tailscale Explained
Просмотров 56 тыс.6 месяцев назад
Subnet Routers | Tailscale Explained
Remotely access any system with a PiKVM and Tailscale
Просмотров 19 тыс.7 месяцев назад
Remotely access any system with a PiKVM and Tailscale
Put your gaming GPU to work! Remote machine learning on Windows with Docker and WSL2 from anywhere.
Просмотров 14 тыс.8 месяцев назад
Put your gaming GPU to work! Remote machine learning on Windows with Docker and WSL2 from anywhere.
Remotely access Home Assistant via Tailscale for free!
Просмотров 58 тыс.9 месяцев назад
Remotely access Home Assistant via Tailscale for free!
Remotely access and share your self-hosted services
Просмотров 105 тыс.9 месяцев назад
Remotely access and share your self-hosted services
Behind the scenes of creating Octoprint and using Tailscale as an open source developer
Просмотров 2 тыс.10 месяцев назад
Behind the scenes of creating Octoprint and using Tailscale as an open source developer
A deep dive into using Tailscale with Docker
Просмотров 69 тыс.10 месяцев назад
A deep dive into using Tailscale with Docker
How to upgrade Tailscale on OPNsense
Просмотров 6 тыс.11 месяцев назад
How to upgrade Tailscale on OPNsense
Your Apple TV is a Subnet Router for Tailscale now!
Просмотров 66 тыс.11 месяцев назад
Your Apple TV is a Subnet Router for Tailscale now!
What is Tailscale SSH? | Tailscale Explained
Просмотров 63 тыс.Год назад
What is Tailscale SSH? | Tailscale Explained
Network Pack-its: Travel Tips For Techies
Просмотров 12 тыс.Год назад
Network Pack-its: Travel Tips For Techies
How to get started with Tailscale in under 10 minutes
Просмотров 184 тыс.Год назад
How to get started with Tailscale in under 10 minutes
Serve and Funnel | Tailscale Explained
Просмотров 32 тыс.Год назад
Serve and Funnel | Tailscale Explained
Be very careful when doing this. I followed this video step by step and right when I activated my tailnet lock command, all my tailscale accounts lost access to the internet. I didnt realize this was the case so I restarted my computer thinking that the issue was something else and I had saved my key on password manager. This was not the case since I didn't have access to internet during password manager and I lost my keys.
i love this software
my bother and i have our own tailscale accounts is this how we link the 2
Nothing about this is what is?
Any chance you can show this using traefik instead of caddy? I've been banging my head trying to set it in up the last few days.
But this configuration requires a oaid subscription, no? With the free version only 3 devices are possible. So the exit node would have to be a device that's always on?
Can you change the device name on the Mac app? Like you can on the iOS app. I know you can on the admin console but just missing it on the actual machine
i do love me some weetabix. not sure if its possible on the mac client
I've made sure I have HTTPS enabled in my TailScale account DNS settings, but the add-on still crashes when I enable the proxy - works fine otherwise. No certificate has been issued to the machine according to the machines tab in TailScale. Just get an exit code, usually 1, and the add-on stops.
whyy does it have to be that complicated jeez
Is this a one way traffic only? I have a biometrics and i cant ping back to the router subnet.
Do I get to have many tailnet name(DNS) since I host not only but many different apps? each name give access to a hosted app?
Newbie here. Just following the steps you mentioned here. After I run "docker compose up -d", I can't access "banana" in browser on host machine like you did. Am I missing a step?
I still struggle to access my plex via tailscale on my Android. Synology firewall and custom server address in plex both don't help. I haven't found a helpful guide yet, neither on tailscale forum, reddit, not YT. For a video, I'd be super happy, but if someone has a my guidance, that would also be very appreciated!
The most amazing fact about this video is how good it is prepared, how nice it is formulated and it delivers the message without wasting time. I cheers you for your great knowledge. The one whom understands well, can make everyone get it. 🎉
Cheers back to you! 🍻
I almost got an orgasm watching this video
Mac version of tailscale ui look good in widnows 🤡
"tailscale can't reach configured dns servers" - status output
This is one of the best products I have ever seen. This opened just SO MANY doors for many of my home projects!
will there be a docker container for TSIDP soon? I want to run it on my Unraid. or will it be a plugin for Unraid? multiple services could use TSIDP as an OpenID login method and it would be very convenient! Also, Alex, I have never thought I could learn something in such a soothing way. Your voice, your calmness, and at the same time, emotionally rich way of teaching/instructing are very effective for me. Thank you from a humble home automation enthusiast from Kyiv, Ukraine <3
What a great idea! I love it. GitHub actions can easily compile the go binaries. That will reduce friction for people who want to install. Compiling code yourself shouldn't be required.
Tailscale revolutionized the way I used networking in my life. It is so helpful for my travel, and supporting family members.
mindblown. thx
i searched for something else, and first i havent understood what u gonna do but maaaaaaan, this kinda makes me wanna use this in a lot more places! this is super cool, you all know your audience for 1000%. keep this up and similar content!! love you and love tailscale<3
Hey Alex, is there a concept of a service account user? I want to avoid using a personal account to authenticate the client.
Will the DS apps all work using this? Thanks.
Hope you've got a TV license 🤣
hi! please show how to connect from my home PC to work PC over the RDP!
Is it possible to host a docker container (a self hosted app like immich ) on macOS (mac mini) using podman desktop, and then try to access it from another mac using Taiscale. I haven't really seen a tutorial doing this, most of the tutorials seem to use Linux for the self hosted containers. I tried following some tutorials (A deep dive into using Tailscale with Docker, etc ), but they didn't work, I wasn't able to directly add tailscale to the container. Is there a tutorial that does it, using macos for hosting. My current method that works, is just using the ip of the mac host that has tailscale. But the method of using the API key doesn't work.
I love tailscale, it feels a LOT that this is really built with core being engineering team not random prod people, and still managed to deliver a so easy to use product.
Thank you for the fantastic walk-through - this is a huge time saver. I'd be interested in extending this method to additional homelab apps.
isn't this applicable beyond proxmox? why specify proxmox? can this not be applied to to anything that can use openid connect or similar?
Can I ask what is the VSCode theme used here?
When running `make install`, you may get an error that it couldn't find the `bash` patch, just simply run `pkg install bash` first and that should resolve it for you.
Well explained!
Thank you
Pretty cool! I don't use tailscale, but its a cool option for internal applications that don't need to be registered with a central Identity Provider (but does break the centralization of a central IDP)
Since you have a cluster, why wouldn’t you setup tsidp as a LXC container or VM?
This is how i would do it unless im missing something. Especially to add redundancy. I created a standard untrusted LXC container with default configuration (didn't have to pass the tun device) The lxc doesn't have to be on the tailscale. And I was able to install tsidp on it without a problem
I had an idea today that I’d like to share with you, regarding a feature. I should probably check the roadmap before saying it though. 😂
Are the terms Realm and Scopes known by any other names? I'm considering using this for XCP-ng (Xen-Orchestra) but their auth-oidc plugin provider mentions fields such as: Auto-Discovery URL, Client-Identifier (*), Client secret (*), Authorization URL, Callback URL, Issuer, Token URL, User Info URL, and Scopes … I understand those marked (*) are "unused" (according to your video at 10:03), what about the others? Thanks for all the help! Looking forward to giving this a try (I run both Hypervisors…) Happy Christmas Alex!
Hey Alex, pretty funny we actually do it the other way around. We use a normal HA Wireguard setup and the client will only start to allow traffic when we're logged into our Keycloak IDP :) When we login there will be an event emitted that we watch out for to add the clients IP to the appropriate NFTables set together with a timeout.
Man, I wish I can do something like this for my users logging into their SaSS applications as we all work remotely. Is that possible?
I am curious about one thing, do we need to install Tailscale to one of our Proxmox nodes?
Yes. The OIDC URL must be routable (which therefore requires that node to be on your tailnet).
@@Tailscale Thank you! Many people say that it is not ideal to install Tailscale to Proxmox node, instead they recommend LXContainers, that's why I asked. Have a great day!
Can i use this method on any lxc
most likely, yes
0:55 “Hammond seems to crash a lot” 😭
This is so helpful! Thank you!
Super awesome!
really cool that you could use ts as an identity provider. i have my proxmox oidc configured with authentik but still awesome to learn about this
Overly complicated, and full of crappy information. Why don't you make a freaking user-friendly guide??
It would be great if you could investigate how possible it is to locally host an OIDC server (exposed on your Tailnet) and use that to authenticate to your Tailnet. This is sort of a chicken and egg situation, but it's one that would be really really handy for self-hosting where you don't want an external IdP to be the root of your identity.
the chicken and egg problem is precisely why we havent made that video. we dont want to arm folks with such a powerful footgun -alex
Tailscale already supports custom OIDC, (slightly iffy as it's based on the domain of the email address you're logging in with, but it does work)
@@u1f98a it's not the custom part that's the problem. It's the keeping it all internal that is. You need to expose it outside of the tailnet in some way that's not using tailscale that makes this a bit of a pain. You have to basically use two technologies (e.g. cloudflare tunnel) or make your provider public.
@@Tailscale Yeah - I know it's a footgun, but it's also a bootstrap type problem, which should have a reasonable solution. If your Tailscale auth is setup for custom OIDC + passkeys, then losing admin access to your console due to the OIDC server being unavailable isn't a huge problem.