Find out what's new in the latest 1.86 release of Tailscale in our brand new show, The Tailscale Changelog Show over on YouTube. #tailscale
Find out what's new in the latest 1.86 release of Tailscale in our brand new show, The Tailscale Changelog Show over on YouTube. #tailscale
New blog post!
I've been using TLS certificates generated by Tailscale to access my self-hosted, private services with HTTPS for some time now, but there is one problem with them: they do not auto-regenerate.
So I used some bash and..
*thunder*, *ominous music*
systemd
to create an automated task that autoregenerates them periodically.
To crank the fun to 11, I also use https://ntfy.sh to notify me if the task succeeded or not
https://stfn.pl/blog/78-tailscale-certs-renew/
#blog #tailscale #systemd #lxc #nextcloud
Thousands of screens. Dozens of firewalls. One solution.
DEEL Media built a remote support workflow that just works — with Tailscale.
Secure
Instant
Scalable
How they did it: https://tailscale.com/customers/deel-media
#RemoteAccess #ZeroTrust #Tailscale #DigitalSignage
@waidler
If you browse to http://yourserver.local/ you’ll find an option to install TailScale for Ark support. #roon #TailScale It’s tucked away in the Ark setup.
@LoganFive the easiest way is to buy a ready made solution like a #Synology or #qnap #NAS they provide turn key solutions.
Otherwise as the others have mentioned, you need an old laptop, a Raspberry Pi or a mini PC with something like #nextcloud on it and something like #tailscale as #vpn provider.
@rae This is the way!
My setup is very similar to your plan. I have 4 VMs on my public VLAN: #Headscale, #PocketID, Podsync and #Caddy as a reverse proxy.
Like your plan, all my other services are only accessible via #Tailscale. So, I cut the Tailscale server dependency
Thinking about spinning up a secure, VLAN-isolated (and firewalled via #UniFi) VM on my #Proxmox #homelab server to act as a public-facing edge node powered by #Tailscale Funnel, custom domain, and Tailscale-issued TLS certs.
For routing multiple services (Gitea, SearXNG, blog, etc.) through Caddy, all sandboxed from my main tailnet + LAN. No open ports, no cloud VPS, no trust leaks.
Any thoughts?
New #blog post: Configuring #pihole to do split horizon #dns for my #tailscale clients
I've been running a tailnet for quite some time but hadn't got around to setting split DNS up properly. This post corrects that
Reminder! Heads up, LA!
We’re hosting a Tailscale Community Meetup in Pasadena on July 8 — come hang out with the team, grab a snack, and nerd out on networking (no NAT traversal required )
https://tailscale.com/events-webinars/tailscale-community-meetup-LA
#Tailscale #LAmeetup #SelfHosting
New blog post!
In which I talk how I installed a self-hosted expense tracker, Actual Budget, using LXC.
The twist is that Actual Budget requires HTTPS to run at all, so I added Tailscale with their provided certificates, allowing me to reach my self-hosted service from anywhere using a secure connection.
https://stfn.pl/blog/75-actual-budget-lxc/
#selfhosted #homelabbing #blog #lxc #tailscale
GitHub Actions + exit nodes =
Simon Willison routed his scraper traffic through Tailscale (on an Apple TV!) to dodge Cloudflare blocks in GitHub Actions.
Ethical, efficient, and pretty clever.
https://til.simonwillison.net/tailscale/tailscale-github-actions
#Tailscale #GitHubActions #SelfHosting
Headed to NYC this month?
Join Buildkite and Tailscale for drinks, bites & skyline views at The Monarch Rooftop!
July 16 | 6–8 PM
RSVP: https://buildkite.com/resources/events/25/aws-summit-nyc/happy-hour/
Good post indicating how Avery Pennarun plans (hopes) to keep #Tailscale free of enshittification.
Also it's quite refreshing to have a CEO of a Bil$$ corp write so candidly about the topic on their personal blog.
LA friends!
We’re hosting a Tailscale Community Meetup in Pasadena on July 8th!
Join us for snacks, stories, and some good old-fashioned tailnet talk. No VPN required.
RSVP here https://tailscale.com/events-webinars/tailscale-community-meetup-LA
Tailscale Funnel = share local services with the world, on your terms. Working on a web app on your laptop and want to show a friend? Instead of deploying, just enable Funnel and give them a URL. Secure, no config nightmares.
https://tailscale.com/kb/1223/funnel
#Tailscale #Funnel #dev
CI/CD shouldn't mean choosing between “works” and “secure.”
Tailscale’s GitHub Action now supports Windows, macOS, & Linux
https://tailscale.com/blog/private-connections-for-github-actions
#GitHubActions #DevOps #Tailscale #CI_CD
Guess who’s back on the Nasdaq tower?
Tailscale is on @redpoint’s 2025 #InfraRed100 list of the top infra startups! Big thanks to the team + panel. Full report: https://www.redpoint.com/infrared/report/
Yes, that is Times Square. Again.
#Tailscale #InfraRed100 #CloudInfra
We’re live at 1:30pm ET!
Join our Ask a Tailscale Expert webinar for demos, Q&A, and real-world tips from our Solutions Engineers.
Watch here: https://youtube.com/live/-GqO9o51jcM?feature=share
Sign up for future sessions: https://tailscale.com/events-webinars/solutions-engineer-office-hours
#Tailscale #NetworkingTools
We’re at #AWSSummit Sydney!
Find the Tailscale team at booth B19 at ICC Sydney on June 4–5. Let’s chat secure networking, access controls, or just grab some swag.
Swag, Sidecars, Grumpquat, and Brad airing our dirty laundry (literally).
17 new Tailscale Insiders
Great talks
Amazing community energy
Read the recap + learn how to join the next one https://tailscale.com/blog/tailscale-insiders-update-seattle-meetup-news