EDACerton Posted March 25 Share Posted March 25 (edited) Tailscale Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly. The service handles complex network configuration on your behalf so that you don't have to. Network connections between devices pierce through firewalls and routers as if they weren't there, allowing for direct connections without the need to manually configure port forwarding. After installing, open the console and use the tailscale CLI to configure: https://tailscale.com/cli Configuration The plugin provides an option to "Enable IP Forwarding" via the Settings page. This is useful for running exit nodes or subnet routers. Most users will simply need to run tailscale up and log in via their web browser. You may also want to disable key expiration for your server (either by using an auth key when connecting, or afterwards via the Tailscale admin console). Contributing Issue reports and pull requests are welcome on Github: https://github.com/dkaser/unraid-tailscale Edited May 9 by EDACerton Update 6 5 Quote Link to comment
EDACerton Posted March 25 Author Share Posted March 25 (edited) Changelog https://github.com/dkaser/unraid-tailscale/releases Edited May 11 by EDACerton 3 Quote Link to comment
carp969 Posted March 25 Share Posted March 25 This is great, good work. One question is how does it handle the frequent updates from Tailscale? Will it be via updates published for the plugin? Quote Link to comment
EDACerton Posted March 25 Author Share Posted March 25 Yes -- fortunately, that's simple, and documented on the repository, so someone could easily fork it if someday that became necessary (not that I plan on that, but I plan for it). 2 Quote Link to comment
ptichalouf Posted March 26 Share Posted March 26 (edited) i use this cmd personaly, i hope this will help someone with this cmd before still in unraid terminal echo 'net.ipv4.ip_forward = 1' | sudo tee -a /etc/sysctl.d/99-tailscale.conf echo 'net.ipv6.conf.all.forwarding = 1' | sudo tee -a /etc/sysctl.d/99-tailscale.conf sudo sysctl -p /etc/sysctl.d/99-tailscale.conf tailscale up --advertise-exit-node --accept-routes --advertise-routes=192.168.1.0/24 Edited March 26 by ptichalouf Quote Link to comment
ADvorsky Posted March 26 Share Posted March 26 just for your info.... tailscales magic dns might break your docker containers. /etc/resolv.conf gets copied to all freshly started contaieners from the host, which points to a dns not existing inside the container... disabling magic dns resolved this issue. Quote Link to comment
EDACerton Posted March 26 Author Share Posted March 26 (edited) 2 hours ago, ptichalouf said: i use this cmd personaly, i hope this will help someone with this cmd before still in unraid terminal echo 'net.ipv4.ip_forward = 1' | sudo tee -a /etc/sysctl.d/99-tailscale.conf echo 'net.ipv6.conf.all.forwarding = 1' | sudo tee -a /etc/sysctl.d/99-tailscale.conf sudo sysctl -p /etc/sysctl.d/99-tailscale.conf tailscale up --advertise-exit-node --accept-routes --advertise-routes=192.168.1.0/24 For everyone else’s benefit — as a general rule, if you aren’t already familiar with the extra flags here (and know you need them), just run tailscale up. FYI -- the first three commands won't survive reboot -- Unraid doesn't act like a traditional linux system, any changes that are made to /etc are lost when the system is rebooted. Fortunately, in this case the impact would be fairly small -- Unraid already sets IPv4 forwarding, so the only thing that you should lose would be IPv6 via the exit node. If you want for that to persist, you would need to modify sysctl on boot using a technique such as https://forums.unraid.net/topic/61544-how-to-modify-etcsysctlconf-on-boot/. This is something that I might look as adding as an option in an update to the plugin. Edited March 26 by EDACerton 1 Quote Link to comment
EDACerton Posted March 26 Author Share Posted March 26 9 minutes ago, ADvorsky said: just for your info.... tailscales magic dns might break your docker containers. /etc/resolv.conf gets copied to all freshly started contaieners from the host, which points to a dns not existing inside the container... disabling magic dns resolved this issue. This can be the case for Docker containers that are connected to the default "bridge" network, but that is expected behavior from Docker. If you want for Docker containers to have internal DNS resolution (i.e., being able to resolve the other containers by name), you need to create a user-defined bridge (reference: Docker documentation). Docker containers connected to a user-defined bridge get an internal DNS server. 1 Quote Link to comment
gustyScanner Posted March 26 Share Posted March 26 Fantastic plugin, thank you for working on it! Exit node as a setting to persist across reboots would be fantastic. Quote Link to comment
EDACerton Posted March 26 Author Share Posted March 26 13 minutes ago, gustyScanner said: Fantastic plugin, thank you for working on it! Exit node as a setting to persist across reboots would be fantastic. Just for clarity -- exit node will persist across reboots, the only thing that doesn't is enabling IPv6 forwarding. 1 Quote Link to comment
Nexus Posted March 26 Share Posted March 26 I installed this plugin then ran tailscale up --advertise-exit-node --accept-routes --advertise-routes=192.168.1.0/24 Now, my system is unresponsive and I had to do a hard reboot and it's not coming back I need to go hookup a keyboard and display to try and recover. Any ideas where to start? Quote Link to comment
mattgob86 Posted March 26 Share Posted March 26 FYI, https://tailscale.com/cli just returns a 404 message for me Quote Link to comment
EDACerton Posted March 26 Author Share Posted March 26 1 minute ago, mattgob86 said: FYI, https://tailscale.com/cli just returns a 404 message for me Sorry about that, the forum helpfully put the period at the end of my sentence on the link. It's fixed Quote Link to comment
aroo85 Posted March 26 Share Posted March 26 9 minutes ago, mattgob86 said: FYI, https://tailscale.com/cli just returns a 404 message for me The link as a . at the end it should be https://tailscale.com/cli Quote Link to comment
EDACerton Posted March 26 Author Share Posted March 26 (edited) 17 minutes ago, Nexus said: I installed this plugin then ran tailscale up --advertise-exit-node --accept-routes --advertise-routes=192.168.1.0/24 Now, my system is unresponsive and I had to do a hard reboot and it's not coming back I need to go hookup a keyboard and display to try and recover. Any ideas where to start? Something about this command probably didn't mesh nicely with your network... it's enabling several extra features that affect how traffic moves. As a general rule, start with tailscale up, only add other flags if you know you need them. To fix your connection, I'd run the following from CLI: tailscale set --accept-routes=false --advertise-exit-node=false --advertise-routes="" Edited March 26 by EDACerton Quote Link to comment
Nexus Posted March 26 Share Posted March 26 (edited) 3 hours ago, EDACerton said: Something about this command probably didn't mesh nicely with your network... it's enabling several extra features that affect how traffic moves. As a general rule, start with tailscale up, only add other flags if you know you need them. To fix your connection, I'd run the following from CLI: tailscale set --accept-routes=false --advertise-exit-node=false --advertise-routes="" Thanks. I opted to boot with no plugins loaded and delete the plugin and plugins directory and reboot. I'll wait a bit until wiser ones than me can play around with this Edited March 27 by Nexus Quote Link to comment
pzg417 Posted March 27 Share Posted March 27 Excellent! Big fan of tailscale. Many thanks! Quote Link to comment
EDACerton Posted March 27 Author Share Posted March 27 23 hours ago, Nexus said: Thanks. I opted to boot with no plugins loaded and delete the plugin and plugins directory and reboot. I'll wait a bit until wiser ones than me can play around with this If what you want is to be able to connect to Unraid remotely, and Docker containers running on bridge networks, then you can install the plugin and run tailscale up (no flags), that should work just fine. The other features are all more advanced networking, so adding them incorrectly can cause issues. 1 Quote Link to comment
SomeoneOnLine Posted March 27 Share Posted March 27 (edited) All though I haven't tried this plugin.....yet. I definitely will be once I get back on land in a few days. Thanks for this. Now to see if and when someone can make a headscale plugin to pair up with this plugin. Thanks for this! ~SOL Edited March 27 by SomeoneOnLine spell check! Quote Link to comment
PilaScat Posted March 27 Share Posted March 27 Tried with advertise route 192.168.1.0/24 and exit node, all working like a charm, thanks, I hope next boot it remains Quote Link to comment
Brandon_K Posted March 28 Share Posted March 28 Thank you thank you for this, as well as the update! I've been waiting for this since the first day I installed the Tailscale container. Up and running with exit node, zero issues. Quote Link to comment
EDACerton Posted March 28 Author Share Posted March 28 I published an update yesterday (version 2023.03.27) that adds a setting to enable IPv6 forwarding for folks that are using their Unraid server as a subnet router or exit node. This allows the required sysctl values (per the Tailscale documentation) to survive reboots. To access, go to the "Settings" page, then "Tailscale". 1 Quote Link to comment
rukiftw Posted March 29 Share Posted March 29 anyway to get access to br0 dockers? with dsmith44's docker tailscale verison and docker host network access enabled, it can access br0 dockers. So far i have been unable to get this plugin to do the same. any ideas? Quote Link to comment
EDACerton Posted March 29 Author Share Posted March 29 1 hour ago, rukiftw said: anyway to get access to br0 dockers? with dsmith44's docker tailscale verison and docker host network access enabled, it can access br0 dockers. So far i have been unable to get this plugin to do the same. any ideas? Honestly, I'm not really certain how that worked in the first place You could probably use the subnet router option to get a similar effect. The other option is to sidecar a Tailscale container to your other containers. This is possible with the existing Docker container, I'm also chatting with dsmith44 a little bit about how that could be made easier. Quote Link to comment
EDACerton Posted March 30 Author Share Posted March 30 Update 2023.03.29 released: updates Tailscale to 1.38.3. 2 Quote Link to comment
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.