• 2 Posts
  • 21 Comments
Joined 3 months ago
cake
Cake day: July 6th, 2025

help-circle
  • I may be (probably am) worrying too much about this, but doesn’t that remove much of the benefit of running services in containers? My understanding is that one benefit of containerization is so that if one service is somehow compromised, the others remain isolated, but running the service that allows you inside on bare metal gives single point access to the drives that those other services rely on, and that’s from the most likely point someone could get into your network. Alternatively, if Tailscale is containerized and someone gets in, they have access to the other services’ front ends but not the data they rely on since Tailscale itself doesn’t have that access.


  • pirateMonkey@lemmy.worldOPtoSelfhosted@lemmy.worldTailscale difficulties
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    19 days ago

    Yes, I believe I made the stupid mistake of not restarting after enabling. Once I did that the warning went away and I was able to enable subnets, but I’m still not able to see my local services (where I try to access via the IP of the host given by Tailscale or the magicDNS address). So, progress!

    ETA: I also had removed the advertise exit nodes line and restarted the container with the --reset flag. After the warning went away I re-added the exit node option and I get the warning that it is misconfigured again.












  • Sorry for misformatted code.

      tailscale-authkey1:
        image: tailscale/tailscale:latest
        hostname: myhost
        environment:
          - TS_AUTHKEY=xx
          - TS_STATE_DIR=/var/lib/tailscale
          - TS_USERSPACE=false
          - TS_EXTRA_ARGS=--advertise-exit-node,--accept-routes
          - TS_ROUTES=192.168.0.0/24
        volumes:
          - ts-authkey-test:/var/lib/tailscale
          - /dev/net/tun:/dev/net/tun
        cap_add:
          - NET_ADMIN
          - SYS_MODULE
        restart: unless-stopped
      nginx-authkey-test:
        image: nginx
        network_mode: service:tailscale-authkey1
    


  • I know this is a week old, but thanks for your input. I hadn’t seen Avahi before, and that’s a cool option, so thanks for sharing it. Part of why I wanted to do things this way was an excuse to practice with running a web server before setting up Foundry, so it’s mostly just testing things out. Of course, if it was just a regular web server, I wouldn’t have had this issue because DNS rebind protection on my router ended up being the problem.



  • Even without full understanding, I think you’re a few steps ahead of me! I was also under the impression that it would be fairly straightforward, but getting lessons in how to troubleshoot (and I appreciate them!)

    I was testing with 127.0.0.1 earlier, so that’s makes sense on one level, but not port 3000.

    Is my understanding correct that the upstream connection was refused means that it went to Cloudflare who then sent it back to my server, and it was rejected there?


  • I’m still very much in a learning mode here, so forgive my ignorance - which logs? Nginx? I’m seeing a fallback_error and fallback_access (which has nothing interesting). There are also some empty files for the host I have set up (proxy-host-1_access/error)

    2025/09/01 12:34:54 [error] 193#193: *1 connect() failed (111: Connection refused) while connecting to upstream, client: 192.168.1.181, server: nginxproxymanager, request: “GET /api/ HTTP/1.1”, upstream: “http://127.0.0.1:3000/”, host: “192.168.1.196:81”, referrer: “http://192.168.1.196:81/nginx/certificates

    Where, presumably obviously, 196 is the server and 181 is a laptop. FWIW I don’t see the directory it’s mentioning, /nginx/certificates, but I’m looking at the host’s directory rather than in the container.