Skip to content

Commit

Permalink
Update Headscale article
Browse files Browse the repository at this point in the history
  • Loading branch information
radarsymphony committed Nov 20, 2023
2 parents b4b2fc4 + 495c506 commit 87dfc70
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions content/posts/headscale-for-tailscale-vpn.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,9 +14,9 @@ tags:
- network
---
# Overview
This guide outlines how to set up [Headscale](https://headscale.net/) running as Docker container behind a reverse proxy (Traefik). It uses a free ubuntu VPS from the Oracle Cloud Free Tier, but any linux-based host with public IP and about ~1GB of memory should work for small Home Lab setups.
[Headscale](https://headscale.net/) is an opensource reverse-engineered implementation of the closed source Tailscale coordination server. There are many advantages to using the original Tailscale coordination server, such as a convenient admin panel and multiple "tailnets" - separate VPNs you can quickly switch between. However, I am on a quest to explore opensource and privacy-focused software, I've decided to set up Headscale as my Tailscale coordination server.

Headscale is an opensource reverse-engineered implementation of the closed source Tailscale coordination server. There are many advantages to using the original Tailscale coordination server, such as a convenient admin panel and multiple tailnets. However, I am on a quest to explore opensource and privacy-focused software, I've decided to set up Headscale as my Tailscale coordination server.
This guide outlines how to set up Headscale running in a Docker container behind a Traefik reverse proxy. It uses a free Ubuntu VPS from the Oracle Cloud Free Tier, but any linux-based host with a public IP and about ~1GB of memory should work for a personal VPN.

Setting up Headscale behind a reverse-proxy is not something that the maintainers support or use themselves, but it _is_ a feature that is often [requested by community members](https://github.com/juanfont/headscale/issues/527). I wanted to see if I could identify a way to configure Headscale behind Traefik as a reverse proxy. The following is my working prototype.
#### Prerequisites
Expand Down Expand Up @@ -48,7 +48,7 @@ services:
- traefik.http.routers.headscale-example-com.service=headscale-example-com
- traefik.http.services.headscale-example-com.loadbalancer.server.port=8080
ports:
- 3478:3478/udp # did not need to open in Oracle VPC firewall
- 3478:3478/udp # have not needed to open in Oracle VPC firewall so far
volumes:
- ./data/headscale:/var/lib/headscale
- ./data/config:/etc/headscale
Expand Down

0 comments on commit 87dfc70

Please sign in to comment.