headscale-ui
wg-easy
Our great sponsors
headscale-ui | wg-easy | |
---|---|---|
13 | 20 | |
1,463 | 11,629 | |
8.1% | 7.6% | |
6.0 | 9.8 | |
2 months ago | 5 days ago | |
Svelte | JavaScript | |
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
headscale-ui
-
Has anyone setup a headscale-ui server ?
However, I'm encountering significant challenges when it comes to setting up a seemingly simple static website for the UI.
-
Make your own VPN with Fly.io, tailscale and GitHub
I've been running wireguard on my own for a few years. I like it, but wish there was a better GUI.
I tried installing headscale. I didn't feel like I got the immediate rush of "cool, I have the baseline thing working" without reading the docs. And, I needed to use this for a GUI: https://github.com/gurucomputing/headscale-ui. I love the command line and am happy to use that, but I'm unsure if there is a benefit to headscale over wireguard if I'm doing that.
I just read this article on tailscale vs. openziti and it mentioned netmaker (a YC company). I tried installing it, but out of the box, "DNS" did not seem to work correctly.
Is anyone here a power user that also benefits from a full fledged GUI? Is tailscale the only option there? I prefer to self-host whenever I can, despite loving tailscale and the people behind it.
-
Self-hosted Tailscale alternative?
There's also gurucomputing/headscale-ui which I've used personally. It's been adequate, though the lack of native arm64 builds until recently has put me off a bit.
- [Self Hosted] Headscale-UI ist jetzt in der Beta!
- The Case Against Automatic Dependency Updates
-
Milliner, a self-hosted Headscale Management WEB-UI. This time with Screenshots!
How does this compare to headscale-ui?
-
Mesh VPN - WireGuard admin
Headscale's ui is fine (well ish, I'd like headscale to write an API for ACLs). I might be biased though because I wrote it.
-
Completely failing with headscale and headscale-webui
Have you tried https://github.com/gurucomputing/headscale-ui ?
-
Take your local development experience to the next level with Dev Containers
My Dev container is here: https://github.com/gurucomputing/headscale-ui/blob/master/documentation/development.md
-
Create Wireguard VPN with Netmaker
I threw my hat into the headscale crowd instead (to the point of writing a UI for it) but I'll have to give netmaker another spin soon.
wg-easy
-
PiHole after wireguard install?
Check out wg-easy on GitHub. There is also a wg with pinole on their page. Works so easily together. https://github.com/wg-easy/wg-easy
-
Alternative to Headscale?
sounds like you just want wg-easy.
-
WireHole is a combination of WireGuard, Pi-hole, and Unbound
This wg-easy?
Definitely not an OSI approved license, but does look like they made an attempt in the spirit of GPL, no?
https://github.com/wg-easy/wg-easy/blob/master/LICENSE.md
> You may:
Use this software for yourself;
Use this software for a company;
Modify this software, as long as you:
Publish the changes on GitHub as an open-source & linked fork;
Don't remove any links to the original project or donation pages;
You may not:
Use this software in a commercial product without a license from the original author;
- The Tailscale Universal Docker Mod
-
Who do you use for port forwarding?
wg-easy running in Docker. Then access it using WireGuard on my mobile devices.
-
Netmaker/Tailscale Vs Traditional VPNs
Just plain wg-easy (wireguard with frontend). No 3rd parties involved, just me & my endpoint
-
Is it possible to make a phone connect to a server without having to open any ports on the server side ?
I suggest running a VPN server like wireguard (very easy to install on phone and set up using https://github.com/wg-easy/wg-easy) and have the port open only to that. The VPN will do the rest in terms of NATing ports and whatnot.
- Which is more of a pain in the ass: connecting to databases via SSH tunnels, or whitelisting IP addresses?
-
Self-Hosted Mesh Network / VPN For User-Friendly LAN Gaming Network?
https://github.com/wg-easy/wg-easy (7.6k stars)
-
Changing Private IP to domain or something locally for selfhosted RSS-Bridge?
I use wg-easy for now https://github.com/wg-easy/wg-easy
What are some alternatives?
sslh - Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)
wireguard-ui - Wireguard web interface
headscale - An open source, self-hosted implementation of the Tailscale control server
pivpn - The Simplest VPN installer, designed for Raspberry Pi
website - Gitpod website and documentation
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
skeleton - A fully featured UI toolkit for Svelte + Tailwind. [Moved to: https://github.com/skeletonlabs/skeleton]
wg-manager - A easy to use WireGuard dashboard and management tool
swyxkit - An opinionated blog starter for SvelteKit + Tailwind + Netlify. Refreshed for SvelteKit 1.0!
wg-gen-web - Simple Web based configuration generator for WireGuard
tailscale-android - Tailscale Android Client
WGDashboard - Simplest dashboard for WireGuard VPN written in Python w/ Flask