tailscale
Netmaker
Our great sponsors
- SonarQube - Static code analysis for 29 languages.
- Revelo Payroll - Free Global Payroll designed for tech teams
- Onboard AI - Learn any GitHub repo in 59 seconds
- InfluxDB - Collect and Analyze Billions of Data Points in Real Time
tailscale | Netmaker | |
---|---|---|
983 | 161 | |
13,676 | 7,974 | |
3.0% | 4.6% | |
0.0 | 9.7 | |
2 days ago | 5 days ago | |
Go | Go | |
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
tailscale
-
Tailscale Kubernetes Operator
I agree, it's a feature that I find sorely lacking in my tailnet.
These are the relevant Github issues to follow, hopefully they address these someday:
- Apple TV, now with more Tailscale
-
Plex to block all servers hosted at Hetzner
tailscale runs a continuous netcheck to an unroutable IP (203.0.113.1:12345:UDP) [1] for whatever reason. This triggered Hetzner's ghetto-ass DDOS protection, thinking my server was compromised or something. They sent me an email saying my server was compromised and I had 24hrs to remedy it.
I responded to the email and filled out this attestation form declaring that my server was not under attack and it was a false positive etc. They still null routed my server and refused to turn it back on, and their arrogant support told me there was no way I was in control of this server etc.
Anyway, took my box offline during a peak user day, migrated to AWS and never looked back.
Don't do anything of importance on Hetzner. No wonder they only get people running pirated plex boxes.
[1] https://github.com/tailscale/tailscale/blob/94304819263b0553...
-
Duck DNS
Fond memories of using DDNS on old Netgear routers at home in the aughts and port forwarding services with some rudimentary firewall rules and tcpwrappers to try and lock down access.
Now I use a combination of Tailscale[1] for private services only to me and Tailscale Funnels[2], and Cloudflare Tunnels[3] for public service exposure.
This accomplishes the same thing I was doing with DDNS and my ISP IP, but in a much more secure and stable manner.
2. https://tailscale.com/kb/1223/tailscale-funnel/
3. https://developers.cloudflare.com/cloudflare-one/connections...
-
Which overlay network?
Tailscale: Seems to have quite good NAT support and seems to do DNS resolution. Clients for most relevant platform - a well rounded package. But I find their plans to be prohibitive. Only 20 devices on the free plan. The first paid tier is 5 devices per 1 user, so 5 devices for me paying? A head scratcher. There is an open source control plane https://github.com/juanfont/headscale but given the clients are not open source it feels a bit scary to rely on. My knowledge of wireguard is not good enough, but I am also wondering if it is really meant for a mesh setup?
- Remote Desktop from anywhere
- Open source projects to look at for best practices?
-
IT-s redditorok. Hogyan tudok otthoni VPN-t felállítani?
Ha van mindket modem mogott fixen szamitogep (akar egy olcso raspberry pi) akkor felrakod a tailscale-t, engedelyezed exit node-kent es kesz vagy. Gepenkent kb 5 perc melo
Netmaker
- NetMaker: Connect Everything with a WireGuard VPN
-
Admin-Friendly Mesh VPN with WireGuard?
After browsing through, I've noticed that three options seem to be gaining traction: Netmaker, wg-easy, and headscale. I'm curious to know if these solutions are interchangeable, and if there are specific reasons to choose one over the others. I'd also like to understand if they are complete stacks, meaning, once set up, could I easily replace one admin GUI with another, or would I need to tear down and rebuild the VPN?
-
Netmaker/Tailscale Vs Traditional VPNs
I've been contemplating the idea of using Netmaker or a similar solution like Tailscale instead of a traditional VPN to access my home network. I would love to hear from those who are already using Netmaker or Tailscale for VPN access to their home network.
-
Self-Hosted Mesh Network / VPN For User-Friendly LAN Gaming Network?
https://github.com/gravitl/netmaker (7k stars)
-
Upgrading VPN solutions in a remote working Environment
NetMaker: This VPN solution has been frequently recommended within my professional circle, and I have personal experience using it for my homelab. It's incredibly user-friendly with great integrations. I'm particularly interested in hearing from anyone who has successfully implemented NetMaker in a production environment within their company.
-
Looking for Alternatives to ZeroTier and TailScale
The code is available on Github, licensed under the Server Side Public License https://github.com/gravitl/netmaker
-
Tailscale increased free plan user limit form 1 to 3 and device cap to 100 also... unlimited subnets
Do the net maker https://github.com/gravitl/netmaker worth trying to use instead of Tailscale? Tailscale is good, but I can watch YouTube over Wi-Fi in another country, but when I try to use Jellyfin to watch movies it’s not loading well
-
Tips & Tricks for Productivity with Android E-Ink Devices (Obsidian, Syncthing, Weylus, RustDesk, Termux, KDE Connect, ZeroTier)
Very relatable! At first, I struggled for days trying to make Netmaker or Innernet functional for my personal home server (Raspberry Pi behind multiple routers). But then I stumbled upon ZeroTier, and everything worked seamlessly within a couple of hours. Tailscale was actually the next one on my list because I heard many positive things about it over at r/selfhosted (especially about headscale). However, I did not end up testing it after ZeroTier worked.
-
How to implement a Mesh Network on AWS
Useful links: Wireguard Netmaker
-
Alternatives to ZeroTier and TailScale?
You can self host Netmaker for free - https://github.com/gravitl/netmaker
What are some alternatives?
headscale - An open source, self-hosted implementation of the Tailscale control server
ZeroTier - A Smart Ethernet Switch for Earth
netbird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
pivpn - The Simplest VPN installer, designed for Raspberry Pi
mistborn
traefik - The Cloud Native Application Proxy