1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
App\Entity\Entry {#2388
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+magazine: App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
+slug: "How-to-access-traefik-hostnames-from-tailscale-clients"
+title: "How to access traefik hostnames from tailscale clients"
+url: null
+body: """
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale.\n
\n
All of my container web services are run through traefik and are accessed using hostnames I set up on my DNS server. How would I go about accessing the different web services externally since the hostnames don’t resolve?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 6
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729433101 {#2410
date: 2024-10-20 16:05:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1866 …}
+votes: Doctrine\ORM\PersistentCollection {#1978 …}
+reports: Doctrine\ORM\PersistentCollection {#1946 …}
+favourites: Doctrine\ORM\PersistentCollection {#1971 …}
+notifications: Doctrine\ORM\PersistentCollection {#2443 …}
+badges: Doctrine\ORM\PersistentCollection {#2426 …}
+children: []
-id: 33840
-titleTs: "'access':3 'client':8 'hostnam':5 'tailscal':7 'traefik':4"
-bodyTs: "'abl':9 'access':12,59,74 'contain':17,50 'deal':29 'decid':3,42 'differ':76 'dns':67 'docker':16 'expos':35 'extern':11,79 'final':2 'go':44,72 'hassl':33 'hostnam':61,82 'local':22 'network':23 'outsid':19 'port':36 'resolv':85 'router':39 'run':54 'secur':32 'server':68 'servic':52,78 'set':63 'sinc':80 'tailscal':46 'traefik':56 'use':60 'want':6,27 'web':51,77 'would':70"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706574801
+visibility: "visible "
+apId: "https://lemmy.world/post/11331541"
+editedAt: null
+createdAt: DateTimeImmutable @1706541801 {#1850
date: 2024-01-29 16:23:21.0 +01:00
}
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
App\Entity\Entry {#2388
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+magazine: App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
+slug: "How-to-access-traefik-hostnames-from-tailscale-clients"
+title: "How to access traefik hostnames from tailscale clients"
+url: null
+body: """
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale.\n
\n
All of my container web services are run through traefik and are accessed using hostnames I set up on my DNS server. How would I go about accessing the different web services externally since the hostnames don’t resolve?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 6
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729433101 {#2410
date: 2024-10-20 16:05:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1866 …}
+votes: Doctrine\ORM\PersistentCollection {#1978 …}
+reports: Doctrine\ORM\PersistentCollection {#1946 …}
+favourites: Doctrine\ORM\PersistentCollection {#1971 …}
+notifications: Doctrine\ORM\PersistentCollection {#2443 …}
+badges: Doctrine\ORM\PersistentCollection {#2426 …}
+children: []
-id: 33840
-titleTs: "'access':3 'client':8 'hostnam':5 'tailscal':7 'traefik':4"
-bodyTs: "'abl':9 'access':12,59,74 'contain':17,50 'deal':29 'decid':3,42 'differ':76 'dns':67 'docker':16 'expos':35 'extern':11,79 'final':2 'go':44,72 'hassl':33 'hostnam':61,82 'local':22 'network':23 'outsid':19 'port':36 'resolv':85 'router':39 'run':54 'secur':32 'server':68 'servic':52,78 'set':63 'sinc':80 'tailscal':46 'traefik':56 'use':60 'want':6,27 'web':51,77 'would':70"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706574801
+visibility: "visible "
+apId: "https://lemmy.world/post/11331541"
+editedAt: null
+createdAt: DateTimeImmutable @1706541801 {#1850
date: 2024-01-29 16:23:21.0 +01:00
}
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
App\Entity\Entry {#2388
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+magazine: App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
+slug: "How-to-access-traefik-hostnames-from-tailscale-clients"
+title: "How to access traefik hostnames from tailscale clients"
+url: null
+body: """
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale.\n
\n
All of my container web services are run through traefik and are accessed using hostnames I set up on my DNS server. How would I go about accessing the different web services externally since the hostnames don’t resolve?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 6
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729433101 {#2410
date: 2024-10-20 16:05:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1866 …}
+votes: Doctrine\ORM\PersistentCollection {#1978 …}
+reports: Doctrine\ORM\PersistentCollection {#1946 …}
+favourites: Doctrine\ORM\PersistentCollection {#1971 …}
+notifications: Doctrine\ORM\PersistentCollection {#2443 …}
+badges: Doctrine\ORM\PersistentCollection {#2426 …}
+children: []
-id: 33840
-titleTs: "'access':3 'client':8 'hostnam':5 'tailscal':7 'traefik':4"
-bodyTs: "'abl':9 'access':12,59,74 'contain':17,50 'deal':29 'decid':3,42 'differ':76 'dns':67 'docker':16 'expos':35 'extern':11,79 'final':2 'go':44,72 'hassl':33 'hostnam':61,82 'local':22 'network':23 'outsid':19 'port':36 'resolv':85 'router':39 'run':54 'secur':32 'server':68 'servic':52,78 'set':63 'sinc':80 'tailscal':46 'traefik':56 'use':60 'want':6,27 'web':51,77 'would':70"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706574801
+visibility: "visible "
+apId: "https://lemmy.world/post/11331541"
+editedAt: null
+createdAt: DateTimeImmutable @1706541801 {#1850
date: 2024-01-29 16:23:21.0 +01:00
}
} |
|
Show voter details
|
5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
6 |
DENIED
|
moderate
|
App\Entity\EntryComment {#4015
+user: App\Entity\User {#3963 …}
+entry: App\Entity\Entry {#2388
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+magazine: App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
+slug: "How-to-access-traefik-hostnames-from-tailscale-clients"
+title: "How to access traefik hostnames from tailscale clients"
+url: null
+body: """
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale.\n
\n
All of my container web services are run through traefik and are accessed using hostnames I set up on my DNS server. How would I go about accessing the different web services externally since the hostnames don’t resolve?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 6
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729433101 {#2410
date: 2024-10-20 16:05:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1866 …}
+votes: Doctrine\ORM\PersistentCollection {#1978 …}
+reports: Doctrine\ORM\PersistentCollection {#1946 …}
+favourites: Doctrine\ORM\PersistentCollection {#1971 …}
+notifications: Doctrine\ORM\PersistentCollection {#2443 …}
+badges: Doctrine\ORM\PersistentCollection {#2426 …}
+children: []
-id: 33840
-titleTs: "'access':3 'client':8 'hostnam':5 'tailscal':7 'traefik':4"
-bodyTs: "'abl':9 'access':12,59,74 'contain':17,50 'deal':29 'decid':3,42 'differ':76 'dns':67 'docker':16 'expos':35 'extern':11,79 'final':2 'go':44,72 'hassl':33 'hostnam':61,82 'local':22 'network':23 'outsid':19 'port':36 'resolv':85 'router':39 'run':54 'secur':32 'server':68 'servic':52,78 'set':63 'sinc':80 'tailscal':46 'traefik':56 'use':60 'want':6,27 'web':51,77 'would':70"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706574801
+visibility: "visible "
+apId: "https://lemmy.world/post/11331541"
+editedAt: null
+createdAt: DateTimeImmutable @1706541801 {#1850
date: 2024-01-29 16:23:21.0 +01:00
}
}
+magazine: App\Entity\Magazine {#266}
+image: null
+parent: null
+root: null
+body: """
I assume when you say externally you mean via Tailscale, but without running Tailscale on each container/service?\n
\n
What I currently do is run Tailscale on a few workstation-type devices, but everything else in my network doesn’t run the Tailscale client (partly because things like printers, outers, etc can’t run the client, and it’s less convenient for things like servers).\n
\n
Those type of devices can be accessed by running one Tailscale node as a Subnet Router. This device is then able to route traffic to it’s subnet. Currently I use a Raspberry Pi for this.\n
\n
My Pi also runs PiHole and acts as my DNS server, so it can name resolve local resources, though I don’t think this is required, because Tailscale has its own DNS resolution called Magic DNS. So your Subnet Router should be able to resolve those names anyway (going off memory here, so be sure to check the docs, I may be misremembering how it works since I use the same device for DNS).\n
\n
You don’t even need Tailscale on a remote device to access your LAN - if you enable the Funnel service, you can provide an inbound encrypted path to specified resources.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1729412859 {#4025
date: 2024-10-20 10:27:39.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@WASTECH@lemmy.world"
"@WASTECH@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#4013 …}
+nested: Doctrine\ORM\PersistentCollection {#4011 …}
+votes: Doctrine\ORM\PersistentCollection {#4009 …}
+reports: Doctrine\ORM\PersistentCollection {#4007 …}
+favourites: Doctrine\ORM\PersistentCollection {#3975 …}
+notifications: Doctrine\ORM\PersistentCollection {#3979 …}
-id: 350090
-bodyTs: "'abl':85,143 'access':71,186 'act':107 'also':103 'anyway':148 'assum':2 'call':134 'check':157 'client':43,55 'container/service':17 'conveni':60 'current':20,93 'devic':31,68,82,172,184 'dns':110,132,136,174 'doc':159 'doesn':38 'els':34 'enabl':191 'encrypt':200 'etc':50 'even':178 'everyth':33 'extern':6 'funnel':193 'go':149 'inbound':199 'lan':188 'less':59 'like':47,63 'local':117 'magic':135 'may':161 'mean':8 'memori':151 'misrememb':163 'name':115,147 'need':179 'network':37 'node':76 'one':74 'outer':49 'part':44 'path':201 'pi':98,102 'pihol':105 'printer':48 'provid':197 'raspberri':97 'remot':183 'requir':126 'resolut':133 'resolv':116,145 'resourc':118,204 'rout':87 'router':80,140 'run':13,23,40,53,73,104 'say':5 'server':64,111 'servic':194 'sinc':167 'specifi':203 'subnet':79,92,139 'sure':155 'tailscal':10,14,24,42,75,128,180 'thing':46,62 'think':123 'though':119 'traffic':88 'type':30,66 'use':95,169 'via':9 'without':12 'work':166 'workstat':29 'workstation-typ':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemm.ee/comment/8790571"
+editedAt: DateTimeImmutable @1729411374 {#3961
date: 2024-10-20 10:02:54.0 +02:00
}
+createdAt: DateTimeImmutable @1706544089 {#4024
date: 2024-01-29 17:01:29.0 +01:00
}
} |
|
Show voter details
|
7 |
DENIED
|
edit
|
App\Entity\EntryComment {#4015
+user: App\Entity\User {#3963 …}
+entry: App\Entity\Entry {#2388
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+magazine: App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
+slug: "How-to-access-traefik-hostnames-from-tailscale-clients"
+title: "How to access traefik hostnames from tailscale clients"
+url: null
+body: """
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale.\n
\n
All of my container web services are run through traefik and are accessed using hostnames I set up on my DNS server. How would I go about accessing the different web services externally since the hostnames don’t resolve?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 6
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729433101 {#2410
date: 2024-10-20 16:05:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1866 …}
+votes: Doctrine\ORM\PersistentCollection {#1978 …}
+reports: Doctrine\ORM\PersistentCollection {#1946 …}
+favourites: Doctrine\ORM\PersistentCollection {#1971 …}
+notifications: Doctrine\ORM\PersistentCollection {#2443 …}
+badges: Doctrine\ORM\PersistentCollection {#2426 …}
+children: []
-id: 33840
-titleTs: "'access':3 'client':8 'hostnam':5 'tailscal':7 'traefik':4"
-bodyTs: "'abl':9 'access':12,59,74 'contain':17,50 'deal':29 'decid':3,42 'differ':76 'dns':67 'docker':16 'expos':35 'extern':11,79 'final':2 'go':44,72 'hassl':33 'hostnam':61,82 'local':22 'network':23 'outsid':19 'port':36 'resolv':85 'router':39 'run':54 'secur':32 'server':68 'servic':52,78 'set':63 'sinc':80 'tailscal':46 'traefik':56 'use':60 'want':6,27 'web':51,77 'would':70"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706574801
+visibility: "visible "
+apId: "https://lemmy.world/post/11331541"
+editedAt: null
+createdAt: DateTimeImmutable @1706541801 {#1850
date: 2024-01-29 16:23:21.0 +01:00
}
}
+magazine: App\Entity\Magazine {#266}
+image: null
+parent: null
+root: null
+body: """
I assume when you say externally you mean via Tailscale, but without running Tailscale on each container/service?\n
\n
What I currently do is run Tailscale on a few workstation-type devices, but everything else in my network doesn’t run the Tailscale client (partly because things like printers, outers, etc can’t run the client, and it’s less convenient for things like servers).\n
\n
Those type of devices can be accessed by running one Tailscale node as a Subnet Router. This device is then able to route traffic to it’s subnet. Currently I use a Raspberry Pi for this.\n
\n
My Pi also runs PiHole and acts as my DNS server, so it can name resolve local resources, though I don’t think this is required, because Tailscale has its own DNS resolution called Magic DNS. So your Subnet Router should be able to resolve those names anyway (going off memory here, so be sure to check the docs, I may be misremembering how it works since I use the same device for DNS).\n
\n
You don’t even need Tailscale on a remote device to access your LAN - if you enable the Funnel service, you can provide an inbound encrypted path to specified resources.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1729412859 {#4025
date: 2024-10-20 10:27:39.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@WASTECH@lemmy.world"
"@WASTECH@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#4013 …}
+nested: Doctrine\ORM\PersistentCollection {#4011 …}
+votes: Doctrine\ORM\PersistentCollection {#4009 …}
+reports: Doctrine\ORM\PersistentCollection {#4007 …}
+favourites: Doctrine\ORM\PersistentCollection {#3975 …}
+notifications: Doctrine\ORM\PersistentCollection {#3979 …}
-id: 350090
-bodyTs: "'abl':85,143 'access':71,186 'act':107 'also':103 'anyway':148 'assum':2 'call':134 'check':157 'client':43,55 'container/service':17 'conveni':60 'current':20,93 'devic':31,68,82,172,184 'dns':110,132,136,174 'doc':159 'doesn':38 'els':34 'enabl':191 'encrypt':200 'etc':50 'even':178 'everyth':33 'extern':6 'funnel':193 'go':149 'inbound':199 'lan':188 'less':59 'like':47,63 'local':117 'magic':135 'may':161 'mean':8 'memori':151 'misrememb':163 'name':115,147 'need':179 'network':37 'node':76 'one':74 'outer':49 'part':44 'path':201 'pi':98,102 'pihol':105 'printer':48 'provid':197 'raspberri':97 'remot':183 'requir':126 'resolut':133 'resolv':116,145 'resourc':118,204 'rout':87 'router':80,140 'run':13,23,40,53,73,104 'say':5 'server':64,111 'servic':194 'sinc':167 'specifi':203 'subnet':79,92,139 'sure':155 'tailscal':10,14,24,42,75,128,180 'thing':46,62 'think':123 'though':119 'traffic':88 'type':30,66 'use':95,169 'via':9 'without':12 'work':166 'workstat':29 'workstation-typ':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemm.ee/comment/8790571"
+editedAt: DateTimeImmutable @1729411374 {#3961
date: 2024-10-20 10:02:54.0 +02:00
}
+createdAt: DateTimeImmutable @1706544089 {#4024
date: 2024-01-29 17:01:29.0 +01:00
}
} |
|
Show voter details
|
8 |
DENIED
|
moderate
|
App\Entity\EntryComment {#4015
+user: App\Entity\User {#3963 …}
+entry: App\Entity\Entry {#2388
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+magazine: App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
+slug: "How-to-access-traefik-hostnames-from-tailscale-clients"
+title: "How to access traefik hostnames from tailscale clients"
+url: null
+body: """
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale.\n
\n
All of my container web services are run through traefik and are accessed using hostnames I set up on my DNS server. How would I go about accessing the different web services externally since the hostnames don’t resolve?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 6
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729433101 {#2410
date: 2024-10-20 16:05:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1866 …}
+votes: Doctrine\ORM\PersistentCollection {#1978 …}
+reports: Doctrine\ORM\PersistentCollection {#1946 …}
+favourites: Doctrine\ORM\PersistentCollection {#1971 …}
+notifications: Doctrine\ORM\PersistentCollection {#2443 …}
+badges: Doctrine\ORM\PersistentCollection {#2426 …}
+children: []
-id: 33840
-titleTs: "'access':3 'client':8 'hostnam':5 'tailscal':7 'traefik':4"
-bodyTs: "'abl':9 'access':12,59,74 'contain':17,50 'deal':29 'decid':3,42 'differ':76 'dns':67 'docker':16 'expos':35 'extern':11,79 'final':2 'go':44,72 'hassl':33 'hostnam':61,82 'local':22 'network':23 'outsid':19 'port':36 'resolv':85 'router':39 'run':54 'secur':32 'server':68 'servic':52,78 'set':63 'sinc':80 'tailscal':46 'traefik':56 'use':60 'want':6,27 'web':51,77 'would':70"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706574801
+visibility: "visible "
+apId: "https://lemmy.world/post/11331541"
+editedAt: null
+createdAt: DateTimeImmutable @1706541801 {#1850
date: 2024-01-29 16:23:21.0 +01:00
}
}
+magazine: App\Entity\Magazine {#266}
+image: null
+parent: null
+root: null
+body: """
I assume when you say externally you mean via Tailscale, but without running Tailscale on each container/service?\n
\n
What I currently do is run Tailscale on a few workstation-type devices, but everything else in my network doesn’t run the Tailscale client (partly because things like printers, outers, etc can’t run the client, and it’s less convenient for things like servers).\n
\n
Those type of devices can be accessed by running one Tailscale node as a Subnet Router. This device is then able to route traffic to it’s subnet. Currently I use a Raspberry Pi for this.\n
\n
My Pi also runs PiHole and acts as my DNS server, so it can name resolve local resources, though I don’t think this is required, because Tailscale has its own DNS resolution called Magic DNS. So your Subnet Router should be able to resolve those names anyway (going off memory here, so be sure to check the docs, I may be misremembering how it works since I use the same device for DNS).\n
\n
You don’t even need Tailscale on a remote device to access your LAN - if you enable the Funnel service, you can provide an inbound encrypted path to specified resources.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1729412859 {#4025
date: 2024-10-20 10:27:39.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@WASTECH@lemmy.world"
"@WASTECH@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#4013 …}
+nested: Doctrine\ORM\PersistentCollection {#4011 …}
+votes: Doctrine\ORM\PersistentCollection {#4009 …}
+reports: Doctrine\ORM\PersistentCollection {#4007 …}
+favourites: Doctrine\ORM\PersistentCollection {#3975 …}
+notifications: Doctrine\ORM\PersistentCollection {#3979 …}
-id: 350090
-bodyTs: "'abl':85,143 'access':71,186 'act':107 'also':103 'anyway':148 'assum':2 'call':134 'check':157 'client':43,55 'container/service':17 'conveni':60 'current':20,93 'devic':31,68,82,172,184 'dns':110,132,136,174 'doc':159 'doesn':38 'els':34 'enabl':191 'encrypt':200 'etc':50 'even':178 'everyth':33 'extern':6 'funnel':193 'go':149 'inbound':199 'lan':188 'less':59 'like':47,63 'local':117 'magic':135 'may':161 'mean':8 'memori':151 'misrememb':163 'name':115,147 'need':179 'network':37 'node':76 'one':74 'outer':49 'part':44 'path':201 'pi':98,102 'pihol':105 'printer':48 'provid':197 'raspberri':97 'remot':183 'requir':126 'resolut':133 'resolv':116,145 'resourc':118,204 'rout':87 'router':80,140 'run':13,23,40,53,73,104 'say':5 'server':64,111 'servic':194 'sinc':167 'specifi':203 'subnet':79,92,139 'sure':155 'tailscal':10,14,24,42,75,128,180 'thing':46,62 'think':123 'though':119 'traffic':88 'type':30,66 'use':95,169 'via':9 'without':12 'work':166 'workstat':29 'workstation-typ':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemm.ee/comment/8790571"
+editedAt: DateTimeImmutable @1729411374 {#3961
date: 2024-10-20 10:02:54.0 +02:00
}
+createdAt: DateTimeImmutable @1706544089 {#4024
date: 2024-01-29 17:01:29.0 +01:00
}
} |
|
Show voter details
|
9 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
10 |
DENIED
|
moderate
|
App\Entity\EntryComment {#4138
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+entry: App\Entity\Entry {#2388
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+magazine: App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
+slug: "How-to-access-traefik-hostnames-from-tailscale-clients"
+title: "How to access traefik hostnames from tailscale clients"
+url: null
+body: """
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale.\n
\n
All of my container web services are run through traefik and are accessed using hostnames I set up on my DNS server. How would I go about accessing the different web services externally since the hostnames don’t resolve?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 6
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729433101 {#2410
date: 2024-10-20 16:05:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1866 …}
+votes: Doctrine\ORM\PersistentCollection {#1978 …}
+reports: Doctrine\ORM\PersistentCollection {#1946 …}
+favourites: Doctrine\ORM\PersistentCollection {#1971 …}
+notifications: Doctrine\ORM\PersistentCollection {#2443 …}
+badges: Doctrine\ORM\PersistentCollection {#2426 …}
+children: []
-id: 33840
-titleTs: "'access':3 'client':8 'hostnam':5 'tailscal':7 'traefik':4"
-bodyTs: "'abl':9 'access':12,59,74 'contain':17,50 'deal':29 'decid':3,42 'differ':76 'dns':67 'docker':16 'expos':35 'extern':11,79 'final':2 'go':44,72 'hassl':33 'hostnam':61,82 'local':22 'network':23 'outsid':19 'port':36 'resolv':85 'router':39 'run':54 'secur':32 'server':68 'servic':52,78 'set':63 'sinc':80 'tailscal':46 'traefik':56 'use':60 'want':6,27 'web':51,77 'would':70"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706574801
+visibility: "visible "
+apId: "https://lemmy.world/post/11331541"
+editedAt: null
+createdAt: DateTimeImmutable @1706541801 {#1850
date: 2024-01-29 16:23:21.0 +01:00
}
}
+magazine: App\Entity\Magazine {#266}
+image: null
+parent: App\Entity\EntryComment {#4015
+user: App\Entity\User {#3963 …}
+entry: App\Entity\Entry {#2388}
+magazine: App\Entity\Magazine {#266}
+image: null
+parent: null
+root: null
+body: """
I assume when you say externally you mean via Tailscale, but without running Tailscale on each container/service?\n
\n
What I currently do is run Tailscale on a few workstation-type devices, but everything else in my network doesn’t run the Tailscale client (partly because things like printers, outers, etc can’t run the client, and it’s less convenient for things like servers).\n
\n
Those type of devices can be accessed by running one Tailscale node as a Subnet Router. This device is then able to route traffic to it’s subnet. Currently I use a Raspberry Pi for this.\n
\n
My Pi also runs PiHole and acts as my DNS server, so it can name resolve local resources, though I don’t think this is required, because Tailscale has its own DNS resolution called Magic DNS. So your Subnet Router should be able to resolve those names anyway (going off memory here, so be sure to check the docs, I may be misremembering how it works since I use the same device for DNS).\n
\n
You don’t even need Tailscale on a remote device to access your LAN - if you enable the Funnel service, you can provide an inbound encrypted path to specified resources.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1729412859 {#4025
date: 2024-10-20 10:27:39.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@WASTECH@lemmy.world"
"@WASTECH@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#4013 …}
+nested: Doctrine\ORM\PersistentCollection {#4011 …}
+votes: Doctrine\ORM\PersistentCollection {#4009 …}
+reports: Doctrine\ORM\PersistentCollection {#4007 …}
+favourites: Doctrine\ORM\PersistentCollection {#3975 …}
+notifications: Doctrine\ORM\PersistentCollection {#3979 …}
-id: 350090
-bodyTs: "'abl':85,143 'access':71,186 'act':107 'also':103 'anyway':148 'assum':2 'call':134 'check':157 'client':43,55 'container/service':17 'conveni':60 'current':20,93 'devic':31,68,82,172,184 'dns':110,132,136,174 'doc':159 'doesn':38 'els':34 'enabl':191 'encrypt':200 'etc':50 'even':178 'everyth':33 'extern':6 'funnel':193 'go':149 'inbound':199 'lan':188 'less':59 'like':47,63 'local':117 'magic':135 'may':161 'mean':8 'memori':151 'misrememb':163 'name':115,147 'need':179 'network':37 'node':76 'one':74 'outer':49 'part':44 'path':201 'pi':98,102 'pihol':105 'printer':48 'provid':197 'raspberri':97 'remot':183 'requir':126 'resolut':133 'resolv':116,145 'resourc':118,204 'rout':87 'router':80,140 'run':13,23,40,53,73,104 'say':5 'server':64,111 'servic':194 'sinc':167 'specifi':203 'subnet':79,92,139 'sure':155 'tailscal':10,14,24,42,75,128,180 'thing':46,62 'think':123 'though':119 'traffic':88 'type':30,66 'use':95,169 'via':9 'without':12 'work':166 'workstat':29 'workstation-typ':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemm.ee/comment/8790571"
+editedAt: DateTimeImmutable @1729411374 {#3961
date: 2024-10-20 10:02:54.0 +02:00
}
+createdAt: DateTimeImmutable @1706544089 {#4024
date: 2024-01-29 17:01:29.0 +01:00
}
}
+root: App\Entity\EntryComment {#4015}
+body: "That is almost the exact same thing I am doing. I have 2 Pi’s running PiHole in HA and I just made one of them the subnet router to allow this access. Since I will be the only one using this, I don’t care to use Funnel right now, but thanks for showing that to me. I am (obviously) new to using Tailscale, and that looks like a very neat feature."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1706544690 {#4143
date: 2024-01-29 17:11:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@WASTECH@lemmy.world"
"@BearOfaTime@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#4146 …}
+nested: Doctrine\ORM\PersistentCollection {#4150 …}
+votes: Doctrine\ORM\PersistentCollection {#4152 …}
+reports: Doctrine\ORM\PersistentCollection {#4153 …}
+favourites: Doctrine\ORM\PersistentCollection {#4155 …}
+notifications: Doctrine\ORM\PersistentCollection {#4157 …}
-id: 350110
-bodyTs: "'2':13 'access':33 'allow':31 'almost':3 'care':46 'exact':5 'featur':73 'funnel':49 'ha':19 'like':69 'look':68 'made':23 'neat':72 'new':62 'obvious':61 'one':24,40 'pi':14 'pihol':17 'right':50 'router':29 'run':16 'show':55 'sinc':34 'subnet':28 'tailscal':65 'thank':53 'thing':7 'use':41,48,64"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/7128207"
+editedAt: null
+createdAt: DateTimeImmutable @1706544690 {#4140
date: 2024-01-29 17:11:30.0 +01:00
}
} |
|
Show voter details
|
11 |
DENIED
|
edit
|
App\Entity\EntryComment {#4138
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+entry: App\Entity\Entry {#2388
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+magazine: App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
+slug: "How-to-access-traefik-hostnames-from-tailscale-clients"
+title: "How to access traefik hostnames from tailscale clients"
+url: null
+body: """
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale.\n
\n
All of my container web services are run through traefik and are accessed using hostnames I set up on my DNS server. How would I go about accessing the different web services externally since the hostnames don’t resolve?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 6
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729433101 {#2410
date: 2024-10-20 16:05:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1866 …}
+votes: Doctrine\ORM\PersistentCollection {#1978 …}
+reports: Doctrine\ORM\PersistentCollection {#1946 …}
+favourites: Doctrine\ORM\PersistentCollection {#1971 …}
+notifications: Doctrine\ORM\PersistentCollection {#2443 …}
+badges: Doctrine\ORM\PersistentCollection {#2426 …}
+children: []
-id: 33840
-titleTs: "'access':3 'client':8 'hostnam':5 'tailscal':7 'traefik':4"
-bodyTs: "'abl':9 'access':12,59,74 'contain':17,50 'deal':29 'decid':3,42 'differ':76 'dns':67 'docker':16 'expos':35 'extern':11,79 'final':2 'go':44,72 'hassl':33 'hostnam':61,82 'local':22 'network':23 'outsid':19 'port':36 'resolv':85 'router':39 'run':54 'secur':32 'server':68 'servic':52,78 'set':63 'sinc':80 'tailscal':46 'traefik':56 'use':60 'want':6,27 'web':51,77 'would':70"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706574801
+visibility: "visible "
+apId: "https://lemmy.world/post/11331541"
+editedAt: null
+createdAt: DateTimeImmutable @1706541801 {#1850
date: 2024-01-29 16:23:21.0 +01:00
}
}
+magazine: App\Entity\Magazine {#266}
+image: null
+parent: App\Entity\EntryComment {#4015
+user: App\Entity\User {#3963 …}
+entry: App\Entity\Entry {#2388}
+magazine: App\Entity\Magazine {#266}
+image: null
+parent: null
+root: null
+body: """
I assume when you say externally you mean via Tailscale, but without running Tailscale on each container/service?\n
\n
What I currently do is run Tailscale on a few workstation-type devices, but everything else in my network doesn’t run the Tailscale client (partly because things like printers, outers, etc can’t run the client, and it’s less convenient for things like servers).\n
\n
Those type of devices can be accessed by running one Tailscale node as a Subnet Router. This device is then able to route traffic to it’s subnet. Currently I use a Raspberry Pi for this.\n
\n
My Pi also runs PiHole and acts as my DNS server, so it can name resolve local resources, though I don’t think this is required, because Tailscale has its own DNS resolution called Magic DNS. So your Subnet Router should be able to resolve those names anyway (going off memory here, so be sure to check the docs, I may be misremembering how it works since I use the same device for DNS).\n
\n
You don’t even need Tailscale on a remote device to access your LAN - if you enable the Funnel service, you can provide an inbound encrypted path to specified resources.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1729412859 {#4025
date: 2024-10-20 10:27:39.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@WASTECH@lemmy.world"
"@WASTECH@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#4013 …}
+nested: Doctrine\ORM\PersistentCollection {#4011 …}
+votes: Doctrine\ORM\PersistentCollection {#4009 …}
+reports: Doctrine\ORM\PersistentCollection {#4007 …}
+favourites: Doctrine\ORM\PersistentCollection {#3975 …}
+notifications: Doctrine\ORM\PersistentCollection {#3979 …}
-id: 350090
-bodyTs: "'abl':85,143 'access':71,186 'act':107 'also':103 'anyway':148 'assum':2 'call':134 'check':157 'client':43,55 'container/service':17 'conveni':60 'current':20,93 'devic':31,68,82,172,184 'dns':110,132,136,174 'doc':159 'doesn':38 'els':34 'enabl':191 'encrypt':200 'etc':50 'even':178 'everyth':33 'extern':6 'funnel':193 'go':149 'inbound':199 'lan':188 'less':59 'like':47,63 'local':117 'magic':135 'may':161 'mean':8 'memori':151 'misrememb':163 'name':115,147 'need':179 'network':37 'node':76 'one':74 'outer':49 'part':44 'path':201 'pi':98,102 'pihol':105 'printer':48 'provid':197 'raspberri':97 'remot':183 'requir':126 'resolut':133 'resolv':116,145 'resourc':118,204 'rout':87 'router':80,140 'run':13,23,40,53,73,104 'say':5 'server':64,111 'servic':194 'sinc':167 'specifi':203 'subnet':79,92,139 'sure':155 'tailscal':10,14,24,42,75,128,180 'thing':46,62 'think':123 'though':119 'traffic':88 'type':30,66 'use':95,169 'via':9 'without':12 'work':166 'workstat':29 'workstation-typ':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemm.ee/comment/8790571"
+editedAt: DateTimeImmutable @1729411374 {#3961
date: 2024-10-20 10:02:54.0 +02:00
}
+createdAt: DateTimeImmutable @1706544089 {#4024
date: 2024-01-29 17:01:29.0 +01:00
}
}
+root: App\Entity\EntryComment {#4015}
+body: "That is almost the exact same thing I am doing. I have 2 Pi’s running PiHole in HA and I just made one of them the subnet router to allow this access. Since I will be the only one using this, I don’t care to use Funnel right now, but thanks for showing that to me. I am (obviously) new to using Tailscale, and that looks like a very neat feature."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1706544690 {#4143
date: 2024-01-29 17:11:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@WASTECH@lemmy.world"
"@BearOfaTime@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#4146 …}
+nested: Doctrine\ORM\PersistentCollection {#4150 …}
+votes: Doctrine\ORM\PersistentCollection {#4152 …}
+reports: Doctrine\ORM\PersistentCollection {#4153 …}
+favourites: Doctrine\ORM\PersistentCollection {#4155 …}
+notifications: Doctrine\ORM\PersistentCollection {#4157 …}
-id: 350110
-bodyTs: "'2':13 'access':33 'allow':31 'almost':3 'care':46 'exact':5 'featur':73 'funnel':49 'ha':19 'like':69 'look':68 'made':23 'neat':72 'new':62 'obvious':61 'one':24,40 'pi':14 'pihol':17 'right':50 'router':29 'run':16 'show':55 'sinc':34 'subnet':28 'tailscal':65 'thank':53 'thing':7 'use':41,48,64"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/7128207"
+editedAt: null
+createdAt: DateTimeImmutable @1706544690 {#4140
date: 2024-01-29 17:11:30.0 +01:00
}
} |
|
Show voter details
|
12 |
DENIED
|
moderate
|
App\Entity\EntryComment {#4138
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+entry: App\Entity\Entry {#2388
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+magazine: App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
+slug: "How-to-access-traefik-hostnames-from-tailscale-clients"
+title: "How to access traefik hostnames from tailscale clients"
+url: null
+body: """
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale.\n
\n
All of my container web services are run through traefik and are accessed using hostnames I set up on my DNS server. How would I go about accessing the different web services externally since the hostnames don’t resolve?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 6
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729433101 {#2410
date: 2024-10-20 16:05:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1866 …}
+votes: Doctrine\ORM\PersistentCollection {#1978 …}
+reports: Doctrine\ORM\PersistentCollection {#1946 …}
+favourites: Doctrine\ORM\PersistentCollection {#1971 …}
+notifications: Doctrine\ORM\PersistentCollection {#2443 …}
+badges: Doctrine\ORM\PersistentCollection {#2426 …}
+children: []
-id: 33840
-titleTs: "'access':3 'client':8 'hostnam':5 'tailscal':7 'traefik':4"
-bodyTs: "'abl':9 'access':12,59,74 'contain':17,50 'deal':29 'decid':3,42 'differ':76 'dns':67 'docker':16 'expos':35 'extern':11,79 'final':2 'go':44,72 'hassl':33 'hostnam':61,82 'local':22 'network':23 'outsid':19 'port':36 'resolv':85 'router':39 'run':54 'secur':32 'server':68 'servic':52,78 'set':63 'sinc':80 'tailscal':46 'traefik':56 'use':60 'want':6,27 'web':51,77 'would':70"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706574801
+visibility: "visible "
+apId: "https://lemmy.world/post/11331541"
+editedAt: null
+createdAt: DateTimeImmutable @1706541801 {#1850
date: 2024-01-29 16:23:21.0 +01:00
}
}
+magazine: App\Entity\Magazine {#266}
+image: null
+parent: App\Entity\EntryComment {#4015
+user: App\Entity\User {#3963 …}
+entry: App\Entity\Entry {#2388}
+magazine: App\Entity\Magazine {#266}
+image: null
+parent: null
+root: null
+body: """
I assume when you say externally you mean via Tailscale, but without running Tailscale on each container/service?\n
\n
What I currently do is run Tailscale on a few workstation-type devices, but everything else in my network doesn’t run the Tailscale client (partly because things like printers, outers, etc can’t run the client, and it’s less convenient for things like servers).\n
\n
Those type of devices can be accessed by running one Tailscale node as a Subnet Router. This device is then able to route traffic to it’s subnet. Currently I use a Raspberry Pi for this.\n
\n
My Pi also runs PiHole and acts as my DNS server, so it can name resolve local resources, though I don’t think this is required, because Tailscale has its own DNS resolution called Magic DNS. So your Subnet Router should be able to resolve those names anyway (going off memory here, so be sure to check the docs, I may be misremembering how it works since I use the same device for DNS).\n
\n
You don’t even need Tailscale on a remote device to access your LAN - if you enable the Funnel service, you can provide an inbound encrypted path to specified resources.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1729412859 {#4025
date: 2024-10-20 10:27:39.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@WASTECH@lemmy.world"
"@WASTECH@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#4013 …}
+nested: Doctrine\ORM\PersistentCollection {#4011 …}
+votes: Doctrine\ORM\PersistentCollection {#4009 …}
+reports: Doctrine\ORM\PersistentCollection {#4007 …}
+favourites: Doctrine\ORM\PersistentCollection {#3975 …}
+notifications: Doctrine\ORM\PersistentCollection {#3979 …}
-id: 350090
-bodyTs: "'abl':85,143 'access':71,186 'act':107 'also':103 'anyway':148 'assum':2 'call':134 'check':157 'client':43,55 'container/service':17 'conveni':60 'current':20,93 'devic':31,68,82,172,184 'dns':110,132,136,174 'doc':159 'doesn':38 'els':34 'enabl':191 'encrypt':200 'etc':50 'even':178 'everyth':33 'extern':6 'funnel':193 'go':149 'inbound':199 'lan':188 'less':59 'like':47,63 'local':117 'magic':135 'may':161 'mean':8 'memori':151 'misrememb':163 'name':115,147 'need':179 'network':37 'node':76 'one':74 'outer':49 'part':44 'path':201 'pi':98,102 'pihol':105 'printer':48 'provid':197 'raspberri':97 'remot':183 'requir':126 'resolut':133 'resolv':116,145 'resourc':118,204 'rout':87 'router':80,140 'run':13,23,40,53,73,104 'say':5 'server':64,111 'servic':194 'sinc':167 'specifi':203 'subnet':79,92,139 'sure':155 'tailscal':10,14,24,42,75,128,180 'thing':46,62 'think':123 'though':119 'traffic':88 'type':30,66 'use':95,169 'via':9 'without':12 'work':166 'workstat':29 'workstation-typ':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemm.ee/comment/8790571"
+editedAt: DateTimeImmutable @1729411374 {#3961
date: 2024-10-20 10:02:54.0 +02:00
}
+createdAt: DateTimeImmutable @1706544089 {#4024
date: 2024-01-29 17:01:29.0 +01:00
}
}
+root: App\Entity\EntryComment {#4015}
+body: "That is almost the exact same thing I am doing. I have 2 Pi’s running PiHole in HA and I just made one of them the subnet router to allow this access. Since I will be the only one using this, I don’t care to use Funnel right now, but thanks for showing that to me. I am (obviously) new to using Tailscale, and that looks like a very neat feature."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1706544690 {#4143
date: 2024-01-29 17:11:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@WASTECH@lemmy.world"
"@BearOfaTime@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#4146 …}
+nested: Doctrine\ORM\PersistentCollection {#4150 …}
+votes: Doctrine\ORM\PersistentCollection {#4152 …}
+reports: Doctrine\ORM\PersistentCollection {#4153 …}
+favourites: Doctrine\ORM\PersistentCollection {#4155 …}
+notifications: Doctrine\ORM\PersistentCollection {#4157 …}
-id: 350110
-bodyTs: "'2':13 'access':33 'allow':31 'almost':3 'care':46 'exact':5 'featur':73 'funnel':49 'ha':19 'like':69 'look':68 'made':23 'neat':72 'new':62 'obvious':61 'one':24,40 'pi':14 'pihol':17 'right':50 'router':29 'run':16 'show':55 'sinc':34 'subnet':28 'tailscal':65 'thank':53 'thing':7 'use':41,48,64"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/7128207"
+editedAt: null
+createdAt: DateTimeImmutable @1706544690 {#4140
date: 2024-01-29 17:11:30.0 +01:00
}
} |
|
Show voter details
|
13 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
14 |
DENIED
|
moderate
|
App\Entity\EntryComment {#4051
+user: App\Entity\User {#4035 …}
+entry: App\Entity\Entry {#2388
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+magazine: App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
+slug: "How-to-access-traefik-hostnames-from-tailscale-clients"
+title: "How to access traefik hostnames from tailscale clients"
+url: null
+body: """
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale.\n
\n
All of my container web services are run through traefik and are accessed using hostnames I set up on my DNS server. How would I go about accessing the different web services externally since the hostnames don’t resolve?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 6
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729433101 {#2410
date: 2024-10-20 16:05:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1866 …}
+votes: Doctrine\ORM\PersistentCollection {#1978 …}
+reports: Doctrine\ORM\PersistentCollection {#1946 …}
+favourites: Doctrine\ORM\PersistentCollection {#1971 …}
+notifications: Doctrine\ORM\PersistentCollection {#2443 …}
+badges: Doctrine\ORM\PersistentCollection {#2426 …}
+children: []
-id: 33840
-titleTs: "'access':3 'client':8 'hostnam':5 'tailscal':7 'traefik':4"
-bodyTs: "'abl':9 'access':12,59,74 'contain':17,50 'deal':29 'decid':3,42 'differ':76 'dns':67 'docker':16 'expos':35 'extern':11,79 'final':2 'go':44,72 'hassl':33 'hostnam':61,82 'local':22 'network':23 'outsid':19 'port':36 'resolv':85 'router':39 'run':54 'secur':32 'server':68 'servic':52,78 'set':63 'sinc':80 'tailscal':46 'traefik':56 'use':60 'want':6,27 'web':51,77 'would':70"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706574801
+visibility: "visible "
+apId: "https://lemmy.world/post/11331541"
+editedAt: null
+createdAt: DateTimeImmutable @1706541801 {#1850
date: 2024-01-29 16:23:21.0 +01:00
}
}
+magazine: App\Entity\Magazine {#266}
+image: null
+parent: null
+root: null
+body: "I use wireguard and nginx but I set my WG DNS as the server ip. I have adguardhome running on the server and have added the external domains to map to their LAN address so they resolved locally when using the vpn or the LAN. A similar setup should work for you."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1706550857 {#4059
date: 2024-01-29 18:54:17.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@WASTECH@lemmy.world"
"@WASTECH@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#4052 …}
+nested: Doctrine\ORM\PersistentCollection {#4043 …}
+votes: Doctrine\ORM\PersistentCollection {#4046 …}
+reports: Doctrine\ORM\PersistentCollection {#4041 …}
+favourites: Doctrine\ORM\PersistentCollection {#4039 …}
+notifications: Doctrine\ORM\PersistentCollection {#4037 …}
-id: 350435
-bodyTs: "'ad':25 'address':34 'adguardhom':18 'dns':11 'domain':28 'extern':27 'ip':15 'lan':33,45 'local':38 'map':30 'nginx':5 'resolv':37 'run':19 'server':14,22 'set':8 'setup':48 'similar':47 'use':2,40 'vpn':42 'wg':10 'wireguard':3 'work':50"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/7130248"
+editedAt: DateTimeImmutable @1729433304 {#4057
date: 2024-10-20 16:08:24.0 +02:00
}
+createdAt: DateTimeImmutable @1706550857 {#4058
date: 2024-01-29 18:54:17.0 +01:00
}
} |
|
Show voter details
|
15 |
DENIED
|
edit
|
App\Entity\EntryComment {#4051
+user: App\Entity\User {#4035 …}
+entry: App\Entity\Entry {#2388
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+magazine: App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
+slug: "How-to-access-traefik-hostnames-from-tailscale-clients"
+title: "How to access traefik hostnames from tailscale clients"
+url: null
+body: """
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale.\n
\n
All of my container web services are run through traefik and are accessed using hostnames I set up on my DNS server. How would I go about accessing the different web services externally since the hostnames don’t resolve?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 6
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729433101 {#2410
date: 2024-10-20 16:05:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1866 …}
+votes: Doctrine\ORM\PersistentCollection {#1978 …}
+reports: Doctrine\ORM\PersistentCollection {#1946 …}
+favourites: Doctrine\ORM\PersistentCollection {#1971 …}
+notifications: Doctrine\ORM\PersistentCollection {#2443 …}
+badges: Doctrine\ORM\PersistentCollection {#2426 …}
+children: []
-id: 33840
-titleTs: "'access':3 'client':8 'hostnam':5 'tailscal':7 'traefik':4"
-bodyTs: "'abl':9 'access':12,59,74 'contain':17,50 'deal':29 'decid':3,42 'differ':76 'dns':67 'docker':16 'expos':35 'extern':11,79 'final':2 'go':44,72 'hassl':33 'hostnam':61,82 'local':22 'network':23 'outsid':19 'port':36 'resolv':85 'router':39 'run':54 'secur':32 'server':68 'servic':52,78 'set':63 'sinc':80 'tailscal':46 'traefik':56 'use':60 'want':6,27 'web':51,77 'would':70"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706574801
+visibility: "visible "
+apId: "https://lemmy.world/post/11331541"
+editedAt: null
+createdAt: DateTimeImmutable @1706541801 {#1850
date: 2024-01-29 16:23:21.0 +01:00
}
}
+magazine: App\Entity\Magazine {#266}
+image: null
+parent: null
+root: null
+body: "I use wireguard and nginx but I set my WG DNS as the server ip. I have adguardhome running on the server and have added the external domains to map to their LAN address so they resolved locally when using the vpn or the LAN. A similar setup should work for you."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1706550857 {#4059
date: 2024-01-29 18:54:17.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@WASTECH@lemmy.world"
"@WASTECH@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#4052 …}
+nested: Doctrine\ORM\PersistentCollection {#4043 …}
+votes: Doctrine\ORM\PersistentCollection {#4046 …}
+reports: Doctrine\ORM\PersistentCollection {#4041 …}
+favourites: Doctrine\ORM\PersistentCollection {#4039 …}
+notifications: Doctrine\ORM\PersistentCollection {#4037 …}
-id: 350435
-bodyTs: "'ad':25 'address':34 'adguardhom':18 'dns':11 'domain':28 'extern':27 'ip':15 'lan':33,45 'local':38 'map':30 'nginx':5 'resolv':37 'run':19 'server':14,22 'set':8 'setup':48 'similar':47 'use':2,40 'vpn':42 'wg':10 'wireguard':3 'work':50"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/7130248"
+editedAt: DateTimeImmutable @1729433304 {#4057
date: 2024-10-20 16:08:24.0 +02:00
}
+createdAt: DateTimeImmutable @1706550857 {#4058
date: 2024-01-29 18:54:17.0 +01:00
}
} |
|
Show voter details
|
16 |
DENIED
|
moderate
|
App\Entity\EntryComment {#4051
+user: App\Entity\User {#4035 …}
+entry: App\Entity\Entry {#2388
+user: Proxies\__CG__\App\Entity\User {#1943 …}
+magazine: App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1912 …}
+slug: "How-to-access-traefik-hostnames-from-tailscale-clients"
+title: "How to access traefik hostnames from tailscale clients"
+url: null
+body: """
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale.\n
\n
All of my container web services are run through traefik and are accessed using hostnames I set up on my DNS server. How would I go about accessing the different web services externally since the hostnames don’t resolve?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 6
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729433101 {#2410
date: 2024-10-20 16:05:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1866 …}
+votes: Doctrine\ORM\PersistentCollection {#1978 …}
+reports: Doctrine\ORM\PersistentCollection {#1946 …}
+favourites: Doctrine\ORM\PersistentCollection {#1971 …}
+notifications: Doctrine\ORM\PersistentCollection {#2443 …}
+badges: Doctrine\ORM\PersistentCollection {#2426 …}
+children: []
-id: 33840
-titleTs: "'access':3 'client':8 'hostnam':5 'tailscal':7 'traefik':4"
-bodyTs: "'abl':9 'access':12,59,74 'contain':17,50 'deal':29 'decid':3,42 'differ':76 'dns':67 'docker':16 'expos':35 'extern':11,79 'final':2 'go':44,72 'hassl':33 'hostnam':61,82 'local':22 'network':23 'outsid':19 'port':36 'resolv':85 'router':39 'run':54 'secur':32 'server':68 'servic':52,78 'set':63 'sinc':80 'tailscal':46 'traefik':56 'use':60 'want':6,27 'web':51,77 'would':70"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706574801
+visibility: "visible "
+apId: "https://lemmy.world/post/11331541"
+editedAt: null
+createdAt: DateTimeImmutable @1706541801 {#1850
date: 2024-01-29 16:23:21.0 +01:00
}
}
+magazine: App\Entity\Magazine {#266}
+image: null
+parent: null
+root: null
+body: "I use wireguard and nginx but I set my WG DNS as the server ip. I have adguardhome running on the server and have added the external domains to map to their LAN address so they resolved locally when using the vpn or the LAN. A similar setup should work for you."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1706550857 {#4059
date: 2024-01-29 18:54:17.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@WASTECH@lemmy.world"
"@WASTECH@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#4052 …}
+nested: Doctrine\ORM\PersistentCollection {#4043 …}
+votes: Doctrine\ORM\PersistentCollection {#4046 …}
+reports: Doctrine\ORM\PersistentCollection {#4041 …}
+favourites: Doctrine\ORM\PersistentCollection {#4039 …}
+notifications: Doctrine\ORM\PersistentCollection {#4037 …}
-id: 350435
-bodyTs: "'ad':25 'address':34 'adguardhom':18 'dns':11 'domain':28 'extern':27 'ip':15 'lan':33,45 'local':38 'map':30 'nginx':5 'resolv':37 'run':19 'server':14,22 'set':8 'setup':48 'similar':47 'use':2,40 'vpn':42 'wg':10 'wireguard':3 'work':50"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/7130248"
+editedAt: DateTimeImmutable @1729433304 {#4057
date: 2024-10-20 16:08:24.0 +02:00
}
+createdAt: DateTimeImmutable @1706550857 {#4058
date: 2024-01-29 18:54:17.0 +01:00
}
} |
|
Show voter details
|
17 |
DENIED
|
edit
|
App\Entity\Magazine {#266
+icon: Proxies\__CG__\App\Entity\Image {#247 …}
+name: "selfhosted@lemmy.world"
+title: "selfhosted"
+description: """
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.\n
\n
Rules:\n
\n
- Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.\n
- No spam posting.\n
- Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.\n
- Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).\n
- No trolling.\n
\n
Resources:\n
\n
- [awesome-selfhosted software](https://github.com/awesome-selfhosted/awesome-selfhosted)\n
- [awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) resources\n
- [Self-Hosted Podcast from Jupiter Broadcasting](https://selfhosted.show)\n
\n
> Any issues on the community? Report it using the report flag.\n
\n
> Questions? DM the mods!
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 222
+entryCommentCount: 3916
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1729582735 {#276
date: 2024-10-22 09:38:55.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#238 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#234 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#223 …}
+entries: Doctrine\ORM\PersistentCollection {#181 …}
+posts: Doctrine\ORM\PersistentCollection {#139 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#201 …}
+bans: Doctrine\ORM\PersistentCollection {#118 …}
+reports: Doctrine\ORM\PersistentCollection {#104 …}
+badges: Doctrine\ORM\PersistentCollection {#82 …}
+logs: Doctrine\ORM\PersistentCollection {#72 …}
+awards: Doctrine\ORM\PersistentCollection {#61 …}
+categories: Doctrine\ORM\PersistentCollection {#1820 …}
-id: 120
+apId: "selfhosted@lemmy.world"
+apProfileId: "https://lemmy.world/c/selfhosted"
+apPublicUrl: "https://lemmy.world/c/selfhosted"
+apFollowersUrl: "https://lemmy.world/c/selfhosted/followers"
+apInboxUrl: "https://lemmy.world/inbox"
+apDomain: "lemmy.world"
+apPreferredUsername: "selfhosted"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703473826 {#270
date: 2023-12-25 04:10:26.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703473826 {#272
date: 2023-12-25 04:10:26.0 +01:00
}
} |
|
Show voter details
|