Skip to content

Tailscale Integration

Tailscale provides secure, zero-config VPN access to your articwake instance from anywhere.

  • Secure by default: All traffic is encrypted end-to-end
  • No port forwarding: Works behind NAT and firewalls
  • Stable IPs: Tailscale IPs don’t change
  • Easy setup: Just one auth key
  1. Go to Tailscale Admin Console
  2. Generate a new auth key
  3. Copy the key (starts with tskey-auth-)

Create tailscale_authkey in /boot/articwake/:

Terminal window
echo "tskey-auth-xxxxx" | sudo tee /mnt/articwake/tailscale_authkey

On first boot, the setup script will:

  1. Install Tailscale
  2. Authenticate with your key
  3. Join your Tailscale network

After setup, access the web UI via:

http://<tailscale-hostname>

Find the hostname with:

Terminal window
tailscale status

For the most reliable setup, use your homelab’s Tailscale IP in config.env:

ARTICWAKE_HOMELAB_IP="100.x.y.z"

This ensures articwake can reach your server even if local network conditions change.

Tailscale offers different key types:

Key TypeExpiryUse Case
One-offAfter first useSingle device setup
ReusableConfigurableMultiple devices or reinstalls
EphemeralNeverContainers, short-lived VMs

For articwake, a one-off key is usually sufficient.

Check the setup log:

Terminal window
ssh root@<local-ip>
cat /var/log/articwake-setup.log | grep -i tailscale
Terminal window
tailscale up --authkey=tskey-auth-xxxxx
Terminal window
tailscale status

If your key expires or you need to re-auth:

Terminal window
tailscale logout
tailscale up --authkey=<new-key>
  • Tailscale traffic is encrypted end-to-end
  • Only devices on your Tailscale network can access articwake
  • Consider using Tailscale ACLs for additional restrictions
  • The auth key is deleted after first boot for security