mirror of
https://github.com/juanfont/headscale.git
synced 2026-01-13 04:40:29 +01:00
No Branch/Tag Specified
main
update_flake_lock_action
gh-pages
kradalby/release-v0.27.2
dependabot/go_modules/golang.org/x/crypto-0.45.0
dependabot/go_modules/github.com/opencontainers/runc-1.3.3
copilot/investigate-headscale-issue-2788
copilot/investigate-visibility-issue-2788
copilot/investigate-issue-2833
copilot/debug-issue-2846
copilot/fix-issue-2847
dependabot/go_modules/github.com/go-viper/mapstructure/v2-2.4.0
dependabot/go_modules/github.com/docker/docker-28.3.3incompatible
kradalby/cli-experiement3
doc/0.26.1
doc/0.25.1
doc/0.25.0
doc/0.24.3
doc/0.24.2
doc/0.24.1
doc/0.24.0
kradalby/build-docker-on-pr
topic/docu-versioning
topic/docker-kos
juanfont/fix-crash-node-id
juanfont/better-disclaimer
update-contributors
topic/prettier
revert-1893-add-test-stage-to-docs
add-test-stage-to-docs
remove-node-check-interval
fix-empty-prefix
fix-ephemeral-reusable
bug_report-debuginfo
autogroups
logs-to-stderr
revert-1414-topic/fix_unix_socket
rename-machine-node
port-embedded-derp-tests-v2
port-derp-tests
duplicate-word-linter
update-tailscale-1.36
warn-against-apache
ko-fi-link
more-acl-tests
fix-typo-standalone
parallel-nolint
tparallel-fix
rerouting
ssh-changelog-docs
oidc-cleanup
web-auth-flow-tests
kradalby-gh-runner
fix-proto-lint
remove-funding-links
go-1.19
enable-1.30-in-tests
0.16.x
cosmetic-changes-integration
tmp-fix-integration-docker
fix-integration-docker
configurable-update-interval
show-nodes-online
hs2021
acl-syntax-fixes
ts2021-implementation
fix-spurious-updates
unstable-integration-tests
mandatory-stun
embedded-derp
prtemplate-fix
v0.28.0-beta.1
v0.27.2-rc.1
v0.27.1
v0.27.0
v0.27.0-beta.2
v0.27.0-beta.1
v0.26.1
v0.26.0
v0.26.0-beta.2
v0.26.0-beta.1
v0.25.1
v0.25.0
v0.25.0-beta.2
v0.24.3
v0.25.0-beta.1
v0.24.2
v0.24.1
v0.24.0
v0.24.0-beta.2
v0.24.0-beta.1
v0.23.0
v0.23.0-rc.1
v0.23.0-beta.5
v0.23.0-beta.4
v0.23.0-beta3
v0.23.0-beta2
v0.23.0-beta1
v0.23.0-alpha12
v0.23.0-alpha11
v0.23.0-alpha10
v0.23.0-alpha9
v0.23.0-alpha8
v0.23.0-alpha7
v0.23.0-alpha6
v0.23.0-alpha5
v0.23.0-alpha4
v0.23.0-alpha4-docker-ko-test9
v0.23.0-alpha4-docker-ko-test8
v0.23.0-alpha4-docker-ko-test7
v0.23.0-alpha4-docker-ko-test6
v0.23.0-alpha4-docker-ko-test5
v0.23.0-alpha-docker-release-test-debug2
v0.23.0-alpha-docker-release-test-debug
v0.23.0-alpha4-docker-ko-test4
v0.23.0-alpha4-docker-ko-test3
v0.23.0-alpha4-docker-ko-test2
v0.23.0-alpha4-docker-ko-test
v0.23.0-alpha3
v0.23.0-alpha2
v0.23.0-alpha1
v0.22.3
v0.22.2
v0.23.0-alpha-docker-release-test
v0.22.1
v0.22.0
v0.22.0-alpha3
v0.22.0-alpha2
v0.22.0-alpha1
v0.22.0-nfpmtest
v0.21.0
v0.20.0
v0.19.0
v0.19.0-beta2
v0.19.0-beta1
v0.18.0
v0.18.0-beta4
v0.18.0-beta3
v0.18.0-beta2
v0.18.0-beta1
v0.17.1
v0.17.0
v0.17.0-beta5
v0.17.0-beta4
v0.17.0-beta3
v0.17.0-beta2
v0.17.0-beta1
v0.17.0-alpha4
v0.17.0-alpha3
v0.17.0-alpha2
v0.17.0-alpha1
v0.16.4
v0.16.3
v0.16.2
v0.16.1
v0.16.0
v0.16.0-beta7
v0.16.0-beta6
v0.16.0-beta5
v0.16.0-beta4
v0.16.0-beta3
v0.16.0-beta2
v0.16.0-beta1
v0.15.0
v0.15.0-beta6
v0.15.0-beta5
v0.15.0-beta4
v0.15.0-beta3
v0.15.0-beta2
v0.15.0-beta1
v0.14.0
v0.14.0-beta2
v0.14.0-beta1
v0.13.0
v0.13.0-beta3
v0.13.0-beta2
v0.13.0-beta1
upstream/v0.12.4
v0.12.4
v0.12.3
v0.12.2
v0.12.2-beta1
v0.12.1
v0.12.0-beta2
v0.12.0-beta1
v0.11.0
v0.10.8
v0.10.7
v0.10.6
v0.10.5
v0.10.4
v0.10.3
v0.10.2
v0.10.1
v0.10.0
v0.9.3
v0.9.2
v0.9.1
v0.9.0
v0.8.1
v0.8.0
v0.7.1
v0.7.0
v0.6.1
v0.6.0
v0.5.2
v0.5.1
v0.5.0
v0.4.0
v0.3.6
v0.3.5
v0.3.4
v0.3.3
v0.3.2
v0.3.1
v0.3.0
v0.2.2
v0.2.1
v0.2.0
v0.1.1
v0.1.0
Labels
Clear labels
CLI
DERP
DNS
Nix
OIDC
SSH
bug
database
documentation
duplicate
enhancement
faq
good first issue
grants
help wanted
might-come
needs design doc
needs investigation
no-stale-bot
out of scope
performance
policy 📝
pull-request
question
regression
routes
stale
tags
tailscale-feature-gap
well described ❤️
wontfix
Mirrored from GitHub Pull Request
No Label
bug
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/headscale#297
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @GrahamJenkins on GitHub (Jul 26, 2022).
Created per request on Discord. I have no clue where to start debugging an issue that occurs with a frequency > 1 month. :-|
I have seen several cases (> 4) where devices on my headscale network rely on (magic)DNS provided by headscale, (which is being provided by PiHole) but it stops working, resulting in machines having no outgoing DNS (by extension any internet) at all. The Headscale server maintains DNS access to the outside internet.
Potential fixes:
Full system restart
Restarting Headscale
Restarting PiHole
Background information: I have been running PiHole on a different server for about 2 years and have had no connectivity issues that I am aware of. My hunch is that there may be a conflict/(???) that occasionally severs the DNS connection between headscale and PiHole, and since Headscale doesn't seem to be aware of any upstream DNS server, all tailscale clients connected to it stop resolving DNS requests. These servers do have IP based network connectivity as well as inbound connections working, they just fail to resolve DNS requests and effectively have no outbound internet connection. (Symptom: docker pull results in 404 type errors and all sorts of other strange errors)
Context info
Headscale v0.15.0 via docker-compose.
Nginx reverse proxy
PiHole with 2-3 upstream DNS providers
Servers: Multiple distros, multiple hosts, mostly Debian based
Upstream DNS: Cloudflare and quad9
Time frame: I have been running headscale for about 2-3 months and have seen this occur perhaps 4 times. The last gap was at least 1-1.5 months between occurrences.
How I realize this is happening: People start messaging me asking if [service/server] is down. I log in and see it up but not functioning.
@geek5nan commented on GitHub (Jul 27, 2022):
It seems that the Tailscale client will override the system's DNS settings on macOS.
When I enabled
Use TailScale DNS Settingsand queried the DNS via the dig command, I clearly saw that the DNS servers were using the nameserver set in HeadScale.When I disable
Use Tailscale DNS Settingsand query the DNS with the dig command again, I see that the DNS server uses the nameserver set in System Preferences.Enabled Use Tailscale DNS settings
Disabled Use Tailscale DNS settings
Regarding this, I suggest you check if the device where your other Tailscale clients are located can access the preferred nameserver set in Headscale the next time you have a problem.
I'm afraid the problem is caused by your other devices not being able to connect to the preferred DNS nameserver you set in Headscale.
@juanfont commented on GitHub (Jul 28, 2022):
@GrahamJenkins can you try with the latest v0.16.0?
@routerino commented on GitHub (Jul 30, 2022):
I seem to have this problem and have been able to reliably recreate it, albeit it might not be exactly the same cause.
I've got my domain (
gurucomputing.com.au) routed via headscale's split dns through my router's tailscale tunnel. Whenever I reboot, I seem to hit a chicken and egg condition where tailscale tries to reach my headscale server via the tailscale tunnel and gets stuck in limbo. Tailscale's status even says "please restart the tailscale service".Once I do restart the service, internet gets happy again. Can also confirm that commenting out the domain that includes the headscale server resolves the issue.
I don't think tailscale expects the coordination server to sit behind the tailscale service. solution is probably to exclude the explicit headscale server dns address from the split dns if it's included in the scope of the split dns, if that's possible. or just use a different domain for headscale vs tunneled services.
@kradalby commented on GitHub (Oct 28, 2022):
I will close this with two notes: