Comment on How to reverse proxy?
ippokratis@lemmy.ml 5 weeks ago
While using a web server before your self hosted micro services is the obvious answer and caddy the easier to configure, as a beginner you should also consider taiscale funnels. You dont need to mess with router stuff like port forward or caring if you ISP have your router behind a cgnat which is kinda norm nowadays , also dont have to care for a domain name dynamic DNS stuff . You could have a look to my quick how to . All you need is running a script , the ports and desired names of your subdomains and your tailscale auth key. ippocratis.github.io/tailscale/
Octavusss@lemm.ee 5 weeks ago
Well I already got static IP from my ISP and configured Wireguard on my directly on my router so I think I’m good.
ippokratis@lemmy.ml 5 weeks ago
The funnel exposes your local services to the public over https . Like what you want to accomplish with reverse proxy . Its just more straightforward for a beginner.
Personally I closed my router ports and switched to tailscalr funnels after using caddy with mutual TLS for years.
WhyJiffie@sh.itjust.works 5 weeks ago
they did not say they want it public, and that’s an additional security burden they may not need
ippokratis@lemmy.ml 5 weeks ago
He he didnt but ghats what he meant
I mean 99% of users use reverse proxy for https public access
Also read the threat replies …
That’s what this thread is about
…
No?
CapitalNumbers@lemm.ee 5 weeks ago
maybe silly question but does tailscale tunnel operate in a similar fashion to a cloud flare tunnel? as in you can remotely access your internal service over https?
ippokratis@lemmy.ml 5 weeks ago
Yes that’s exactly what they do