this post was submitted on 20 Feb 2026
60 points (100.0% liked)

Selfhosted

56737 readers
284 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

This should be excellent for selfhosters that have all their services in one VM. I haven't tried this myself, but I think this means you can:

  • you can create memorable links instead of memorizing port numbers: jellyfin.foo-bar.ts.net
  • share one service from a machine instead of all of them in a more intuitive way

If you’re new to Tailscale Services, it lets you publish internal resources like databases, APIs, and web servers as named services in your tailnet, using stable MagicDNS names. Rather than connecting to individual machines, teams connect to logical services that automatically route traffic to healthy, available backends across your infrastructure. This decoupling makes migrations, scaling, and high availability far easier, without reconfiguring clients, rewriting access policies, or standing up load balancers. Our documentation has details on use cases, requirements, and implementation.

top 27 comments
sorted by: hot top controversial new old
[–] avidamoeba@lemmy.ca 25 points 1 day ago (4 children)

While this is great, especially for smaller self-hosters, as a setup gets more and more dependent on Tailscale, one should think about self-hosting Headscale, and therefore not being over-reliant on services not offered by it. I'm in that boat and I haven't done the Headscale migration yet.

[–] Archer@lemmy.world 7 points 7 hours ago

Yeah it’s gonna hurt a lot when they enshittify

[–] irmadlad@lemmy.world 12 points 1 day ago (1 children)

What is it about Tailscale that is giving you heartburn? I am over reliant on my ISP. Without them, selfhosting would be rather bland.

[–] avidamoeba@lemmy.ca 21 points 1 day ago* (last edited 1 day ago) (1 children)

Ownership, size and profit growth strategy. My ISP is a massively profitable poorly regulated oligopoly. The deal there is clear - they're already charging as much as the market can afford. They aren't providing a free service today that they'll have to monetize down the line to compensate for the time operating on VC funding. Tailscale, awesome as it is today, is in my view guaranteed to enshittify over time as they start getting pressed to grow profit. That's not too much of a problem for me since the clients I use are open source and there's an alternative open source server. If I used features unavailable in Headscale or were in over my head and unable to self-host Headscale, I might be in a bad time some time down the line.

[–] irmadlad@lemmy.world 11 points 1 day ago (3 children)

Would it make you feel better if you paid Tailscale for one of their plans? It's not like they are just giving away their whole enterprise. It's fairly trivial for them to give free services, kind of like Cloudflare, Oracle, et al. Reading a bit reveals:

  • Tailscale's estimated annual revenue is currently $45.2M per year.
  • Tailscale's estimated revenue per employee is $230,489
  • Tailscale's total funding is $277M.
  • Tailscale's current valuation is $1.5B. (April 2025)
  • Tailscale has 196 Employees.
  • Tailscale grew their employee count by 23% last year.

That seems pretty profitable. Enshitification happens. It's been going on since I was born. If it's free on the internet, and later it becomes a paid service, then I just find something else that fits. Or pony up the cheapest plan they have, which currently is their Personal Plus @ $5 USD per month. I don't mind paying for a good service and $5 USD is burger from McDonalds. Extremely well under what most people put into a hobby. Will prices increase? Maybe...everything goes up. Rarely do services and utilities go down in price. When the price points are no longer justifiable, again, I look for something else that fits.

[–] non_burglar@lemmy.world 3 points 3 hours ago

Enshitification happens.

I don't think that's a given necessarily, I think it's a common pattern under the vc funding -> IPO model.

But companies like Steam and Patagonia show that companies don't all have to follow the same predictable enshittification arc.

[–] kurcatovium@piefed.social 7 points 1 day ago (2 children)

There's also Netbird, worth checking out.

[–] Lettuceeatlettuce@lemmy.ml 1 points 2 hours ago

Netbird and Pangolin too.

[–] irmadlad@lemmy.world 3 points 1 day ago

I've heard great things about Netbird. There are all manner of choices. Their team plan @ $5 USD looks rather generous for homelab operation.

[–] avidamoeba@lemmy.ca 3 points 1 day ago* (last edited 23 hours ago)

That's one way to look at it. I used to look at paid VC-funded services like that. I no longer do as I've observed services I paid good money for get more expensive much faster than inflation and decrease in quality and features at the same time. It's one reason I self-host many services I used to pay third parties for. I now look to alternatives from the get go and derisk existing dependencies. To be clear - profitability isn't merely the only problem. The ownership and its profit growth strategy (and expectations) are. Those are not the same in a decades old ISP and a VC-funded startup.

Merely being profitable today isn't a good predictor for stable prices and function over the long run for VC-funded services. I'm not planning to do major surgery to my setup every few years as yet another service shits the bed. The workstation/server where my self-hosted services run has last been reinstalled in 2014. Most of my config-as-code was written in 2019. I support a few families with this and I aim at maximum stability with minimal maintenance. So I use open source whenever I can and I often pay for development. I only integrated Tailscale in my setup because the clients are open source and because there's an open source server option.

I'm not saying to people - don't use Tailscale. In fact I often recommend it to new self-hosters. But I do that because there's a way out. So here I'm reminding people who care about a way out to check if this feature is escapable. :D

[–] MatSeFi@lemmy.liebeleu.de 6 points 1 day ago* (last edited 1 day ago) (1 children)

I did it about 8 months ago... it just works like black magic. It’s a "fire and forget" VPN, but SSO is a must in my opinion; otherwise, key exchange is too tedious.

[–] avidamoeba@lemmy.ca 4 points 1 day ago (1 children)

You're talking about Headscale right?

[–] MatSeFi@lemmy.liebeleu.de 3 points 1 day ago (1 children)

Yes.. sry wasn't clear about that..

[–] avidamoeba@lemmy.ca 2 points 1 day ago (2 children)

Can you share what components are you using for SSO, UI, etc.?

[–] MatSeFi@lemmy.liebeleu.de 4 points 1 day ago

Never got warm with all the UIs available. But things change very fast on that front. For me it looks like that they only differ by the time it takes to provide support for the newest headscale version. Just take the one supporting yours :) For SSO , the OIDC provider from Nextcloud is working as good as any other. Having some kind of static IP also helps but the headscale server runs on HTTPS port plus some optional ones (not sure if I remember correctly) dynamic dns should be ok as well.

[–] tux7350@lemmy.world 4 points 1 day ago* (last edited 1 day ago)

Not OP but I use headscale and have it configured using Authentik for SSO. Works flawlessly once its up and running. I also use headplane for the UI. It has SSO integration as well which makes everything a breeze.

Edit: Forgot to mention, all running in docker with traefik as the reverse proxy.

[–] prenatal_confusion@feddit.org 3 points 1 day ago (1 children)

I switched to pangolin and I am amazed how well it works.

[–] WingedObsidian@sh.itjust.works 3 points 1 day ago* (last edited 1 day ago) (1 children)

Love pangolin. Although I wish internal connections would make more sense

[–] hoppolito@mander.xyz 1 points 5 hours ago

I have long had a switch to pangolin for my homelab services on the roadmap. Can you explain what you mean with internal connections making more sense?

[–] avidamoeba@lemmy.ca 9 points 1 day ago* (last edited 1 day ago) (3 children)

- you can create memorable links instead of memorizing port numbers: jellyfin.foo-bar.ts.net

BTW, I'm doing something similar with standard DNS records that point to an internal Tailscale IP. I can go to https://immich.mydomain.com/ which only works if Tailscale is active. Let's Encrypt works too. Obviously the setup isn't automatic but it's automateable for more adept self-hosters.

[–] TheBlackLounge@lemmy.zip 2 points 5 hours ago (1 children)

Immich needs this, right? I remember it not working on a tailscale funnel path.

[–] avidamoeba@lemmy.ca 1 points 3 hours ago

I haven't tried funnel but it works using an internal Talscale IP/host and port. E.g. http://the-immich-host:1234/ if the-immich-host is a Tailscale machine.

[–] blanka@lemmy.dbzer0.com 2 points 6 hours ago

I do this too. Can recommend.

[–] GraveyardOrbit@lemmy.zip 2 points 8 hours ago (1 children)

Does this work from outside your lan or just when you’re in the network with your dns server?

[–] avidamoeba@lemmy.ca 2 points 6 hours ago

Works outside. I'm setting a standard DNS record on a standard DNS provider to an internal TS IP. The record works everywhere but the IP is only accessible when TS is on. Whether I'm on the local net or outside.

[–] irmadlad@lemmy.world 4 points 1 day ago

Neat. What would be a good application for App-aware connectivity?

[–] Decronym@lemmy.decronym.xyz 3 points 1 day ago* (last edited 2 hours ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
DNS Domain Name Service/System
HTTP Hypertext Transfer Protocol, the Web
HTTPS HTTP over SSL
IP Internet Protocol
SSL Secure Sockets Layer, for transparent encryption
SSO Single Sign-On
VPN Virtual Private Network

[Thread #106 for this comm, first seen 20th Feb 2026, 18:41] [FAQ] [Full list] [Contact] [Source code]