diff --git a/development/ref/remote-cli/index.html b/development/ref/remote-cli/index.html index 12d358a7..7a2c1148 100644 --- a/development/ref/remote-cli/index.html +++ b/development/ref/remote-cli/index.html @@ -7,5 +7,5 @@ api_key: <API_KEY_FROM_PREVIOUS_STEP>
export HEADSCALE_CLI_ADDRESS="<HEADSCALE_ADDRESS>:<PORT>"
export HEADSCALE_CLI_API_KEY="<API_KEY_FROM_PREVIOUS_STEP>"
-Bug
Headscale currently requires at least an empty configuration file when environment variables are used to specify connection details. See issue 2193 for more information.
This instructs the headscale binary to connect to a remote instance at <HEADSCALE_ADDRESS>:<PORT>, instead of connecting to the local instance.
Test the connection
Let us run the headscale command to verify that we can connect by listing our nodes:
This instructs the headscale binary to connect to a remote instance at <HEADSCALE_ADDRESS>:<PORT>, instead of connecting to the local instance.
Test the connection
Let us run the headscale command to verify that we can connect by listing our nodes:
You should now be able to see a list of your nodes from your workstation, and you can now control the headscale server from your workstation.
It is possible to run the gRPC remote endpoint behind a reverse proxy, like Nginx, and have it run on the same port as headscale.
While this is not a supported feature, an example on how this can be set up on NixOS is shown here.
cli.insecure: true in the configuration file or by setting HEADSCALE_CLI_INSECURE=1 via an environment variable. We do not recommend to disable certificate validation.