Tailscale VPN¶
The Tailscale VPN can be used to access PiKVM from the Internet if configuring port forwarding is not possible or more security is desired. Tailscale is a convenient and free (for private use) tool for organizing a small VPN network.
The basic Tailscale configuration commands are shown below. For detailed instructions, refer to Tailscale support.
Configuring the PiKVM¶
-
Update OS:
Updating PiKVM OS
To update, run following commands under the
root
user:[root@pikvm ~]# pikvm-update
If you encounter an error like:
[root@pikvm ~]# pikvm-update bash: pikvm-update: command not found
It's most likely you have an old OS release. You can update the OS as follows:
[root@pikvm ~]# rw [root@pikvm ~]# pacman -Syy [root@pikvm ~]# pacman -S pikvm-os-updater [root@pikvm ~]# pikvm-update
Next time you will be able to use the usual method with
pikvm-update
. -
Install the Tailscale client, run
tailscaled
service and register it in the network:[root@pikvm ~]# rw [root@pikvm ~]# pacman -S tailscale-pikvm [root@pikvm ~]# systemctl enable --now tailscaled [root@pikvm ~]# tailscale up
-
Follow the link to authorize this installation. You likely want to disable key expiry!
-
After authorization success, reboot to make sure that everything works correctly:
[root@pikvm ~]# reboot
-
Now, you can view the IP address of the Tailscale network interface:
[root@pikvm ~]# ip addr show tailscale0
If everything is successful, PiKVM will become a member of your VPN network.
Do not update Tailscale if you don't have access to PiKVM without VPN
Unfortunately, sometimes, updating the Tailscale client can cause problems due to breaking changes. These are compatibility issues on the Tailscale side. Remember this when updating.
Configuring a client device¶
- Download and install the Tailscale client to the system you are using (not to the system you want to control).
- Check the Tailscale admin page to view your VPN network.
- Follow the URL in the web browser:
https://<tailscale_kvm_ip>
and you will see the PiKVM web interface.
Using Tailscale Certificates¶
PiKVM uses self-signed SSL certificates out of the box. You can also use Tailscale certificates in place of the default one.
Warning
Tailscale certificates are provided by Let's Encrypt and has a default expiry of 90 days. There is currently no mechanism available to auto-renew Tailscale certificate. You may put the commands below in a script to simplify process.
-
Switch filesystem to RW if in ReadOnly mode and delete existing PiKVM certificates for nginx and vnc.
[root@pikvm ~]# rw [root@pikvm ~]# rm -v /etc/kvmd/{nginx,vnc}/ssl/*.{crt,key}
-
Provision new certificates using
tailscale cert
command. Optionally you may create a directory to store the certificates.[root@pikvm ~]# mkdir .cert [root@pikvm ~]# cd .cert [root@pikvm .cert]# tailscale cert <tailscale_hostname>
-
Copy the certificates to nginx's and vnc's ssl directories.
[root@pikvm ~]# cp /root/.cert/<tailscale_hostname>.key /etc/kvmd/nginx/ssl/server.key [root@pikvm ~]# cp /root/.cert/<tailscale_hostname>.crt /etc/kvmd/nginx/ssl/server.crt
Repeat the same steps for vnc if you have configured it.
[root@pikvm ~]# cp /root/.cert/<tailscale_hostname>.key /etc/kvmd/vnc/ssl/server.key [root@pikvm ~]# cp /root/.cert/<tailscale_hostname>.crt /etc/kvmd/vnc/ssl/server.crt
-
Grant file ownership to nginx and vnc services. Switch filesystem to ReadOnly again
[root@pikvm ~]# chown :kvmd-nginx /etc/kvmd/nginx/ssl/* [root@pikvm ~]# chown :kvmd-vnc /etc/kvmd/vnc/ssl/* [root@pikvm ~]# ro
-
Restart nginx and vnc services
[root@pikvm ~]# systemctl restart kvmd-nginx [root@pikvm ~]# systemctl restart kvmd-vnc
Troubleshooting¶
-
If something does not work, the usual advice is to completely remove Tailscale from PiKVM and perform a clean installation:
[root@pikvm ~]# rw [root@pikvm ~]# pacman -Rscnd tailscale [root@pikvm ~]# rm -rf /var/lib/tailscale /var/cache/tailscale [root@pikvm ~]# reboot
Now, follow the instructions from the beginning to re-install Tailscale.
-
In case of certificate issues you can try the following steps to debug and fix.
-
Check if the services are running. If not please start them. For example, web UI service can be checked using:
[root@pikvm ~]# systemctl status kvmd-nginx
For VNC:
[root@pikvm ~]# systemctl status kvmd-vnc
-
If the services are running but not accessible or showing a warning, check the respective logs. For web UI:
[root@pikvm ~]# journalctl -xeu kvmd-nginx
-
If the logs shows TLS/certificate/permissions errors, the issue may be with file ownership. The services must have at least the group ownership of the certificates. The ownership should look similar to this:
[root@pikvm ~]# ls -l /etc/kvmd/{nginx,vnc}/ssl /etc/kvmd/nginx/ssl: total 8 -r--r--r-- 1 root kvmd-nginx 2872 Jan 3 16:07 server.crt -r--r----- 1 root kvmd-nginx 227 Jan 3 16:07 server.key /etc/kvmd/vnc/ssl: total 8 -r--r--r-- 1 root kvmd-vnc 2872 Jan 3 16:07 server.crt -r--r----- 1 root kvmd-vnc 227 Jan 3 16:07 server.key