Skip to content

Commit

Permalink
Remove Tailscale example from focs
Browse files Browse the repository at this point in the history
  • Loading branch information
sergioisidoro committed Jan 26, 2024
1 parent 42fd93e commit 36cfc0c
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ This is heavily inspired and a lot of things replicated from [TADS Boilerplate p

## Important notes
- `public-network` is the network all services need to be if you want them public so Traefik can find them.
- It is strongly advised to put Portainer behind a VPN or internal network. To block access from the internet, you can add `internal_services_ip_whitelist` to the variables, allowing only certain IPs. If you're using Tailscale you could do `internal_services_ip_whitelist="100.64.0.0/10"` such that only devices and nodes in that network can communicate with the web interfaces.
- It is strongly advised to put Portainer behind a VPN or internal network. To block access from the internet, you can add `internal_services_ip_whitelist` to the variables, allowing only certain IPs.
- Remember to put annotations on the `deploy` section so that Traefik can find your services across all nodes.

# 🚀 Quickstart
Expand Down

0 comments on commit 36cfc0c

Please sign in to comment.