-
Notifications
You must be signed in to change notification settings - Fork 399
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Connect Worker trough Tailscale VPN #848
Comments
Hi there! So sorry you ran into this. Cronicle v1 requires bidirectional connections between the primary and worker servers. So both primary and workers need to all be behind the same VPN or LAN so they can route to each other. When a worker starts up, it picks the first non-private IPv4 interface from the network cards to use as the IP. If you need to override this, add a top-level Cronicle v2 (which will be released later in 2025) redesigns this whole thing, and the connections are ONLY one way. Worker servers connect to the primary server, and NEVER the other way around. This should open up a lot of new use cases that are difficult to setup under v1, specifically around VPNs. Hope this helps! |
Okay so i added the |
@Skyfay |
Yes, then it gets complicated. I think then I'll wait for the v2 maybe it will work then :) |
I want to use Cronicle over VPN. However, when I add a worker, it is immediately shown as offline. The adding process works though. The problem is probably that Cronicle directly uses the public IP of the server and therefore cannot establish a connection. How can I prevent it from not connecting via the IP address that is entered?
The text was updated successfully, but these errors were encountered: