Expose a Service Publicly via Fly.io + Tailscale
This guide describes how to expose a BlumeOps service to the public internet
using a reverse proxy container on Fly.io that tunnels back
to indri over tailscale. The approach keeps the home IP hidden,
requires no changes to existing infrastructure (*.ops.eblu.me, caddy,
DNS), and is reusable for multiple services.
Architecture
Internet → <service>.eblu.me
│
Fly.io edge (Anycast, TLS via Let's Encrypt)
│
Fly.io VM (nginx reverse proxy + Tailscale)
│ (WireGuard tunnel)
tailnet (tail8d86e.ts.net)
│
<service>.tail8d86e.ts.net (Tailscale ingress)
│
k8s Service → pod
(The approach works similarly for non-k8s services via tailscale serve
service definitions, eg. forgejo and zot)
A single Fly.io container serves as the public-facing proxy for all exposed
services. Each service gets a server block in the nginx config and a DNS
CNAME. The container joins the tailnet via an ephemeral auth key and reaches
backend services through Tailscale ingress endpoints.
Existing *.ops.eblu.me services remain private behind Tailscale — this
approach does not touch caddy, gandi DNS-01, or any other existing
infrastructure. They can continue to operate in parallel for private access.
Key decisions
| Decision | Choice | Rationale |
|---|---|---|
| Proxy host | Fly.io (free tier) | Managed container, no server to maintain via Ansible. Shared IPv4 + IPv6 are free for HTTP/HTTPS; dedicated IPv4 is $2/mo if a service needs non-HTTP(S) protocols |
| Tunnel | Tailscale (existing) | Already in use, WireGuard encryption, ACL control |
| DNS | CNAME at gandi | No DNS migration needed, no Cloudflare dependency |
| TLS (public) | Fly.io auto-provisions Let’s Encrypt | No cert management, $0.10/mo per hostname |
| TLS (origin) | Tailscale handles encryption | WireGuard tunnel encrypts all traffic |
| CDN/cache | nginx proxy_cache in container | Per-service: aggressive for static sites, selective or disabled for dynamic services |
| DDoS | Fly.io Anycast + nginx rate limiting | Not enterprise-grade; see |
| IaC | fly/ directory in repo, Pulumi for DNS + TS key | No well-maintained Fly.io Pulumi provider; fly.toml is the app’s IaC |
TLS in this architecture
There are three independent TLS segments — none involve Caddy:
- Browser → Fly.io edge: Fly.io auto-provisions a Let’s Encrypt
certificate for each custom domain (e.g.,
docs.eblu.me). Validated via TLS-ALPN challenge — no DNS API needed. - nginx → Tailscale ingress: nginx proxies to
https://<service>.tail8d86e.ts.net. The Tailscale ingress serves a Tailscale-issued cert. nginx usesproxy_ssl_verify offsince the underlying tunnel is already encrypted. - WireGuard tunnel: All Tailscale traffic is encrypted at the network layer regardless of application-level TLS.
Caddy continues to serve *.ops.eblu.me with its existing Gandi DNS-01
certificates. The two TLS domains are completely independent.
External references
- Tailscale on Fly.io — official guide for running Tailscale in a Fly.io container
- Fly.io Custom Domains — how Fly handles TLS for custom domains
- Home Assistant + Fly.io + Tailscale — community guide describing this exact pattern
One-time setup (first service)
These steps establish the Fly.io proxy infrastructure. They only need to be done once.
Step 1: Fly.io account and app
- Create or recover a Fly.io account at https://fly.io (requires credit card for free tier)
- Install
flyctl:brew install flyctl - Authenticate:
fly auth login - Create the app:
fly apps create blumeops-proxy - Store the Fly.io deploy token in 1Password (blumeops vault):
- Generate:
fly tokens create deploy -a blumeops-proxy - Store as
fly-deploy-tokenfield
- Generate:
Step 2: Repository structure
Create the fly/ directory at the repository root. This is separate from containers/ because the image is built and deployed directly to Fly.io by fly deploy — it never goes through registry.ops.eblu.me.
fly/
├── fly.toml # Fly.io app configuration
├── Dockerfile # nginx + tailscale + alloy
├── nginx.conf # Reverse proxy + cache config
├── start.sh # Entrypoint: start tailscale, nginx, alloy
├── alloy.river # Observability: logs → Loki, metrics → Prometheus
└── error.html # Friendly 503 page for upstream failures
See the actual files in fly/ for current configuration. Key design points:
fly.toml— uses bluegreen deploys so the old machine serves traffic until the new one passes health checks.auto_stop_machines = "off"keeps the proxy always-on.Dockerfile— multi-stage build pulling nginx, Tailscale, and alloy binaries. Alloy runs as a sidecar inside the container for observability (see below).start.sh— startstailscaledfirst (MagicDNS must be available before nginx resolves upstreams), then nginx in the background, then Alloy, and blocks on the nginx process.nginx.conf— uses aresolver 100.100.100.100directive so upstream DNS resolution is deferred to request time (not config load time). Each service gets aserverblock with aset $upstreamvariable pattern. Includes a JSON access log format that Alloy tails for log collection and metric extraction. A catch-all server block serves/healthzand rejects unknown hosts.error.html— shown viaproxy_intercept_errorswhen upstreams are unreachable (indri offline, tunnel down, etc.). Cached responses still take priority viaproxy_cache_use_stale.
Observability sidecar
The Fly.io container includes alloy baked in (fly/alloy.river). Alloy tails the nginx JSON access log and:
- Forwards log lines to loki via the Tailscale Ingress endpoint
- Derives Prometheus metrics (
flyio_nginx_http_requests_total,flyio_nginx_http_request_duration_seconds,flyio_nginx_cache_requests_total, etc.) and remote-writes them to prometheus
Both Loki and Prometheus are reached directly via their *.tail8d86e.ts.net Tailscale Ingress endpoints (not via caddy), since the proxy’s ACLs only allow tag:flyio-target.
Step 3: Tailscale auth key and ACLs (Pulumi)
Extend the existing pulumi/tailscale/ project.
Add to pulumi/tailscale/__main__.py:
# Auth key for Fly.io proxy container
flyio_key = tailscale.TailnetKey(
"flyio-proxy-key",
reusable=True,
ephemeral=True,
preauthorized=True, # Skip device approval on the tailnet
tags=["tag:flyio-proxy"],
expiry=7776000, # 90 days
)
pulumi.export("flyio_authkey", flyio_key.key)Note:
preauthorized=Trueis required if your tailnet has device approval enabled. Without it, each new container start (including health-check restarts) creates a node that needs manual approval, causing the container to hang before nginx starts.
Add to pulumi/tailscale/policy.hujson:
Tag owner (allows the k8s operator to assign this tag to Ingress proxy nodes):
"tag:flyio-target": ["autogroup:admin", "tag:blumeops", "tag:k8s-operator"],
Access grant (Fly.io proxy → explicitly tagged endpoints on HTTPS only):
{
"src": ["tag:flyio-proxy"],
"dst": ["tag:flyio-target"],
"ip": ["tcp:443"],
},
ACL test:
{
"src": "tag:flyio-proxy",
"accept": ["tag:flyio-target:443"],
"deny": ["tag:k8s:443", "tag:homelab:443", "tag:homelab:22", "tag:nas:445", "tag:registry:443"],
},
Each service’s Tailscale Ingress must be annotated with tag:flyio-target to be reachable by the proxy — see 7. Tag the Tailscale Ingress with tag:flyio-target.
Deploy: mise run tailnet-preview then mise run tailnet-up.
After deploying, extract the auth key and set it as a Fly.io secret:
# Get the key from Pulumi state
cd pulumi/tailscale && pulumi stack output flyio_authkey --show-secrets
# Set it in Fly.io
fly secrets set TS_AUTHKEY="tskey-auth-..." -a blumeops-proxyStore the auth key in 1Password as well for the fly-setup mise task.
Step 4: Mise tasks
Three mise tasks manage the proxy lifecycle. See the actual scripts in mise-tasks/ for current implementation:
mise run fly-deploy— runsfly deployfrom thefly/directorymise run fly-setup— one-time, idempotent setup: fetches the Tailscale auth key from Pulumi state, stages it as a Fly.io secret, allocates IPs, and adds TLS certs for all public domains (currentlydocs.eblu.meandcv.eblu.me)mise run fly-shutoff— emergency shutoff: scales machines to zero, immediately stopping all public traffic
Step 5: Forgejo CI workflow
A Forgejo Actions workflow (.forgejo/workflows/deploy-fly.yaml) auto-deploys on pushes to main that touch fly/**. It installs flyctl, runs fly deploy, and verifies health. It can also be triggered manually via workflow_dispatch.
The FLY_DEPLOY_TOKEN Forgejo Actions secret must be set via the forgejo API or UI, following the pattern in the forgejo_actions_secrets Ansible role.
Per-service setup
To expose an additional service (example: wiki.eblu.me):
1. Add nginx server block
Edit fly/nginx.conf — add a new server block. The configuration
differs significantly between static and dynamic services. See the
existing docs.eblu.me and cv.eblu.me blocks in fly/nginx.conf
for the current pattern (uses set $upstream variable for deferred
DNS resolution, proxy_intercept_errors for error pages, etc.).
Static site template (simplified — adapt from existing blocks):
# --- wiki.eblu.me (static) ---
server {
listen 8080;
server_name wiki.eblu.me;
limit_req zone=general burst=20 nodelay;
error_page 502 503 504 /error.html;
location = /error.html {
root /usr/share/nginx/html;
internal;
}
location / {
set $upstream_wiki https://wiki.tail8d86e.ts.net;
proxy_pass $upstream_wiki$request_uri;
proxy_ssl_verify off;
proxy_ssl_server_name on;
proxy_intercept_errors on;
proxy_cache services;
proxy_cache_valid 200 1d;
proxy_cache_valid 404 1m;
proxy_cache_use_stale error timeout updating;
proxy_cache_lock on;
proxy_cache_key $host$uri;
proxy_ignore_headers Cache-Control Set-Cookie;
add_header X-Cache-Status $upstream_cache_status;
add_header X-Clacks-Overhead "GNU Terry Pratchett" always;
}
}Dynamic service template (e.g., Forgejo — hypothetical, not currently deployed):
# --- forge.eblu.me (dynamic, authenticated) ---
server {
listen 8080;
server_name forge.eblu.me;
# Higher rate limit — git operations, CI webhooks, and API calls
# can legitimately burst. Forgejo also has its own rate limiting,
# so this is a safety net, not the primary control.
limit_req zone=general burst=50 nodelay;
# Git LFS and repo uploads can be large
client_max_body_size 512m;
error_page 502 503 504 /error.html;
location = /error.html {
root /usr/share/nginx/html;
internal;
}
location / {
set $upstream_forge https://forge.tail8d86e.ts.net;
proxy_pass $upstream_forge$request_uri;
proxy_ssl_verify off;
proxy_ssl_server_name on;
proxy_intercept_errors on;
# NO proxy_cache — dynamic content with sessions.
# Caching would serve stale pages and break authentication.
# Pass through headers needed for proper proxying
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
# WebSocket support (Forgejo uses it for live updates)
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
# Selectively cache static assets only
location ~* \.(css|js|png|jpg|svg|woff2?)$ {
set $upstream_forge_static https://forge.tail8d86e.ts.net;
proxy_pass $upstream_forge_static$request_uri;
proxy_ssl_verify off;
proxy_ssl_server_name on;
proxy_cache services;
proxy_cache_valid 200 7d;
proxy_cache_key $host$uri;
add_header X-Cache-Status $upstream_cache_status;
add_header X-Clacks-Overhead "GNU Terry Pratchett" always;
}
}Key differences for dynamic services:
- No blanket caching — only static assets (CSS, JS, images) are cached
- Respect
Set-Cookie— do not ignore session headers - Include query strings in non-cached requests (default behavior when
proxy_cache_keyis not overridden) - Higher rate limits — legitimate usage patterns are burstier
- Proxy headers — pass
X-Real-IP,X-Forwarded-For,X-Forwarded-Protoso the backend sees the real client IP (important for Forgejo’s audit logs and its own rate limiting) - WebSocket support — many modern web apps use WebSockets
- Larger body size — git pushes and file uploads need more than the default 1MB
2. Add Fly.io certificate
fly certs add wiki.eblu.me -a blumeops-proxyOr add it to mise-tasks/fly-setup so it’s captured for future runs.
3. Deploy
mise run fly-deployOr push the fly/nginx.conf change to main — the Forgejo workflow deploys automatically.
4. Verify against fly.dev
Test the proxy before touching DNS. Use the Host header to simulate
the real domain:
# Health check
curl -sf https://blumeops-proxy.fly.dev/healthz
# Simulate real domain request
curl -I -H "Host: wiki.eblu.me" https://blumeops-proxy.fly.dev/
# Should return 200 with X-Cache-Status headerIf this fails, debug without any public DNS impact.
5. Add DNS CNAME (Pulumi)
Only after verifying the proxy works. Add to pulumi/gandi/__main__.py:
wiki_public = gandi.livedns.Record(
"wiki-public",
zone=domain,
name="wiki",
type="CNAME",
ttl=300,
values=["blumeops-proxy.fly.dev."],
)Deploy: mise run dns-preview then mise run dns-up.
6. Verify with real domain
curl -I https://wiki.eblu.me
# Should return 200 with X-Cache-Status header7. Tag the Tailscale Ingress with tag:flyio-target
The fly.io proxy can only reach endpoints tagged with tag:flyio-target. Add the annotation to the service’s Tailscale Ingress:
annotations:
tailscale.com/tags: "tag:k8s,tag:flyio-target"Include tag:k8s to preserve existing access rules for the Ingress proxy node. The tag:flyio-target tag opts this specific endpoint into being reachable by the fly.io proxy — no broad ACL changes needed.
For non-k8s services (e.g., Forgejo on indri), create a k8s ExternalName Service pointing to the host, then a Tailscale Ingress with the same annotation.
Security
DDoS and rate limiting
This approach provides basic protection, not enterprise-grade:
- Fly.io Anycast absorbs volumetric L3/L4 attacks
- nginx
limit_reqcaps per-IP request rates at the container level - nginx
proxy_cacheserves most requests from cache — only cache misses traverse the Tailscale tunnel to indri
For static sites, the cache is the primary defense. Most requests
never reach the origin. Cache-busting is mitigated by ignoring query
strings (proxy_cache_key $host$uri) and client cache-control headers.
For dynamic services, the cache covers only static assets. Most requests flow through the Tailscale tunnel to indri on every hit. This makes dynamic services significantly more vulnerable to L7 DDoS — an attacker sending high volumes of legitimate-looking requests (login pages, API endpoints, search queries) bypasses the cache entirely. Mitigations for dynamic services:
- nginx
limit_reqis the primary defense at the proxy layer — tune the rate and burst per service - The backend service’s own rate limiting (e.g., Forgejo’s built-in rate limiter) provides a second layer
- fail2ban on indri (see below) can block IPs showing abuse patterns
- The break-glass shutoff remains the last resort
If a publicly exposed dynamic service attracts targeted attacks or the home network bandwidth is impacted, consider migrating to Cloudflare Tunnel for enterprise-grade DDoS protection (requires DNS migration; see plan history in git).
fail2ban
fail2ban monitors log files for repeated failed authentication attempts (SSH brute force, bad login passwords, API abuse) and bans IPs via firewall rules.
Static sites: fail2ban does not apply. There is no login surface, no sessions, no credentials to brute force.
Dynamic services with authentication (e.g., Forgejo): fail2ban is relevant and should be configured on indri, not on Fly.io. The nginx proxy is transparent — it forwards requests but does not see authentication outcomes. fail2ban watches the service’s own logs on indri for patterns like repeated failed logins.
Setup considerations for Forgejo specifically:
- Forgejo logs failed auth attempts to its log file
- fail2ban needs a filter matching Forgejo’s log format
- Banned IPs are blocked at indri’s firewall (the Fly.io proxy IP is
the Tailscale address of the
flyio-proxynode, not the end user’s IP) - Important: for fail2ban to see real client IPs, the nginx proxy
must pass
X-Real-IP/X-Forwarded-Forheaders (included in the dynamic service nginx config above), and Forgejo must be configured to trust the proxy and log the forwarded IP rather than the proxy’s Tailscale IP - Disable open user registration before exposing Forgejo publicly — require explicit invites
Break-glass shutoff
If the proxy is causing issues, stop it immediately:
mise run fly-shutoffThis stops all machines in seconds — zero traffic reaches indri. See Emergency Shutoff for the full escalation ladder (container stop → Tailscale revoke → DNS removal).
Considerations for dynamic services
The architecture described in this guide works for both static and dynamic services, but the nginx configuration and security posture differ significantly. This section summarizes what changes when exposing a dynamic, authenticated service like forgejo.
| Concern | Static site | Dynamic service |
|---|---|---|
| Caching | Aggressive (cache everything, 1d TTL) | Static assets only, or disabled |
| Session cookies | Ignored (proxy_ignore_headers Set-Cookie) | Must be passed through |
| Query strings | Ignored in cache key | Included (default behavior) |
| Rate limiting | 10r/s is plenty | Higher burst needed; coordinate with backend rate limiter |
| Request body size | Default 1MB is fine | Increase for uploads (client_max_body_size) |
| WebSocket | Not needed | Often needed (proxy_http_version 1.1, Upgrade headers) |
| Proxy headers | Optional | Required (X-Real-IP, X-Forwarded-For, X-Forwarded-Proto) |
| fail2ban | Not applicable | Configure on indri, watching service logs |
| DDoS exposure | Low — cache absorbs most traffic | Higher — most requests hit origin |
| Pre-exposure checklist | Deploy and go | Disable open registration, audit access controls, configure fail2ban |
Checklist before exposing a dynamic service
- Disable open user registration (require invites or admin approval)
- Audit access controls and permissions
- Configure the service to log the forwarded client IP (not the proxy IP)
- Set up fail2ban on indri with a filter for the service’s log format
- Tag the service’s Tailscale Ingress with
tag:flyio-target - Test the nginx config locally or in staging before deploying
- Rehearse the break-glass shutoff (
mise run fly-shutoff)
IaC summary
| Component | Managed by | Declarative? |
|---|---|---|
| Tailscale auth key | Pulumi (pulumi/tailscale/) | yes |
| Tailscale ACLs | Pulumi (pulumi/tailscale/policy.hujson) | yes |
| DNS CNAMEs | Pulumi (pulumi/gandi/) | yes |
| Container + app config | fly/Dockerfile + fly/fly.toml in repo | yes |
| Observability | fly/alloy.river in repo | yes |
| Deployment | Forgejo CI on push to fly/, or mise run fly-deploy | yes |
| Fly.io secrets + certs | mise run fly-setup (one-time, idempotent) | semi |
The “semi” for Fly.io secrets is a one-time operation backed by a repeatable mise task. Fly.io does not have a mature Pulumi or Terraform provider, so fly.toml + flyctl is the standard IaC model for Fly.io apps.
Verification
Pre-DNS (verify against fly.dev)
Test the proxy works before creating any public DNS records:
curl -sf https://blumeops-proxy.fly.dev/healthz— returnsokcurl -I -H "Host: docs.eblu.me" https://blumeops-proxy.fly.dev/— returns 200 withX-Cache-Statusheaderfly status -a blumeops-proxy— shows healthy machine- All
*.ops.eblu.meservices still work from tailnet (unchanged) mise run services-checkpasses
If anything fails here, debug without public DNS impact.
Post-DNS (after CNAME is live)
After deploying DNS (mise run dns-up):
curl -I https://docs.eblu.me— returns 200 withX-Cache-Statusheadercurl -I https://cv.eblu.me— same for each public servicedig docs.eblu.me— resolves to Fly.io IPs (not Tailscale IP)dig forge.ops.eblu.me— still resolves to indri’s Tailscale IP (unchanged)- Second request to same URL shows
X-Cache-Status: HIT