Skip to content

Commit

Permalink
Update monitor-alert.mdx
Browse files Browse the repository at this point in the history
  • Loading branch information
rekuenkdr authored Jun 7, 2024
1 parent 1c4535d commit 02e4ca2
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions docs/stake-pool-guides/monitor-alert.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -64,12 +64,12 @@ Failure to disable key expiry will knock your pool offline when they expire afte
:::

Once the machines are added you should disable key expiry on each machine or the keys used to connect to the VPN will expire after 90 days and those
nodes will be unable to connect. You can do this on the [Tailscale](tailscale.com) website by clicking the ... for each machine and choosing 'Disable key expiry'.
nodes will be unable to connect. You can do this on the [Tailscale](https://tailscale.com) website by clicking the ... for each machine and choosing 'Disable key expiry'.
You can always generate new keys at any time if you wish. If you do get locked out you can toggle the expiry on the website and restart the server to get back into it.

### Access Control layer

Click the 'Access controls' tab on the [Tailscale](tailscale.com) website. By default there is a rule to allow all traffic on all ports between the machines in the tailnet.
Click the 'Access controls' tab on the [Tailscale](https://tailscale.com) website. By default there is a rule to allow all traffic on all ports between the machines in the tailnet.
This is fine to get started but know you have the ability to group machines and only allow certain ports to communicate through the VPN to machines in that group.
For example I have a mainnet and a testnet group and only allow the ports needed for those machines.

Expand Down

0 comments on commit 02e4ca2

Please sign in to comment.