Can't get TN Connect to work - connection error

No matter how hard I try I can not get TrueNAS Connect to work.

I have a bog standard install of 25.10.1

When if open the TruneNAS UI through a local domain name and start the registration process it fails with the below error.

The TrueNAS UI is available on to IP’s both on port 443.

pfSense resolves to 192.168.10.98

The other IP is 192.168.40.98

If I let TN Connect try long enough it will eventually connect.

The only thing that works is the above stats, no other features work.

Can’t add and enclosure:

Can’t access the inventory:

Can’t access the applications:

Keyring is saying that the TrueNAS box is offline:

Any help will be much appreciated. I have never been able to get this to work.

1 Like

TN Connect worked for several weeks without issue for me and for the last two weeks I have experienced this same issue. I may have moved to 25.10.1 at the same time, I do not recall. @HoneyBadger there is not a lot of debug information to gather, but this was working for me and now it is experiencing the issues above. ^

1 Like

I am experiencing exactly the same issue. Reported it in jira on 21 dec (TNCS-56). Got a reply today that they’re looking at it. Helpdesk refer to “get access to server in your browser”, but it already has (in another tab)

1 Like

Same here. The Jira I’ve been to doesn’t have A TrueNAS Connect section. Not sure if it’s separate or private for some reason.

EDIT: OK so in my case it likely actually works. I just wasn’t initially aware that Connect does not use a tunnel or anything and relies on local access. I was trying to access a machine over tailscale and I imagine that the registration process captures the IP assigned on the interface of its default gateway. Even if it tries to connect using all IPs the system had at time of registration, I use one-to-one NAT on OPNsense at the site as part of subnet routing so the NAS itself has no tailnet IP.

So for me the Connect dash likely was just trying to use the local IP (which funny enough is a different NAS at this site) and failing.

Would be cool if eventually we could manually specify IPs/addresses to try and hit the system on, where if one fails it tries the next.

1 Like

On the Jira dashboard. Click on the Blue Box icon on the upper left and then you should see two choices in Spaces, TrueCommand & TrueNAS.

I’m aware of this, but this is in regards to TrueNAS Connect, which based on what Gamy4 said has an issue prefix of TNCS, whereas the TrueNAS project is NAS and TrueCommand is TC, so even if we ignore the obvious name differences, it’s neither of those because of the differing prefix.

Yes, there is no public Jira for TrueNAS Connect, requests and bug reports can be made from within the UI.

Manual IP/address management is planned for the future, right now we default to pulling all IPs on all interfaces, but this can be disabled manually from the shell (midclt call tn_connect.update ‘{“use_all_interfaces”: false, “ips”: [“IP”], “interfaces”: [“eno1”]}’, where “ips” or “interfaces” could be manually supplied (choose one or the other). Note that the Tailscale interface is not selected by default, but its IP can be provided manually. We do consider Tailscale usage (or another VPN) as an important part of usability for TrueNAS Connect and want to make configuration as smooth as possible. Thank you for your patience!

2 Likes

Did this get resolved?

Could you post a ticket via the TrueNAS Connect UI?

Initially I was NOT even getting that far, rather I would sit indefinitely at “Hang Tight”, therefore I filed a Bug Report: Although that “Malformed” URL which was affecting Connect’s Heartbeat has since been “Fixed”, what got me past my “Hang Tight” Block was to resolve a DNS reBinding Issue and for that my Solution was “White Listing” truenas.direct

Although TP-Link’s OEM Firmware was NOT affected, here are the Settings I used for pfSense, OPNsense (ZimaBoard) and OpenWRT (TP-Link Archer C7 V2):

pfSense CE 2.8.1

Services → DNS Resolver → General DNS Resolver Options → Custom options

server:
private-domain: “truenas.direct

OPNsense 26.1.2_5

Service → Unbound DNS → Advanced → Private Domains

truenas.direct

OpenWrt 24.10.5

Network → DHCP and DNS → Filter → Domain whitelist

truenas.direct

OpenWrt 25.12.0-rc5

Network → DNS → Filter → Domain whitelist

truenas.direct

More recently Dashlane’s AI has begun flagging those “Long” Distinguished Names generated within that same truenas.direct domain as “Possible” Phishing Attempts and for that I have to have Dashlane “Trust” That Website!

1 Like

I just figured this out as well.

Came here to post but I was late to the party.

In pfSense you have to add private-domain: “truenas.direct” to the Custom options in the DNS resolver.

interface-automatic: yes
server:
private-domain:  "truenas.direct"

I have. Thanks.

If our documentation wasn’t clear, please provide feedback in the docs. Our goal is to not waste people’s time.