Tailscale #52
Labels
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: home/nixos-servers#52
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
I have come around, and maybe don't want some things to be exposed to the internet. Tailscale should be a good solution to this. Will also investigate headscale.
Tailscale itself might be able to eliminate a lot of complexity from our servers. Instead of using Nomad (which is not anymore open source software) or Docker Swarm, we can have a setup as follows: we deploy our services using Podman. For every container that needs to be exposed to the outside, we can put this container with a tailscale container inside the same pod. This means they will have the same networking namespace. Tailscale can then function as a reverse proxy. It can also use funnel to expose it to the internet if wanted. It can also do let's encrypt!!
Bascially this but with podman. Should verify this is all possible with podman.
According to this page, we can use auth keys to automatically authenticate a k8s pod with Tailscale. An auth key generates node keys. These node keys are associated to a specific node (in this context k8s pod) and can be set to not expire. The auth key is expired after a maximum of 60 days, after which a new one has to be installed. The node keys continue to work though.