Tailscale #52

Closed
opened 2024-02-12 21:21:49 +00:00 by pim · 2 comments
Owner

I have come around, and maybe don't want some things to be exposed to the internet. Tailscale should be a good solution to this. Will also investigate headscale.

I have come around, and maybe don't want some things to be exposed to the internet. Tailscale should be a good solution to this. Will also investigate headscale.
Author
Owner

Tailscale itself might be able to eliminate a lot of complexity from our servers. Instead of using Nomad (which is not anymore open source software) or Docker Swarm, we can have a setup as follows: we deploy our services using Podman. For every container that needs to be exposed to the outside, we can put this container with a tailscale container inside the same pod. This means they will have the same networking namespace. Tailscale can then function as a reverse proxy. It can also use funnel to expose it to the internet if wanted. It can also do let's encrypt!!

Bascially this but with podman. Should verify this is all possible with podman.

Tailscale itself might be able to eliminate a lot of complexity from our servers. Instead of using Nomad (which is not anymore open source software) or Docker Swarm, we can have a setup as follows: we deploy our services using Podman. For every container that needs to be exposed to the outside, we can put this container with a tailscale container inside the same pod. This means they will have the same networking namespace. Tailscale can then function as a reverse proxy. It can also use funnel to expose it to the internet if wanted. It can also do let's encrypt!! Bascially [this](https://tailscale.com/kb/1282/docker) but with podman. Should verify this is all possible with podman.
Author
Owner

According to this page, we can use auth keys to automatically authenticate a k8s pod with Tailscale. An auth key generates node keys. These node keys are associated to a specific node (in this context k8s pod) and can be set to not expire. The auth key is expired after a maximum of 60 days, after which a new one has to be installed. The node keys continue to work though.

According to [this page](https://tailscale.com/kb/1185/kubernetes#setup), we can use [auth keys](https://tailscale.com/kb/1085/auth-keys) to automatically authenticate a k8s pod with Tailscale. An auth key generates node keys. These node keys are associated to a specific node (in this context k8s pod) and can be set to [not expire](https://tailscale.com/kb/1028/key-expiry#disabling-key-expiry). The auth key is expired after a maximum of 60 days, after which a new one has to be installed. The node keys continue to work though.
pim closed this issue 2024-07-21 20:10:55 +00:00
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: home/nixos-servers#52
No description provided.