Skip to content
/ tspoc Public
forked from zerbitx/tspoc

Playing with tailscale in k8s

Notifications You must be signed in to change notification settings

jrsdav/tspoc

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

TailScale sidecar POC

Setup using kind because its so easy:

  1. Install TailScale
  2. Create the cluster with kind create cluster
  3. Install sealed-secrets/kubeseal on the cluster with kubectl apply -f https://github.com/bitnami-labs/sealed-secrets/releases/download/v0.15.0/controller.yaml
  4. Get a reusable token from your Tailscale Admin Console and save it to tailscalekey.unsealed (needs to be that name for the deployment)
  5. Create a sealed secret called tailscalekey with kubectl apply -f <(kubectl create secret generic tailscalekey --dry-run=client --from-file=tailscalekey.unsealed -o yaml | kubeseal -o yaml)
  6. Deploy! kubectl apply -f deployments/tailscale-deployment.yaml

What you should have at this point is a deployment with one pod having 2 containers, one being the hashicorp/http-echo container set to respond on port 5678

  1. Go back to your Tailscale Admin Console machines list and find the new machine that the tailscale container registered using your key from the sealed secret.
  2. curl http://👆<IP>:5678

If you see "Tailscale FTW!" then you win

Dockerfile and entrypoint script for the tailscale image are included for anyone to modify.

About

Playing with tailscale in k8s

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Dockerfile 71.5%
  • Shell 28.5%