Skip to content

Latest commit

 

History

History
19 lines (13 loc) · 1.4 KB

README.md

File metadata and controls

19 lines (13 loc) · 1.4 KB

TailScale sidecar POC

Setup using kind because its so easy:

  1. Install TailScale
  2. Create the cluster with kind create cluster
  3. Install sealed-secrets/kubeseal on the cluster with kubectl apply -f https://github.com/bitnami-labs/sealed-secrets/releases/download/v0.15.0/controller.yaml
  4. Get a reusable token from your Tailscale Admin Console and save it to tailscalekey.unsealed (needs to be that name for the deployment)
  5. Create a sealed secret called tailscalekey with kubectl apply -f <(kubectl create secret generic tailscalekey --dry-run=client --from-file=tailscalekey.unsealed -o yaml | kubeseal -o yaml)
  6. Deploy! kubectl apply -f deployments/tailscale-deployment.yaml

What you should have at this point is a deployment with one pod having 2 containers, one being the hashicorp/http-echo container set to respond on port 5678

  1. Go back to your Tailscale Admin Console machines list and find the new machine that the tailscale container registered using your key from the sealed secret.
  2. curl http://👆<IP>:5678

If you see "Tailscale FTW!" then you win

Dockerfile and entrypoint script for the tailscale image are included for anyone to modify.