Skip to content

zerbitx/tspoc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

TailScale sidecar POC

Setup using kind because its so easy:

  1. Install TailScale
  2. Create the cluster with kind create cluster
  3. Install sealed-secrets/kubeseal on the cluster with kubectl apply -f https://github.com/bitnami-labs/sealed-secrets/releases/download/v0.15.0/controller.yaml. (kubeseal must also be installed on your local machine to create the secret in a later step, do so with brew install kubeseal).
  4. Get a reusable token from your Tailscale Admin Console and save it to tailscalekey.unsealed (needs to be that name for the deployment)
  5. Create a sealed secret called tailscalekey with kubectl apply -f <(kubectl create secret generic tailscalekey --dry-run=client --from-file=tailscalekey.unsealed -o yaml | kubeseal -o yaml)
  6. Deploy! kubectl apply -f deployments/tailscale-deployment.yaml

What you should have at this point is a deployment with one pod having 2 containers, one being the hashicorp/http-echo container set to respond on port 5678

  1. Go back to your Tailscale Admin Console machines list and find the new machine that the tailscale container registered using your key from the sealed secret.
  2. curl http://👆<IP>:5678

If you see "Tailscale FTW!" then you win

Dockerfile and entrypoint script for the tailscale image are included for anyone to modify.

About

Playing with tailscale in k8s

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published