tailscale/docs/k8s
Maisem Ali 0842e2f45b ipn/store: add ability to store data as k8s secrets.
Signed-off-by: Maisem Ali <maisem@tailscale.com>
2021-09-01 12:50:59 -07:00
..
README.md ipn/store: add ability to store data as k8s secrets. 2021-09-01 12:50:59 -07:00
role.yaml ipn/store: add ability to store data as k8s secrets. 2021-09-01 12:50:59 -07:00
rolebinding.yaml ipn/store: add ability to store data as k8s secrets. 2021-09-01 12:50:59 -07:00
sa.yaml ipn/store: add ability to store data as k8s secrets. 2021-09-01 12:50:59 -07:00

README.md

Using Kubernetes Secrets as the state store for Tailscale

Tailscale supports using Kubernetes Secrets as the state store, however there is some configuration required in order for it to work.

Note: this only works if tailscaled runs inside a pod in the cluster.

  1. Create a service account for Tailscale (optional)

    kubectl create -f sa.yaml
    
  2. Create role and role bindings for the service account

    kubectl create -f role.yaml
    kubectl create -f rolebinding.yaml
    
  3. Launch tailscaled with a Kubernetes Secret as the state store.

    tailscaled --state=kube:tailscale