Skip to main content

Tailscale Operator

Run the Tailscale operator on CKS

Chart referenceDescription
coreweave/tailscale-operatorCoreWeave's Helm chart for deploying Tailscale Operator on CKS clusters

About Tailscale

Tailscale is a convenient mesh network VPN service that powers encrypted peer-to-peer private network communication. With native support for Kubernetes and a Kubernetes Operator, Tailscale is a popular choice for securely accessing in-cluster resources and the Kubernetes API server without exposing them publicly.

To function optimally in the CKS environment, CoreWeave packages a bespoke version of the tailscale-operator Helm chart, and a CoreWeave-specific container image.

Usage

Tailnet configuration

Edit your Tailnet policy JSON for use with CKS. The following sections outline the recommended changes to your Tailnet configuration.

Tailnet ipPool

Tailscale's default configuration assigns an IP address from the 100.64.0.0/10 range to each device joined to a Tailnet. Because CKS operates some control-plane services in the 100.124.0.0/18 address range, a Tailnet used with CKS should allocate addresses from a smaller, non-overlapping pool.

Tailscale supports configurable IP Pools for this purpose. The largest contiguous non-overlapping address pool for use with CKS is 100.64.0.0/13.

Example policy JSON using the 100.64.0.0/13 CIDR range
{
"nodeAttrs": [
{
"ipPool": ["100.64.0.0/13"],
},
],
}

CoreWeave's tailscale-operator chart and container image provide the customizations necessary to support a non-overlapping ipPool out of the box.

Tailnet derpMap

Tailscale runs relay servers worldwide to help establish direct connections to endpoints on your Tailnet. When direct connections are impossible, the relays help to forward traffic to your endpoints.

To complement the Tailscale-hosted relays, CoreWeave hosts its own relays in select regions to provide a congestion-free, last-mile hop to your CKS workloads.

To consume CoreWeave hosted relays, you must add them to Tailnet's configuration.

Note

By default, the Tailscale client chooses a relay closest to connection origin, which may not always be a CoreWeave hosted relay. To ensure exclusive consumption of CoreWeave relays, enable OmitDefaultRegions in your Tailnet configuration. Please note that this configuration may not be optimal when connecting to endpoints outside a CoreWeave Region.

A Policy JSON example

This example outlines all the recommended objects for your Tailnet's Policy JSON.

Example
{
// Included in the default Tailscale Policy file
"acls": [
{"action": "accept", "src": ["*"], "dst": ["*:*"]},
],
"ssh": [
{
"action": "check",
"src": ["autogroup:member"],
"dst": ["autogroup:self"],
"users": ["autogroup:nonroot", "root"],
},
],
// nodeAttrs for tailnet ipPool
"nodeAttrs": [
{
"ipPool": ["100.64.0.0/13"],
},
],
// derpMap for Tailscale relays on CoreWeave
"derpMap": {
// Disable default Tailscale relays
"OmitDefaultRegions": true,
"Regions": {
// To find a up to date, complete list of CoreWeave relays
// https://raw.githubusercontent.com/coreweave/tailscale-derp/main/derpmap/derpmap.json
"904": {
"RegionID": 904,
"RegionCode": "us-east-04",
"RegionName": "US-EAST-04",
"Nodes": [
{
"Name": "904a",
"RegionID": 904,
"HostName": "derp.us-east-04.coreweave.com",
},
],
},
},
},
// For the tailscale-operator to use its OAuth token for adding tailscale Nodes to the tailnet
"tagOwners": {
"tag:k8s-operator": [],
"tag:k8s": ["tag:k8s-operator"],
},
}

Deploying the tailscale-operator chart

The CoreWeave Charts tailscale-operator chart is based on the upstream Tailscale chart, with optimizations that work best with CKS.

The CoreWeave tailscale-operator Helm chart includes the following:

  • A default ProxyClass applied to all exposed services to configure proxy-specific settings
  • Support for CKS-specific TS_CGNAT_OVERRIDE_RANGE, to allow cluster-local communication in the 100.124.0.0/18 address range
  • Default resource limits
  • A convenient post-install hook to declaratively expose existing in-cluster services to your Tailnet

To install the Helm chart, first provide an OAuth client and modify your Tailnet policy file so the tailscale-operator can communicate with the Tailscale Control Plane. You can find detailed information about OAuth clients in Tailscale's documentation.

Tailnet policy JSON to allow the operator
"tagOwners": {
"tag:k8s-operator": [],
"tag:k8s": ["tag:k8s-operator"],
}

Install the tailscale-operator chart using one of these methods:

Install with the Secret pre-created

In this method, the tailscale namespace is pre-created, and the Kubernetes Secret operator-oauth is populated with the credentials that the tailscale-operator expects and consumes.

First, create the tailscale namespace.

Example
$
kubectl create namespace tailscale

Next, create a Secret from the OAuth secret generated in the admin console.

Example
$
kubectl create secret generic operator-oauth \
--namespace tailscale \
--from-literal=client_id=<YOUR_CLIENT_ID> \
--from-literal=client_secret=<YOUR_CLIENT_SECRET>

After adding the secret to the namespace, install the Helm chart.

Example
$
helm upgrade --install tailscale-operator \
--namespace tailscale coreweave/tailscale-operator

Install by setting the OAuth secret in Helm values

This method installs the Secrets, and creates the tailscale namespace, during the Helm chart installation.

Example
$
helm upgrade --install \
--create-namespace tailscale-operator \
--namespace tailscale \
--set tailscale-operator.oauth.clientId=[Insert Client ID] \
--set tailscale-operator.oauth.clientSecret=[Insert Client Secret] \
coreweave/tailscale-operator

Verify the installation

After the installation is complete, verify that the tailscale-operator is running in the tailscale namespace.

Example
$
kubectl get pods -n tailscale

Output:

Example
NAME READY STATUS RESTARTS AGE
operator-54f98f5c6f-jwjmr 1/1 Running 0 9m18s

Check the Tailscale admin console to see the connected clients.

Exposing Services

To expose Kubernetes services to Tailnet, you can annotate a Kubernetes service, or configure the services in Helm values.

Annotate a Kubernetes Service

To expose a service to Tailnet, annotate the service with the tailscale.com/expose: true annotation.

Example
$
kubectl annotate service kubernetes tailscale.com/expose="true" -n default

After the service is exposed, a new Pod is created in the tailscale namespace.

Example
$
kubectl get pods -n tailscale

Output, with the newly created Pod highlighted:

Example
NAME READY STATUS RESTARTS AGE
operator-54f98f5c6f-jwjmr 1/1 Running 6 (55m ago) 59m
ts-kubernetes-6f9dq-0 1/1 Running 0 8m7s

You can access the service through the Tailscale IP address or MagicDNS hostname. By default, MagicDNS names are formatted as <namespace>-<service-name>.<magicDNS-hostname>.

Configuring Services in Helm

To expose a service to Tailnet, modify your Helm values to include the service.

Example
$
helm upgrade -i tailscale-operator -n tailscale coreweave/tailscale-operator \
--set exposedServices.[0].name=kubernetes \
--set exposedServices.[0].namespace=default

This leverages a Helm post-install/upgrade hook during upgrade or installation.

For additional information on Tailscale usage, see: