Documentation Index
Fetch the complete documentation index at: https://docs.coreweave.com/llms.txt
Use this file to discover all available pages before exploring further.
| Chart reference | Description |
|---|---|
coreweave/tailscale-operator | CoreWeave’s Helm chart for deploying Tailscale Operator on CKS clusters |
About Tailscale
Tailscale is a convenient mesh network VPN service that powers encrypted peer-to-peer private network communication. With native support for Kubernetes and a Kubernetes Operator, Tailscale is a popular choice for securely accessing in-cluster resources and the Kubernetes API server without exposing them publicly. To function optimally in the CKS environment, CoreWeave packages a bespoke version of the tailscale-operator Helm chart, and a CoreWeave-specific container image.Usage
Tailnet configuration
Edit your Tailnet policy JSON for use with CKS. The following sections outline the recommended changes to your Tailnet configuration.Tailnet ipPool
Tailscale’s default configuration assigns an IP address from the 100.64.0.0/10 range to each device joined to a Tailnet. Because CKS operates some control-plane services in the 100.124.0.0/18 address range, a Tailnet used with CKS should allocate addresses from a smaller, non-overlapping pool.
Tailscale supports configurable IP Pools for this purpose. The largest contiguous non-overlapping address pool for use with CKS is 100.64.0.0/13.
Example policy JSON using the 100.64.0.0/13 CIDR range
tailscale-operator chart and container image provide the customizations necessary to support a non-overlapping ipPool out of the box.
Tailnet derpMap
Tailscale runs relay servers worldwide to help establish direct connections to endpoints on your Tailnet. When direct connections are impossible, the relays help to forward traffic to your endpoints.
To complement the Tailscale-hosted relays, CoreWeave hosts its own relays in select regions to provide a congestion-free, last-mile hop to your CKS workloads.
To consume CoreWeave hosted relays, you must add them to Tailnet’s configuration.
By default, the Tailscale client chooses a relay closest to connection origin, which may not always be a CoreWeave hosted relay. To ensure exclusive consumption of CoreWeave relays, enable
OmitDefaultRegions in your Tailnet configuration. Please note that this configuration may not be optimal when connecting to endpoints outside a CoreWeave Region.A Policy JSON example
A Policy JSON example
This example outlines all the recommended objects for your Tailnet’s Policy JSON.
Deploying the tailscale-operator chart
The CoreWeave Charts tailscale-operator chart is based on the upstream Tailscale chart, with optimizations that work best with CKS.
The CoreWeave tailscale-operator Helm chart includes the following:
- A default
ProxyClassapplied to all exposed services to configure proxy-specific settings - Support for CKS-specific
TS_CGNAT_OVERRIDE_RANGE, to allow cluster-local communication in the100.124.0.0/18address range - Default resource limits
- A convenient post-install hook to declaratively expose existing in-cluster services to your Tailnet
tailscale-operator can communicate with the Tailscale Control Plane. You can find detailed information about OAuth clients in Tailscale’s documentation.
Tailnet policy JSON to allow the operator
tailscale-operator chart using one of these methods:
Install with the Secret pre-created
In this method, thetailscale namespace is pre-created, and the Kubernetes Secret operator-oauth is populated with the credentials that the tailscale-operator expects and consumes.
First, create the tailscale namespace.
Install by setting the OAuth secret in Helm values
This method installs the Secrets, and creates thetailscale namespace, during the Helm chart installation.
Verify the installation
After the installation is complete, verify that thetailscale-operator is running in the tailscale namespace.

Exposing Services
To expose Kubernetes services to Tailnet, you can annotate a Kubernetes service, or configure the services in Helm values.Annotate a Kubernetes Service
To expose a service to Tailnet, annotate the service with thetailscale.com/expose: true annotation.
tailscale namespace.
<namespace>-<service-name>.<magicDNS-hostname>.
Configuring Services in Helm
To expose a service to Tailnet, modify your Helm values to include the service.- Tailscale documentation: Using the Tailscale Kubernetes Operator
- Tailscale documentation: Managing egress traffic and managing ingress traffic from your cluster with Tailscale