mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-26 11:35:35 +00:00
21 lines
629 B
Markdown
21 lines
629 B
Markdown
|
# Using Kubernetes Secrets as the state store for Tailscale
|
||
|
Tailscale supports using Kubernetes Secrets as the state store, however there is some configuration required in order for it to work.
|
||
|
|
||
|
**Note: this only works if `tailscaled` runs inside a pod in the cluster.**
|
||
|
|
||
|
1. Create a service account for Tailscale (optional)
|
||
|
```
|
||
|
kubectl create -f sa.yaml
|
||
|
```
|
||
|
|
||
|
1. Create role and role bindings for the service account
|
||
|
```
|
||
|
kubectl create -f role.yaml
|
||
|
kubectl create -f rolebinding.yaml
|
||
|
```
|
||
|
|
||
|
1. Launch `tailscaled` with a Kubernetes Secret as the state store.
|
||
|
```
|
||
|
tailscaled --state=kube:tailscale
|
||
|
```
|