2023-01-27 21:37:20 +00:00
|
|
|
# Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
# SPDX-License-Identifier: BSD-3-Clause
|
2021-10-12 21:24:07 +00:00
|
|
|
apiVersion: v1
|
|
|
|
kind: Pod
|
|
|
|
metadata:
|
|
|
|
name: proxy
|
|
|
|
spec:
|
|
|
|
serviceAccountName: "{{SA_NAME}}"
|
|
|
|
initContainers:
|
|
|
|
# In order to run as a proxy we need to enable IP Forwarding inside
|
2022-10-01 18:24:07 +00:00
|
|
|
# the container. The `net.ipv4.ip_forward` sysctl is not allowlisted
|
2021-10-12 21:24:07 +00:00
|
|
|
# in Kubelet by default.
|
|
|
|
- name: sysctler
|
2023-10-17 00:25:00 +00:00
|
|
|
image: "ghcr.io/tailscale/tailscale:latest"
|
2021-10-12 21:24:07 +00:00
|
|
|
securityContext:
|
|
|
|
privileged: true
|
|
|
|
command: ["/bin/sh"]
|
|
|
|
args:
|
|
|
|
- -c
|
2022-10-01 18:24:07 +00:00
|
|
|
- sysctl -w net.ipv4.ip_forward=1 net.ipv6.conf.all.forwarding=1
|
2021-10-12 21:24:07 +00:00
|
|
|
resources:
|
|
|
|
requests:
|
|
|
|
cpu: 1m
|
|
|
|
memory: 1Mi
|
|
|
|
containers:
|
|
|
|
- name: tailscale
|
|
|
|
imagePullPolicy: Always
|
2022-06-06 19:43:23 +00:00
|
|
|
image: "ghcr.io/tailscale/tailscale:latest"
|
2021-10-12 21:24:07 +00:00
|
|
|
env:
|
|
|
|
# Store the state in a k8s secret
|
2022-06-06 19:43:23 +00:00
|
|
|
- name: TS_KUBE_SECRET
|
|
|
|
value: "{{TS_KUBE_SECRET}}"
|
|
|
|
- name: TS_USERSPACE
|
2021-10-12 21:24:07 +00:00
|
|
|
value: "false"
|
2024-03-04 14:59:51 +00:00
|
|
|
- name: TS_DEBUG_FIREWALL_MODE
|
|
|
|
value: auto
|
2023-01-27 23:05:03 +00:00
|
|
|
- name: TS_AUTHKEY
|
2021-10-12 21:24:07 +00:00
|
|
|
valueFrom:
|
|
|
|
secretKeyRef:
|
|
|
|
name: tailscale-auth
|
2023-01-27 23:05:03 +00:00
|
|
|
key: TS_AUTHKEY
|
2021-10-12 21:24:07 +00:00
|
|
|
optional: true
|
2022-06-06 19:43:23 +00:00
|
|
|
- name: TS_DEST_IP
|
|
|
|
value: "{{TS_DEST_IP}}"
|
2022-10-25 20:12:54 +00:00
|
|
|
- name: TS_AUTH_ONCE
|
|
|
|
value: "true"
|
2021-10-12 21:24:07 +00:00
|
|
|
securityContext:
|
|
|
|
capabilities:
|
|
|
|
add:
|
|
|
|
- NET_ADMIN
|