mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-26 11:35:35 +00:00
0842e2f45b
Signed-off-by: Maisem Ali <maisem@tailscale.com> |
||
---|---|---|
.. | ||
README.md | ||
role.yaml | ||
rolebinding.yaml | ||
sa.yaml |
Using Kubernetes Secrets as the state store for Tailscale
Tailscale supports using Kubernetes Secrets as the state store, however there is some configuration required in order for it to work.
Note: this only works if tailscaled
runs inside a pod in the cluster.
-
Create a service account for Tailscale (optional)
kubectl create -f sa.yaml
-
Create role and role bindings for the service account
kubectl create -f role.yaml kubectl create -f rolebinding.yaml
-
Launch
tailscaled
with a Kubernetes Secret as the state store.tailscaled --state=kube:tailscale