1.8 KiB
1.8 KiB
Simple Tailscale Setup
What you need:
- A Tailscale account (free at https://tailscale.com)
- An auth key from your Tailscale admin console
3-Step Setup:
Step 1: Get your auth key
- Go to https://login.tailscale.com/admin/settings/keys
- Click "Generate auth key"
- Make it Reusable and set expiration to 90 days (or longer)
- Copy the key (starts with
tskey-auth-)
Step 2: Store the key securely
make create-vault
When prompted, add this content:
---
vault_tailscale_auth_key: "tskey-auth-your-actual-key-here"
Save and exit.
Step 3: Install Tailscale everywhere
# Check what will happen (dry run)
make tailscale-check
# Install on all machines
make tailscale
That's it! Your machines should now be connected to your Tailscale network.
Check if it worked:
make tailscale-status
How the vault connects to your settings:
The group_vars/all.yml file now contains:
tailscale_auth_key: "{{ vault_tailscale_auth_key | default('') }}"
This tells Ansible: "Look for vault_tailscale_auth_key in the encrypted vault file, and if it's not there, use an empty string."
So when you put your real auth key in the vault, it automatically gets used!
The confusing variables explained:
tailscale_auth_key: YOU NEED THIS - your authentication keytailscale_ssh: USEFUL - lets you SSH through Tailscale networktailscale_accept_routes: USEFUL - access other networks through Tailscaletailscale_hostname: OPTIONAL - custom name (defaults to your server names)tailscale_advertise_routes: ADVANCED - share your local network with otherstailscale_shields_up: SECURITY - blocks incoming connections- Everything else: IGNORE unless you have specific enterprise needs