Overview
Tailscale provides secure remote access for administration tasks. It’s used exclusively for SSH access to the server—not for accessing services (which go through Cloudflare Tunnel).Tailscale creates a private mesh network. No ports need to be opened, and connections are end-to-end encrypted.
Use Case
| Use | Method |
|---|---|
| Access services | Cloudflare Tunnel |
| SSH to server | Tailscale |
| Emergency access | Tailscale |
Installation on Fedora CoreOS
Tailscale is installed directly on the host (not containerized) for full network access.Ignition Configuration
Manual Setup
Terraform Configuration
Tailscale ACLs and device authorization are managed via Terraform:Authentication
Tailscale is configured to authenticate via an OAuth provider (GitHub, Google, etc.). This keeps authentication simple and separate from the Authentik setup used for services.Security Considerations
SSH Only
Tailscale is only used for SSH access. Services are accessed via Cloudflare Tunnel with proper authentication.
ACL Restricted
Tailscale ACLs limit which devices can reach which ports. Only admin-tagged devices can SSH.
Troubleshooting
Can't connect to server
Can't connect to server
Check Tailscale status on the server:Verify:
- Server is online in Tailscale admin console
- ACLs allow your device to reach the server
- SSH service is running:
systemctl status sshd
Authentication issues
Authentication issues
Re-authenticate if the session expired: