Skip to main content

Remote Access — Overview

Access your entire infrastructure from any machine connected to WiFi — no need to be on the same network as the MAAS controller.


The Problem

All your services live on a private network (10.0.0.x):

MAAS UI → http://10.0.0.1:5240/MAAS
Grafana → http://10.0.0.x:3000
ArgoCD → http://10.0.0.x:8080
kubectl → https://10.0.0.2:6443
SSH → ubuntu@10.0.0.x

None of these are reachable from outside the local network. Without being physically connected to the MAAS switch, you are locked out.


Solution Architecture

Two layers work together:

Remote Machine (any WiFi)

│ Layer 1 — Secure Tunnel
│ (Tailscale VPN OR Cloudflare Tunnel)


MAAS Controller (10.0.0.1)

│ Layer 2 — Web Dashboard
│ Homer (running in k3s)


┌──────────────────────────────────┐
│ Mini Cloud Platform Dashboard │
│ MAAS · Grafana · ArgoCD · ... │
└──────────────────────────────────┘

Options Comparison

TailscaleCloudflare Tunnel
Remote access methodVPN meshBrowser URL
Client requiredYes (Tailscale app)No — any browser
kubectl / SSH worksYes (full network)No (HTTP only)
Needs domain nameNoYes
Needs public IPNoNo
Traffic routePeer-to-peerVia Cloudflare
Setup difficultyVery easyEasy
CostFree (up to 100 devices)Free
Best forFull dev workflowSharing UI with others

What You Will Have After Both

From any device, anywhere:

Option A (Tailscale):
http://100.x.x.x:7902 → Homer dashboard
http://100.x.x.x:5240/MAAS → MAAS UI
kubectl get nodes → works
ssh ubuntu@100.x.x.x → works

Option B (Cloudflare):
https://dashboard.yourdomain.com → Homer dashboard
https://maas.yourdomain.com → MAAS UI
https://grafana.yourdomain.com → Grafana
https://argocd.yourdomain.com → ArgoCD

Run both in parallel:

Tailscale → your personal full-access dev workflow
Cloudflare → share specific UIs with teammates or access from locked-down devices