Skip to main content

Tailscale — Full Remote Access via VPN

Tailscale creates a private mesh VPN between your machines using WireGuard under the hood. Every device gets a stable 100.x.x.x IP that works from any network.


How It Works

Your Laptop (any WiFi)
100.x.x.10

│ WireGuard encrypted tunnel
│ (peer-to-peer when possible, relayed otherwise)


MAAS Controller
100.x.x.1 ←──── stable Tailscale IP
10.0.0.1 ←──── local cluster IP


All cluster services become reachable via 100.x.x.1

No port forwarding. No public IP. Works through NAT and firewalls.


Step 1 — Create a Tailscale Account

Go to tailscale.com and sign up (free, up to 100 devices).


Step 2 — Install Tailscale on the MAAS Controller

ssh ubuntu@10.0.0.1 # or however you access your controller

curl -fsSL https://tailscale.com/install.sh | sh

sudo tailscale up

A URL will appear — open it in your browser and authenticate with your Tailscale account.

After auth, note the Tailscale IP assigned to the controller:

tailscale ip -4
# Example: 100.72.14.33

Step 3 — Install Tailscale on Your Remote Machine

Linux:

curl -fsSL https://tailscale.com/install.sh | sh
sudo tailscale up

macOS:

Download from tailscale.com/download or:

brew install tailscale

Windows / iOS / Android:

Available in respective app stores.


Step 4 — Verify the Connection

From your remote machine:

ping 100.72.14.33 # use your controller's actual Tailscale IP

Then test cluster access:

# MAAS UI
curl -s -o /dev/null -w "%{http_code}" http://100.72.14.33:5240/MAAS
# → 200

# SSH into a node (through controller as jump host)
ssh -J ubuntu@100.72.14.33 ubuntu@10.0.0.2

# kubectl (copy kubeconfig first)
kubectl get nodes

Step 5 — Configure kubectl for Remote Use

Copy kubeconfig from the control plane through the Tailscale tunnel:

scp -J ubuntu@100.72.14.33 ubuntu@10.0.0.2:/etc/rancher/k3s/k3s.yaml ~/.kube/config

Edit ~/.kube/config — replace the server address:

# Before:
server: https://127.0.0.1:6443

# After:
server: https://10.0.0.2:6443

Then add a route so your machine knows to reach 10.0.0.x through Tailscale:

# On the MAAS controller — advertise the cluster subnet
sudo tailscale up --advertise-routes=10.0.0.0/24

# In the Tailscale admin console → approve the route for this device

After route approval, from your remote machine:

kubectl get nodes
# All 3 nodes visible — no VPN client config needed beyond tailscale up

Services Accessible via Tailscale

Replace 100.72.14.33 with your actual controller Tailscale IP:

ServiceURL
MAAS UIhttp://100.72.14.33:5240/MAAS
Homer Dashboardhttp://100.72.14.33:7902
Grafanahttp://100.72.14.33:3000
ArgoCDhttp://100.72.14.33:8080
SSH (controller)ssh ubuntu@100.72.14.33
SSH (nodes via jump)ssh -J ubuntu@100.72.14.33 ubuntu@10.0.0.2
kubectlworks after subnet route approval

Tailscale Admin Console

Manage all your devices and routes at login.tailscale.com/admin:

✔ See all connected devices
✔ Approve subnet routes (10.0.0.0/24)
✔ Set ACLs (restrict which device can reach what)
✔ View last seen / connection status

Done When

✔ tailscale ip -4 returns a 100.x.x.x address on the controller
✔ ping from remote machine to Tailscale IP works
✔ MAAS UI opens in browser from remote machine
✔ kubectl get nodes works remotely