Tailscale — Full Remote Access via VPN
Tailscale creates a private mesh VPN between your machines using WireGuard under the hood. Every device gets a stable 100.x.x.x IP that works from any network.
How It Works
Your Laptop (any WiFi)
100.x.x.10
│
│ WireGuard encrypted tunnel
│ (peer-to-peer when possible, relayed otherwise)
│
▼
MAAS Controller
100.x.x.1 ←──── stable Tailscale IP
10.0.0.1 ←──── local cluster IP
│
▼
All cluster services become reachable via 100.x.x.1
No port forwarding. No public IP. Works through NAT and firewalls.
Step 1 — Create a Tailscale Account
Go to tailscale.com and sign up (free, up to 100 devices).
Step 2 — Install Tailscale on the MAAS Controller
ssh ubuntu@10.0.0.1 # or however you access your controller
curl -fsSL https://tailscale.com/install.sh | sh
sudo tailscale up
A URL will appear — open it in your browser and authenticate with your Tailscale account.
After auth, note the Tailscale IP assigned to the controller:
tailscale ip -4
# Example: 100.72.14.33
Step 3 — Install Tailscale on Your Remote Machine
Linux:
curl -fsSL https://tailscale.com/install.sh | sh
sudo tailscale up
macOS:
Download from tailscale.com/download or:
brew install tailscale
Windows / iOS / Android:
Available in respective app stores.
Step 4 — Verify the Connection
From your remote machine:
ping 100.72.14.33 # use your controller's actual Tailscale IP
Then test cluster access:
# MAAS UI
curl -s -o /dev/null -w "%{http_code}" http://100.72.14.33:5240/MAAS
# → 200
# SSH into a node (through controller as jump host)
ssh -J ubuntu@100.72.14.33 ubuntu@10.0.0.2
# kubectl (copy kubeconfig first)
kubectl get nodes
Step 5 — Configure kubectl for Remote Use
Copy kubeconfig from the control plane through the Tailscale tunnel:
scp -J ubuntu@100.72.14.33 ubuntu@10.0.0.2:/etc/rancher/k3s/k3s.yaml ~/.kube/config
Edit ~/.kube/config — replace the server address:
# Before:
server: https://127.0.0.1:6443
# After:
server: https://10.0.0.2:6443
Then add a route so your machine knows to reach 10.0.0.x through Tailscale:
# On the MAAS controller — advertise the cluster subnet
sudo tailscale up --advertise-routes=10.0.0.0/24
# In the Tailscale admin console → approve the route for this device
After route approval, from your remote machine:
kubectl get nodes
# All 3 nodes visible — no VPN client config needed beyond tailscale up
Services Accessible via Tailscale
Replace 100.72.14.33 with your actual controller Tailscale IP:
| Service | URL |
|---|---|
| MAAS UI | http://100.72.14.33:5240/MAAS |
| Homer Dashboard | http://100.72.14.33:7902 |
| Grafana | http://100.72.14.33:3000 |
| ArgoCD | http://100.72.14.33:8080 |
| SSH (controller) | ssh ubuntu@100.72.14.33 |
| SSH (nodes via jump) | ssh -J ubuntu@100.72.14.33 ubuntu@10.0.0.2 |
| kubectl | works after subnet route approval |
Tailscale Admin Console
Manage all your devices and routes at login.tailscale.com/admin:
✔ See all connected devices
✔ Approve subnet routes (10.0.0.0/24)
✔ Set ACLs (restrict which device can reach what)
✔ View last seen / connection status
Done When
✔ tailscale ip -4 returns a 100.x.x.x address on the controller
✔ ping from remote machine to Tailscale IP works
✔ MAAS UI opens in browser from remote machine
✔ kubectl get nodes works remotely