Updated tailscale proxies
Signed-off-by: Marcus Noble <github@marcusnoble.co.uk>
This commit is contained in:
@@ -25,6 +25,49 @@ data:
|
||||
"loki-distributed.proxy-civo.svc:80": "loki-loki.cluster.local"
|
||||
}
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: tailscale-internal-proxy
|
||||
namespace: proxy-civo
|
||||
type: Opaque
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: tailscale-internal-proxy
|
||||
labels:
|
||||
app.kubernetes.io/name: tailscale
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: tailscale-internal-proxy
|
||||
labels:
|
||||
app.kubernetes.io/name: tailscale
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: "tailscale-internal-proxy"
|
||||
roleRef:
|
||||
kind: Role
|
||||
name: tailscale-internal-proxy
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
name: tailscale-internal-proxy
|
||||
labels:
|
||||
app.kubernetes.io/name: tailscale
|
||||
rules:
|
||||
- apiGroups: [""]
|
||||
resources: ["secrets"]
|
||||
verbs: ["create"]
|
||||
- apiGroups: [""]
|
||||
resourceNames: ["tailscale-internal-proxy"]
|
||||
resources: ["secrets"]
|
||||
verbs: ["get", "update"]
|
||||
---
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
@@ -36,6 +79,8 @@ metadata:
|
||||
configmap.reloader.stakater.com/reload: "host-mappings"
|
||||
spec:
|
||||
replicas: 1
|
||||
strategy:
|
||||
type: Recreate
|
||||
selector:
|
||||
matchLabels:
|
||||
app: internal-proxy
|
||||
@@ -44,7 +89,8 @@ spec:
|
||||
labels:
|
||||
app: internal-proxy
|
||||
spec:
|
||||
dnsPolicy: None
|
||||
serviceAccountName: tailscale-internal-proxy
|
||||
dnsPolicy: ClusterFirst
|
||||
dnsConfig:
|
||||
nameservers:
|
||||
- 100.100.100.100
|
||||
@@ -64,14 +110,21 @@ spec:
|
||||
- name: host-mappings
|
||||
mountPath: /config/
|
||||
- name: tailscale
|
||||
image: ghcr.io/tailscale/tailscale:v1.22
|
||||
image: ghcr.io/tailscale/tailscale:v1.29
|
||||
imagePullPolicy: Always
|
||||
tty: true
|
||||
env:
|
||||
- name: AUTH_KEY
|
||||
- name: TS_AUTH_KEY
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: tailscale-auth
|
||||
key: password
|
||||
- name: TS_KUBE_SECRET
|
||||
value: tailscale-internal-proxy
|
||||
- name: TS_ACCEPT_DNS
|
||||
value: "true"
|
||||
- name: TS_EXTRA_ARGS
|
||||
value: "--hostname=proxy-civo-internal-proxy"
|
||||
securityContext:
|
||||
capabilities:
|
||||
add:
|
||||
@@ -84,13 +137,14 @@ spec:
|
||||
if [[ ! -d /dev/net ]]; then mkdir -p /dev/net; fi
|
||||
if [[ ! -c /dev/net/tun ]]; then mknod /dev/net/tun c 10 200; fi
|
||||
echo "Starting tailscaled"
|
||||
tailscaled --socket=/tmp/tailscaled.sock &
|
||||
tailscaled --state=kube:${TS_KUBE_SECRET} --socket=/tmp/tailscaled.sock &
|
||||
PID=$!
|
||||
echo "Running tailscale up"
|
||||
tailscale --socket=/tmp/tailscaled.sock up \
|
||||
--accept-dns=true \
|
||||
--authkey=${AUTH_KEY} \
|
||||
--hostname=proxy-civo-internal-proxy
|
||||
--accept-dns=${TS_ACCEPT_DNS} \
|
||||
--authkey=${TS_AUTH_KEY} \
|
||||
${TS_EXTRA_ARGS}
|
||||
echo "Re-enabling incoming traffic from the cluster"
|
||||
wait ${PID}
|
||||
volumes:
|
||||
- name: host-mappings
|
||||
|
Reference in New Issue
Block a user