Install tailscale
Install, not configure
This commit is contained in:
parent
29cac09b48
commit
02847355a7
6 changed files with 30 additions and 1 deletions
|
@ -20,3 +20,5 @@ roles:
|
|||
version: v2022.10.17
|
||||
- src: geerlingguy.certbot
|
||||
version: 5.1.0
|
||||
- src: artis3n.tailscale
|
||||
version: v4.4.1
|
||||
|
|
6
ansible/group_vars/all/tailscale.yml
Normal file
6
ansible/group_vars/all/tailscale.yml
Normal file
|
@ -0,0 +1,6 @@
|
|||
# Just install for now, don't configure
|
||||
tailscale_up_skip: true
|
||||
|
||||
tailscale_cidr: 100.64.0.0/24 # It's really /10, but I don't use that many IPs
|
||||
|
||||
tailscale_port: 41641
|
|
@ -16,6 +16,7 @@
|
|||
- headscale
|
||||
- fail2ban_ssh
|
||||
- restic
|
||||
- artis3n.tailscale
|
||||
|
||||
- hosts:
|
||||
- pve
|
||||
|
@ -79,6 +80,7 @@
|
|||
- nginx
|
||||
- ingress
|
||||
- nebula
|
||||
- artis3n.tailscale
|
||||
|
||||
- hosts: pve
|
||||
roles:
|
||||
|
@ -114,6 +116,7 @@
|
|||
- commento
|
||||
- website
|
||||
- remark42
|
||||
- artis3n.tailscale
|
||||
|
||||
- hosts: jellyfin
|
||||
roles:
|
||||
|
|
|
@ -19,6 +19,9 @@ table inet filter {
|
|||
|
||||
# Allow nebula
|
||||
udp dport {{ nebula_listen_port }} accept;
|
||||
|
||||
# Allow Tailscale
|
||||
udp dport {{ tailscale_port }} accept;
|
||||
}
|
||||
|
||||
chain POSTROUTING {
|
||||
|
@ -27,6 +30,7 @@ table inet filter {
|
|||
|
||||
# NAT - because the proxmox machines may not have routes back
|
||||
ip saddr {{ nebula.cidr }} ip daddr {{ pve_hosts.internal_cidr }} counter masquerade
|
||||
ip saddr {{ tailscale_cidr }} ip daddr {{ pve_hosts.internal_cidr }} counter masquerade
|
||||
}
|
||||
|
||||
chain FORWARD {
|
||||
|
@ -39,5 +43,9 @@ table inet filter {
|
|||
|
||||
# Allow monitoring of nebula network
|
||||
ip saddr {{ pve_hosts.forrest.ip }}/32 ip daddr {{ nebula.cidr }} accept
|
||||
|
||||
# Allow traffic from Tailscale to proxmox network
|
||||
ip saddr {{ tailscale_cidr }} ip daddr {{ pve_hosts.internal_cidr }} accept
|
||||
ip saddr {{ pve_hosts.internal_cidr }} ip daddr {{ tailscale_cidr }} ct state related,established accept
|
||||
}
|
||||
}
|
||||
|
|
|
@ -91,6 +91,15 @@ resource "linode_firewall" "casey" {
|
|||
ipv4 = ["0.0.0.0/0"]
|
||||
ipv6 = ["::/0"]
|
||||
}
|
||||
|
||||
inbound {
|
||||
label = "allow-inbound-tailscale"
|
||||
action = "ACCEPT"
|
||||
protocol = "UDP"
|
||||
ports = "41641"
|
||||
ipv4 = ["0.0.0.0/0"]
|
||||
ipv6 = ["::/0"]
|
||||
}
|
||||
}
|
||||
|
||||
resource "linode_rdns" "casey_reverse_ipv4" {
|
||||
|
|
|
@ -4,7 +4,8 @@ module "walker_firewall" {
|
|||
description = "walker"
|
||||
ports = [
|
||||
"80/tcp",
|
||||
"443/tcp"
|
||||
"443/tcp",
|
||||
"41641/udp"
|
||||
]
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in a new issue