Install tailscale
Install, not configure
This commit is contained in:
parent
29cac09b48
commit
02847355a7
6 changed files with 30 additions and 1 deletions
|
@ -20,3 +20,5 @@ roles:
|
||||||
version: v2022.10.17
|
version: v2022.10.17
|
||||||
- src: geerlingguy.certbot
|
- src: geerlingguy.certbot
|
||||||
version: 5.1.0
|
version: 5.1.0
|
||||||
|
- src: artis3n.tailscale
|
||||||
|
version: v4.4.1
|
||||||
|
|
6
ansible/group_vars/all/tailscale.yml
Normal file
6
ansible/group_vars/all/tailscale.yml
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
# Just install for now, don't configure
|
||||||
|
tailscale_up_skip: true
|
||||||
|
|
||||||
|
tailscale_cidr: 100.64.0.0/24 # It's really /10, but I don't use that many IPs
|
||||||
|
|
||||||
|
tailscale_port: 41641
|
|
@ -16,6 +16,7 @@
|
||||||
- headscale
|
- headscale
|
||||||
- fail2ban_ssh
|
- fail2ban_ssh
|
||||||
- restic
|
- restic
|
||||||
|
- artis3n.tailscale
|
||||||
|
|
||||||
- hosts:
|
- hosts:
|
||||||
- pve
|
- pve
|
||||||
|
@ -79,6 +80,7 @@
|
||||||
- nginx
|
- nginx
|
||||||
- ingress
|
- ingress
|
||||||
- nebula
|
- nebula
|
||||||
|
- artis3n.tailscale
|
||||||
|
|
||||||
- hosts: pve
|
- hosts: pve
|
||||||
roles:
|
roles:
|
||||||
|
@ -114,6 +116,7 @@
|
||||||
- commento
|
- commento
|
||||||
- website
|
- website
|
||||||
- remark42
|
- remark42
|
||||||
|
- artis3n.tailscale
|
||||||
|
|
||||||
- hosts: jellyfin
|
- hosts: jellyfin
|
||||||
roles:
|
roles:
|
||||||
|
|
|
@ -19,6 +19,9 @@ table inet filter {
|
||||||
|
|
||||||
# Allow nebula
|
# Allow nebula
|
||||||
udp dport {{ nebula_listen_port }} accept;
|
udp dport {{ nebula_listen_port }} accept;
|
||||||
|
|
||||||
|
# Allow Tailscale
|
||||||
|
udp dport {{ tailscale_port }} accept;
|
||||||
}
|
}
|
||||||
|
|
||||||
chain POSTROUTING {
|
chain POSTROUTING {
|
||||||
|
@ -27,6 +30,7 @@ table inet filter {
|
||||||
|
|
||||||
# NAT - because the proxmox machines may not have routes back
|
# NAT - because the proxmox machines may not have routes back
|
||||||
ip saddr {{ nebula.cidr }} ip daddr {{ pve_hosts.internal_cidr }} counter masquerade
|
ip saddr {{ nebula.cidr }} ip daddr {{ pve_hosts.internal_cidr }} counter masquerade
|
||||||
|
ip saddr {{ tailscale_cidr }} ip daddr {{ pve_hosts.internal_cidr }} counter masquerade
|
||||||
}
|
}
|
||||||
|
|
||||||
chain FORWARD {
|
chain FORWARD {
|
||||||
|
@ -39,5 +43,9 @@ table inet filter {
|
||||||
|
|
||||||
# Allow monitoring of nebula network
|
# Allow monitoring of nebula network
|
||||||
ip saddr {{ pve_hosts.forrest.ip }}/32 ip daddr {{ nebula.cidr }} accept
|
ip saddr {{ pve_hosts.forrest.ip }}/32 ip daddr {{ nebula.cidr }} accept
|
||||||
|
|
||||||
|
# Allow traffic from Tailscale to proxmox network
|
||||||
|
ip saddr {{ tailscale_cidr }} ip daddr {{ pve_hosts.internal_cidr }} accept
|
||||||
|
ip saddr {{ pve_hosts.internal_cidr }} ip daddr {{ tailscale_cidr }} ct state related,established accept
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -91,6 +91,15 @@ resource "linode_firewall" "casey" {
|
||||||
ipv4 = ["0.0.0.0/0"]
|
ipv4 = ["0.0.0.0/0"]
|
||||||
ipv6 = ["::/0"]
|
ipv6 = ["::/0"]
|
||||||
}
|
}
|
||||||
|
|
||||||
|
inbound {
|
||||||
|
label = "allow-inbound-tailscale"
|
||||||
|
action = "ACCEPT"
|
||||||
|
protocol = "UDP"
|
||||||
|
ports = "41641"
|
||||||
|
ipv4 = ["0.0.0.0/0"]
|
||||||
|
ipv6 = ["::/0"]
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "linode_rdns" "casey_reverse_ipv4" {
|
resource "linode_rdns" "casey_reverse_ipv4" {
|
||||||
|
|
|
@ -4,7 +4,8 @@ module "walker_firewall" {
|
||||||
description = "walker"
|
description = "walker"
|
||||||
ports = [
|
ports = [
|
||||||
"80/tcp",
|
"80/tcp",
|
||||||
"443/tcp"
|
"443/tcp",
|
||||||
|
"41641/udp"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue