Our great sponsors
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
If you don't want to make authentication, just make it inaccessible. This is where Tailscale comes in. I already run Tailscale on all the nodes, which is how I'm able to have a multi-region k3s cluster. That doesn't make my pods routable though.
You can see my version at kasuboski/tailscale-proxy. The main differences are it takes a HOSTNAME and DEST_PORT parameters.
I've been making a feedreader to replace my running miniflux. It's my first real rust project and I wanted an even more minimal feedreader.
You can see how it's all put together in my k8s-gitops repo. The gist is that you add a sidecar container that starts tailscale and in my case adds an iptables rule which forwards all traffic to the app port. You can see my poor Doppler secret naming in there too where everything is using miniflux-secret.
I've been making a feedreader to replace my running miniflux. It's my first real rust project and I wanted an even more minimal feedreader.
Related posts
- Accéder à l’ensemble du cluster Kubernetes avec Tailscale …
- Minikube: How to connect to the control-plane IP as the range is outside LAN range?
- How to update Go version of tailscaled on macOS
- Self-service infrastructure as code
- 5-Step Approach: ProjectSveltos Event Framework for Kubernetes Deployment with Cilium Gateway API