The Tailscale policy file shapes your tailnet, by letting you define who can access what, how devices connect, and even how IP addresses are assigned to nodes. At the heart of this policy file lies the ACLs section, which holds the access rules for your network. The Tailscale pol … | Continue reading
Restrict access for non-compliant devices with Tailscale Device Posture Management, now available in beta. You can manage additional attributes of your devices and use them as part of connectivity rules within your tailnet. This is a powerful building block that allows you to in … | Continue reading
It’s the holiday season, which means many of us are traveling to be close to family or loved ones, but that also means being far from our home networks. Tailscale can be a real help on the road, and traveling to familiar and faraway places can be an opportunity to set up connecti … | Continue reading
It’s the holiday season, which means many of us are traveling to be close to family or loved ones, but that also means being far from our home networks. Tailscale can be a real help on the road, and traveling to familiar and faraway places can be an opportunity to set up connecti … | Continue reading
Tailscale is a universal zero trust network access platform that lets organizations securely connect users with internal resources. You can manage connections to those resources using access control lists, in order to apply the principles of least privilege to your network’s acce … | Continue reading
As organizations grow, so does the expectation of reliable performance and uptime for employees and workloads. Today, we are excited to announce the release of Tailscale Regional routing, which helps teams scale their app connectors and subnet routers globally by routing & balanc … | Continue reading
Tailscale is a universal zero trust network access platform that lets organizations securely connect users with internal resources. You can manage connections to those resources using access control lists, in order to apply the principles of least privilege to your network’s acce … | Continue reading
As organizations grow, so does the expectation of reliable performance and uptime for employees and workloads. Today, we are excited to announce the release of Tailscale Regional routing, which helps teams scale their app connectors and subnet routers globally by routing & balanc … | Continue reading
Tailscale assigns every one of your nodes a private IPv4 address. We do this from the CGNAT range, which is typically used by ISPs that have run out of public IPv4 addresses. Starting today, you have control over what IP address from that range is assigned to your nodes. This giv … | Continue reading
Tailscale assigns every one of your nodes a private IPv4 address. We do this from the CGNAT range, which is typically used by ISPs that have run out of public IPv4 addresses. Starting today, you have control over what IP address from that range is assigned to your nodes. This giv … | Continue reading
Tailscale’s integration with Datadog is now Generally Available, bringing much-requested support for the observability industry leader as a native streaming destination for your Tailscale logs. Customers can now send Tailscale logs directly to Datadog and use its out of the box v … | Continue reading
Tailscale’s integration with Datadog is now Generally Available, bringing much-requested support for the observability industry leader as a native streaming destination for your Tailscale logs. Customers can now send Tailscale logs directly to Datadog and use its out of the box v … | Continue reading
We’re releasing a set of changes that builds on the foundation of our earlier WireGuard performance work, significantly improving UDP throughput on Linux. As with the previous work, we intend to upstream these changes to WireGuard. Our changes improve throughput for HTTP/3, QUIC, … | Continue reading
At Tailscale, we aim to provide users with a programmable network that is both secure enough to earn their trust and flexible enough to meet their networking needs across a wide range of infrastructure set-ups. We focus on making the locks trustworthy so our customers can focus o … | Continue reading
At Tailscale, we aim to provide users with a programmable network that is both secure enough to earn their trust and flexible enough to meet their networking needs across a wide range of infrastructure set-ups. We focus on making the locks trustworthy so our customers can focus o … | Continue reading
We have made new updates to our log streaming features to make them even better. Tailscale now supports log streaming to private endpoints, log streaming to Cribl, and configuration audit log streaming for users on all plans. | Continue reading
We have made new updates to our log streaming features to make them even better! Securing log streaming with private endpoints We’re happy to announce that Tailscale now supports streaming logs to private (tailnet) endpoints. If you don’t want to send logs over the public interne … | Continue reading
👉 We’d love to hear your thoughts on Tailscale. Filling out thisfeedback form helps us build a better product for you and other users. October Recap We are back with another recap of a busy month here at Tailscale. We have plenty to share including product releases, upcom … | Continue reading
At Tailscale, we are constantly making performance improvements, adding new features, and fixing bugs in the Tailscale client. To make it easier for you to get those improvements, we’re adding auto-update support on all platforms where Tailscale runs. For example, when we release … | Continue reading
Tailscale is a programmable network that lets you manage connections between your resources in a declarative way using ACLs, so you can define specifically which users should be able to connect to which services in your environment. Although Tailscale isn’t a service mesh per se, … | Continue reading
You can use Tailscale to connect Kubernetes services together, or to connect to services running in other environments. The Tailscale Kubernetes operator, now in beta, allows you to more easily deploy Tailscale to expose services in your Kubernetes cluster to your tailnet, and eg … | Continue reading
Tailscale Serve and Funnel aren’t new features, but today, we’re enhancing their user experience based on insights from how users actually interact with them. Not to get too philosophical, but the most useful features are the features you actually use, and we hope that today’s re … | Continue reading
We’d love to hear your thoughts on Tailscale. Filling out this feedback form helps us build a better product for you and other users. September Recap Fall has arrived and we continue to be busy here at Tailscale. In September, we announced some new updates, including adding Appl … | Continue reading
Tailscale has always been - and will always be - deeply dedicated to data and information security. With that, we are happy to announce that we have successfully completed our 2023 SOC 2 Type II reassessment! This annual assessment ensures that we have implemented the procedures, … | Continue reading
Today we’re expanding the list of devices that can run Tailscale, bringing secure remote networking to the Apple TV. The newly released tvOS 17 offers support for VPNs, and we’re proud to say Tailscale is among the first to use this new feature. You can now add your Apple TV dire … | Continue reading
Tailscale has partnered with Mullvad to make its global network of VPN servers available for our customers. You can now easily browse the web using any one of Mullvad’s available servers as a Tailscale exit node while maintaining the user privacy that’s synonymous with Mullvad.Mu … | Continue reading
We’d love to hear your thoughts on Tailscale. Filling out this feedback form helps us build a better product for you and other users. August News It’s been a busy August so far here at Tailscale. Earlier this month, we were at Black Hat Las Vegas, and enjoyed seeing all the atten … | Continue reading
Onboarding a new or transferred employee can be time-consuming, but it’s a good problem to have. Offboarding, on the other hand, not so much. Offboarding is not only inconvenient, but doing it poorly puts organizations at risk — as former employees may inadvertently retain access … | Continue reading
Tailscale for VS Code just got a major upgrade, bringing you the ability to explore, edit, and transfer the files on any of the nodes in your tailnet that you can reach through Tailscale SSH. For the millions of developers who use VS Code regularly, this new extension brings all … | Continue reading
Log streaming to Panther is generally available We’re happy to announce that the Tailscale integration with Panther Labs is now Generally Available. We launched this feature a few weeks ago, and made lots of improvements based on your great feedback (thanks!). With log streaming … | Continue reading
We’d love to hear your thoughts on Tailscale. Filling out this feedback form helps us build a better product for you and other users. July News Before we get into our July updates below, in case you missed it, we’ve uploaded videos from our first community event Tailscale Up. Che … | Continue reading
Tailscale gives you access to your devices regardless of their location, it follows that Tailscale should work wherever you are too! That said, while we’ve had an iOS app since the early days, this app hasn’t received much love in a long time. That changes today: with version 1.4 … | Continue reading
On the bright and sunny day of Wednesday, May 31, 2023 the developer relations team hosted Tailscale’s first user conference in San Francisco at Dogpatch Studios. We were looking to hear stories of Tailscale at home, work, and play from different industries and individuals, from … | Continue reading
Wishlist is a surprisingly fun personalized directory you can run in your terminal to browse and connect to multiple SSH services, made by the command line tool company Charm. You can think of Wishlist like a homepage for your SSH apps and servers. And starting today, you can tie … | Continue reading
Previously, we have made it possible for our customers to stream their configuration audit logs and network flow logs to security information and event management (SIEM) systems such as Splunk and ELK. We received a ton of customer requests to support Panther as a native streamin … | Continue reading
Tailscale is named as such because we want to allow small, human-scale teams to build trusted networks easily — without having the complexity or long tail of software and operational problems, which don’t scale well to a small team. Tail. Scale. Sure, sure, that’s a good vision1. … | Continue reading
Tailscale updated our terms and conditions today. Specifically, we updated our Terms of Service and our Privacy Policy. We can’t summarize the changes, because, well, we’re not lawyers, and lawyers like it when we link to the full language of the change — apparently if you don’t … | Continue reading
We are pleased to announce the general availability of network flow logs and log steaming. Network flow logs allow Tailscale customers to monitor the network activity in their tailnet. These logs can help detect threats, investigate security incidents, and maintain compliance sta … | Continue reading
We want to hear from you: How can we improve Tailscale? We’d love to hear what you think about Tailscale, and filling out this Google form helps us build a better product for you! June News Before we get into what happened in June, let’s go back to the beginning of the month. We … | Continue reading
An official Tailscale app has landed in the QNAP App Center, so now users of the company’s network-attached storage devices can download and install a Tailscale client with just a few clicks. QNAP users can install the Tailscale package directly from the QNAP App Center. Please n … | Continue reading
We’re releasing a Tailscale extension for Visual Studio Code, a text editor we hear is pretty popular. The new extension, now in beta, brings the magic of your tailnet even closer to your code and makes it easier than ever to share your local development over the internet for col … | Continue reading
Tailscale now supports passkeys as the newest way to authenticate to your tailnet. Passkeys let you extend your tailnet to users beyond your identity provider, without worrying about weak or reused passwords. This also means that if you are on the Free plan and you’re using a sin … | Continue reading
Tailscale’s ease of setup and use is one of the reasons so many individuals choose our free plan to run their homelabs. With a few clicks they can add devices to their tailnet, manage access controls for users, and with a little magic, host a private Minecraft server for their fr … | Continue reading
When we launched Tailscale, we wanted it to be the easiest way for users to connect their devices securely across the internet. So, when you sign up, your Tailscale network (tailnet) is automatically created based on your domain. Anyone in the same custom domain as you can automa … | Continue reading
Today we’re kicking off Tailscale Up, our first ever community conference. To celebrate the occasion, we’re announcing new features that address some of the top community feature requests — and we hope will excite you. We’ll be rolling out more information about these announcemen … | Continue reading
We’d love to hear your thoughts on Tailscale. Filling out this feedback form helps us build a better product for you and other users. May News May has been a big month for the Tailscale team. We launched session recording for Tailscale SSH in beta, allowing you to record the te … | Continue reading
We’re pleased to announce that custom OIDC is now generally available for all users. With custom OIDC, users can sign into Tailscale using any identity provider that supports OpenID Connect (OIDC). To use a custom OIDC provider with Tailscale, you must verify domain ownership by … | Continue reading
Today, we’re launching session recording for Tailscale SSH in beta, allowing you to record the terminal output whenever someone on your tailnet initiates a Tailscale SSH connection. You can use these recordings to detect threats, investigate security incidents, and remain complia … | Continue reading