When I talk to other infrastructure folks at tech conferences, they’re usually shocked to hear that Tailscale’s infra team is just three engineers. Companies of similar size often have multiples of that. How do we manage to get by with so few people? | Continue reading
In today’s video, we’ll walk through how to install the application SearXNG in a container accessible from anywhere through Tailscale. SearXNG is a fully open-source search engine aggregator that can combine results from services and databases across the web and present them with … | Continue reading
This month's newsletter brings a bunch of recent product updates, notes from the community about how folks are using Tailscale, and some upcoming events where you can catch us online and IRL. | Continue reading
Tailscale administrators can now use Amazon S3 and S3-compatible buckets as streaming destinations for both configuration audit logs and network flow logs. | Continue reading
Tailscale has been recognized in Deloitte’s Technology Fast 50 as one of Canada’s fastest-growing tech innovators. It’s an honour to be included alongside other companies that are pushing boundaries, both abroad and right here at home. | Continue reading
With the recent release of Factorio’s Space Age expansion, we’ve been playing a lot of the base-building game — and that started with setting up a multiplayer server and sharing it into our friends’ tailnets. | Continue reading
Tailscale’s device posture integration with 1Password’s Extended Access Management's device trust (previously Kolide) is now generally available. This integration is designed to address the access-trust gap of devices in your network, and helps ensure that only trusted and compli … | Continue reading
A year ago, we started noticing that Tailscale was getting popular with AI companies. That was the good news. The bad news: we didn't know why. After a bunch of research, it turns out AI companies like Tailscale for pretty much the same reasons everyone else does. | Continue reading
With Google Workspace integration, Tailscale takes another big step towards simplifying network administration by working seamlessly with one of the most widely used productivity suites in the world. | Continue reading
When Tailscale usage starts to ramp up within an organization, bandwidth and latency issues from relayed connections can start to be noticeable to users. Solutions engineer Lee Briggs outlines how to minimize latency with direct connections in Kubernetes environments. | Continue reading
When you want to fine-tune the rules of who has access to what inside your Tailscale network, the solution is our Access Control Lists, or ACLs. ACLs are a powerful way to manage access to the resources on your tailnet. This is a quick getting started guide for those of you who a … | Continue reading
Today’s video walks through connecting a Virtual Private Server (VPS) in the cloud to your locally hosted infrastructure over an encrypted Tailscale tunnel, backed by WireGuard technology. We start by automatically spinning up and configuring the cloud VPS on DigitalOcean to act … | Continue reading
Tailscale has finally joined the dark side. That is to say: we rolled out support for “dark mode” in our admin console. Working on dark mode helped us bring some much-needed consistency to our products for the web. | Continue reading
Ansible is one of those tools that once you learn it, you wonder why it took you so long to do so. Today's video goes into detail on using Ansible with Tailscale, using Tailscale SSH to simplify the sometimes-complicated story of identity and SSH keys. | Continue reading
User and group provisioning for Microsoft Entra ID is now generally available for Tailscale Enterprise plans. This integration lets you automate the process of creating new users to access your tailnet, removing users when they no longer need to have access, and more. | Continue reading
This month's newsletter brings a bunch of recent product updates, notes from the community about how folks are using Tailscale, and some upcoming events where you can catch us online and IRL. | Continue reading
When you're installing Tailscale on more than a device or two, it can make sense to automate the process. That kind of automation is part of a field called "Infrastructure as Code," which is the focus of a new video series we're launching on automating the set-up of Tailscale in … | Continue reading
Our new integration with Axiom allows you to stream your Tailscale audit and network flow logs directly to your Axiom account, providing more visibility and analysis capabilities for your tailnet's activity and health. | Continue reading
We don’t talk a lot in public about the big vision for Tailscale, why we’re really here. Usually I prefer to focus on what exists right now, and what we’re going to do in the next few months. But let’s look at the biggest of big pictures for a change. | Continue reading
We’re excited to announce an integration with Control D, a customizable DNS service. With Control D and Tailscale, every device on your tailnet can be protected from internet threats, unwanted and malicious content, or ads. | Continue reading
Today's video walks you through the basics of installing Docker and connecting your first container with Tailscale, and covers the built-in functionality that generates automated TLS certificates for nodes on your tailnet. This quickstart is the fastest path to getting started wi … | Continue reading
Today we’re excited to announce two new configuration methods for how traffic flows throughout your tailnet. IP sets allow you to define granular networks in policies, so that designated users or devices can only access necessary parts of a subnet. Via introduces a powerful routi … | Continue reading
We are delighted to announce that Tailscale has been awarded the AWS Networking Competency. This recognition underscores Tailscale's deep expertise and proven success in delivering seamless, secure networking solutions on AWS. | Continue reading
Subnet routers are a powerful tool to bring Tailscale to environments where you can't install the client on every device. In today's video, Alex explains how subnet routers work and shows the steps to configure one on Windows and Linux. | Continue reading
If you’ve deployed an AI model to a remote device before, then you’ll know that connecting to it and keeping it secure aren’t exactly easy. Existing edge device tooling from cloud providers has been built around entirely different workloads, focused mostly on streaming low bandwi … | Continue reading
In our latest video, we use Tailscale to connect to PiKVM, an inexpensive remote access tool that runs on a Raspberry Pi and works independently of your OS. | Continue reading
Auto exit nodes are a new Tailscale feature to connect users to the nearest and most performant exit node to access the public internet. With auto exit nodes, employers can support remote work by ensuring employees have the best available connection and aren't stuck looking for l … | Continue reading
Since the disclosure of the TunnelVision bug (CVE 2024-3661) by researchers at Leviathan Security, some users have asked us whether and how it affects Tailscale. The short answer: it’s complicated. While we don’t think TunnelVision constitutes a major security concern for most Ta … | Continue reading
Today we’re bringing a new network visibility option to our Enterprise customers by allowing them to monitor destination addresses for traffic egressing the network through an exit node. This will allow customers to run more advanced forensic analyses during active or historical … | Continue reading
Today we're excited to announce a major overhaul to the Tailscale Android app that greatly improves the user experience and brings some of Tailscale's most widely used and requested features to the platform. | Continue reading
Tailscale's device posture management integration with CrowdStrike Falcon Zero Trust brings improved security and control to your Zero Trust network. This integration empowers you to leverage the Falcon Zero Trust Assessment score with Tailscale's device posture management, enabl … | Continue reading
In today’s video I walk you through the process of hooking up Immich’s machine learning components to a Windows 11 system, primarily used as my personal gaming rig, running on WSL2, inside of a docker container with Nvidia hardware acceleration support. | Continue reading
The April newsletter from Tailscale, featuring product updates, highlights from the community, and information about upcoming events. | Continue reading
A few weeks ago, we quietly updated one component of our identity pricing options, making Tailscale usable with any OIDC-compliant SSO identity provider on any plan. It's a small change that reflects a bigger security principle. | Continue reading
Tailscale is now a certified member of the AWS Partner Network, making it easier for users to deploy and configure our secure WireGuard®-based mesh network in their AWS environments. From teams with a few cloud servers to businesses with complex enterprise deployments, Tailscale … | Continue reading
In our latest video, we walk through how to remotely access your Home Assistant by adding it to your Tailscale network. | Continue reading
On March 7, 2024, tailscale.com was unavailable for approximately 90 minutes due to an expired TLS certificate. We were able to identify and address the issue quickly, and the downtime was mostly limited to our marketing materials and documentation; still, we would like to explai … | Continue reading
We’re thrilled to announce that Tailscale SSH is now Generally Available. Tailscale SSH allows Tailscale to manage the authentication and authorization of SSH connections on your tailnet. From the user’s perspective, you use SSH as normal—authenticating with Tailscale according t … | Continue reading
With Tailscale, organizations can easily create software-defined perimeters across their environments to enforce the principle of least privilege everywhere. And they can do so without ever exposing their private networks to the public internet. | Continue reading
The March newsletter from Tailscale, featuring product updates, highlights from the community, and information about upcoming events. | Continue reading
Today we’re making expanding our secret scanning offerings with an integration between Tailscale and GitLab, the popular DevSecOps platform. | Continue reading
Today, we’re celebrating a big milestone. Just a bit before Tailscale’s fifth birthday, we've passed 5000 paying customers. | Continue reading
Tailscale auto-updates are now Generally Available, with a number of usability and control improvements. Today's update builds on our previously announced beta release. | Continue reading
Tailscale Mobile Device Management policies enter General Availability today, and we are thrilled to share this new feature set with our Premium and Enterprise customers. Mobile Device Management (MDM) policies bring new levels of control and security to your Tailscale experience … | Continue reading
Creating small, trusted networks with your friends, family and coworkers is central to our mission here at Tailscale. In this article we're going to dive deep into using Docker to do just that, with containers. | Continue reading
Tailscale provides a programmable network to our customers that is both secure enough to earn their trust and flexible enough to meet their networking needs across a wide range of infrastructure set-ups. We focus on making the locks trustworthy so our customers can focus on keepi … | Continue reading
Right around the turn of the new year, we rolled out a little update to our user invite system. The change: you can now invite people who don't authenticate through GitHub to join a tailnet owned by a user who does. For users who have built out tailnets based on a GitHub login an … | Continue reading
At Aspen Insights, we use Tailscale as our corporate VPN to connect to on-premise resources, 3rd party devices, and our cloud resources. It simplifies and secures a lot of traffic that would have taken considerable time with corporate certificates and CA management in a tradition … | Continue reading