Ask a Solutions Engineer your technical questions in our October 9 Office HoursSign up
Get started
Login
WireGuard is a registered trademark of Jason A. Donenfeld.
© 2024 Tailscale Inc. All rights reserved. Tailscale is a registered trademark of Tailscale Inc.
Scaling Tailscale: From Manual to Automated DeploymentWatch Now

Tailscale for DevOps

Tailscale, a virtual private programmable network

A world map with groups of devices all connected to the Tailscale logo

Trusted by 5,000+ companies like these

Connect to VMs and containers via SSH

Command line window showing an active SSH connection
An illustration of a key

Instead of self-managing or sharing keys across an entire fleet of machines, use Tailscale SSH to automatically rotate SSH keys, while validating user identities against an existing IdP (e.g Google Workspace or Okta).

Two diagonal arrows pointing towards each other, but not touching

Tailscale establishes end-to-end encrypted connections between any two devices on the internet without opening sensitive ports to the world, so go ahead and DROP all INPUTs.

An icon of a stylized database with a backwards rotating arrow

Meet compliance obligations, or just debug what happened last week, with the ability to record and replay Tailscale SSH sessions.


Connect Kubernetes Clusters

A diagram showing a code editor, a command line window and a chart connecting users to different network environments
Kubernetes' seven-sided polygon logo, with a boat wheel in the middle

Use Tailscale’s operator to seamlessly connect clusters with other infrastructure, including: logging, CI / CD workflows, other internal APIs, and managed databases.

An illustration of a stylized chain

Quickly enable secure access to dev, test, staging, and production environments. SCIM group sync makes it easy to provide teams outside of engineering with access to critical tools.

An illustration of a stylized globe secured by a padlock

Connect a cluster with Tailscale to drop the risky public IP for the control plane. With minimal configuration it’s possible to securely manage & debug clusters from anywhere.

Webinar

Watch our webinar on using Tailscale for Kubernetes networking

Find out how Tailscale can make your your life with Kubernetes hassle-free.

Exploring Tailscale with Kubernetes video thumbnail

Connect CI / CD Pipelines

Flow chart showing a user updating code to be tested by a runner, and logged to a database
An illustration of a triangle with an exclamation mark centered inside

SSH into CI / CD job runners to diagnose build issues without the complexity of managing or sharing keys. Tailscale SSH takes all the hassle out of key management and easily integrates with existing identity providers.

An illustration of two arrows following the path of a circle, pointing clock-wise

Easily & securely connect cloud or local CI / CD runners to internal services and test databases across clouds, VPCs, or regions.


A Network of Benefits

An illustration of the earth showing various devices located across the globe, connected by arching lines

Securely connect anything on the internet with Tailscale. Create a unified, secure network that bridges all of your machines regardless of their physical location or the network topology between them.

Use Tailscale’s drop in SSH replacement to easily manage shell access to any linux based infrastructure. Verify user identities against an existing IdP (e.g Google Workspace or Okta) and manage access via centralized ACLs.

An image of a browser window showing the login screen for the Tailscale admin console, with IDP provider logos in a grid behind it
In illustration connecting three different infrastructure as code providers, Terraform, Pulumi and Ansible connecting to a server environment through an example code snippet

Tailscale seamlessly integrates into any GitOps workflow with support for popular Infrastructure as Code (IaC) tools like Terraform, Pulumi, and Ansible. Using native integrations, both deployment and network access policies can be checked into version control for easy review and rollbacks.

Easily install Tailscale on every machine and in every cluster to enable authenticated & direct connections, encrypted end-to-end, between any two machines or users. Customize network access with fine-grained control based on user identity, source machine, and custom tags.

A flow chart connecting a user to different SaaS tools and other resources, with each group of tools only accessible to a certain group of people

Get these features and more with Tailscale

An icon of a command line interface window

Use this drop-in replacement to manage & record shell access into any linux machine without needing to share or manage keys.

A stylized wrench icon

Quickly route traffic to & from Kubernetes clusters to your Tailnet while keeping services and the control plane off the public internet.

Two arrows passing downwards through a circle then diverging left and right

Establish connectivity to entire VPCs or devices where Tailscale can't be installed.

An icon of a left and right angle bracket

Easily deploy Tailscale into cloud and on-prem environments via your IaC provider of choice, including: Terraform, Pulumi, and Ansible.

The Git branch icon, one vertical line and one curved branching line pointing upwards

Easily modify and rollback JSON based network configuration directly from GitHub or GitLab.

A stylized globe icon

Quickly & securely share prototypes, demos, or web applications with other users on a Tailnet regardless of location or network.

A stylized padlock icon

By installing the Tailscale client, all traffic is encrypted end-to-end using the Wireguard® protocol.

A stylized silhouette of a person next to a checkmark

Use SSO & MFA from a wide array of supported IdPs to authenticate users onto any Tailnet.

A horizontal line with one upward peak and one downward peak

Natively stream network flow and configuration audit logs to popular SIEM providers.


Pricing that works for everyone

Personal

For individuals who want to securely connect personal devices, for free.

$0per active user/month
Get started free
Starter

For teams or organizations looking for an easy-to-use, secure, legacy VPN replacement.

$6per active user/month
Get started free
Premium

For companies who need service and resource level authentication and access control.

$18per active user/month
Get started free
Enterprise

For companies who need advanced integrations, compliance and support for access control at scale.