| name | tailscale |
| description | Operational guidance for Tailscale networking tasks, including checking tailnet status, DNS names, device tags, ACL/auth key usage, subnet routers, exit nodes, and Serve/Funnel. Use when requests mention Tailscale, ts.net, tailnet, MagicDNS, Tailscale CLI, or connectivity/troubleshooting in a Tailscale-managed network. |
Tailscale Ops
Workflow
- Clarify scope: local machine, server, or Kubernetes cluster? Confirm whether changes are desired or read-only diagnostics are enough.
- Gather state (read-only by default):
tailscale status --jsontailscale ip -4/tailscale ip -6tailscale whois <ip>(if identifying peers)tailscale netcheck(connectivity)tailscale ping <node>(reachability)
- Interpret results:
- Use
Self.DNSNameto confirm the node’s ts.net name. - Check
Peerentries for tags, endpoints, and connectivity.
- Use
- Only mutate when asked:
- Avoid
tailscale upor ACL changes unless explicitly requested. - Never print or commit auth keys/secrets.
- Avoid
Common tasks
- Find Tailnet domain / node DNS:
tailscale status --json→Self.DNSName(strip trailing.).
- Validate MagicDNS name:
- Confirm
Self.DNSNameand that MagicDNS is enabled in admin console.
- Confirm
- Subnet routers:
- Check routes in
tailscale status --json(peer routes). - Changes require
tailscale up --advertise-routes=...and ACL approval.
- Check routes in
- Exit nodes:
- Check available exit nodes:
tailscale status. - Enable/disable only with explicit approval.
- Check available exit nodes:
- Serve/Funnel:
tailscale serve status/tailscale funnel status.
Kubernetes notes
- For Services exposed via Tailscale, check
tailscale.com/hostnameannotations and Service status. - Confirm the expected ts.net FQDN and TLS termination path.
Safety
- Treat auth keys and client secrets as sensitive.
- Prefer read-only diagnostics unless the user explicitly asks to change network state.