arillso.agent.tailscale role – Install and configure Tailscale VPN for mesh networking
Note
This role is part of the arillso.agent collection (version 1.0.1).
It is not included in ansible-core.
To check whether it is installed, run ansible-galaxy collection list.
To install it use: ansible-galaxy collection install arillso.agent.
To use it in a playbook, specify: arillso.agent.tailscale.
Entry point main – Install and configure Tailscale VPN for mesh networking
Synopsis
This role installs and configures Tailscale VPN via official package sources for creating secure mesh networks between devices and infrastructure. All configuration is persistent via /etc/tailscale/config.json daemon config file.
Parameters
Parameter |
Comments |
|---|---|
Accept DNS configuration from tailnet (true/false) Default: |
|
Accept subnet routes advertised by other nodes (true/false) Default: |
|
Advertise as app connector for domain-based routing (true/false) Default: |
|
Advertise this node as an exit node (true/false) Default: |
|
Subnet routes to advertise in CIDR format (e.g., ‘192.168.1.0/24’) Default: |
|
Services to advertise (e.g., ‘svc:my-api’) Default: |
|
Tailscale authentication key for initial device registration (tskey-auth-* or tskey-reusable-*) |
|
Enable automatic update application (true/false) Default: |
|
Enable automatic update checking (true/false) Default: |
|
Directory path for Tailscale configuration files Default: |
|
Enable persistent daemon configuration via config.json Choices:
|
|
Path to Tailscale daemon configuration file Default: |
|
Enable/disable Tailscale (true/false) Default: |
|
Exit node to use (IP, stable node ID, or MagicDNS name) Default: |
|
Allow direct LAN access when using exit node (true/false) Default: |
|
Custom hostname for this device in Tailscale network Default: |
|
Lock config to prevent CLI changes (true/false) Default: |
|
Firewall management mode: ‘on’ (default), ‘off’, or ‘nodivert’ Choices:
|
|
Unix username allowed to operate tailscale without root Default: |
|
Name of the Tailscale package to install Default: |
|
Desired state of the Tailscale package Choices:
|
|
Enable device posture data collection (true/false) Default: |
|
Custom Tailscale preferences via ‘tailscale set’ (advanced users only) Default: |
|
Perform logout and re-authentication (WARNING: temporary disconnect) Choices:
|
|
Custom control server URL (default: https://controlplane.tailscale.com) Default: |
|
Whether the tailscaled service should be enabled on boot Choices:
|
|
Dictionary of systemd service override parameters Default: |
|
Desired state of the tailscaled service Choices:
|
|
Block all incoming connections from tailnet (true/false) Default: |
|
Enable source NAT for advertised routes (true/false) Default: |
|
Enable Tailscale SSH server (true/false) Default: |
|
Enable stateful packet filtering (true/false) Default: |
|
WireGuard endpoints in ‘<address>:<port>’ format Default: |
|
List of Tailscale tags for ACL-based access control (e.g., ‘tag:gateway’) Default: |
|
Enable web client interface on port 5252 (true/false) Default: |