Tailscale
Tailnet tail8d86e.ts.net provides secure networking for all BlumeOps infrastructure.
ACL Management
ACLs managed via Pulumi in pulumi/tailscale/policy.hujson.
Groups
| Group | Members | Purpose |
|---|---|---|
group:allisonflix | admin, member | jellyfin media access |
Device Tags
| Tag | Devices | Purpose |
|---|---|---|
tag:homelab | indri, ringtail | Server infrastructure |
tag:nas | sifaka | Network-attached storage |
tag:blumeops | indri, sifaka, ringtail | Pulumi IaC managed resources |
tag:registry | indri | Container registry (Zot) |
tag:forge | indri | Forgejo git hosting |
tag:loki | indri | Loki log aggregation |
tag:k8s-api | indri | Kubernetes API server (minikube) |
tag:k8s-operator | (operator pod) | Tailscale operator for k8s — see tailscale-operator |
tag:k8s | (Ingress proxy pods) | Kubernetes Tailscale Ingress nodes; each also carries a per-service tag (tag:grafana, tag:kiwix, tag:devpi, tag:feed, tag:pg) |
tag:ci-gateway | (ephemeral CI containers) | CI containers pushing images to registry |
tag:flyio-proxy | (Fly.io proxy container) | Public reverse proxy |
tag:flyio-target | (designated Ingress endpoints) | Endpoints reachable by the Fly.io proxy |
Important: Don’t tag user-owned devices (like gilbert) via Pulumi. Tagging converts them to “tagged devices” which lose user identity and break user-based SSH rules. Gilbert is referenced as tag:workstation in tagOwners for ownership purposes but remains user-owned so blume.erich@gmail.com identity is preserved.
Access Matrix
| Source | Kiwix | Forge | DevPI | Miniflux | PostgreSQL | NAS | Grafana | Loki |
|---|---|---|---|---|---|---|---|---|
autogroup:admin | Y | Y | Y | Y | Y | Y | Y | Y |
autogroup:member | Y | Y (443, SSH) | Y | Y | Y (5432) | - | - | - |
tag:homelab | - | - | - | - | Y (5432) | Y | - | Y (3100) |
tag:k8s | - | Y (3001, 2200) | - | - | - | - | - | - |
- Admins — full access to all services
- Members — user-facing services only; no Grafana, Loki, or NAS
- Homelab — server-to-server: full mutual access between homelab peers (including SSH), full NAS access, and k8s service access (443, 5432, 9187)
- K8s — can reach registry (443) and forge on indri (HTTP 3001, SSH 2200) for GitOps
Additional grants not shown in the matrix:
tag:flyio-proxy→tag:flyio-targeton tcp:443 onlytag:ci-gateway→tag:registryon tcp:443tag:k8s→tag:registryon tcp:443tag:homelab→tag:k8son tcp:443, tcp:5432, tcp:9187
See pulumi/tailscale/policy.hujson for the full grant definitions.
SSH Access
| Source | Destinations | Auth |
|---|---|---|
autogroup:member | autogroup:self | check |
autogroup:admin | tag:homelab | check (12h) |
autogroup:admin | tag:nas | check (12h) |
tag:homelab | tag:homelab | accept (tagged devices cannot perform interactive auth) |
Auto Approvers
ProxyGroup pods (tag:k8s) can auto-approve their own VIP Services. This is required for multi-cluster Tailscale Ingress routing — without it, advertised ProxyGroup routes are not approved. See tailscale-operator for ProxyGroup configuration details.
OAuth Credentials
Pulumi uses OAuth client from 1Password (blumeops vault):
- Scopes: acl, dns, devices, services
- Auto-applies
tag:blumeopsto IaC-managed resources