Network overview: Your device <-- internet --> VPN-provider <-- tailnet --> Kubernetes-Pod <-- vpn --> Internet
- Go into the AIRVPN client area and create a new device and a generate a configuration for the device.
- Go into the tailscale dashboard add a Linux server and note down the auth key
- Fill out the details in the secrets
- Apply the resources
DNS is using kubernetes internal DNS, so it is leaking. This is because tailscale needs access to the kubernetes API, and I have not figured out how to split DNS lookup.
Direct connection to tailscale on Kubernetes without going through the VPN provider would be nice. However, I have not figured out if tailscale can be forced to advertise a specific public ip:port.