I'm trying to set up a Tailscale node as a relay to my AWS VPC. I've followed the instructions here to the letter, multiple times. Unfortunately, I just cannot seem to ssh to the second (non-Tailscale) instance. My process, briefly:
Set up an AWS VPC with the VPC wizard
create an instance
tailscale-relayon the VPC, on the public subnet, with SSH enabled, and my private key. Assign it a new Security Group calledsg-tailscale-relayssh to
tailscale-relay, install tailscaleenable IP forwarding (per docs here)
sudo tailscale up --advertise-routes=10.0.0.0/24, where10.0.0.0/24is the range specified in the private subnet (and equivalently in the public subnet, see photo at bottom)disable key expiry and authorize subnet routes for this node in the Tailscale console
close off ssh access to
tailscale-relayin its Security Group, then verify that I can ssh to it with it's Tailscale IP (annoyingly, still requiring my.pemkey)create another instance,
test-tailscale, assign it to the same VPC but to the private subnet. Do NOT give it a public IP. Allow all inbound traffic from thesg-tailscale-relaysubnet, but not from anywhere elseThen, from my local machine, SSH to the private IP of
test-tailscaletimes out.I can
pingtest-tailscalefromtailscale-relay(but nottailscale ping, obviously)
What gives? I don't understand what I'm doing wrong.
- Bonus: Can I ssh without the private key?