Try our new research platform with insights from 80,000+ expert users
reviewer2797194 - PeerSpot reviewer
Software Engineer
Real User
Top 5Leaderboard
Jan 20, 2026
Securing private cloud workflows has protected sensitive AWS resources with fine-grained access
Pros and Cons
  • "The security is valuable, as there are many providers available, but Tailscale fulfills the requirements that we had, allowing us to access and expose internal apps without exposing them to the general internet."
  • "Regarding how Tailscale can be improved, I think for free users, there are some limited options."

What is our primary use case?

We have been using Tailscale for about four or five months, and we have been using it from the beginning.

For our main use case, we use Tailscale because it creates a peer-to-peer VPN mesh where we host our AWS infrastructure behind it, so the general web cannot directly access it. It is only accessible from authorized systems, such as the one that I have.

A specific example of how we use Tailscale for this peer-to-peer VPN mesh in my daily work is that the entirety of our AWS infrastructure and systems that we use to build at Flyra are behind a private VPN that is accessible using Tailscale. The general web cannot access it, so we ensure that there is nothing unauthorized accessing our servers. Authorized and recognized systems are only able to access the infrastructure and the resources that we want restricted, and that is where Tailscale comes in.

About my main use case, I am fully aware that it is end-to-end encrypted. We maintain access using ACLs, which allows us to fine-tune the fine-grained rules for who can connect and to what.

What is most valuable?

The best features Tailscale offers are highlighted by the fact that setting up Tailscale was straightforward, at least once you are following the documentation and the guides. The security is valuable, as there are many providers available, but Tailscale fulfills the requirements that we had, allowing us to access and expose internal apps without exposing them to the general internet. The complex site-to-site connections are replaced using VPNs, and we can SSH into our remote desktops or SSH into our EC2 machines in our AWS regions in a secure way.

About the features that make Tailscale stand out for me, with access control lists, we can fine-grain what can be accessed and by whom. It solved our base use case, which is keeping our secured infrastructure behind a private VPN, and that is why we started using it in the first place.

Tailscale has had more positive impacts on my organization regarding security.

What needs improvement?

Regarding how Tailscale can be improved, I think for free users, there are some limited options. However, we have a paid policy, so we pay Tailscale every month. At some point, we may want to host our own coordination servers, which Tailscale does not have right now. However, it is just a general consideration, and I doubt that we will have that problem soon.

Regarding the needed improvements for paid users, I think things are acceptable. The limits could be higher for free users, and that is all.

For how long have I used the solution?

I have been a software developer for about two years, and that represents full-time experience.

Buyer's Guide
Enterprise Infrastructure VPN
February 2026
Find out what your peers are saying about Tailscale, Twingate, Fortinet and others in Enterprise Infrastructure VPN. Updated: February 2026.
884,873 professionals have used our research since 2012.

What other advice do I have?

My advice to others looking into using Tailscale is that if there is a use case where you want to secure your private EC2 instances, the workflows, your Git repositories, and sensitive data, Docker images, Maven builds, Gradle builds, and so forth, behind and away from the general internet and onto your private cloud, Tailscale can act as that link, allowing you access to that private information from authorized systems while also fine-graining that control. I would rate this product a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jan 20, 2026
Flag as inappropriate
PeerSpot user
Data Engineer at a consultancy with 11-50 employees
Real User
Mar 25, 2026
Secure access to kubernetes services has become seamless and has simplified my daily work

What is our primary use case?

My main use case of Tailscale is for creating a VPN between Kubernetes services in Oracle Cloud, other servers, and my PC to connect with them, and I also use it to expose some services, so instead of port forwarding some services of Kubernetes, I use Tailscale, which makes things very easy and usable.

Regarding exposing services, I use Grafana and for Tailscale, I expose that service so I can access it through the VPN instead of port forwarding the service. I also use it to expose a Kafka UI service, and I use Kafka in my job.

What is most valuable?

The best feature I like in Tailscale is the Tailscale operator, which is a very intelligent way to connect your Kubernetes cluster with any other device.

In my job, Tailscale has reduced the amount of work and headache of having a VPN between servers and cloud, so instead of following a longer and complex process of having a site-to-site VPN and a device with a fixed public IP to connect with the cloud and other spots in Morocco, especially in Tangier, Tailscale simplifies all of that.

It reduces work, so I was supposed to have a complex job that requires technical knowledge to do some networking tasks, but Tailscale provides a very straightforward solution to avoid a lot of work.

What needs improvement?

I still do not have any issues in mind that need improvement, but if I think about a new feature or something to be improved in the future, I may share it with you.

For how long have I used the solution?

I have been using the solution for about seven months.

What do I think about the stability of the solution?

Tailscale is very stable in my experience.

What do I think about the scalability of the solution?

Tailscale's scalability is actually so good; I have not faced any downtime or issues, so every time I use Tailscale, I get what I expect.

Which solution did I use previously and why did I switch?

Before Tailscale, I used Headscale, which is an open-source implementation of Tailscale. I deployed Headscale to avoid dependencies, but it had many downsides; it did not have an operator for Kubernetes and needed many features, so Headscale was not enough. I also used OpenVPN, but it does not have the integrations and intelligence that Tailscale has, so I am satisfied with Tailscale and I will continue to use it for many months.

I evaluated Headscale, but it was not enough compared to Tailscale.

What other advice do I have?

I think it is a very good solution; however, I think a ten is something very perfect, and I feel Tailscale has many things to do in the future, such as getting more integrations into other things.

For others looking to use Tailscale, I want to tell them you will not regret it ever; Tailscale is a very good and useful solution.

I think it saves me time and money since the current tier I use is the free one, so it saves money and time, and that is good. I give this review a rating of eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Mar 25, 2026
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Enterprise Infrastructure VPN Report and find out what your peers are saying about Tailscale, Twingate, Fortinet, and more!
Updated: February 2026
Buyer's Guide
Download our free Enterprise Infrastructure VPN Report and find out what your peers are saying about Tailscale, Twingate, Fortinet, and more!