与代理建立联系:使用Tailscale将他们置于正确的对话中
Networking with agents: Put them in the right conversations with Tailscale

原始链接: https://blog.firetiger.com/networking-with-agents-how-to-put-them-in-the-right-conversations/

## Firetiger 现在可以连接到您的私有数据库 Firetiger 数据库代理旨在自动化数据库管理(Postgres、MySQL、ClickHouse),但大多数有价值的数据库都位于私有网络中,这带来了连接性挑战。传统的解决方案,如 VPC 对等互联或 VPN,复杂且容易出现问题。 Firetiger 通过 **网络传输** 来解决这个问题,首先是 **Tailscale**。Tailscale 简化了网络之间的安全连接,允许 Firetiger 代理访问您的数据库,*而无需*将其暴露到公共互联网。 操作方式如下:您使用 Tailscale 的基于身份的访问控制在您的 Tailnet 中授予 Firetiger 访问权限,创建凭据,并配置 Firetiger Tailscale 网络传输。这将建立一个安全加密的连接。 这意味着您现在可以利用 Firetiger 的自动化 DBA 和自定义代理来监控和管理您私有托管的数据库,消除盲点并简化操作——即使在复杂的网络配置下也是如此。提供了一个详细的指南,其中包含完整的设置示例。

黑客新闻 新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 使用Tailscale与代理建立网络:将它们置于正确的对话中 (firetiger.com) 12 分,由 matsur 1小时前发布 | 隐藏 | 过去 | 收藏 | 1 条评论 帮助 Avicebron 31分钟前 [–] 推理是在网络中进行吗?回复 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请YC | 联系 搜索:
相关文章

原文

We briefly considered prompting our agents with the classic networking playbook: polish the profile, craft a compelling personal narrative, ask for warm intros, comment “Insightful perspective” on questionable posts about politics in the workplace. Sadly, this did not help them reach your private Postgres database.

In theory, Firetiger Database Agents can administrate your Postgres, MySQL, and Clickhouse on autopilot. In reality, your database likely lives on a private network, never to be touched by the outside world. Surely you are doomed to a life of database blind spots, pain and suffering, right?

Wrong! Because thanks to good tools like Tailscale, connecting two things on the Internet is finally a solved problem. And now, you can connect Firetiger to your Tailnet, allowing Firetiger DBAs and other Agents to securely observe and operate your privately networked infrastructure.

Why is this needed?

Most interesting databases live on private networks. This creates a real problem for any system running on the Internet, Firetiger included, that needs to actually talk to those databases.

There are a few options to bridge the gap from agent on one network to database on another. VPC peering, but you'll hit overlapping CIDR blocks on the count of three. AWS PrivateLink, which works great if everyone is on AWS and you enjoy configuring Network Load Balancers for fun. Site-to-site VPNs, code for “six hours debugging IPsec tunnels”. Bastion hosts, which are lovely until someone forgets to rotate the SSH keys.

Enter Firetiger Network Transports

We built Firetiger Network Transports as a way to connect agents to private network resources. A network transport is how Firetiger gets from our infrastructure to yours: the underlay for your connections. By default, we use the public internet. But now you can plug in other methods, with the first we're shipping Tailscale.

Tailscale makes connecting two things on the Internet very simple: You install it on both sides, and they can securely talk to each other with end-to-end encryption. It works no matter what cloud you're on, what NAT you're behind, or how your VPC is configured. 

With our Tailscale transport, Firetiger joins your Tailnet as an ephemeral device, scoped to the permissions you define in Tailscale’s identity-based access controls. Your database stays off the public internet, without sacrificing secure access.

Here’s how it works:

Grant Firetiger access to your database within your Tailnet

Update Tailscale ACLs accordingly. For example:

{
  // create a new tag for firetiger devices
  "tagOwners": {
      "tag:firetiger": ["autogroup:admin"]
  },
  // Allow firetiger devices to connect to your postgres databases
  "grants": [
      {
          "src": ["tag:firetiger"],
          "dst": ["*"],
          "ip": ["5432"]
      }
  ]
}

Create Tailscale Credentials for Firetiger

You’ll need to give it permission to write Auth Keys, for the tag you created earlier. This allows Firetiger to connect to your Tailnet using ephemeral devices

Create a Firetiger Tailscale Network Transport

Firetiger Network Transports allow you to proxy connections to your infrastructure by various means, including Tailscale. Here we create Tailscale Network Transport, and plug in our Tailscale OAuth Credentials:

Create a Connection Using Your Tailscale Network Transport

Finally, you can connect your database (or any other connection type) to Firetiger, and configure it to use the tailscale network transport.

Configure your agent

Set up our preconfigured DBA (database agent) to make sure your database is healthy, or build custom agents with outcomes and objectives specific to your company. Thanks to Firetiger Network Transports, our agents can help you get to good outcomes even if your database is ensconced on a private network.

That’s it! 

For a complete end-to-end example, check out this guide on how to connect your private database to Firetiger using Tailscale.

You can sign up for Firetiger today and give Network Transports a spin.

联系我们 contact @ memedata.com