Networking with agents: Put them in the right conversations with Tailscale

Published: (March 10, 2026 at 02:38 PM EDT)
4 min read

Source: Hacker News

We briefly considered prompting our agents with the classic networking playbook: polish the profile, craft a compelling personal narrative, ask for warm intros, comment “Insightful perspective” on questionable posts about politics in the workplace. Sadly, this did not help them reach your private Postgres database.

In theory, Firetiger Database Agents can administrate your Postgres, MySQL, and ClickHouse on autopilot. In reality, your database likely lives on a private network, never to be touched by the outside world. Surely you are doomed to a life of database blind spots, pain and suffering, right?

Wrong! Thanks to tools like Tailscale, connecting two things on the Internet is finally a solved problem. You can now connect Firetiger to your Tailnet, allowing Firetiger DBAs and other agents to securely observe and operate your privately networked infrastructure.

Why is this needed?

Most interesting databases live on private networks. This creates a real problem for any system running on the Internet, Firetiger included, that needs to talk to those databases.

There are a few options to bridge the gap from an agent on one network to a database on another:

  • VPC peering – you’ll quickly hit overlapping CIDR blocks.
  • AWS PrivateLink – works great if everyone is on AWS, but requires configuring Network Load Balancers.
  • Site‑to‑site VPNs – often result in “six hours debugging IPsec tunnels”.
  • Bastion hosts – useful until someone forgets to rotate the SSH keys.

Enter Firetiger Network Transports

We built Firetiger Network Transports as a way to connect agents to private network resources. A network transport is the underlay that lets Firetiger reach your infrastructure. By default we use the public internet, but you can now plug in other methods—starting with Tailscale.

Tailscale makes connecting two endpoints simple: install it on both sides and they can securely talk to each other with end‑to‑end encryption, regardless of cloud provider, NAT, or VPC configuration.

With our Tailscale transport, Firetiger joins your Tailnet as an ephemeral device, scoped to the permissions you define in Tailscale’s identity‑based access controls. Your database stays off the public internet without sacrificing secure access.

Here’s how it works:

Grant Firetiger access to your database within your Tailnet

Update Tailscale ACLs accordingly. For example:

{
  // create a new tag for firetiger devices
  "tagOwners": {
    "tag:firetiger": ["autogroup:admin"]
  },
  // Allow firetiger devices to connect to your postgres databases
  "grants": [
    {
      "src": ["tag:firetiger"],
      "dst": ["*"],
      "ip": ["5432"]
    }
  ]
}

Create Tailscale credentials for Firetiger

You’ll need permission to write Auth Keys for the tag you created earlier. This allows Firetiger to connect to your Tailnet using ephemeral devices.

Tailscale credential screen 1 Tailscale credential screen 2

Create a Firetiger Tailscale Network Transport

Firetiger Network Transports let you proxy connections to your infrastructure by various means, including Tailscale. Here we create a Tailscale Network Transport and plug in our Tailscale OAuth credentials.

Create Tailscale transport UI

Create a connection using your Tailscale Network Transport

Now you can connect your database (or any other resource) to Firetiger and configure it to use the Tailscale transport.

Create connection UI

Configure your agent

Set up our pre‑configured DBA (database agent) to monitor health, or build custom agents with outcomes specific to your company. Thanks to Firetiger Network Transports, agents can operate even when the database resides on a private network.

Agent configuration UI

That’s it!

For a complete end‑to‑end example, see the guide on how to connect your private database to Firetiger using Tailscale.

You can also sign up for Firetiger today and give Network Transports a spin.

0 views
Back to Blog

Related posts

Read more »

Cloudflare Crawl Endpoint

Article URL: https://developers.cloudflare.com/changelog/post/2026-03-10-br-crawl-endpoint/ Comments URL: https://news.ycombinator.com/item?id=47329557 Points:...

RISC-V Is Sloooow

Triaging I went through the Fedora RISC‑V trackerhttps://abologna.gitlab.io/fedora-riscv-tracker/ entries, triaged most of them currently 17 entries remain in...

Mother of All Grease Fires (1994)

Background I work in the very center of Palo Alto, in a computer‑company office building that is surrounded by restaurants, hotels, a bank, an art‑supply store...