Content Deep Dive
Network flow logs is generally available
Blog post from Tailscale
Post Details
Company
Date Published
Author
Pouyan Aminian and Jairo Camacho
Word Count
150
Language
-
Hacker News Points
-
Summary
Network flow logs are now generally available for Tailscale customers, enabling them to monitor network activity within their tailnet to detect threats, investigate security incidents, and maintain compliance with security policies. These logs capture metadata about network traffic without recording content, ensuring connections remain end-to-end encrypted and inaccessible to Tailscale. Available for Premium and Enterprise plan customers, log streaming, including configuration audit logs, is also offered to Enterprise plan users. To utilize these features, customers are encouraged to consult the documentation on logging and events.