Home / Companies / Tailscale / Blog / Post Details
Content Deep Dive

Network flow logs is generally available

Blog post from Tailscale

Post Details
Company
Date Published
Author
Pouyan Aminian and Jairo Camacho
Word Count
150
Language
-
Hacker News Points
-
Summary

Network flow logs are now generally available for Tailscale customers, enabling them to monitor network activity within their tailnet to detect threats, investigate security incidents, and maintain compliance with security policies. These logs capture metadata about network traffic without recording content, ensuring connections remain end-to-end encrypted and inaccessible to Tailscale. Available for Premium and Enterprise plan customers, log streaming, including configuration audit logs, is also offered to Enterprise plan users. To utilize these features, customers are encouraged to consult the documentation on logging and events.