mirror of https://github.com/istio/istio.io.git
Change the installation instructions for Openshift (#856)
The documentation change here reflects the work that was done on: https://github.com/istio/istio/pull/2465 and should only be merged IFF the aforementioned PR is merged
This commit is contained in:
parent
dc3511ed14
commit
9e6c08bb9a
|
@ -60,10 +60,11 @@ support).
|
||||||
* [Openshift Origin](https://www.openshift.org) version 3.7 or later
|
* [Openshift Origin](https://www.openshift.org) version 3.7 or later
|
||||||
|
|
||||||
* Openshift by default does not allow containers running with UID 0. Enable containers running
|
* Openshift by default does not allow containers running with UID 0. Enable containers running
|
||||||
with UID 0 for Istio's service accounts for ingress and egress:
|
with UID 0 for Istio's service accounts for ingress as well the Prometheus and Grafana addons:
|
||||||
```bash
|
```bash
|
||||||
oc adm policy add-scc-to-user anyuid -z istio-ingress-service-account -n istio-system
|
oc adm policy add-scc-to-user anyuid -z istio-ingress-service-account -n istio-system
|
||||||
oc adm policy add-scc-to-user anyuid -z default -n istio-system
|
oc adm policy add-scc-to-user anyuid -z istio-grafana-service-account -n istio-system
|
||||||
|
oc adm policy add-scc-to-user anyuid -z istio-prometheus-service-account -n istio-system
|
||||||
```
|
```
|
||||||
|
|
||||||
* Service account that runs application pods need privileged security context constraints as part of sidecar injection.
|
* Service account that runs application pods need privileged security context constraints as part of sidecar injection.
|
||||||
|
|
Loading…
Reference in New Issue