And now fix a bunch of markdown issues.

This commit is contained in:
mtail 2018-05-18 05:34:02 -07:00
parent c4d8330732
commit e667b96a23
1 changed files with 12 additions and 12 deletions

View File

@ -96,12 +96,13 @@ Configure `kubectl` CLI based on steps [here](https://www.ibm.com/support/knowle
OpenShift by default does not allow containers running with UID 0. Enable containers running
with UID 0 for Istio's service accounts for ingress as well the Prometheus and Grafana addons:
```bash
oc adm policy add-scc-to-user anyuid -z istio-ingress-service-account -n istio-system
oc adm policy add-scc-to-user anyuid -z default -n istio-system
oc adm policy add-scc-to-user anyuid -z grafana -n istio-system
oc adm policy add-scc-to-user anyuid -z prometheus -n istio-system
```command
$ oc adm policy add-scc-to-user anyuid -z istio-ingress-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z default -n istio-system
$ oc adm policy add-scc-to-user anyuid -z grafana -n istio-system
$ oc adm policy add-scc-to-user anyuid -z prometheus -n istio-system
```
Service account that runs application pods need privileged security context constraints as part of sidecar injection.
```command
@ -241,7 +242,6 @@ For example, run the following command on a MacOS or Linux system:
$ export PATH=$PWD/bin:$PATH
```
## Installation steps
1. Install Istio's core components. Choose one of the three _**mutually exclusive**_ options below fo quick install. However, we recommend you to install