mirror of https://github.com/istio/istio.io.git
And now fix a bunch of markdown issues.
This commit is contained in:
parent
c4d8330732
commit
e667b96a23
|
@ -96,12 +96,13 @@ Configure `kubectl` CLI based on steps [here](https://www.ibm.com/support/knowle
|
|||
OpenShift by default does not allow containers running with UID 0. Enable containers running
|
||||
with UID 0 for Istio's service accounts for ingress as well the Prometheus and Grafana addons:
|
||||
|
||||
```bash
|
||||
oc adm policy add-scc-to-user anyuid -z istio-ingress-service-account -n istio-system
|
||||
oc adm policy add-scc-to-user anyuid -z default -n istio-system
|
||||
oc adm policy add-scc-to-user anyuid -z grafana -n istio-system
|
||||
oc adm policy add-scc-to-user anyuid -z prometheus -n istio-system
|
||||
```command
|
||||
$ oc adm policy add-scc-to-user anyuid -z istio-ingress-service-account -n istio-system
|
||||
$ oc adm policy add-scc-to-user anyuid -z default -n istio-system
|
||||
$ oc adm policy add-scc-to-user anyuid -z grafana -n istio-system
|
||||
$ oc adm policy add-scc-to-user anyuid -z prometheus -n istio-system
|
||||
```
|
||||
|
||||
Service account that runs application pods need privileged security context constraints as part of sidecar injection.
|
||||
|
||||
```command
|
||||
|
@ -241,7 +242,6 @@ For example, run the following command on a MacOS or Linux system:
|
|||
$ export PATH=$PWD/bin:$PATH
|
||||
```
|
||||
|
||||
|
||||
## Installation steps
|
||||
|
||||
1. Install Istio's core components. Choose one of the three _**mutually exclusive**_ options below fo quick install. However, we recommend you to install
|
||||
|
|
Loading…
Reference in New Issue