Fix OpenShift code blocks.

Improve grammar while I was in the neighborhood.
This commit is contained in:
mtail 2018-07-25 19:39:20 -07:00
parent 2e48e07bef
commit eb46b2af6e
6 changed files with 26 additions and 29 deletions

View File

@ -5,7 +5,7 @@ weight: 3
keywords: [platform-setup,aws]
---
To setup the AWS with Kops cluster for Istio, follow these instructions:
Follow these instructions to prepare an AWS cluster with Kops for Istio.
When you install a new cluster with Kubernetes version 1.9, the prerequisite to
enable `admissionregistration.k8s.io/v1beta1` is covered.

View File

@ -5,11 +5,11 @@ weight: 6
keywords: [platform-setup,azure]
---
To setup the Azure cluster for Istio, follow these instructions:
Follow these instructions to prepare an Azure cluster for Istio.
You can deploy a Kubernetes cluster to Azure via [AKS](https://azure.microsoft.com/en-us/services/kubernetes-service/) or [ACS-Engine](https://github.com/azure/acs-engine) which fully supports Istio.
## Instructions for AKS
## AKS
You can create an AKS cluster via [the az cli](https://docs.microsoft.com/en-us/azure/aks/kubernetes-walkthrough) or [the Azure portal](https://docs.microsoft.com/en-us/azure/aks/kubernetes-walkthrough-portal).
@ -48,7 +48,7 @@ For the `az` cli option, complete `az login` authentication OR use cloud shell,
$ az aks get-credentials --resource-group myResourceGroup --name myAKSCluster
{{< /text >}}
## Instructions for ACS-Engine
## ACS-Engine
1. [Follow the instructions](https://github.com/Azure/acs-engine/blob/master/docs/acsengine.md#install) to get and install the `acs-engine` binary.

View File

@ -5,7 +5,7 @@ weight: 9
keywords: [platform-setup,kubernetes,gke,google]
---
To setup the Google Kubernetes Engine cluster for Istio, follow these instructions:
Follow these instructions to prepare an GKE cluster for Istio.
1. Create a new cluster.

View File

@ -5,9 +5,7 @@ weight: 12
keywords: [platform-setup,ibm,iks]
---
To setup the IBM Cloud Kubernetes Service (IKS) cluster for Istio, follow these instructions:
## IBM Cloud Kubernetes Service (IKS)
Follow these instructions to prepare an IBM IKS cluster for Istio.
1. Create a new lite cluster.

View File

@ -5,7 +5,7 @@ weight: 15
keywords: [platform-setup,kubernetes,minikube]
---
To setup the Kubernetes cluster for Istio with Minikube, follow these instructions:
Follow these instructions to prepare Minikube for Istio.
1. To run Istio locally, install the latest version of
[Minikube](https://kubernetes.io/docs/setup/minikube/), version **0.28.0 or

View File

@ -5,26 +5,25 @@ weight: 18
keywords: [platform-setup,openshift]
---
To setup an OpenShift cluster for Istio, follow these instructions:
Follow these instructions to prepare an OpenShift cluster for Istio.
By default, OpenShift doesn't allow containers running with user ID 0.
You must enable containers running with UID 0 for Istio's service accounts:
Enable containers running with UID 0 for Istio's service accounts:
{{< text bash >}}
$ oc adm policy add-scc-to-user anyuid -z istio-ingress-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z default -n istio-system
$ oc adm policy add-scc-to-user anyuid -z prometheus -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-egressgateway-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-citadel-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-ingressgateway-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-cleanup-old-ca-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-mixer-post-install-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-mixer-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-pilot-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-sidecar-injector-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-galley-service-account -n istio-system
{{< /text >}}
{{< text bash >}}
$ oc adm policy add-scc-to-user anyuid -z istio-ingress-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z default -n istio-system
$ oc adm policy add-scc-to-user anyuid -z prometheus -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-egressgateway-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-citadel-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-ingressgateway-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-cleanup-old-ca-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-mixer-post-install-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-mixer-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-pilot-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-sidecar-injector-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-galley-service-account -n istio-system
{{< /text >}}
The list above accounts for the default Istio service accounts. If you enabled
other Istio services, like _Grafana_ for example, you need to enable its
@ -33,9 +32,9 @@ service account with a similar command.
A service account that runs application pods needs privileged security context
constraints as part of sidecar injection.
{{< text bash >}}
$ oc adm policy add-scc-to-user privileged -z default -n <target-namespace>
{{< /text >}}
{{< text bash >}}
$ oc adm policy add-scc-to-user privileged -z default -n <target-namespace>
{{< /text >}}
> Check for `SELINUX` in this [discussion](https://github.com/istio/issues/issues/34)
> with respect to Istio in case you see issues bringing up the Envoy.