Fix OpenShift code blocks.

Improve grammar while I was in the neighborhood.
This commit is contained in:
mtail 2018-07-25 19:39:20 -07:00
parent 2e48e07bef
commit eb46b2af6e
6 changed files with 26 additions and 29 deletions

View File

@ -5,7 +5,7 @@ weight: 3
keywords: [platform-setup,aws] keywords: [platform-setup,aws]
--- ---
To setup the AWS with Kops cluster for Istio, follow these instructions: Follow these instructions to prepare an AWS cluster with Kops for Istio.
When you install a new cluster with Kubernetes version 1.9, the prerequisite to When you install a new cluster with Kubernetes version 1.9, the prerequisite to
enable `admissionregistration.k8s.io/v1beta1` is covered. enable `admissionregistration.k8s.io/v1beta1` is covered.

View File

@ -5,11 +5,11 @@ weight: 6
keywords: [platform-setup,azure] keywords: [platform-setup,azure]
--- ---
To setup the Azure cluster for Istio, follow these instructions: Follow these instructions to prepare an Azure cluster for Istio.
You can deploy a Kubernetes cluster to Azure via [AKS](https://azure.microsoft.com/en-us/services/kubernetes-service/) or [ACS-Engine](https://github.com/azure/acs-engine) which fully supports Istio. You can deploy a Kubernetes cluster to Azure via [AKS](https://azure.microsoft.com/en-us/services/kubernetes-service/) or [ACS-Engine](https://github.com/azure/acs-engine) which fully supports Istio.
## Instructions for AKS ## AKS
You can create an AKS cluster via [the az cli](https://docs.microsoft.com/en-us/azure/aks/kubernetes-walkthrough) or [the Azure portal](https://docs.microsoft.com/en-us/azure/aks/kubernetes-walkthrough-portal). You can create an AKS cluster via [the az cli](https://docs.microsoft.com/en-us/azure/aks/kubernetes-walkthrough) or [the Azure portal](https://docs.microsoft.com/en-us/azure/aks/kubernetes-walkthrough-portal).
@ -48,7 +48,7 @@ For the `az` cli option, complete `az login` authentication OR use cloud shell,
$ az aks get-credentials --resource-group myResourceGroup --name myAKSCluster $ az aks get-credentials --resource-group myResourceGroup --name myAKSCluster
{{< /text >}} {{< /text >}}
## Instructions for ACS-Engine ## ACS-Engine
1. [Follow the instructions](https://github.com/Azure/acs-engine/blob/master/docs/acsengine.md#install) to get and install the `acs-engine` binary. 1. [Follow the instructions](https://github.com/Azure/acs-engine/blob/master/docs/acsengine.md#install) to get and install the `acs-engine` binary.

View File

@ -5,7 +5,7 @@ weight: 9
keywords: [platform-setup,kubernetes,gke,google] keywords: [platform-setup,kubernetes,gke,google]
--- ---
To setup the Google Kubernetes Engine cluster for Istio, follow these instructions: Follow these instructions to prepare an GKE cluster for Istio.
1. Create a new cluster. 1. Create a new cluster.

View File

@ -5,9 +5,7 @@ weight: 12
keywords: [platform-setup,ibm,iks] keywords: [platform-setup,ibm,iks]
--- ---
To setup the IBM Cloud Kubernetes Service (IKS) cluster for Istio, follow these instructions: Follow these instructions to prepare an IBM IKS cluster for Istio.
## IBM Cloud Kubernetes Service (IKS)
1. Create a new lite cluster. 1. Create a new lite cluster.

View File

@ -5,7 +5,7 @@ weight: 15
keywords: [platform-setup,kubernetes,minikube] keywords: [platform-setup,kubernetes,minikube]
--- ---
To setup the Kubernetes cluster for Istio with Minikube, follow these instructions: Follow these instructions to prepare Minikube for Istio.
1. To run Istio locally, install the latest version of 1. To run Istio locally, install the latest version of
[Minikube](https://kubernetes.io/docs/setup/minikube/), version **0.28.0 or [Minikube](https://kubernetes.io/docs/setup/minikube/), version **0.28.0 or

View File

@ -5,26 +5,25 @@ weight: 18
keywords: [platform-setup,openshift] keywords: [platform-setup,openshift]
--- ---
To setup an OpenShift cluster for Istio, follow these instructions: Follow these instructions to prepare an OpenShift cluster for Istio.
By default, OpenShift doesn't allow containers running with user ID 0. By default, OpenShift doesn't allow containers running with user ID 0.
You must enable containers running with UID 0 for Istio's service accounts:
Enable containers running with UID 0 for Istio's service accounts: {{< text bash >}}
$ oc adm policy add-scc-to-user anyuid -z istio-ingress-service-account -n istio-system
{{< text bash >}} $ oc adm policy add-scc-to-user anyuid -z default -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-ingress-service-account -n istio-system $ oc adm policy add-scc-to-user anyuid -z prometheus -n istio-system
$ oc adm policy add-scc-to-user anyuid -z default -n istio-system $ oc adm policy add-scc-to-user anyuid -z istio-egressgateway-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z prometheus -n istio-system $ oc adm policy add-scc-to-user anyuid -z istio-citadel-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-egressgateway-service-account -n istio-system $ oc adm policy add-scc-to-user anyuid -z istio-ingressgateway-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-citadel-service-account -n istio-system $ oc adm policy add-scc-to-user anyuid -z istio-cleanup-old-ca-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-ingressgateway-service-account -n istio-system $ oc adm policy add-scc-to-user anyuid -z istio-mixer-post-install-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-cleanup-old-ca-service-account -n istio-system $ oc adm policy add-scc-to-user anyuid -z istio-mixer-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-mixer-post-install-account -n istio-system $ oc adm policy add-scc-to-user anyuid -z istio-pilot-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-mixer-service-account -n istio-system $ oc adm policy add-scc-to-user anyuid -z istio-sidecar-injector-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-pilot-service-account -n istio-system $ oc adm policy add-scc-to-user anyuid -z istio-galley-service-account -n istio-system
$ oc adm policy add-scc-to-user anyuid -z istio-sidecar-injector-service-account -n istio-system {{< /text >}}
$ oc adm policy add-scc-to-user anyuid -z istio-galley-service-account -n istio-system
{{< /text >}}
The list above accounts for the default Istio service accounts. If you enabled The list above accounts for the default Istio service accounts. If you enabled
other Istio services, like _Grafana_ for example, you need to enable its other Istio services, like _Grafana_ for example, you need to enable its
@ -33,9 +32,9 @@ service account with a similar command.
A service account that runs application pods needs privileged security context A service account that runs application pods needs privileged security context
constraints as part of sidecar injection. constraints as part of sidecar injection.
{{< text bash >}} {{< text bash >}}
$ oc adm policy add-scc-to-user privileged -z default -n <target-namespace> $ oc adm policy add-scc-to-user privileged -z default -n <target-namespace>
{{< /text >}} {{< /text >}}
> Check for `SELINUX` in this [discussion](https://github.com/istio/issues/issues/34) > Check for `SELINUX` in this [discussion](https://github.com/istio/issues/issues/34)
> with respect to Istio in case you see issues bringing up the Envoy. > with respect to Istio in case you see issues bringing up the Envoy.