diff --git a/documentation/modules/ROOT/pages/1setup.adoc b/documentation/modules/ROOT/pages/1setup.adoc index 6202911c..06e43231 100644 --- a/documentation/modules/ROOT/pages/1setup.adoc +++ b/documentation/modules/ROOT/pages/1setup.adoc @@ -116,6 +116,14 @@ kubectl config set-context $(kubectl config current-context) --namespace=istio-s IMPORTANT: `istio-demo.yaml` enables policy enforcement by default which is required in some sections of the tutorial. Please refer to https://istio.io/docs/tasks/policy-enforcement/enabling-policy/ if you are not using this file. +If using OpenShift, modify security contexts to ensure that all pods start properly. + +[.console-input] +[source,bash,subs="attributes+,+macros"] +--- +oc adm policy add-scc-to-group anyuid system:serviceaccounts:istio-system +--- + Wait for Istio's components to be ready [.console-input] @@ -149,7 +157,19 @@ Istio is supported in OpenShift by Red Hat OpenShift Service Mesh operator. To install it, you need to follow the instructions written in: https://docs.openshift.com/container-platform/4.3/service_mesh/service_mesh_install/preparing-ossm-installation.html -It is important that after you finish with the installation, all the required pods are delpyed in `istio-system` namespace: +-- +Minishift:: ++ +--- +Modify security contexts to ensure that all pods start properly. + +[.console-input] +[source,bash,subs="attributes+,+macros"] +---- +oc adm policy add-scc-to-group anyuid system:serviceaccounts:istio-system +---- + +It is important that after you finish with the installation, all the required pods are deployed in `istio-system` namespace: [.console-input] [source,bash,subs="attributes+,+macros"] @@ -175,4 +195,4 @@ kiali-78d9c5b87c-snjzh 0/1 Running 0 2 prometheus-6dff867c97-gr2n5 2/2 Running 0 28h ---- -- -==== \ No newline at end of file +====