跳到主要内容
版本:v2.5

Enable Istio with Pod Security Policies

If you have restrictive Pod Security Policies enabled, then Istio may not be able to function correctly, because it needs certain permissions in order to install itself and manage pod infrastructure. In this section, we will configure a cluster with PSPs enabled for an Istio install, and also set up the Istio CNI plugin.

The Istio CNI plugin removes the need for each application pod to have a privileged NET_ADMIN container. For further information, see the Istio CNI Plugin docs. Please note that the Istio CNI Plugin is in alpha.

The steps differ based on the Rancher version.

Prerequisites:

  • The cluster must be an RKE Kubernetes cluster.
  • The cluster must have been created with a default PodSecurityPolicy.

To enable pod security policy support when creating a Kubernetes cluster in the Rancher UI, go to Advanced Options. In the Pod Security Policy Support section, click Enabled. Then select a default pod security policy.

  1. Set the PodSecurityPolicy to unrestricted
  2. Enable the CNI
  3. Verify that the CNI is working.

1. Set the PodSecurityPolicy to unrestricted

An unrestricted PSP allows Istio to be installed.

Set the PSP to unrestricted in the project where is Istio is installed, or the project where you plan to install Istio.

  1. From the cluster view of the Cluster Manager, select Projects/Namespaces.
  2. Find the Project: System and select the > Edit.
  3. Change the Pod Security Policy option to be unrestricted, then click Save.

2. Enable the CNI

When installing or upgrading Istio through Apps & Marketplace,

  1. Click Components.
  2. Check the box next to Enabled CNI.
  3. Finish installing or upgrading Istio.

The CNI can also be enabled by editing the values.yaml:

istio_cni.enabled: true

Istio should install successfully with the CNI enabled in the cluster.

3. Verify that the CNI is working

Verify that the CNI is working by deploying a sample application or deploying one of your own applications.