If you have restrictive Pod Security Policies enabled, then Istio may not be able to function correctly, because it needs certain permissions in order to install itself and manage pod infrastructure. In this section, we will configure a cluster with PSPs enabled for an Istio install, and also set up the Istio CNI plugin.

The Istio CNI plugin removes the need for each application pod to have a privileged NET_ADMIN container. For further information, see the Istio CNI Plugin docs. Please note that the Istio CNI Plugin is in alpha.

The steps differ based on the Rancher version.

Prerequisites:

  • The cluster must be an RKE Kubernetes cluster.
  • The cluster must have been created with a default PodSecurityPolicy.

To enable pod security policy support when creating a Kubernetes cluster in the Rancher UI, go to Advanced Options. In the Pod Security Policy Support section, click Enabled. Then select a default pod security policy.

  1. Set the PodSecurityPolicy to unrestricted
  2. Enable the CNI
  3. Verify that the CNI is working.

1. Set the PodSecurityPolicy to unrestricted

An unrestricted PSP allows Istio to be installed.

Set the PSP to unrestricted in the project where is Istio is installed, or the project where you plan to install Istio.

  1. From the cluster view of the Cluster Manager, select Projects/Namespaces.
  2. Find the Project: System and select the ⋮ > Edit.
  3. Change the Pod Security Policy option to be unrestricted, then click Save.

2. Enable the CNI

When installing or upgrading Istio through Apps & Marketplace,

  1. Click Components.
  2. Check the box next to Enabled CNI.
  3. Finish installing or upgrading Istio.

The CNI can also be enabled by editing the values.yaml:

  1. istio_cni.enabled: true

Istio should install successfully with the CNI enabled in the cluster.

3. Verify that the CNI is working

Verify that the CNI is working by deploying a sample application or deploying one of your own applications.

Prerequisites:

  • The cluster must be an RKE Kubernetes cluster.
  • The cluster must have been created with a default PodSecurityPolicy.

To enable pod security policy support when creating a Kubernetes cluster in the Rancher UI, go to Advanced Options. In the Pod Security Policy Support section, click Enabled. Then select a default pod security policy.

  1. Configure the System Project Policy to allow Istio install.
  2. Install the CNI plugin in the System project.
  3. Install Istio.

1. Configure the System Project Policy to allow Istio install

  1. From the cluster view of the Cluster Manager, select Projects/Namespaces.
  2. Find the Project: System and select the ⋮ > Edit.
  3. Change the Pod Security Policy option to be unrestricted, then click Save.

2. Install the CNI Plugin in the System Project

  1. From the main menu of the Dashboard, select Projects/Namespaces.
  2. Select the Project: System project.
  3. Choose Tools > Catalogs in the navigation bar.
  4. Add a catalog with the following:
    1. Name: istio-cni
    2. Catalog URL: https://github.com/istio/cni
    3. Branch: The branch that matches your current release, for example: release-1.4.
  5. From the main menu select Apps
  6. Click Launch and select istio-cni
  7. Update the namespace to be “kube-system”
  8. In the answers section, click “Edit as YAML” and paste in the following, then click launch:
  1. ---
  2. logLevel: "info"
  3. excludeNamespaces:
  4. - "istio-system"
  5. - "kube-system"

3. Install Istio

Follow the primary instructions, adding a custom answer: istio_cni.enabled: true.

After Istio has finished installing, the Apps page in System Projects should show both istio and istio-cni applications deployed successfully. Sidecar injection will now be functional.