Skip to content

Instantly share code, notes, and snippets.

@ceizner
Last active April 26, 2018 18:35
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save ceizner/5d9c886e7048e6e17403c21df0186fbe to your computer and use it in GitHub Desktop.
Save ceizner/5d9c886e7048e6e17403c21df0186fbe to your computer and use it in GitHub Desktop.
1. wget -O docker.deb https://apt.dockerproject.org/repo/pool/main/d/docker-engine/docker-engine_1.10.3-0~jessie_amd64.deb && dpkg -i docker.deb
2. vi /lib/systemd/system/docker.service and add "--insecure-registry 172.30.0.0/16" to the docker command line
3. wget https://github.com/openshift/origin/releases/download/v1.4.1/openshift-origin-server-v1.4.1-3f9807a-linux-64bit.tar.gz
tar -xzvf openshift-origin-server-v1.4.1-3f9807a-linux-64bit.tar.gz
cd openshift-origin-server-v1.4.1+3f9807a-linux-64bit
cp * /usr/local/bin/
metadata_endpoint="http://169.254.169.254/latest/meta-data"
public_hostname="$( curl -s "${metadata_endpoint}/public-hostname" )"
public_ip="$( curl -s "${metadata_endpoint}/public-ipv4" )"
oc cluster up --public-hostname="${public_hostname}" --routing-suffix="${public_ip}.nip.io"
If you want to run sysdig backend on opneshift use service account for example on project eizner account *costa*
Also update redis and elasticsearch deployments to use service account
oc adm policy add-scc-to-user privileged system:serviceaccount:eizner:costa
oc adm policy add-scc-to-user anyuid system:serviceaccount:eizner:costa
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment