File tree Expand file tree Collapse file tree 1 file changed +0
-15
lines changed
content/en/docs/concepts/security Expand file tree Collapse file tree 1 file changed +0
-15
lines changed Original file line number Diff line number Diff line change @@ -263,25 +263,10 @@ capability that you can't grant with the securityContext. This is useful for
263
263
containers that want to use operating system administrative capabilities such
264
264
as manipulating the network stack or accessing hardware devices.
265
265
266
- <<<<<<< Updated upstream
267
- ### Windows privileged containers {#windows-privileged-containers}
268
-
269
- {{< feature-state for_k8s_version="1.26" state="stable" >}}
270
-
271
- In Windows, you can create a
272
- [ Windows HostProcess pod] ( /docs/tasks/configure-pod-container/create-hostprocess-pod )
273
- by setting the ` windowsOptions.hostProcess ` flag on the security context of the
274
- pod spec. All containers in these pods must run as Windows HostProcess
275
- containers. HostProcess pods run directly on the host and can also be used to
276
- perform administrative tasks as is done with Linux privileged containers. In
277
- order to use this feature, the WindowsHostProcessContainers feature gate must be
278
- enabled.
279
- =======
280
266
In Kubernetes version 1.26 and later, you can also run Windows containers in a
281
267
similarly privileged mode by setting the ` windowsOptions.hostProcess ` flag on
282
268
the security context of the Pod spec. For details and instructions, see
283
269
[ Create a Windows HostProcess Pod] ( /docs/tasks/configure-pod-container/create-hostprocess-pod/ ) .
284
- >>>>>>> Stashed changes
285
270
286
271
## Recommendations and best practices {#recommendations-best-practices}
287
272
You can’t perform that action at this time.
0 commit comments