Skip to content

Commit 7416c9c

Browse files
committed
Modify Windows HostProcess section to point to dedicated page
1 parent 610753c commit 7416c9c

File tree

1 file changed

+0
-15
lines changed

1 file changed

+0
-15
lines changed

content/en/docs/concepts/security/linux-kernel-security-constraints.md

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -263,25 +263,10 @@ capability that you can't grant with the securityContext. This is useful for
263263
containers that want to use operating system administrative capabilities such
264264
as manipulating the network stack or accessing hardware devices.
265265

266-
<<<<<<< Updated upstream
267-
### Windows privileged containers {#windows-privileged-containers}
268-
269-
{{< feature-state for_k8s_version="1.26" state="stable" >}}
270-
271-
In Windows, you can create a
272-
[Windows HostProcess pod](/docs/tasks/configure-pod-container/create-hostprocess-pod)
273-
by setting the `windowsOptions.hostProcess` flag on the security context of the
274-
pod spec. All containers in these pods must run as Windows HostProcess
275-
containers. HostProcess pods run directly on the host and can also be used to
276-
perform administrative tasks as is done with Linux privileged containers. In
277-
order to use this feature, the WindowsHostProcessContainers feature gate must be
278-
enabled.
279-
=======
280266
In Kubernetes version 1.26 and later, you can also run Windows containers in a
281267
similarly privileged mode by setting the `windowsOptions.hostProcess` flag on
282268
the security context of the Pod spec. For details and instructions, see
283269
[Create a Windows HostProcess Pod](/docs/tasks/configure-pod-container/create-hostprocess-pod/).
284-
>>>>>>> Stashed changes
285270

286271
## Recommendations and best practices {#recommendations-best-practices}
287272

0 commit comments

Comments
 (0)