Skip to content

Commit 87537d3

Browse files
committed
document privileged containers as GC
1 parent b8883b8 commit 87537d3

File tree

1 file changed

+8
-1
lines changed
  • content/en/docs/concepts/workloads/pods

1 file changed

+8
-1
lines changed

content/en/docs/concepts/workloads/pods/_index.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -289,13 +289,20 @@ section.
289289

290290
## Privileged mode for containers
291291

292-
{{< feature-state for_k8s_version="v1.26" state="stable" >}}
292+
Any container in a pod can run in privileged mode to use operating system administrative capabilities
293+
that would otherwise be inaccessible. This is available for both Windows and Linux.
294+
295+
### Linux containers
293296

294297
In Linux, any container in a Pod can enable privileged mode using the `privileged` (Linux) flag
295298
on the [security context](/docs/tasks/configure-pod-container/security-context/) of the
296299
container spec. This is useful for containers that want to use operating system administrative
297300
capabilities such as manipulating the network stack or accessing hardware devices.
298301

302+
### Windows containers
303+
304+
{{< feature-state for_k8s_version="v1.26" state="stable" >}}
305+
299306
In Windows, you can create a [Windows HostProcess pod](/docs/tasks/configure-pod-container/create-hostprocess-pod)
300307
by setting the `windowsOptions.hostProcess` flag on the security context of the pod spec. All containers in these
301308
pods must run as Windows HostProcess containers. HostProcess pods run directly on the host and can also be used

0 commit comments

Comments
 (0)