File tree Expand file tree Collapse file tree 1 file changed +8
-1
lines changed
content/en/docs/concepts/workloads/pods Expand file tree Collapse file tree 1 file changed +8
-1
lines changed Original file line number Diff line number Diff line change @@ -289,13 +289,20 @@ section.
289
289
290
290
## Privileged mode for containers
291
291
292
- {{< feature-state for_k8s_version="v1.26" state="stable" >}}
292
+ Any container in a pod can run in privileged mode to use operating system administrative capabilities
293
+ that would otherwise be inaccessible. This is available for both Windows and Linux.
294
+
295
+ ### Linux containers
293
296
294
297
In Linux, any container in a Pod can enable privileged mode using the ` privileged ` (Linux) flag
295
298
on the [ security context] ( /docs/tasks/configure-pod-container/security-context/ ) of the
296
299
container spec. This is useful for containers that want to use operating system administrative
297
300
capabilities such as manipulating the network stack or accessing hardware devices.
298
301
302
+ ### Windows containers
303
+
304
+ {{< feature-state for_k8s_version="v1.26" state="stable" >}}
305
+
299
306
In Windows, you can create a [ Windows HostProcess pod] ( /docs/tasks/configure-pod-container/create-hostprocess-pod )
300
307
by setting the ` windowsOptions.hostProcess ` flag on the security context of the pod spec. All containers in these
301
308
pods must run as Windows HostProcess containers. HostProcess pods run directly on the host and can also be used
You can’t perform that action at this time.
0 commit comments