Skip to content

Commit abb8ac3

Browse files
authored
Merge pull request #35856 from kgibm/issue35170
Clarify privileges of kubectl debug node
2 parents 6baf25c + 20ab45f commit abb8ac3

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

content/en/docs/tasks/debug/debug-application/debug-running-pod.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -611,8 +611,8 @@ kubectl delete pod myapp myapp-debug
611611
## Debugging via a shell on the node {#node-shell-session}
612612

613613
If none of these approaches work, you can find the Node on which the Pod is
614-
running and create a privileged Pod running in the host namespaces. To create
615-
an interactive shell on a node using `kubectl debug`, run:
614+
running and create a Pod running on the Node. To create
615+
an interactive shell on a Node using `kubectl debug`, run:
616616

617617
```shell
618618
kubectl debug node/mynode -it --image=ubuntu
@@ -628,8 +628,11 @@ When creating a debugging session on a node, keep in mind that:
628628

629629
* `kubectl debug` automatically generates the name of the new Pod based on
630630
the name of the Node.
631-
* The container runs in the host IPC, Network, and PID namespaces.
632631
* The root filesystem of the Node will be mounted at `/host`.
632+
* The container runs in the host IPC, Network, and PID namespaces, although
633+
the pod isn't privileged, so reading some process information may fail,
634+
and `chroot /host` will fail.
635+
* If you need a privileged pod, create it manually.
633636

634637
Don't forget to clean up the debugging Pod when you're finished with it:
635638

0 commit comments

Comments
 (0)