Skip to content

Commit b8883b8

Browse files
committed
Update privileged pod documentation to reflect GA feature
1 parent d6f0cb2 commit b8883b8

File tree

1 file changed

+12
-3
lines changed
  • content/en/docs/concepts/workloads/pods

1 file changed

+12
-3
lines changed

content/en/docs/concepts/workloads/pods/_index.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -289,9 +289,18 @@ section.
289289

290290
## Privileged mode for containers
291291

292-
In Linux, any container in a Pod can enable privileged mode using the `privileged` (Linux) flag on the [security context](/docs/tasks/configure-pod-container/security-context/) of the container spec. This is useful for containers that want to use operating system administrative capabilities such as manipulating the network stack or accessing hardware devices.
293-
294-
If your cluster has the `WindowsHostProcessContainers` feature enabled, you can create a [Windows HostProcess pod](/docs/tasks/configure-pod-container/create-hostprocess-pod) by setting the `windowsOptions.hostProcess` flag on the security context of the pod spec. All containers in these pods must run as Windows HostProcess containers. HostProcess pods run directly on the host and can also be used to perform administrative tasks as is done with Linux privileged containers.
292+
{{< feature-state for_k8s_version="v1.26" state="stable" >}}
293+
294+
In Linux, any container in a Pod can enable privileged mode using the `privileged` (Linux) flag
295+
on the [security context](/docs/tasks/configure-pod-container/security-context/) of the
296+
container spec. This is useful for containers that want to use operating system administrative
297+
capabilities such as manipulating the network stack or accessing hardware devices.
298+
299+
In Windows, you can create a [Windows HostProcess pod](/docs/tasks/configure-pod-container/create-hostprocess-pod)
300+
by setting the `windowsOptions.hostProcess` flag on the security context of the pod spec. All containers in these
301+
pods must run as Windows HostProcess containers. HostProcess pods run directly on the host and can also be used
302+
to perform administrative tasks as is done with Linux privileged containers. In order to use this feature, the
303+
`WindowsHostProcessContainers`[feature gate](/docs/reference/command-line-tools-reference/feature-gates/) must be enabled.
295304

296305
{{< note >}}
297306
Your {{< glossary_tooltip text="container runtime" term_id="container-runtime" >}} must support the concept of a privileged container for this setting to be relevant.

0 commit comments

Comments
 (0)