Skip to content

Commit d8e9c84

Browse files
authored
Merge pull request #38673 from dshebib/update_pod_privilege_feature
Update privileged pod documentation to reflect GA feature
2 parents d828b30 + ba37aa6 commit d8e9c84

File tree

1 file changed

+21
-4
lines changed
  • content/en/docs/concepts/workloads/pods

1 file changed

+21
-4
lines changed

content/en/docs/concepts/workloads/pods/_index.md

Lines changed: 21 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -289,14 +289,31 @@ section.
289289

290290
## Privileged mode for containers
291291

292-
In Linux, any container in a Pod can enable privileged mode using the `privileged` (Linux) flag on the [security context](/docs/tasks/configure-pod-container/security-context/) of the container spec. This is useful for containers that want to use operating system administrative capabilities such as manipulating the network stack or accessing hardware devices.
293-
294-
If your cluster has the `WindowsHostProcessContainers` feature enabled, you can create a [Windows HostProcess pod](/docs/tasks/configure-pod-container/create-hostprocess-pod) by setting the `windowsOptions.hostProcess` flag on the security context of the pod spec. All containers in these pods must run as Windows HostProcess containers. HostProcess pods run directly on the host and can also be used to perform administrative tasks as is done with Linux privileged containers.
295-
296292
{{< note >}}
297293
Your {{< glossary_tooltip text="container runtime" term_id="container-runtime" >}} must support the concept of a privileged container for this setting to be relevant.
298294
{{< /note >}}
299295

296+
Any container in a pod can run in privileged mode to use operating system administrative capabilities
297+
that would otherwise be inaccessible. This is available for both Windows and Linux.
298+
299+
### Linux containers
300+
301+
In Linux, any container in a Pod can enable privileged mode using the `privileged` (Linux) flag
302+
on the [security context](/docs/tasks/configure-pod-container/security-context/) of the
303+
container spec. This is useful for containers that want to use operating system administrative
304+
capabilities such as manipulating the network stack or accessing hardware devices.
305+
306+
### Windows containers
307+
308+
{{< feature-state for_k8s_version="v1.26" state="stable" >}}
309+
310+
In Windows, you can create a [Windows HostProcess pod](/docs/tasks/configure-pod-container/create-hostprocess-pod)
311+
by setting the `windowsOptions.hostProcess` flag on the security context of the pod spec. All containers in these
312+
pods must run as Windows HostProcess containers. HostProcess pods run directly on the host and can also be used
313+
to perform administrative tasks as is done with Linux privileged containers. In order to use this feature, the
314+
`WindowsHostProcessContainers`[feature gate](/docs/reference/command-line-tools-reference/feature-gates/) must be enabled.
315+
316+
300317
## Static Pods
301318

302319
_Static Pods_ are managed directly by the kubelet daemon on a specific node,

0 commit comments

Comments
 (0)