Skip to content

Commit dbdc272

Browse files
committed
Remove info that is now covered in new prereqs module
1 parent 68ca07d commit dbdc272

File tree

1 file changed

+0
-12
lines changed

1 file changed

+0
-12
lines changed

windows_containers/understanding-windows-container-workloads.adoc

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -7,18 +7,6 @@ toc::[]
77

88
Windows Container Support for Red Hat OpenShift provides built-in support for running Microsoft Windows Server containers on {product-title}. For those that administer heterogeneous environments with a mix of Linux and Windows workloads, {product-title} allows you to deploy Windows workloads running on Windows Server containers while also providing traditional Linux workloads hosted on {op-system-first} or {op-system-base-full}.
99

10-
Windows container workloads are supported for clusters running on the following cloud providers:
11-
12-
* Amazon Web Services (AWS)
13-
* Microsoft Azure
14-
* VMware vSphere
15-
16-
The following Windows Server operating systems are supported for {product-title} {product-version}:
17-
18-
* Windows Server Long-Term Servicing Channel (LTSC): Windows Server 2019
19-
20-
For more information, see Microsoft's documentation on link:https://docs.microsoft.com/en-us/windows-server/get-started/editions-comparison-windows-server-2019[Windows Server channels].
21-
2210
[NOTE]
2311
====
2412
Multi-tenancy for clusters that have Windows nodes is not supported. Hostile multi-tenant usage introduces security concerns in all Kubernetes environments. Additional security features like link:https://kubernetes.io/docs/concepts/policy/pod-security-policy/[pod security policies], or more fine-grained role-based access control (RBAC) for nodes, make exploits more difficult. However, if you choose to run hostile multi-tenant workloads, a hypervisor is the only security option you should use. The security domain for Kubernetes encompasses the entire cluster, not an individual node. For these types of hostile multi-tenant workloads, you should use physically isolated clusters.

0 commit comments

Comments
 (0)