NS Jail

nsjail is Agent Boundaries' default jail type that uses Linux namespaces to provide process isolation. It creates unprivileged network namespaces to control and monitor network access for processes running under Boundary.

Running on Docker, Kubernetes, or ECS? See the relevant page for runtime and permission requirements:

Overview

nsjail leverages Linux namespace technology to isolate processes at the network level. When Agent Boundaries runs with nsjail, it creates a separate network namespace for the isolated process, allowing Agent Boundaries to intercept and filter all network traffic according to the configured policy.

This jail type requires Linux capabilities to create and manage network namespaces, which means it has specific runtime requirements when running in containerized environments like Docker and Kubernetes.

Architecture

Boundary