. For instance, if you inspect the OCI runtime spec passed to runsc in a multi-container scenario (like in GKE), it will have a section like this:
```
"namespaces": [
{
"type": "pid"
},
{
"type": "ipc",
"path": "/proc/104921/ns/ipc"
},
{
"type": "uts",
"path": "/proc/104921/ns/uts"
},
{
"type": "mount"
},
{
"type": "network",
"path": "/proc/104921/ns/net"
},
{
"type": "cgroup"
}
],
```
This will cause the new subcontainer to have create/join these namespaces. For example, this subcontainer would
run in a new pid namespace. But like Kevin said, such namespace isolation between the containers is implemented by the sentry. The sentry process itself (which is shared among all containers in a pod) is running in the same namespace while servicing requests from multiple containers.
- Ayush