ACI support for privileged container
Make possible to lauch contaner in privilege mode to allow loading of kernel modules and other feautures.
ACI currently has no plans to provide access to host-level interaction. We are always open to feedback, but this is the current plan.
Mohammad Moattar commented
It is interesting that it was here from 2018. The ACI is an ideal solution to run build agents but if you need your build agent to build a docker file it should be running in privileged mode (At least the team city does). I'm surprised if any company with similar requirements uses Azure.
The shell is there but when you get to a more advanced situation of running a single docker, I don't think Azure is a good one.
Yes! You run on hyperv containers so why not?
Leszek Pietrzak commented
so no option to mount a cifs share?
Tilo Sönnichsen commented
any update mie 2020?
The --cap-add is required for features such as blobfuse. AzureFiles is the wrong solution for many scenarios. Add this capability, or don't wonder why we use AWS: we have to, since it don't work in ACI!
Support the equivalents of "docker run -d --cap-add NET_ADMIN ..." and SYS_ADMIN