containerd path

[root@iZ2zehy5z9qf8fnrjigvzqZ rootfs]# cd /run/containerd/io.containerd.runtime.v2.task/k8s.io/334fc571ca3580aa0691f3d39e24d8c1b2c66d179e95c460de3665329928bbfc/rootfs
[root@iZ2zehy5z9qf8fnrjigvzqZ rootfs]# ls
bin  boot  dev  etc  hacker.txt  home  lib  lib32  lib64  libx32  media  mnt  opt  proc  root  run  sbin  srv  sys  tmp  usr  var
[root@iZ2zehy5z9qf8fnrjigvzqZ rootfs]# crictl inspect 334fc571ca358 | grep 334fc571ca3580aa0691f3d39e24d8c1b2c66d179e95c460de3665329928bbfc
    "id": "334fc571ca3580aa0691f3d39e24d8c1b2c66d179e95c460de3665329928bbfc",
    "snapshotKey": "334fc571ca3580aa0691f3d39e24d8c1b2c66d179e95c460de3665329928bbfc",
        "cgroupsPath": "kubepods-burstable-podcb47abb5_2e0b_4f4d_9336_800d8d32c7d8.slice:cri-containerd:334fc571ca3580aa0691f3d39e24d8c1b2c66d179e95c460de3665329928bbfc",

猜你喜欢

转载自blog.csdn.net/SHELLCODE_8BIT/article/details/134758769