VERSION="v1.30.0" curl -L https://github.com/kubernetes-sigs/cri-tools/releases/download/$VERSION/crictl-$VERSION-linux-amd64.tar.gz | sudo tar -xz -C /usr/local/bin crictl --version crictl info (shows runtime configuration) Part 2: Installing nerdctl (Full containerd Control) If your cluster runs containerd, nerdctl provides a Docker-like experience for filesystem inspection.
Run: ps aux | grep -E "containerd|crio|dockerd" We will cover installation on Ubuntu 22.04/24.04 LTS , RHEL 9 / CentOS 9 , and macOS (for remote debugging) . Part 1: Installing cri-tools (crictl) crictl is the Swiss Army knife. It does not care about your underlying filesystem; it talks to the CRI socket. On Ubuntu/Debian # Add Kubernetes repository (contains cri-tools) sudo apt-get update sudo apt-get install -y apt-transport-https ca-certificates curl curl -fsSL https://pkgs.k8s.io/core:/stable:/v1.30/deb/Release.key | sudo gpg --dearmor -o /etc/apt/keyrings/kubernetes-apt-keyring.gpg echo 'deb [signed-by=/etc/apt/keyrings/kubernetes-apt-keyring.gpg] https://pkgs.k8s.io/core:/stable:/v1.30/deb/ /' | sudo tee /etc/apt/sources.list.d/kubernetes.list sudo apt-get update sudo apt-get install -y cri-tools On RHEL/CentOS/Fedora cat <<EOF | sudo tee /etc/yum.repos.d/kubernetes.repo [kubernetes] name=Kubernetes baseurl=https://pkgs.k8s.io/core:/stable:/v1.30/rpm/ enabled=1 gpgcheck=1 gpgkey=https://pkgs.k8s.io/core:/stable:/v1.30/rpm/repodata/repomd.xml.key EOF sudo yum install -y cri-tools Manual Install (All Linux distros) For the latest version (bypassing package managers):
In the rapidly evolving landscape of cloud-native development and container orchestration, the underlying infrastructure often becomes an opaque black box. For developers and system administrators working with Kubernetes, containerd, or CRI-O, one acronym repeatedly surfaces when debugging storage issues: CRI .
"lowerdir": "/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/12/fs:/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/11/fs", "upperdir": "/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/23/fs", "workdir": "/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/23/work" The upperdir is where all write changes to the container are stored. Go there:
# For containerd runtime-endpoint: "unix:///run/containerd/containerd.sock" image-endpoint: "unix:///run/containerd/containerd.sock" timeout: 10 debug: false # For CRI-O runtime-endpoint: "unix:///run/crio/crio.sock" Test config: crictl ps -a export CONTAINERD_ADDRESS=/run/containerd/containerd.sock export CONTAINERD_NAMESPACE=k8s.io # Critical for Kubernetes nerdctl ps Hands-On: Using CRI Filesystem Tools to Inspect Container Storage Now for the practical part. Assume a pod named my-app is consuming 10GB of disk space, but df -h inside the pod shows only 1GB. Where is the space? Let's investigate. Step 1: Find the Target Container ID crictl ps --name my-app --state Running # Output: CONTAINER ID: 3e8f2a1b9c0d Step 2: Inspect the Container's Root Filesystem Mounts crictl inspect 3e8f2a1b9c0d | jq .info.runtimeSpec.mounts Look for type: "overlay" . You'll see lowerdir , upperdir , workdir .