-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for containerd container runtime #51
Comments
It would be useful to implement the containerd support in a way that support for other OCI container runtimes such as CRI-O could be added later. CRI-O is used in OpenShift. |
It is not working in AKS either:
When inspecting the logs in the kubectl flame pod:
As you can see, it is trying to place the Container ID in the path. But that does not work with containerd. I entered in the overlayfs directory to check the schema and I found this:
The Kubernetes version is 1.20.7:
|
Since kubectl-flame doesn't support containerd, I'd like to introduce a workaround for using async-profiler. kubectl-flame's java profiling support uses async-profiler. I have scripts in https://github.com/lhotari/k8s-diagnostics-toolbox for creating flamegraphs in k8s environment for Java containers. Just in case someone is looking for workarounds for the lack of containerd support in kubectl-flame. |
Thanks a lot for your help. I will have a look at them! |
Hi, is there any plan to resolve this issue as containerd runtime is a new standard now? |
I am getting a similar error for CRI-O. Is it better to file a separate ticket or track it within this one?
|
same here:
|
Same here:
|
same here |
GKE has switched to use containerd as the default container runtime in GKE node version 1.19.
On Ubuntu, microk8s also uses containerd.
The text was updated successfully, but these errors were encountered: