All Products
Search
Document Center

Container Service for Kubernetes:Manage ContainerOS nodes

Last Updated:Mar 26, 2026
This topic applies only to nodes that are not managed by Auto Mode.

ContainerOS restricts direct shell access to prevent untraceable operations. To perform administrative tasks — such as troubleshooting, package installation, or system configuration — use the administrative container: a privileged environment with pre-installed tools, access to system processes, network state, and host file system.

Choose your access path based on your ContainerOS version:

Version Log on to administrative container Log on to host
ContainerOS 3.5 and later Workbench or VNC (shell removed from host) Run sudo superman from within the container
ContainerOS earlier than 3.5 SSH, using ECS Cloud Assistant + key pair Workbench or VNC
All versions kubectl debug (alternative method)

Administrative container overview

The administrative container runs alongside the host OS with the following properties:

  • Pre-installed with additional software packages; supports package installation via YUM.

  • Displays system processes, network state, and host configurations.

  • Mounts the host root file system in read-only mode at /.lifsea/rootfs.

  • Provides the sudo superman command to enter the host environment.

Log on to the administrative container (ContainerOS 3.5 and later)

Starting from ContainerOS 3.5, shell access is removed from the host. Log on to the administrative container directly using Workbench or VNC.

Workbench logon

Cloud Assistant is pre-installed in the administrative container. No additional prerequisites are required.

  1. Log on to the ACK console. In the left navigation pane, click Clusters.

  2. On the Clusters page, click the cluster name. In the left navigation pane, choose Nodes > Nodes.

  3. In the Actions column of the target node, choose More > Workbench Remote Connection.

  4. Select the secret-free connection method to log on.

VNC logon

VNC logon requires password authentication. Before you begin, set the administrative container logon password using the Workbench secret-free logon method above.

  1. Log on to the ACK console. In the left navigation pane, click Clusters.

  2. On the Clusters page, click the cluster name. In the left navigation pane, choose Nodes > Nodes.

  3. In the Actions column of the target node, choose More > VNC Remote Connection, and follow the prompts to complete identity authentication.

Log on to the host (ContainerOS earlier than 3.5)

For ContainerOS versions earlier than 3.5, log on to the host using Workbench or VNC.

Workbench logon

Before you begin, ensure that the node can access the Cloud Assistant service.

  1. Log on to the ACK console. In the left navigation pane, click Clusters.

  2. On the Clusters page, click the cluster name. In the left navigation pane, choose Nodes > Nodes.

  3. In the Actions column of the target node, choose More > Workbench Remote Connection.

VNC logon

VNC logon requires password authentication. Before you begin, set the logon password using the Workbench secret-free logon method above.

  1. Log on to the ACK console. In the left navigation pane, click Clusters.

  2. On the Clusters page, click the cluster name. In the left navigation pane, choose Nodes > Nodes.

  3. In the Actions column of the target node, choose More > VNC Remote Connection, and follow the prompts to complete identity authentication.

Log on to the administrative container via SSH (ContainerOS earlier than 3.5)

This method uses ECS Cloud Assistant to start the administrative container, then connects via SSH.

Prerequisites

Before you begin, ensure that you have:

Start the administrative container

  1. Log on to the ECS Cloud Assistant console and click Create/Run Command in the upper-right corner. For details, see Create and run commands.ECS console

  2. In the Create Command panel, run the following command:

    sudo lifseacli container start

    The following output confirms that Cloud Assistant started the administrative container successfully:

    启动运维容器.png

Connect via SSH

  1. From a terminal that supports SSH, connect to the administrative container using the private key bound to the instance:

    ssh -i <ssh-private-key.pem> admin@<instance-ip>

    Replace <ssh-private-key.pem> with your private key file and <instance-ip> with the instance IP address. Alternatively, log on as admin directly through Workbench using the same key pair — port 22 must be open. After a successful logon, the administrative container interface appears. The host root file system is mounted in read-only mode at /.lifsea/rootfs.

    登录运维容器.png

Enter the host environment

  1. From inside the administrative container, run the following command to enter the host:

    sudo superman
  2. Run ls to list the available commands on the host. The host provides a limited set of system commands.

    进入目录.png

Exit

Run exit to leave the host environment. Run exit again to disconnect from the administrative container. The container continues running and remains accessible via SSH.

Manage the administrative container

Use lifseacli to stop, restart, delete, or check the status of the administrative container. Run these commands via ECS Cloud Assistant or from a terminal connected to the node.

Operation Command
Stop sudo lifseacli container stop
Restart sudo lifseacli container restart
Delete sudo lifseacli container rm
Query status sudo lifseacli container status
If you bind a new key pair to or unbind the key pair from the instance after starting the administrative container, restart the container for the change to take effect.
Important

Deleting the administrative container removes all installed software and saved files. Restarting the container initializes a new environment. Do not save important data in the administrative container.

Troubleshooting

Error: UNPROTECTED PRIVATE KEY FILE!

FAQ.png

The private key file is accessible by other users. Run the following command to restrict access:

chmod 400 <ssh-private-key.pem>

Replace <ssh-private-key.pem> with the name of your private key file.

What's next