File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
content/en/docs/concepts/security Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -286,7 +286,7 @@ workloads running in a shared cluster. Running workloads in a sandbox environmen
286
286
insulate the host from container escapes, where an attacker exploits a vulnerability to gain
287
287
access to the host system and all the processes/files running on that host.
288
288
289
- Virtual machines and userspace kernels are 2 popular approaches to sandboxing. The following
289
+ Virtual machines and userspace kernels are two popular approaches to sandboxing. The following
290
290
sandboxing implementations are available:
291
291
292
292
* [ gVisor] ( https://gvisor.dev/ ) intercepts syscalls from containers and runs them through a
@@ -514,4 +514,4 @@ project provides an implementation of virtual control planes.
514
514
#### Other implementations
515
515
516
516
* [ Kamaji] ( https://github.com/clastix/kamaji )
517
- * [ vcluster] ( https://github.com/loft-sh/vcluster )
517
+ * [ vcluster] ( https://github.com/loft-sh/vcluster )
You can’t perform that action at this time.
0 commit comments