Skip to content

Commit 6b2a259

Browse files
authored
Merge pull request #41153 from my-git9/path-273
[zh-cn] sync manage-resources-containers secret
2 parents 415a018 + cde75ac commit 6b2a259

File tree

2 files changed

+6
-7
lines changed

2 files changed

+6
-7
lines changed

content/zh-cn/docs/concepts/configuration/manage-resources-containers.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -405,7 +405,7 @@ see the [Troubleshooting](#troubleshooting) section.
405405
### Monitoring compute & memory resource usage
406406

407407
The kubelet reports the resource usage of a Pod as part of the Pod
408-
[`status`](/docs/concepts/overview/working-with-objects/kubernetes-objects/#object-spec-and-status).
408+
[`status`](/docs/concepts/overview/working-with-objects/#object-spec-and-status).
409409

410410
If optional [tools for monitoring](/docs/tasks/debug/debug-cluster/resource-usage-monitoring/)
411411
are available in your cluster, then Pod resource usage can be retrieved either
@@ -415,7 +415,7 @@ directly or from your monitoring tools.
415415
### 监控计算和内存资源用量 {#monitoring-compute-memory-resource-usage}
416416

417417
kubelet 会将 Pod 的资源使用情况作为 Pod
418-
[`status`](/zh-cn/docs/concepts/overview/working-with-objects/kubernetes-objects/#object-spec-and-status)
418+
[`status`](/zh-cn/docs/concepts/overview/working-with-objects/#object-spec-and-status)
419419
的一部分来报告的。
420420

421421
如果为集群配置了可选的[监控工具](/zh-cn/docs/tasks/debug/debug-cluster/resource-usage-monitoring/),
@@ -566,7 +566,6 @@ ephemeral storage.
566566
If you have a different configuration, then the kubelet does not apply resource
567567
limits for ephemeral local storage.
568568
-->
569-
570569
kubelet 能够度量其本地存储的用量。
571570
实现度量机制的前提是你已使用本地临时存储所支持的配置之一对节点进行配置。
572571

content/zh-cn/docs/concepts/configuration/secret.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -137,11 +137,11 @@ Here are some of your options:
137137
下面是一些选项:
138138

139139
<!--
140-
- if your cloud-native component needs to authenticate to another application that you
140+
- If your cloud-native component needs to authenticate to another application that you
141141
know is running within the same Kubernetes cluster, you can use a
142142
[ServiceAccount](/docs/reference/access-authn-authz/authentication/#service-account-tokens)
143143
and its tokens to identify your client.
144-
- there are third-party tools that you can run, either within or outside your cluster,
144+
- There are third-party tools that you can run, either within or outside your cluster,
145145
that provide secrets management. For example, a service that Pods access over HTTPS,
146146
that reveals a secret if the client correctly authenticates (for example, with a ServiceAccount
147147
token).
@@ -153,10 +153,10 @@ Here are some of your options:
153153
例如,这一工具可能是 Pod 通过 HTTPS 访问的一个服务,该服务在客户端能够正确地通过身份认证
154154
(例如,通过 ServiceAccount 令牌)时,提供机密数据内容。
155155
<!--
156-
- for authentication, you can implement a custom signer for X.509 certificates, and use
156+
- For authentication, you can implement a custom signer for X.509 certificates, and use
157157
[CertificateSigningRequests](/docs/reference/access-authn-authz/certificate-signing-requests/)
158158
to let that custom signer issue certificates to Pods that need them.
159-
- you can use a [device plugin](/docs/concepts/extend-kubernetes/compute-storage-net/device-plugins/)
159+
- You can use a [device plugin](/docs/concepts/extend-kubernetes/compute-storage-net/device-plugins/)
160160
to expose node-local encryption hardware to a specific Pod. For example, you can schedule
161161
trusted Pods onto nodes that provide a Trusted Platform Module, configured out-of-band.
162162
-->

0 commit comments

Comments
 (0)