Skip to content

Commit a562ab1

Browse files
authored
Merge pull request #45497 from asa3311/sync-zh-104
[zh] sync node-pressure-eviction scheduling-framework multi-tenancy
2 parents ac543c3 + a663a2d commit a562ab1

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

content/zh-cn/docs/concepts/scheduling-eviction/node-pressure-eviction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -334,7 +334,7 @@ kubelet 具有以下默认硬驱逐条件:
334334

335335
<!--
336336
These default values of hard eviction thresholds will only be set if none
337-
of the parameters is changed. If you changed the value of any parameter,
337+
of the parameters is changed. If you change the value of any parameter,
338338
then the values of other parameters will not be inherited as the default
339339
values and will be set to zero. In order to provide custom values, you
340340
should provide all the thresholds respectively.

content/zh-cn/docs/concepts/scheduling-eviction/scheduling-framework.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ called for that node. Nodes may be evaluated concurrently.
222222
### PostFilter {#post-filter}
223223

224224
<!--
225-
These plugins are called after Filter phase, but only when no feasible nodes
225+
These plugins are called after the Filter phase, but only when no feasible nodes
226226
were found for the pod. Plugins are called in their configured order. If
227227
any postFilter plugin marks the node as `Schedulable`, the remaining plugins
228228
will not be called. A typical PostFilter implementation is preemption, which

content/zh-cn/docs/concepts/security/multi-tenancy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -608,7 +608,7 @@ sandboxing implementations are available:
608608
609609
* [gVisor](https://gvisor.dev/) intercepts syscalls from containers and runs them through a
610610
userspace kernel, written in Go, with limited access to the underlying host.
611-
* [Kata Containers](https://katacontainers.io/) is an OCI compliant runtime that allows you to run
611+
* [Kata Containers](https://katacontainers.io/) provide a secure container runtime that allows you to run
612612
containers in a VM. The hardware virtualization available in Kata offers an added layer of
613613
security for containers running untrusted code.
614614
-->
@@ -617,8 +617,8 @@ sandboxing implementations are available:
617617

618618
* [gVisor](https://gvisor.dev/) 拦截来自容器的系统调用,并通过用户空间内核运行它们,
619619
用户空间内核采用 Go 编写,对底层主机的访问是受限的
620-
* [Kata Containers](https://katacontainers.io/) 是符合 OCI 的运行时,允许你在 VM 中运行容器。
621-
Kata 中提供的硬件虚拟化为运行不受信任代码的容器提供了额外的安全层。
620+
* [Kata Containers](https://katacontainers.io/) 提供了一个安全的容器运行时,
621+
允许你在 VM 中运行容器。Kata 中提供的硬件虚拟化为运行不受信任代码的容器提供了额外的安全层。
622622

623623
<!--
624624
### Node Isolation

0 commit comments

Comments
 (0)