File tree Expand file tree Collapse file tree 3 files changed +5
-5
lines changed
content/zh-cn/docs/concepts Expand file tree Collapse file tree 3 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -334,7 +334,7 @@ kubelet 具有以下默认硬驱逐条件:
334
334
335
335
<!--
336
336
These default values of hard eviction thresholds will only be set if none
337
- of the parameters is changed. If you changed the value of any parameter,
337
+ of the parameters is changed. If you change the value of any parameter,
338
338
then the values of other parameters will not be inherited as the default
339
339
values and will be set to zero. In order to provide custom values, you
340
340
should provide all the thresholds respectively.
Original file line number Diff line number Diff line change @@ -222,7 +222,7 @@ called for that node. Nodes may be evaluated concurrently.
222
222
### PostFilter {#post-filter}
223
223
224
224
<!--
225
- These plugins are called after Filter phase, but only when no feasible nodes
225
+ These plugins are called after the Filter phase, but only when no feasible nodes
226
226
were found for the pod. Plugins are called in their configured order. If
227
227
any postFilter plugin marks the node as `Schedulable`, the remaining plugins
228
228
will not be called. A typical PostFilter implementation is preemption, which
Original file line number Diff line number Diff line change @@ -608,7 +608,7 @@ sandboxing implementations are available:
608
608
609
609
* [gVisor](https://gvisor.dev/) intercepts syscalls from containers and runs them through a
610
610
userspace kernel, written in Go, with limited access to the underlying host.
611
- * [Kata Containers](https://katacontainers.io/) is an OCI compliant runtime that allows you to run
611
+ * [Kata Containers](https://katacontainers.io/) provide a secure container runtime that allows you to run
612
612
containers in a VM. The hardware virtualization available in Kata offers an added layer of
613
613
security for containers running untrusted code.
614
614
-->
@@ -617,8 +617,8 @@ sandboxing implementations are available:
617
617
618
618
* [ gVisor] ( https://gvisor.dev/ ) 拦截来自容器的系统调用,并通过用户空间内核运行它们,
619
619
用户空间内核采用 Go 编写,对底层主机的访问是受限的
620
- * [ Kata Containers] ( https://katacontainers.io/ ) 是符合 OCI 的运行时,允许你在 VM 中运行容器。
621
- Kata 中提供的硬件虚拟化为运行不受信任代码的容器提供了额外的安全层。
620
+ * [ Kata Containers] ( https://katacontainers.io/ ) 提供了一个安全的容器运行时,
621
+ 允许你在 VM 中运行容器。 Kata 中提供的硬件虚拟化为运行不受信任代码的容器提供了额外的安全层。
622
622
623
623
<!--
624
624
### Node Isolation
You can’t perform that action at this time.
0 commit comments