@@ -199,7 +199,7 @@ On Linux, the container runtime typically configures
199
199
kernel {{< glossary_tooltip text="cgroups" term_id="cgroup" >}} that apply and enforce the
200
200
limits you defined.
201
201
202
- - The CPU limit defines a hard ceiling on how much CPU time that the container can use.
202
+ - The CPU limit defines a hard ceiling on how much CPU time the container can use.
203
203
During each scheduling interval (time slice), the Linux kernel checks to see if this
204
204
limit is exceeded; if so, the kernel waits before allowing that cgroup to resume execution.
205
205
- The CPU request typically defines a weighting. If several different containers (cgroups)
@@ -244,30 +244,30 @@ directly or from your monitoring tools.
244
244
If you do not specify a `sizeLimit` for an `emptyDir` volume, that volume may
245
245
consume up to that pod's memory limit (`Pod.spec.containers[].resources.limits.memory`).
246
246
If you do not set a memory limit, the pod has no upper bound on memory consumption,
247
- and can consume all available memory on the node. Kubernetes schedules pods based
247
+ and can consume all available memory on the node. Kubernetes schedules pods based
248
248
on resource requests (`Pod.spec.containers[].resources.requests`) and will not
249
249
consider memory usage above the request when deciding if another pod can fit on
250
- a given node. This can result in a denial of service and cause the OS to do
251
- out-of-memory (OOM) handling. It is possible to create any number of `emptyDir`s
250
+ a given node. This can result in a denial of service and cause the OS to do
251
+ out-of-memory (OOM) handling. It is possible to create any number of `emptyDir`s
252
252
that could potentially consume all available memory on the node, making OOM
253
253
more likely.
254
254
{{< /caution >}}
255
255
256
256
From the perspective of memory management, there are some similarities between
257
257
when a process uses memory as a work area and when using memory-backed
258
- ` emptyDir` . But when using memory as a volume like memory-backed `emptyDir`,
259
- there are additional points below that you should be careful of.
258
+ ` emptyDir` . But when using memory as a volume, like memory-backed `emptyDir`,
259
+ there are additional points below that you should be careful of :
260
260
261
261
* Files stored on a memory-backed volume are almost entirely managed by the
262
- user application. Unlike when used as a work area for a process, you can not
262
+ user application. Unlike when used as a work area for a process, you can not
263
263
rely on things like language-level garbage collection.
264
264
* The purpose of writing files to a volume is to save data or pass it between
265
- applications. Neither Kubernetes nor the OS may automatically delete files
265
+ applications. Neither Kubernetes nor the OS may automatically delete files
266
266
from a volume, so memory used by those files can not be reclaimed when the
267
267
system or the pod are under memory pressure.
268
268
* A memory-backed `emptyDir` is useful because of its performance, but memory
269
269
is generally much smaller in size and much higher in cost than other storage
270
- media, such as disks or SSDs. Using large amounts of memory for `emptyDir`
270
+ media, such as disks or SSDs. Using large amounts of memory for `emptyDir`
271
271
volumes may affect the normal operation of your pod or of the whole node,
272
272
so should be used carefully.
273
273
0 commit comments