Skip to content

Commit f7f347c

Browse files
authored
Merge pull request #48596 from fgogolli/patch-2
Fix typos and text in manage-resources-containers.md
2 parents 3fa049b + dbc57ad commit f7f347c

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

content/en/docs/concepts/configuration/manage-resources-containers.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ On Linux, the container runtime typically configures
199199
kernel {{< glossary_tooltip text="cgroups" term_id="cgroup" >}} that apply and enforce the
200200
limits you defined.
201201
202-
- The CPU limit defines a hard ceiling on how much CPU time that the container can use.
202+
- The CPU limit defines a hard ceiling on how much CPU time the container can use.
203203
During each scheduling interval (time slice), the Linux kernel checks to see if this
204204
limit is exceeded; if so, the kernel waits before allowing that cgroup to resume execution.
205205
- The CPU request typically defines a weighting. If several different containers (cgroups)
@@ -244,30 +244,30 @@ directly or from your monitoring tools.
244244
If you do not specify a `sizeLimit` for an `emptyDir` volume, that volume may
245245
consume up to that pod's memory limit (`Pod.spec.containers[].resources.limits.memory`).
246246
If you do not set a memory limit, the pod has no upper bound on memory consumption,
247-
and can consume all available memory on the node. Kubernetes schedules pods based
247+
and can consume all available memory on the node. Kubernetes schedules pods based
248248
on resource requests (`Pod.spec.containers[].resources.requests`) and will not
249249
consider memory usage above the request when deciding if another pod can fit on
250-
a given node. This can result in a denial of service and cause the OS to do
251-
out-of-memory (OOM) handling. It is possible to create any number of `emptyDir`s
250+
a given node. This can result in a denial of service and cause the OS to do
251+
out-of-memory (OOM) handling. It is possible to create any number of `emptyDir`s
252252
that could potentially consume all available memory on the node, making OOM
253253
more likely.
254254
{{< /caution >}}
255255

256256
From the perspective of memory management, there are some similarities between
257257
when a process uses memory as a work area and when using memory-backed
258-
`emptyDir`. But when using memory as a volume like memory-backed `emptyDir`,
259-
there are additional points below that you should be careful of.
258+
`emptyDir`. But when using memory as a volume, like memory-backed `emptyDir`,
259+
there are additional points below that you should be careful of:
260260

261261
* Files stored on a memory-backed volume are almost entirely managed by the
262-
user application. Unlike when used as a work area for a process, you can not
262+
user application. Unlike when used as a work area for a process, you can not
263263
rely on things like language-level garbage collection.
264264
* The purpose of writing files to a volume is to save data or pass it between
265-
applications. Neither Kubernetes nor the OS may automatically delete files
265+
applications. Neither Kubernetes nor the OS may automatically delete files
266266
from a volume, so memory used by those files can not be reclaimed when the
267267
system or the pod are under memory pressure.
268268
* A memory-backed `emptyDir` is useful because of its performance, but memory
269269
is generally much smaller in size and much higher in cost than other storage
270-
media, such as disks or SSDs. Using large amounts of memory for `emptyDir`
270+
media, such as disks or SSDs. Using large amounts of memory for `emptyDir`
271271
volumes may affect the normal operation of your pod or of the whole node,
272272
so should be used carefully.
273273

0 commit comments

Comments
 (0)