File tree Expand file tree Collapse file tree 3 files changed +5
-5
lines changed
content/zh-cn/docs/concepts Expand file tree Collapse file tree 3 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -334,7 +334,7 @@ kubelet 具有以下默认硬驱逐条件:
334334
335335<!--
336336These default values of hard eviction thresholds will only be set if none
337- of the parameters is changed. If you changed the value of any parameter,
337+ of the parameters is changed. If you change the value of any parameter,
338338then the values of other parameters will not be inherited as the default
339339values and will be set to zero. In order to provide custom values, you
340340should provide all the thresholds respectively.
Original file line number Diff line number Diff line change @@ -222,7 +222,7 @@ called for that node. Nodes may be evaluated concurrently.
222222### PostFilter {#post-filter}
223223
224224<!--
225- These plugins are called after Filter phase, but only when no feasible nodes
225+ These plugins are called after the Filter phase, but only when no feasible nodes
226226were found for the pod. Plugins are called in their configured order. If
227227any postFilter plugin marks the node as `Schedulable`, the remaining plugins
228228will not be called. A typical PostFilter implementation is preemption, which
Original file line number Diff line number Diff line change @@ -608,7 +608,7 @@ sandboxing implementations are available:
608608
609609* [gVisor](https://gvisor.dev/) intercepts syscalls from containers and runs them through a
610610 userspace kernel, written in Go, with limited access to the underlying host.
611- * [Kata Containers](https://katacontainers.io/) is an OCI compliant runtime that allows you to run
611+ * [Kata Containers](https://katacontainers.io/) provide a secure container runtime that allows you to run
612612 containers in a VM. The hardware virtualization available in Kata offers an added layer of
613613 security for containers running untrusted code.
614614-->
@@ -617,8 +617,8 @@ sandboxing implementations are available:
617617
618618* [ gVisor] ( https://gvisor.dev/ ) 拦截来自容器的系统调用,并通过用户空间内核运行它们,
619619 用户空间内核采用 Go 编写,对底层主机的访问是受限的
620- * [ Kata Containers] ( https://katacontainers.io/ ) 是符合 OCI 的运行时,允许你在 VM 中运行容器。
621- Kata 中提供的硬件虚拟化为运行不受信任代码的容器提供了额外的安全层。
620+ * [ Kata Containers] ( https://katacontainers.io/ ) 提供了一个安全的容器运行时,
621+ 允许你在 VM 中运行容器。 Kata 中提供的硬件虚拟化为运行不受信任代码的容器提供了额外的安全层。
622622
623623<!--
624624### Node Isolation
You can’t perform that action at this time.
0 commit comments