You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -371,7 +371,7 @@ When setting up Kata using a [packaged installation method](https://github.com/k
371
371
372
372
## Build a custom QEMU
373
373
374
-
Your qemu directory need to be prepared with source code. Alternatively, you can use the [Kata containers QEMU](https://github.com/kata-containers/qemu/tree/master) and checkout the recommended branch:
374
+
Your QEMU directory need to be prepared with source code. Alternatively, you can use the [Kata containers QEMU](https://github.com/kata-containers/qemu/tree/master) and checkout the recommended branch:
375
375
376
376
```
377
377
$ go get -d github.com/kata-containers/qemu
@@ -397,7 +397,7 @@ $ sudo -E make install
397
397
>
398
398
> - You should only do this step if you are on aarch64/arm64.
399
399
> - You should include [Eric Auger's latest PCDIMM/NVDIMM patches](https://patchwork.kernel.org/cover/10647305/) which are
400
-
> under upstream review for supporting nvdimm on aarch64.
400
+
> under upstream review for supporting NVDIMM on aarch64.
401
401
>
402
402
You could build the custom `qemu-system-aarch64` as required with the following command:
403
403
```
@@ -508,7 +508,7 @@ Restart CRI-O to take changes into account
508
508
$ sudo systemctl restart crio
509
509
```
510
510
511
-
### containerd with cri plugin
511
+
### containerd with CRI plugin
512
512
513
513
If you select containerd with `cri` plugin, follow the "Getting Started for Developers"
If you wish to raise an issue for a new limitation, either
81
81
[raise an issue directly on the runtime](https://github.com/kata-containers/runtime/issues/new)
82
82
or see the
@@ -136,7 +136,7 @@ these commands is potentially challenging.
136
136
See issue https://github.com/clearcontainers/runtime/issues/341 and [the constraints challenge](#the-constraints-challenge) for more information.
137
137
138
138
For CPUs resource management see
139
-
[cpu-constraints](design/cpu-constraints.md).
139
+
[CPU constraints](design/cpu-constraints.md).
140
140
141
141
### docker run and shared memory
142
142
@@ -156,10 +156,10 @@ See issue https://github.com/kata-containers/runtime/issues/185 for more informa
156
156
## Docker daemon features
157
157
158
158
Some features enabled or implemented via the
159
-
[dockerd daemon](https://docs.docker.com/config/daemon/) configuration are not yet
159
+
[`dockerd` daemon](https://docs.docker.com/config/daemon/) configuration are not yet
160
160
implemented.
161
161
162
-
### selinux support
162
+
### SELinux support
163
163
164
164
The `dockerd` configuration option `"selinux-enabled": true` is not presently implemented
165
165
in Kata Containers. Enabling this option causes an OCI runtime error.
@@ -168,7 +168,7 @@ See issue https://github.com/kata-containers/runtime/issues/784 for more informa
168
168
169
169
The consequence of this is that the [Docker --security-opt is only partially supported](#docker---security-opt-option-partially-supported).
170
170
171
-
Kubernetes [selinux labels](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#assign-selinux-labels-to-a-container) will also not be applied.
171
+
Kubernetes [SELinux labels](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#assign-selinux-labels-to-a-container) will also not be applied.
172
172
173
173
# Architectural limitations
174
174
@@ -244,7 +244,7 @@ Note: The `--security-opt apparmor=your_profile` is not yet supported. See https
244
244
245
245
## The constraints challenge
246
246
247
-
Applying resource constraints such as cgroup, cpu, memory, and storage to a workload is not always straightforward with a VM based system. A Kata Container runs in an isolated environment inside a virtual machine. This, coupled with the architecture of Kata Containers, offers many more possibilities than are available to traditional Linux containers due to the various layers and contexts.
247
+
Applying resource constraints such as cgroup, CPU, memory, and storage to a workload is not always straightforward with a VM based system. A Kata Container runs in an isolated environment inside a virtual machine. This, coupled with the architecture of Kata Containers, offers many more possibilities than are available to traditional Linux containers due to the various layers and contexts.
248
248
249
249
In some cases it might be necessary to apply the constraints to multiple levels. In other cases, the hardware isolated VM provides equivalent functionality to the the requested constraint.
Copy file name to clipboardExpand all lines: Stable-Branch-Strategy.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ providing only bug and security fixes.
17
17
Kata Containers will maintain two stable release branches in addition to the master branch.
18
18
Once a new MAJOR or MINOR release is created from master, a new stable branch is created for
19
19
the prior MAJOR or MINOR release and the older stable branch is no longer maintained. End of
20
-
maintainence for a branch is announced on the Kata Containers mailing list. Users can determine
20
+
maintenance for a branch is announced on the Kata Containers mailing list. Users can determine
21
21
the version currently installed by running `kata-runtime kata-env`. It is recommended to use the
22
22
latest stable branch available.
23
23
@@ -81,7 +81,7 @@ stable and master. While this is not in place currently, it should be considered
81
81
### Patch releases
82
82
83
83
Releases are normally made every other week for patch releases, which include a GitHub release as
84
-
well as binary packages. These patch releases are made for both stable branches, and a 'release candidate'
84
+
well as binary packages. These patch releases are made for both stable branches, and a "release candidate"
85
85
for the next `MAJOR` or `MINOR` is created from master. If there are no changes across all the repositories, no
86
86
release is created and an announcement is made on the developer mailing list to highlight this.
87
87
If a release is being made, each repository is tagged for this release, regardless
@@ -103,8 +103,8 @@ Kata guarantees compatibility between components that are within one minor relea
103
103
104
104
This is critical for dependencies which cross between host (runtime, shim, proxy) and
105
105
the guest (hypervisor, rootfs and agent). For example, consider a cluster with a long-running
106
-
deployment, workload-never-dies, all on kata version 1.1.3 components. If the operator updates
106
+
deployment, workload-never-dies, all on Kata version 1.1.3 components. If the operator updates
107
107
the Kata components to the next new minor release (i.e. 1.2.0), we need to guarantee that the 1.2.0
108
108
runtime still communicates with 1.1.3 agent within workload-never-dies.
109
109
110
-
Handling live-update is out of the scope of this document. See this [kata-runtime issue](https://github.com/kata-containers/runtime/issues/492) for details.
110
+
Handling live-update is out of the scope of this document. See this [`kata-runtime` issue](https://github.com/kata-containers/runtime/issues/492) for details.
0 commit comments