Skip to content

Commit 5a0f429

Browse files
committed
resolving link warnings
1 parent 50b3c8e commit 5a0f429

File tree

4 files changed

+8
-8
lines changed

4 files changed

+8
-8
lines changed

articles/aks/limit-egress-traffic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -639,7 +639,7 @@ In this article, you learned how to secure your outbound traffic using Azure Fir
639639
<!-- LINKS - internal -->
640640
641641
[az-group-create]: /cli/azure/group#az_group_create
642-
[outbound-fqdn-rules]: /outbound-rules-control-egress.md
642+
[outbound-fqdn-rules]: ./outbound-rules-control-egress.md
643643
[az-network-vnet-create]: /cli/azure/network/vnet#az_network_vnet_create
644644
[az-network-vnet-subnet-create]: /cli/azure/network/vnet/subnet#az_network_vnet_subnet_create
645645
[az-network-vnet-subnet-update]: /cli/azure/network/vnet/subnet#az_network_vnet_subnet_update
@@ -653,7 +653,7 @@ In this article, you learned how to secure your outbound traffic using Azure Fir
653653
[az-network-firewall-application-rule-create]: /cli/azure/network/firewall/application-rule#az_network_firewall_application_rule_create
654654
[az-aks-create]: /cli/azure/aks#az_aks_create
655655
[az-aks-update]: /cli/azure/aks#az_aks_update
656-
[az-network-firewall-nat-rule-create]: /cli/azure/network/firewall/nat_rule#az_network_firewall_nat_rule_create
656+
[az-network-firewall-nat-rule-create]: /cli/azure/network/firewall/nat-rule#az-network-firewall-nat-rule-create
657657
[az-group-delete]: /cli/azure/group#az_group_delete
658658
[add role to identity]: use-managed-identity.md#add-role-assignment-for-control-plane-identity
659659
[Use a pre-created kubelet managed identity]: use-managed-identity.md#use-a-pre-created-kubelet-managed-identity

articles/aks/outbound-rules-control-egress.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -231,5 +231,5 @@ If you want to restrict how pods communicate between themselves and East-West tr
231231

232232
<!-- LINKS - internal -->
233233

234-
[private-clusters]: /private-clusters.md
235-
[use-network-policies]: /use-network-policies.md
234+
[private-clusters]: ./private-clusters.md
235+
[use-network-policies]: ./use-network-policies.md

articles/backup/azure-kubernetes-service-backup-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ The extension pods aren't exempt, and require the Azure Active Directory (Azure
7474
```Error
7575
{"Message":"Error in the getting the Configurations: error {Post \https://centralus.dp.kubernetesconfiguration.azure.com/subscriptions/ subscriptionid /resourceGroups/ aksclusterresourcegroup /provider/managedclusters/clusters/ aksclustername /configurations/getPendingConfigs?api-version=2021-11-01\: dial tcp: lookup centralus.dp.kubernetesconfiguration.azure.com on 10.63.136.10:53: no such host}","LogType":"ConfigAgentTrace","LogLevel":"Error","Environment":"prod","Role":"ClusterConfigAgent","Location":"centralus","ArmId":"/subscriptions/ subscriptionid /resourceGroups/ aksclusterresourcegroup /providers/Microsoft.ContainerService/managedclusters/ aksclustername ","CorrelationId":"","AgentName":"ConfigAgent","AgentVersion":"1.8.14","AgentTimestamp":"2023/01/19 20:24:16"}`
7676
```
77-
**Cause**: Specific FQDN/application rules are required to use cluster extensions in the AKS clusters. [Learn more](../aks/limit-egress-traffic.md#cluster-extensions).
77+
**Cause**: Specific FQDN/application rules are required to use cluster extensions in the AKS clusters. [Learn more](../aks/outbound-rules-control-egress.md#cluster-extensions).
7878

7979
This error appears due to absence of these FQDN rules because of which configuration information from the Cluster Extensions service wasn't available.
8080

articles/backup/azure-kubernetes-service-cluster-backup-concept.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ ms.author: jsuri
1010

1111
# Prerequisites for Azure Kubernetes Service backup using Azure Backup (preview)
1212

13-
This article describes the prerequisites for Azure Kubernetes Sercuce (AKS) backup.
13+
This article describes the prerequisites for Azure Kubernetes Service (AKS) backup.
1414

15-
Azure Backup now allows you to back up AKS clusters (cluster resources and persistent volumes attached to the cluster) using a backup extension, which must be installed in the cluster. Backup vault communicates with the cluster via this Backup Extension to perform backup and restore operations. Based on the least privileged security model, a Backup vault must have *Trusted Access* enabled to communicate with the AKS cluster.
15+
Azure Backup now allows you to back up AKS clusters (cluster resources and persistent volumes attached to the cluster) using a backup extension, which must be installed in the cluster. Backup vault communicates with the cluster via this Backup Extension to perform backup and restore operations. Based on the least privileged security model, a Backup vault must have *Trusted Access* enabled to communicate with the AKS cluster.
1616

1717
## Backup Extension
1818

@@ -66,7 +66,7 @@ To enable backup for an AKS cluster, see the following prerequisites: .
6666
6767
- The Backup Extension during installation fetches Container Images stored in Microsoft Container Registry (MCR). If you enable a firewall on the AKS cluster, the extension installation process might fail due to access issues on the Registry. Learn [how to allow MCR access from the firewall](../container-registry/container-registry-firewall-access-rules.md#configure-client-firewall-rules-for-mcr).
6868

69-
- Install Backup Extension on the AKS clusters following the [required FQDN/application rules](../aks/limit-egress-traffic.md#required-fqdn--application-rules-6).
69+
- Install Backup Extension on the AKS clusters following the [required FQDN/application rules](../aks/outbound-rules-control-egress.md).
7070

7171
- If you've any previous installation of *Velero* in the AKS cluster, you need to delete it before installing Backup Extension.
7272

0 commit comments

Comments
 (0)