Skip to content

Commit ce0c5be

Browse files
Fix broken links to security book
1 parent 71b7cc7 commit ce0c5be

11 files changed

+11
-11
lines changed

AKS-Arc/azure-rbac-local.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,4 +222,4 @@ az role definition delete -n "AKS Arc Deployment Reader"
222222
- [Access and identity options](concepts-security-access-identity.md) for AKS enabled by Azure Arc
223223
- [Create an Azure service principal with Azure CLI](/cli/azure/azure-cli-sp-tutorial-1)
224224
- Available Azure permissions for [Hybrid + Multicloud](/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes)
225-
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security.book.md).
225+
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security-book).

AKS-Arc/concepts-security-access-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,4 +155,4 @@ The following table contains a summary of how users can authenticate to Kubernet
155155

156156
- To get started with Kubernetes RBAC for Kubernetes authorization, see [Control access using Microsoft Entra ID and Kubernetes RBAC](kubernetes-rbac-local.md)
157157
- To get started with Azure RBAC for Kubernetes authorization, see [Use Azure RBAC for Kubernetes Authorization](azure-rbac-local.md)
158-
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security.book.md).
158+
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security-book).

AKS-Arc/configure-ssh-keys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,4 +80,4 @@ For information about error messages that can occur when you create and deploy a
8080
- [Connect to Windows or Linux worker nodes with SSH](ssh-connect-to-windows-and-linux-worker-nodes.md)
8181
- [Restrict SSH access to specific IP addresses](restrict-ssh-access.md)
8282
- [Get on-demand logs for troubleshooting](get-on-demand-logs.md)
83-
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security.book.md).
83+
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security-book).

AKS-Arc/enable-authentication-microsoft-entra-id.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,4 +75,4 @@ Enable Microsoft Entra authentication on your existing Kubernetes cluster using
7575
- [Access and identity options for AKS enabled by Azure Arc](concepts-security-access-identity.md)
7676
- [Microsoft Entra integration with Kubernetes RBAC](kubernetes-rbac-local.md)
7777
- [Use Azure role-based access control (RBAC) for Kubernetes authorization](azure-rbac-local.md)
78-
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security.book.md).
78+
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security-book).

AKS-Arc/encrypt-etcd-secrets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ If you encounter any errors with the KMS plugin, follow the procedure on the [Tr
105105

106106
## Next steps
107107

108-
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security.book.md).
108+
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security-book).
109109
- [Create Kubernetes clusters](aks-create-clusters-cli.md#deploy-the-application-and-load-balancer)
110110
- [Deploy a Linux application on a Kubernetes cluster](deploy-linux-application.md)
111111

AKS-Arc/kubernetes-rbac-entra-id.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -236,4 +236,4 @@ Error from server (Forbidden): pods is forbidden: User cannot list resource "pod
236236
## Next steps
237237

238238
- [Learn more about security in AKS Arc on Windows Server](concepts-security.md)
239-
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security.book.md).
239+
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security-book).

AKS-Arc/kubernetes-rbac-local.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -247,4 +247,4 @@ Error from server (Forbidden): pods is forbidden: User cannot list resource "pod
247247
## Next steps
248248

249249
- [Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/overview)
250-
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security.book.md).
250+
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security-book).

AKS-Arc/restrict-ssh-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,4 +42,4 @@ This command does two things: it limits the scope of the command, and it also li
4242

4343
- [Restrict SSH access (AKS on Azure Local 22H2)](restrict-ssh-access-22h2.md)
4444
- [AKS enabled by Arc overview](aks-overview.md)
45-
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security.book.md).
45+
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security-book).

AKS-Arc/retrieve-admin-kubeconfig.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,4 @@ ms.reviewer: leslielin
1919
## Next steps
2020

2121
- [Use Azure RBAC for Kubernetes authorization](azure-rbac-23h2.md)
22-
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security.book.md).
22+
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security-book).

AKS-Arc/ssh-connect-to-windows-and-linux-worker-nodes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,4 +54,4 @@ If you encounter SSH login issues, verify that your IP address is included in th
5454

5555
- [Use SSH keys to get on-demand logs for troubleshooting](get-on-demand-logs.md)
5656
- [Configure SSH keys for an AKS Arc cluster](configure-ssh-keys.md)
57-
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security.book.md).
57+
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security-book).

0 commit comments

Comments
 (0)