Skip to content

Commit 114ba42

Browse files
authored
Merge pull request #35192 from Shubham82/fixed-hyperlinks
Fixed Hyperlinks for custom CA and dedicated CA.
2 parents 3845042 + f25dfcd commit 114ba42

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

content/en/docs/tasks/tls/managing-tls-in-a-cluster.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ draft](https://github.com/ietf-wg-acme/acme/).
1818

1919
{{< note >}}
2020
Certificates created using the `certificates.k8s.io` API are signed by a
21-
[dedicated CA](#a-note-to-cluster-administrators). It is possible to configure your cluster to use the cluster root
21+
[dedicated CA](#configuring-your-cluster-to-provide-signing). It is possible to configure your cluster to use the cluster root
2222
CA for this purpose, but you should never rely on this. Do not assume that
2323
these certificates will validate against the cluster root CA.
2424
{{< /note >}}
@@ -42,7 +42,7 @@ install it via your operating system's software sources, or fetch it from
4242

4343
## Trusting TLS in a cluster
4444

45-
Trusting the [custom CA](#a-note-to-cluster-administrators) from an application running as a pod usually requires
45+
Trusting the [custom CA](#configuring-your-cluster-to-provide-signing) from an application running as a pod usually requires
4646
some extra application configuration. You will need to add the CA certificate
4747
bundle to the list of CA certificates that the TLS client or server trusts. For
4848
example, you would do this with a golang TLS config by parsing the certificate

0 commit comments

Comments
 (0)