Skip to content

Commit 2056e6a

Browse files
authored
Merge pull request #40356 from tk3fftk/patch-1
fix links in service-accounts.md
2 parents 961f60b + 4731975 commit 2056e6a

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

content/en/docs/concepts/security/service-accounts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -171,12 +171,12 @@ following methods:
171171
If you have a legacy application that is not aware of Kubernetes, you
172172
could use a sidecar container within the same pod to fetch these tokens
173173
and make them available to the application workload.
174-
* [Token Volume Projection](/docs/tasks/configure-pod-container/configure-service-account/#service-account-token-volume-projection)
174+
* [Token Volume Projection](/docs/tasks/configure-pod-container/configure-service-account/#serviceaccount-token-volume-projection)
175175
(also recommended): In Kubernetes v1.20 and later, use the Pod specification to
176176
tell the kubelet to add the service account token to the Pod as a
177177
*projected volume*. Projected tokens expire automatically, and the kubelet
178178
rotates the token before it expires.
179-
* [Service Account Token Secrets](/docs/tasks/configure-pod-container/configure-service-account/#manually-create-a-service-account-api-token)
179+
* [Service Account Token Secrets](/docs/tasks/configure-pod-container/configure-service-account/#manually-create-an-api-token-for-a-serviceaccount)
180180
(not recommended): You can mount service account tokens as Kubernetes
181181
Secrets in Pods. These tokens don't expire and don't rotate.
182182
This method is not recommended, especially at scale, because of the risks associated

0 commit comments

Comments
 (0)