Skip to content

Commit dfaefa5

Browse files
committed
Nit: Fix hrefs of some links
1 parent fe81c57 commit dfaefa5

File tree

9 files changed

+12
-12
lines changed

9 files changed

+12
-12
lines changed

content/en/docs/concepts/extend-kubernetes/compute-storage-net/device-plugins.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -253,7 +253,7 @@ message AllocatableResourcesResponse {
253253

254254
`ContainerDevices` do expose the topology information declaring to which NUMA cells the device is affine.
255255
The NUMA cells are identified using a opaque integer ID, which value is consistent to what device
256-
plugins report [when they register themselves to the kubelet](https://kubernetes.io/docs/concepts/extend-kubernetes/compute-storage-net/device-plugins/#device-plugin-integration-with-the-topology-manager).
256+
plugins report [when they register themselves to the kubelet](/docs/concepts/extend-kubernetes/compute-storage-net/device-plugins/#device-plugin-integration-with-the-topology-manager).
257257

258258

259259
The gRPC service is served over a unix socket at `/var/lib/kubelet/pod-resources/kubelet.sock`.

content/en/docs/concepts/workloads/pods/disruptions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ rolling out node software updates can cause voluntary disruptions. Also, some im
8686
of cluster (node) autoscaling may cause voluntary disruptions to defragment and compact nodes.
8787
Your cluster administrator or hosting provider should have documented what level of voluntary
8888
disruptions, if any, to expect. Certain configuration options, such as
89-
[using PriorityClasses](https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/)
89+
[using PriorityClasses](/docs/concepts/configuration/pod-priority-preemption/)
9090
in your pod spec can also cause voluntary (and involuntary) disruptions.
9191

9292

content/en/docs/reference/command-line-tools-reference/kube-scheduler.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ each Pod in the scheduling queue according to constraints and available
2727
resources. The scheduler then ranks each valid Node and binds the Pod to a
2828
suitable Node. Multiple different schedulers may be used within a cluster;
2929
kube-scheduler is the reference implementation.
30-
See [scheduling](https://kubernetes.io/docs/concepts/scheduling-eviction/)
30+
See [scheduling](/docs/concepts/scheduling-eviction/)
3131
for more information about scheduling and the kube-scheduler component.
3232

3333
```

content/en/docs/reference/scheduling/config.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,7 @@ only has one pending pods queue.
250250

251251
## {{% heading "whatsnext" %}}
252252

253-
* Read the [kube-scheduler reference](https://kubernetes.io/docs/reference/command-line-tools-reference/kube-scheduler/)
253+
* Read the [kube-scheduler reference](/docs/reference/command-line-tools-reference/kube-scheduler/)
254254
* Learn about [scheduling](/docs/concepts/scheduling-eviction/kube-scheduler/)
255255
* Read the [kube-scheduler configuration (v1beta1)](/docs/reference/config-api/kube-scheduler-config.v1beta1/) reference
256256

content/en/docs/reference/setup-tools/kubeadm/generated/kubeadm_certs_generate-csr.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Generate keys and certificate signing requests
1717

1818
Generates keys and certificate signing requests (CSRs) for all the certificates required to run the control plane. This command also generates partial kubeconfig files with private key data in the "users > user > client-key-data" field, and for each kubeconfig file an accompanying ".csr" file is created.
1919

20-
This command is designed for use in [Kubeadm External CA Mode](https://kubernetes.io/docs/tasks/administer-cluster/kubeadm/kubeadm-certs/#external-ca-mode). It generates CSRs which you can then submit to your external certificate authority for signing.
20+
This command is designed for use in [Kubeadm External CA Mode](/docs/tasks/administer-cluster/kubeadm/kubeadm-certs/#external-ca-mode). It generates CSRs which you can then submit to your external certificate authority for signing.
2121

2222
The PEM encoded signed certificates should then be saved alongside the key files, using ".crt" as the file extension, or in the case of kubeconfig files, the PEM encoded signed certificate should be base64 encoded and added to the kubeconfig file in the "users > user > client-certificate-data" field.
2323

content/en/docs/reference/using-api/deprecation-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ The **policy/v1beta1** API version of PodDisruptionBudget will no longer be serv
7474
PodSecurityPolicy in the **policy/v1beta1** API version will no longer be served in v1.25, and the PodSecurityPolicy admission controller will be removed.
7575

7676
PodSecurityPolicy replacements are still under discussion, but current use can be migrated to
77-
[3rd-party admission webhooks](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/) now.
77+
[3rd-party admission webhooks](/docs/reference/access-authn-authz/extensible-admission-controllers/) now.
7878

7979
#### RuntimeClass {#runtimeclass-v125}
8080

content/en/docs/setup/best-practices/cluster-large.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,8 +66,8 @@ When creating a cluster, you can (using custom tooling):
6666
* start and configure additional etcd instance
6767
* configure the {{< glossary_tooltip term_id="kube-apiserver" text="API server" >}} to use it for storing events
6868

69-
See [Operating etcd clusters for Kubernetes](https://kubernetes.io/docs/tasks/administer-cluster/configure-upgrade-etcd/) and
70-
[Set up a High Availability etcd cluster with kubeadm](docs/setup/production-environment/tools/kubeadm/setup-ha-etcd-with-kubeadm/)
69+
See [Operating etcd clusters for Kubernetes](/docs/tasks/administer-cluster/configure-upgrade-etcd/) and
70+
[Set up a High Availability etcd cluster with kubeadm](/docs/setup/production-environment/tools/kubeadm/setup-ha-etcd-with-kubeadm/)
7171
for details on configuring and managing etcd for a large cluster.
7272

7373
## Addon resources

content/en/docs/setup/production-environment/_index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ access cluster resources. You can use role-based access control
4949
security mechanisms to make sure that users and workloads can get access to the
5050
resources they need, while keeping workloads, and the cluster itself, secure.
5151
You can set limits on the resources that users and workloads can access
52-
by managing [policies](https://kubernetes.io/docs/concepts/policy/) and
52+
by managing [policies](/docs/concepts/policy/) and
5353
[container resources](/docs/concepts/configuration/manage-resources-containers/).
5454

5555
Before building a Kubernetes production environment on your own, consider
@@ -286,8 +286,8 @@ and the
286286
deployment methods.
287287
- Configure user management by determining your
288288
[Authentication](/docs/reference/access-authn-authz/authentication/) and
289-
[Authorization](docs/reference/access-authn-authz/authorization/) methods.
289+
[Authorization](/docs/reference/access-authn-authz/authorization/) methods.
290290
- Prepare for application workloads by setting up
291-
[resource limits](docs/tasks/administer-cluster/manage-resources/),
291+
[resource limits](/docs/tasks/administer-cluster/manage-resources/),
292292
[DNS autoscaling](/docs/tasks/administer-cluster/dns-horizontal-autoscaling/)
293293
and [service accounts](/docs/reference/access-authn-authz/service-accounts-admin/).

content/en/docs/tasks/administer-cluster/kubeadm/kubeadm-certs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -239,7 +239,7 @@ The field `serverTLSBootstrap: true` will enable the bootstrap of kubelet servin
239239
certificates by requesting them from the `certificates.k8s.io` API. One known limitation
240240
is that the CSRs (Certificate Signing Requests) for these certificates cannot be automatically
241241
approved by the default signer in the kube-controller-manager -
242-
[`kubernetes.io/kubelet-serving`](https://kubernetes.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers).
242+
[`kubernetes.io/kubelet-serving`](/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers).
243243
This will require action from the user or a third party controller.
244244

245245
These CSRs can be viewed using:

0 commit comments

Comments
 (0)