Skip to content

Commit f189916

Browse files
authored
Merge pull request #33857 from Sea-n/fix-link
Fix Markdown link
2 parents 7d973d1 + cca0aca commit f189916

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

content/en/docs/concepts/configuration/secret.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -982,7 +982,7 @@ kubectl create secret docker-registry secret-tiger-docker \
982982
```
983983

984984
That command creates a Secret of type `kubernetes.io/dockerconfigjson`.
985-
If you dump the `.data.dockercfgjson` field from that new Secret and then
985+
If you dump the `.data.dockerconfigjson` field from that new Secret and then
986986
decode it from base64:
987987

988988
```shell
@@ -1291,7 +1291,7 @@ on that node.
12911291
- When deploying applications that interact with the Secret API, you should
12921292
limit access using
12931293
[authorization policies](/docs/reference/access-authn-authz/authorization/) such as
1294-
[RBAC]( /docs/reference/access-authn-authz/rbac/).
1294+
[RBAC](/docs/reference/access-authn-authz/rbac/).
12951295
- In the Kubernetes API, `watch` and `list` requests for Secrets within a namespace
12961296
are extremely powerful capabilities. Avoid granting this access where feasible, since
12971297
listing Secrets allows the clients to inspect the values of every Secret in that
@@ -1310,7 +1310,7 @@ have access to run a Pod that then exposes the Secret.
13101310
- When deploying applications that interact with the Secret API, you should
13111311
limit access using
13121312
[authorization policies](/docs/reference/access-authn-authz/authorization/) such as
1313-
[RBAC]( /docs/reference/access-authn-authz/rbac/).
1313+
[RBAC](/docs/reference/access-authn-authz/rbac/).
13141314
- In the API server, objects (including Secrets) are persisted into
13151315
{{< glossary_tooltip term_id="etcd" >}}; therefore:
13161316
- only allow cluster admistrators to access etcd (this includes read-only access);

content/en/docs/contribute/participate/pr-wranglers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,4 +100,4 @@ In late 2021, SIG Docs introduced the PR Wrangler Shadow Program. The program wa
100100

101101
- Others can reach out on the [#sig-docs Slack channel](https://kubernetes.slack.com/messages/sig-docs) for requesting to shadow an assigned PR Wrangler for a specific week. Feel free to reach out to Brad Topol (`@bradtopol`) or one of the [SIG Docs co-chairs/leads](https://github.com/kubernetes/community/tree/master/sig-docs#leadership).
102102

103-
- Once you've signed up to shadow a PR Wrangler, introduce yourself to the PR Wrangler on the [Kubernetes Slack](slack.k8s.io).
103+
- Once you've signed up to shadow a PR Wrangler, introduce yourself to the PR Wrangler on the [Kubernetes Slack](https://slack.k8s.io).

content/en/docs/tasks/administer-cluster/configure-upgrade-etcd.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ access to clients with the certificate `k8sclient.cert`.
150150

151151
Once etcd is configured correctly, only clients with valid certificates can
152152
access it. To give Kubernetes API servers the access, configure them with the
153-
flags `--etcd-certfile=k8sclient.cert`,`--etcd-keyfile=k8sclient.key` and
153+
flags `--etcd-certfile=k8sclient.cert`, `--etcd-keyfile=k8sclient.key` and
154154
`--etcd-cafile=ca.cert`.
155155

156156
{{< note >}}
@@ -319,7 +319,7 @@ employed to recover the data of a failed cluster.
319319

320320
Before starting the restore operation, a snapshot file must be present. It can
321321
either be a snapshot file from a previous backup operation, or from a remaining
322-
[data directory]( https://etcd.io/docs/current/op-guide/configuration/#--data-dir).
322+
[data directory](https://etcd.io/docs/current/op-guide/configuration/#--data-dir).
323323
Here is an example:
324324

325325
```shell

0 commit comments

Comments
 (0)