Skip to content

Commit

Permalink
Merge pull request #1284 from lunarwhite/fix-link
Browse files Browse the repository at this point in the history
Fix broken kyverno links
  • Loading branch information
jetstack-bot authored Sep 5, 2023
2 parents 0ef97ce + 8a93e63 commit 577b416
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion content/docs/installation/best-practice.md
Original file line number Diff line number Diff line change
Expand Up @@ -107,7 +107,7 @@ tweak the [various liveness probe time settings and thresholds](https://github.c
## Restrict Auto-Mount of Service Account Tokens

This recommendation is described in the [Kyverno Policy Catalogue](https://kyverno.io/policies/other/restrict_automount_sa_token/restrict_automount_sa_token/) as follows:
This recommendation is described in the [Kyverno Policy Catalogue](https://kyverno.io/policies/other/res/restrict-automount-sa-token/restrict-automount-sa-token/) as follows:
> Kubernetes automatically mounts ServiceAccount credentials in each Pod. The
> ServiceAccount may be assigned roles allowing Pods to access API resources.
> Blocking this ability is an extension of the least privilege best practice and
Expand Down
2 changes: 1 addition & 1 deletion content/v1.12-docs/installation/best-practice.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ and in that case you can modify the installation configuration using Helm chart

## Restrict Auto-Mount of Service Account Tokens

This recommendation is described in the [Kyverno Policy Catalogue](https://kyverno.io/policies/other/restrict_automount_sa_token/restrict_automount_sa_token/) as follows:
This recommendation is described in the [Kyverno Policy Catalogue](https://kyverno.io/policies/other/res/restrict-automount-sa-token/restrict-automount-sa-token/) as follows:
> Kubernetes automatically mounts ServiceAccount credentials in each Pod. The
> ServiceAccount may be assigned roles allowing Pods to access API resources.
> Blocking this ability is an extension of the least privilege best practice and
Expand Down

0 comments on commit 577b416

Please sign in to comment.