Skip to content

Commit 610d513

Browse files
committed
Update links
1 parent 9b2921e commit 610d513

File tree

4 files changed

+15
-15
lines changed

4 files changed

+15
-15
lines changed

edge_computing/day_2_core_cnf_clusters/security/security-basics.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,28 +15,28 @@ include::modules/security-rbac-overview.adoc[leveloffset=+1]
1515
[role="_additional-resources"]
1616
.Additional resources
1717

18-
* link:https://docs.openshift.com/container-platform/4.17/authentication/using-rbac.html#authorization-overview_using-rbac[Using RBAC to define and apply permissions]
18+
* xref:../../../authentication/using-rbac.adoc#authorization-overview_using-rbac[Using RBAC to define and apply permissions]
1919
2020
include::modules/security-sec-accounts-overview.adoc[leveloffset=+1]
2121

2222
[role="_additional-resources"]
2323
.Additional resources
2424

25-
* link:https://docs.openshift.com/container-platform/4.17/authentication/understanding-and-creating-service-accounts.html[Understanding and creating service accounts]
25+
* xref:../../../authentication/understanding-and-creating-service-accounts.adoc#understanding-and-creating-service-accounts[Understanding and creating service accounts]
2626
2727
include::modules/security-identity-prov-config.adoc[leveloffset=+1]
2828

2929
[role="_additional-resources"]
3030
.Additional resources
3131

32-
* link:https://docs.openshift.com/container-platform/4.17/authentication/understanding-identity-provider.html[Understanding identity provider configuration]
32+
* xref:../../../authentication/understanding-identity-provider.adoc#understanding-identity-provider[Understanding identity provider configuration]
3333
3434
include::modules/security-replacing-kubeadmin-user.adoc[leveloffset=+1]
3535

3636
[role="_additional-resources"]
3737
.Additional resources
3838

39-
* link:https://docs.openshift.com/container-platform/4.17/authentication/identity_providers/configuring-htpasswd-identity-provider.html#identity-provider-htpasswd-about_configuring-htpasswd-identity-provider[About htpasswd authentication]
39+
* xref:../../../authentication/identity_providers/configuring-htpasswd-identity-provider.adoc#identity-provider-htpasswd-about_configuring-htpasswd-identity-provider[Configuring an htpasswd identity provider]
4040
4141
include::modules/security-sec-considerations-telco.adoc[leveloffset=+1]
4242

@@ -49,4 +49,4 @@ include::modules/security-lifecycle-mgmnt.adoc[leveloffset=+1]
4949
[role="_additional-resources"]
5050
.Additional resources
5151

52-
* link:https://docs.openshift.com/container-platform/4.17/edge_computing/day_2_core_cnf_clusters/updating/update-welcome.html[Upgrading a telco core CNF clusters]
52+
* xref:../../../edge_computing/day_2_core_cnf_clusters/updating/telco-update-welcome.adoc#telco-update-welcome[Upgrading a telco core CNF clusters]

edge_computing/day_2_core_cnf_clusters/security/security-host-sec.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,17 @@ include::modules/security-rhcos-overview.adoc[leveloffset=+1]
1111
[role="_additional-resources"]
1212
.Additional resources
1313

14-
* link:https://docs.openshift.com/container-platform/4.17/architecture/architecture-rhcos.html#rhcos-about_architecture-rhcos[About RHCOS]
14+
* xref:../../../architecture/architecture-rhcos.adoc#rhcos-about_architecture-rhcos[About RHCOS]
1515
16-
* link:https://docs.openshift.com/container-platform/4.17/architecture/architecture-rhcos.html[Red Hat Enterprise Linux CoreOS (RHCOS)].
16+
* xref:../../../architecture/architecture-rhcos.adoc[Red Hat Enterprise Linux CoreOS (RHCOS)].
1717
18-
* link:https://docs.openshift.com/container-platform/4.17/edge_computing/day_2_core_cnf_clusters/security/security-host-sec.html#security-linux-capabilities-overview_security-host-sec[Linux capabilities].
18+
* xref:../../../edge_computing/day_2_core_cnf_clusters/security/security-host-sec.adoc#security-linux-capabilities-overview_security-host-sec[Linux capabilities].
1919
2020
include::modules/security-command-line-host-access.adoc[leveloffset=+1]
2121

2222
[role="_additional-resources"]
2323
.Additional resources
2424

25-
* link:https://docs.openshift.com/container-platform/4.17/support/troubleshooting/investigating-pod-issues.html#starting-debug-pods-with-root-access_investigating-pod-issues[Starting debug pods with root access].
25+
* xref:../../../support/troubleshooting/investigating-pod-issues.adoc#starting-debug-pods-with-root-access_investigating-pod-issues[Starting debug pods with root access].
2626
2727
include::modules/security-linux-capabilities-overview.adoc[leveloffset=+1]

edge_computing/day_2_core_cnf_clusters/security/security-sec-context-constraints.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,13 @@ Security context constraints allow an administrator to control the following sec
2626
2727
Default SCCs are created during installation and when you install some Operators or other components. As a cluster administrator, you can also create your own SCCs by using the OpenShift CLI (`oc`).
2828

29-
For information about default security context constraints, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html#default-sccs_configuring-internal-oauth[Default security context constraints].
29+
For information about default security context constraints, see xref:../../../authentication/managing-security-context-constraints.adoc#default-sccs_configuring-internal-oauth[Default security context constraints].
3030

3131
[IMPORTANT]
3232
====
3333
Do not modify the default SCCs. Customizing the default SCCs can lead to issues when some of the platform pods deploy or {product-title} is upgraded. Additionally, the default SCC values are reset to the defaults during some cluster upgrades, which discards all customizations to those SCCs.
3434
35-
Instead of modifying the default SCCs, create and modify your own SCCs as needed. For detailed steps, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html#security-context-constraints-creating_configuring-internal-oauth[Creating security context constraints].
35+
Instead of modifying the default SCCs, create and modify your own SCCs as needed. For detailed steps, see xref:../../../authentication/managing-security-context-constraints.adoc#security-context-constraints-creating_configuring-internal-oauth[Creating security context constraints].
3636
====
3737

3838
You can use the following basic SCCs:
@@ -96,4 +96,4 @@ The `restricted-v2` SCC explicitly denies everything except what it explicitly a
9696
* Allowed capabilities: `NET_BIND_SERVICE`. A pod can request this capability, but it is not added by default.
9797
* Allowed `seccomp` profiles: `runtime/default`.
9898
99-
For more information, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html[Managing security context constraints].
99+
For more information, see xref:../../../authentication/managing-security-context-constraints.adoc[Managing security context constraints].

modules/security-sec-context-constraints.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,13 @@ Security context constraints allow an administrator to control the following sec
2626
2727
Default SCCs are created during installation and when you install some Operators or other components. As a cluster administrator, you can also create your own SCCs by using the OpenShift CLI (`oc`).
2828

29-
For information about default security context constraints, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html#default-sccs_configuring-internal-oauth[Default security context constraints].
29+
For information about default security context constraints, see link:https://docs.openshift.com/container-platform/{product-version}/authentication/managing-security-context-constraints.html#default-sccs_configuring-internal-oauth[Default security context constraints].
3030

3131
[IMPORTANT]
3232
====
3333
Do not modify the default SCCs. Customizing the default SCCs can lead to issues when some of the platform pods deploy or {product-title} is upgraded. Additionally, the default SCC values are reset to the defaults during some cluster upgrades, which discards all customizations to those SCCs.
3434
35-
Instead of modifying the default SCCs, create and modify your own SCCs as needed. For detailed steps, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html#security-context-constraints-creating_configuring-internal-oauth[Creating security context constraints].
35+
Instead of modifying the default SCCs, create and modify your own SCCs as needed. For detailed steps, see link:https://docs.openshift.com/container-platform/{product-version}/authentication/managing-security-context-constraints.html#security-context-constraints-creating_configuring-internal-oauth[Creating security context constraints].
3636
====
3737

3838
You can use the following basic SCCs:
@@ -96,4 +96,4 @@ The `restricted-v2` SCC explicitly denies everything except what it explicitly a
9696
* Allowed capabilities: `NET_BIND_SERVICE`. A pod can request this capability, but it is not added by default.
9797
* Allowed `seccomp` profiles: `runtime/default`.
9898
99-
For more information, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html[Managing security context constraints].
99+
For more information, see link:https://docs.openshift.com/container-platform/{product-version}/authentication/managing-security-context-constraints.html[Managing security context constraints].

0 commit comments

Comments
 (0)