Skip to content

Commit 97f0e01

Browse files
authored
docs: fix links (#509)
1 parent c877f21 commit 97f0e01

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

docs/modules/hdfs/pages/usage-guide/logging-log-aggregation.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ spec:
2323
----
2424

2525
Further information on how to configure logging, can be found in
26-
xref:home:concepts:logging.adoc[].
26+
xref:concepts:logging.adoc[].

docs/modules/hdfs/pages/usage-guide/monitoring.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@ All services (with the exception of the Zookeeper daemon on the node names) run
66

77
The metrics endpoints are also used as liveliness probes by K8S.
88

9-
See xref:home:operators:monitoring.adoc[] for more details.
9+
See xref:operators:monitoring.adoc[] for more details.

docs/modules/hdfs/pages/usage-guide/security.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
== Authentication
44
Currently the only supported authentication mechanism is Kerberos, which is disabled by default.
55
For Kerberos to work a Kerberos KDC is needed, which the users needs to provide.
6-
The xref:home:secret-operator:secretclass.adoc#backend-kerberoskeytab[secret-operator documentation] states which kind of Kerberos servers are supported and how they can be configured.
6+
The xref:secret-operator:secretclass.adoc#backend-kerberoskeytab[secret-operator documentation] states which kind of Kerberos servers are supported and how they can be configured.
77

88
IMPORTANT: Kerberos is supported starting from HDFS version 3.3.x
99

@@ -12,7 +12,7 @@ To configure HDFS to use Kerberos you first need to collect information about yo
1212
Additionally you need a service-user, which the secret-operator uses to create create principals for the HDFS services.
1313

1414
=== 2. Create Kerberos SecretClass
15-
Afterwards you need to enter all the needed information into a SecretClass, as described in xref:home:secret-operator:secretclass.adoc#backend-kerberoskeytab[secret-operator documentation].
15+
Afterwards you need to enter all the needed information into a SecretClass, as described in xref:secret-operator:secretclass.adoc#backend-kerberoskeytab[secret-operator documentation].
1616
The following guide assumes you have named your SecretClass `kerberos-hdfs`.
1717

1818
=== 3. Configure HDFS to use SecretClass
@@ -55,7 +55,7 @@ We have an https://github.com/stackabletech/hdfs-operator/blob/main/tests/templa
5555

5656
== Authorization
5757
For authorization we developed https://github.com/stackabletech/hdfs-utils[hdfs-utils], which contains an OPA authorizer and group mapper.
58-
This matches our general xref:home:concepts:opa.adoc[] mechanisms.
58+
This matches our general xref:concepts:opa.adoc[] mechanisms.
5959

6060
IMPORTANT: It is recommended to enable Kerberos when doing Authorization, as otherwise you don't have any security measures at all.
6161
There still might be cases where you want authorization on top of a cluster without authentication, as you don't want to accidentally drop files and therefore use different users for different use-cases.

0 commit comments

Comments
 (0)