From 65a87af1470594fdbbc34a68b2340171a61adc1a Mon Sep 17 00:00:00 2001 From: Kingdon Barrett Date: Thu, 24 Aug 2023 10:46:08 -0400 Subject: [PATCH] more link canonicalization Signed-off-by: Kingdon Barrett --- content/en/flux/guides/mozilla-sops.md | 2 +- content/en/flux/installation/configuration/multitenancy.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/content/en/flux/guides/mozilla-sops.md b/content/en/flux/guides/mozilla-sops.md index 5c3398f2d..b2f611522 100644 --- a/content/en/flux/guides/mozilla-sops.md +++ b/content/en/flux/guides/mozilla-sops.md @@ -316,7 +316,7 @@ Note that when using `flux bootstrap` you can [set the annotation](/flux/install #### Azure -When using Azure Key Vault you need to authenticate kustomize-controller either with [aad-pod-identity](/flux/components/kustomize/kustomization/#aad-pod-identity) +When using Azure Key Vault you need to authenticate kustomize-controller either with [aad-pod-identity](/flux/components/kustomize/kustomizations/#aad-pod-identity) or by passing [Service Principal credentials as environment variables](https://github.com/mozilla/sops#encrypting-using-azure-key-vault). Create the Azure Key-Vault: diff --git a/content/en/flux/installation/configuration/multitenancy.md b/content/en/flux/installation/configuration/multitenancy.md index 8a4916f4a..d6cec5def 100644 --- a/content/en/flux/installation/configuration/multitenancy.md +++ b/content/en/flux/installation/configuration/multitenancy.md @@ -23,7 +23,7 @@ RBAC rules to Flux API objects. To give users control over the authorisation, the Flux controllers can _impersonate_ (assume the identity of) a service account mentioned in the apply specification (e.g., the field `.spec.serviceAccountName` in -a [`Kustomization` object](https://fluxcd.io/flux/components/kustomize/kustomization/#role-based-access-control) +a [`Kustomization` object](https://fluxcd.io/flux/components/kustomize/kustomizations/#role-based-access-control) or in a [`HelmRelease` object](https://fluxcd.io/flux/components/helm/helmreleases/#role-based-access-control)) for both accessing resources and applying configuration. This lets a user constrain the operations performed by the Flux controllers with RBAC.