Skip to content

Commit

Permalink
update broken links
Browse files Browse the repository at this point in the history
  • Loading branch information
shanmydell committed Jan 25, 2024
1 parent fba801a commit 7452dcb
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 5 deletions.
6 changes: 3 additions & 3 deletions content/docs/deployment/helm/modules/encryption/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,13 +13,13 @@ the rest of the deployment process is described in the correspondent [CSI driver

## Vault Server

Hashicorp Vault must be [pre-configured](../vault) to support Encryption. The Vault server's IP address and port must be accessible
Hashicorp Vault must be [pre-configured](vault) to support Encryption. The Vault server's IP address and port must be accessible
from the Kubernetes cluster where the CSI driver is to be deployed.

## Rekey Controller

The Encryption Rekey CRD Controller is an optional component that, if installed, allows encrypted volumes rekeying in a
Kubernetes cluster. Please refer to [Rekey Configuration](../rekey) for the Rekey Controller installation details.
Kubernetes cluster. Please refer to [Rekey Configuration](rekey) for the Rekey Controller installation details.

## Helm Chart Values

Expand Down Expand Up @@ -106,7 +106,7 @@ A secret with the AppRole credentials used by Encryption to authenticate to the

> Set `role_id` and `secret_id` to the values provided by the Vault server administrator.

> If a self-managed test Vault instance is used, generate role ID and secret ID following [these steps](../vault/#set-role-id-and-secret-id-to-the-role).
> If a self-managed test Vault instance is used, generate role ID and secret ID following [these steps](vault/#set-role-id-and-secret-id-to-the-role).

```shell
cat >auth.json <<EOF
Expand Down
4 changes: 2 additions & 2 deletions content/docs/deployment/helm/modules/encryption/vault.md
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ Create server certificate signed by the CA:

> Replace `<external IP>` with an IP address by which Encryption can reach the Vault server.
This may be the address of the Docker host where the Vault server will be running.
The same address should be used for `vault_addr` in [vault-client-conf](../deployment#configmap-vault-client-conf).
The same address should be used for `vault_addr` in [vault-client-conf](../#configmap-vault-client-conf).

```shell
cat > cert.ext <<EOF
Expand Down Expand Up @@ -224,7 +224,7 @@ vault write auth/approle/role/dea-role/role-id role_id=demo-role-id
vault write auth/approle/role/dea-role/custom-secret-id secret_id=demo-secret-id
```

> Secret ID has an expiration time after which it becomes invalid resulting in [authorization failure](../troubleshooting#expired-approle-secret-id).
> Secret ID has an expiration time after which it becomes invalid resulting in [authorization failure](../../../../secure/encryption/troubleshooting#expired-approle-secret-id).
> The expiration time for new secret IDs can be set in `secret_id_ttl` parameter when [the role is created](#create-a-role) or later on using
> `vault write auth/approle/role/dea-role/secret-id-ttl secret_id_ttl=24h`.
Expand Down

0 comments on commit 7452dcb

Please sign in to comment.