File tree 1 file changed +4
-4
lines changed
content/en/docs/concepts/configuration 1 file changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -667,8 +667,8 @@ it to read a file.
667
667
668
668
When deploying applications that interact with the secrets API, access should be
669
669
limited using [authorization policies](
670
- https://kubernetes.io/ docs/admin /authorization/) such as [RBAC](
671
- https://kubernetes.io/ docs/admin/authorization /rbac/).
670
+ / docs/reference/access-authn-authz /authorization/) such as [RBAC](
671
+ / docs/reference/access-authn-authz /rbac/).
672
672
673
673
Secrets often hold values that span a spectrum of importance, many of which can
674
674
cause escalations within Kubernetes (e.g. service account tokens) and to
@@ -685,7 +685,7 @@ privileged, system-level components.
685
685
Applications that need to access the secrets API should perform `get` requests on
686
686
the secrets they need. This lets administrators restrict access to all secrets
687
687
while [white-listing access to individual instances](
688
- https://kubernetes.io/ docs/admin/authorization /rbac/#referring-to-resources) that
688
+ / docs/reference/access-authn-authz /rbac/#referring-to-resources) that
689
689
the app needs.
690
690
691
691
For improved performance over a looping `get`, clients can design resources that
@@ -748,5 +748,5 @@ Pod level](#use-case-secret-visible-to-one-container-in-a-pod).
748
748
single node.
749
749
750
750
{{< note >}}
751
- **Note:** As of 1.7 [encryption of secret data at rest is supported](https://kubernetes.io /docs/tasks/administer-cluster/encrypt-data/).
751
+ **Note:** As of 1.7 [encryption of secret data at rest is supported](/docs/tasks/administer-cluster/encrypt-data/).
752
752
{{< /note >}}
You can’t perform that action at this time.
0 commit comments