Fix broken relative links (#1388)

Signed-off-by: Jeremy Chase <jeremy.chase@gmail.com>

Co-authored-by: Flynn <kflynn@users.noreply.github.com>
This commit is contained in:
Jeremy Chase 2022-07-22 11:47:32 -04:00 committed by GitHub
parent cc4452cdc6
commit 7b5df4f1a3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 4 additions and 4 deletions

View File

@ -60,7 +60,7 @@ At a high level, you will:
src="/images/multicluster/install.svg" >}}
Linkerd requires a shared
[trust anchor](https://linkerd.io../generate-certificates/#trust-anchor-certificate)
[trust anchor](../generate-certificates/#trust-anchor-certificate)
to exist between the installations in all clusters that communicate with each
other. This is used to encrypt the traffic between clusters and authorize
requests that reach the gateway so that your cluster is not open to the public

View File

@ -58,7 +58,7 @@ At a high level, you will:
src="/images/multicluster/install.svg" >}}
Linkerd requires a shared
[trust anchor](https://linkerd.io../generate-certificates/#trust-anchor-certificate)
[trust anchor](../generate-certificates/#trust-anchor-certificate)
to exist between the installations in all clusters that communicate with each
other. This is used to encrypt the traffic between clusters and authorize
requests that reach the gateway so that your cluster is not open to the public

View File

@ -57,7 +57,7 @@ At a high level, you will:
src="/images/multicluster/install.svg" >}}
Linkerd requires a shared
[trust anchor](https://linkerd.io../generate-certificates/#trust-anchor-certificate)
[trust anchor](../generate-certificates/#trust-anchor-certificate)
to exist between the installations in all clusters that communicate with each
other. This is used to encrypt the traffic between clusters and authorize
requests that reach the gateway so that your cluster is not open to the public

View File

@ -670,7 +670,7 @@ This documentation will use the following elements:
Before installing the Emojivoto demo application, install Linkerd and Kong on
your cluster. Remember when injecting the Kong deployment to use the `--ingress`
flag (or annotation) as mentioned
[above](https://linkerd.io../using-ingress/#proxy-ingress-mode)!
[above](../using-ingress/#proxy-ingress-mode)!
We need to declare KongPlugin (a Kong CRD) and Ingress resources as well.