From 62235277e5dedf78cd4d85d20a581a5acd018821 Mon Sep 17 00:00:00 2001 From: Karthikeyan Valliyurnatt Date: Mon, 11 Dec 2023 16:20:13 -0500 Subject: [PATCH] fix secure settings link on stack config policy page --- .../stack-config-policy.asciidoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/orchestrating-elastic-stack-applications/stack-config-policy.asciidoc b/docs/orchestrating-elastic-stack-applications/stack-config-policy.asciidoc index 2631bdb3cd..d160c1afa1 100644 --- a/docs/orchestrating-elastic-stack-applications/stack-config-policy.asciidoc +++ b/docs/orchestrating-elastic-stack-applications/stack-config-policy.asciidoc @@ -45,7 +45,7 @@ The following fields are optional: * `namespace` is the namespace of the `StackConfigPolicy` resource and used to identify the Elasticsearch clusters to which this policy applies. If it equals to the operator namespace, the policy applies to all namespaces managed by the operator, otherwise the policy only applies to the namespace of the policy. * `resourceSelector` is a link:https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/[label selector] to identify the Elasticsearch clusters to which this policy applies in combination with the namespace(s). No `resourceSelector` means all Elasticsearch clusters in the namespace(s). -* `secureSettings` is a list of Secrets containing Secure Settings to inject into the keystore(s) of the Elasticsearch cluster(s) to which this policy applies, similar to the <<{p}-custom-images,Elasticsearch Secure Settings>>. +* `secureSettings` is a list of Secrets containing Secure Settings to inject into the keystore(s) of the Elasticsearch cluster(s) to which this policy applies, similar to the <<{p}-es-secure-settings,Elasticsearch Secure Settings>>. Secure settings may be required to configure Cloud snapshot repositories (Azure, GCS, S3) if you are not using Cloud-provider specific means to leverage Kubernetes service accounts (<<{p}-gke-workload-identiy,GKE Workload Identity>> or <<{p}-iam-service-accounts,AWS IAM roles for service accounts>>, for example).