You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/docs/installation/best-practice.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,7 +107,7 @@ tweak the [various liveness probe time settings and thresholds](https://github.c
107
107
108
108
## Restrict Auto-Mount of Service Account Tokens
109
109
110
-
This recommendation is described in the [Kyverno Policy Catalogue](https://kyverno.io/policies/other/restrict_automount_sa_token/restrict_automount_sa_token/) as follows:
110
+
This recommendation is described in the [Kyverno Policy Catalogue](https://kyverno.io/policies/other/res/restrict-automount-sa-token/restrict-automount-sa-token/) as follows:
111
111
> Kubernetes automatically mounts ServiceAccount credentials in each Pod. The
112
112
> ServiceAccount may be assigned roles allowing Pods to access API resources.
113
113
> Blocking this ability is an extension of the least privilege best practice and
Copy file name to clipboardExpand all lines: content/v1.12-docs/installation/best-practice.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ and in that case you can modify the installation configuration using Helm chart
16
16
17
17
## Restrict Auto-Mount of Service Account Tokens
18
18
19
-
This recommendation is described in the [Kyverno Policy Catalogue](https://kyverno.io/policies/other/restrict_automount_sa_token/restrict_automount_sa_token/) as follows:
19
+
This recommendation is described in the [Kyverno Policy Catalogue](https://kyverno.io/policies/other/res/restrict-automount-sa-token/restrict-automount-sa-token/) as follows:
20
20
> Kubernetes automatically mounts ServiceAccount credentials in each Pod. The
21
21
> ServiceAccount may be assigned roles allowing Pods to access API resources.
22
22
> Blocking this ability is an extension of the least privilege best practice and
0 commit comments