From ff0c271d7b89ac910c0454779b08890aa0a1a18e Mon Sep 17 00:00:00 2001 From: Stephen Cuppett Date: Wed, 3 Oct 2018 10:46:51 -0400 Subject: [PATCH] Fix Calico network policy docs link --- docs/topics/security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/topics/security.md b/docs/topics/security.md index cfea901d..3a3411f3 100644 --- a/docs/topics/security.md +++ b/docs/topics/security.md @@ -10,7 +10,7 @@ Typhoon aims to be minimal and secure. We're running it ourselves after all. * Generated kubelet TLS certificates and `kubeconfig` (365 days) * [Role-Based Access Control](https://kubernetes.io/docs/admin/authorization/rbac/) is enabled. Apps must define RBAC policies * Workloads run on worker nodes only, unless they tolerate the master taint -* Kubernetes [Network Policy](https://kubernetes.io/docs/concepts/services-networking/network-policies/) and Calico [Policy](https://docs.projectcalico.org/latest/reference/calicoctl/resources/policy) support [^1] +* Kubernetes [Network Policy](https://kubernetes.io/docs/concepts/services-networking/network-policies/) and Calico [NetworkPolicy](https://docs.projectcalico.org/latest/reference/calicoctl/resources/networkpolicy) support [^1] [^1]: Requires `networking = "calico"`. Calico is the default on AWS, bare-metal, and Google Cloud. Azure and Digital Ocean are limited to `networking = "flannel"`.