diff --git a/linkerd.io/content/2-edge/reference/authorization-policy.md b/linkerd.io/content/2-edge/reference/authorization-policy.md index 46ba134c93..afa255600a 100644 --- a/linkerd.io/content/2-edge/reference/authorization-policy.md +++ b/linkerd.io/content/2-edge/reference/authorization-policy.md @@ -43,7 +43,7 @@ policy in the cluster: [Server], [HTTPRoute], [ServerAuthorization], The general pattern for authorization is: -- A `Server` describes and a set of pods, and a single port on those pods. +- A `Server` describes a set of pods, and a single port on those pods. - Optionally, an `HTTPRoute` references that `Server` and describes a subset of HTTP traffic to it. - A `MeshTLSAuthentication` or `NetworkAuthentication` decribes who @@ -77,7 +77,7 @@ A `Server` spec may contain the following top level fields: {{< table >}} | field| value | |------|-------| -| `accessPolicy`| [accessPolicy](#accessPolicy) declares the policy applied to traffic not matching any associated authorization policies (defaults to `deny`). | +| `accessPolicy`| [accessPolicy](#accesspolicy) declares the policy applied to traffic not matching any associated authorization policies (defaults to `deny`). | | `podSelector`| A [podSelector](#podselector) selects pods in the same namespace. | | `port`| A port name or number. Only ports in a pod spec's `ports` are considered. | | `proxyProtocol`| Configures protocol discovery for inbound connections. Supersedes the `config.linkerd.io/opaque-ports` annotation. Must be one of `unknown`,`HTTP/1`,`HTTP/2`,`gRPC`,`opaque`,`TLS`. Defaults to `unknown` if not set. | diff --git a/linkerd.io/content/2.12/reference/authorization-policy.md b/linkerd.io/content/2.12/reference/authorization-policy.md index bc8e9fd4eb..c4f97feb01 100644 --- a/linkerd.io/content/2.12/reference/authorization-policy.md +++ b/linkerd.io/content/2.12/reference/authorization-policy.md @@ -41,7 +41,7 @@ policy in the cluster: [Server], [HTTPRoute], [ServerAuthorization], The general pattern for authorization is: -- A `Server` describes and a set of pods, and a single port on those pods. +- A `Server` describes a set of pods, and a single port on those pods. - Optionally, an `HTTPRoute` references that `Server` and describes a subset of HTTP traffic to it. - A `MeshTLSAuthentication` or `NetworkAuthentication` decribes who diff --git a/linkerd.io/content/2.13/reference/authorization-policy.md b/linkerd.io/content/2.13/reference/authorization-policy.md index c1280180f0..faf4bbb7a7 100644 --- a/linkerd.io/content/2.13/reference/authorization-policy.md +++ b/linkerd.io/content/2.13/reference/authorization-policy.md @@ -41,7 +41,7 @@ policy in the cluster: [Server], [HTTPRoute], [ServerAuthorization], The general pattern for authorization is: -- A `Server` describes and a set of pods, and a single port on those pods. +- A `Server` describes a set of pods, and a single port on those pods. - Optionally, an `HTTPRoute` references that `Server` and describes a subset of HTTP traffic to it. - A `MeshTLSAuthentication` or `NetworkAuthentication` decribes who diff --git a/linkerd.io/content/2.14/reference/authorization-policy.md b/linkerd.io/content/2.14/reference/authorization-policy.md index 1089b8f463..7bbdf12e58 100644 --- a/linkerd.io/content/2.14/reference/authorization-policy.md +++ b/linkerd.io/content/2.14/reference/authorization-policy.md @@ -41,7 +41,7 @@ policy in the cluster: [Server], [HTTPRoute], [ServerAuthorization], The general pattern for authorization is: -- A `Server` describes and a set of pods, and a single port on those pods. +- A `Server` describes a set of pods, and a single port on those pods. - Optionally, an `HTTPRoute` references that `Server` and describes a subset of HTTP traffic to it. - A `MeshTLSAuthentication` or `NetworkAuthentication` decribes who diff --git a/linkerd.io/content/2.15/reference/authorization-policy.md b/linkerd.io/content/2.15/reference/authorization-policy.md index 1089b8f463..7bbdf12e58 100644 --- a/linkerd.io/content/2.15/reference/authorization-policy.md +++ b/linkerd.io/content/2.15/reference/authorization-policy.md @@ -41,7 +41,7 @@ policy in the cluster: [Server], [HTTPRoute], [ServerAuthorization], The general pattern for authorization is: -- A `Server` describes and a set of pods, and a single port on those pods. +- A `Server` describes a set of pods, and a single port on those pods. - Optionally, an `HTTPRoute` references that `Server` and describes a subset of HTTP traffic to it. - A `MeshTLSAuthentication` or `NetworkAuthentication` decribes who diff --git a/linkerd.io/content/2.16/reference/authorization-policy.md b/linkerd.io/content/2.16/reference/authorization-policy.md index 46ba134c93..afa255600a 100644 --- a/linkerd.io/content/2.16/reference/authorization-policy.md +++ b/linkerd.io/content/2.16/reference/authorization-policy.md @@ -43,7 +43,7 @@ policy in the cluster: [Server], [HTTPRoute], [ServerAuthorization], The general pattern for authorization is: -- A `Server` describes and a set of pods, and a single port on those pods. +- A `Server` describes a set of pods, and a single port on those pods. - Optionally, an `HTTPRoute` references that `Server` and describes a subset of HTTP traffic to it. - A `MeshTLSAuthentication` or `NetworkAuthentication` decribes who @@ -77,7 +77,7 @@ A `Server` spec may contain the following top level fields: {{< table >}} | field| value | |------|-------| -| `accessPolicy`| [accessPolicy](#accessPolicy) declares the policy applied to traffic not matching any associated authorization policies (defaults to `deny`). | +| `accessPolicy`| [accessPolicy](#accesspolicy) declares the policy applied to traffic not matching any associated authorization policies (defaults to `deny`). | | `podSelector`| A [podSelector](#podselector) selects pods in the same namespace. | | `port`| A port name or number. Only ports in a pod spec's `ports` are considered. | | `proxyProtocol`| Configures protocol discovery for inbound connections. Supersedes the `config.linkerd.io/opaque-ports` annotation. Must be one of `unknown`,`HTTP/1`,`HTTP/2`,`gRPC`,`opaque`,`TLS`. Defaults to `unknown` if not set. |