Docs: Fix secure settings link

Original commit: elastic/x-pack-elasticsearch@f98a8dabc6
This commit is contained in:
Alexander Reelsen 2018-03-26 15:32:27 +02:00
parent c2764cef98
commit 67badaadb0
4 changed files with 4 additions and 4 deletions

View File

@ -165,7 +165,7 @@ If you configure multiple HipChat accounts, you either need to set a default
HipChat account or specify which account the notification should be sent with
in the <<actions-hipchat, hipchat>> action.
deprecated[Storing the `auth_token` in the configuration file or using via updating the settings now is deprecated, as you should use the keystore for this, see <<secure-settings,secure settings>>]
deprecated[Storing the `auth_token` in the configuration file or using via updating the settings now is deprecated, as you should use the keystore for this, see {ref}/secure-settings.html[secure settings]]
[source,yaml]
--------------------------------------------------

View File

@ -106,7 +106,7 @@ You configure the accounts {watcher} can use to communicate with Jira in the
`xpack.notification.jira` namespace in `elasticsearch.yml`.
{watcher} supports Basic Authentication for Jira Software. To configure a
Jira account you need to specify (see <<secure-settings,secure settings>>):
Jira account you need to specify (see {ref}/secure-settings.html[secure settings]):
[source,yaml]
--------------------------------------------------

View File

@ -146,7 +146,7 @@ image::images/pagerduty-services.jpg[]
image::images/pagerduty-integrations.jpg[]
To configure a PagerDuty account in the keystore, you
must specify an account name and integration key, (see <<secure-settings,secure settings>>):
must specify an account name and integration key, (see {ref}/secure-settings.html[secure settings]):
[source,yaml]
--------------------------------------------------

View File

@ -193,7 +193,7 @@ image::images/slack-add-webhook-integration.jpg[]
image::images/slack-copy-webhook-url.jpg[]
To configure a Slack account, at a minimum you need to specify the account
name and webhook URL in the elasticsearch keystore (<<secure-settings,secure settings>>):
name and webhook URL in the elasticsearch keystore (se {ref}/secure-settings.html[secure settings]):
[source,shell]
--------------------------------------------------