From a9b9f8bed6f0923e12fa31c9e23a73ae10b2bb79 Mon Sep 17 00:00:00 2001 From: Lizan Zhou Date: Mon, 2 Mar 2020 14:27:49 -0800 Subject: [PATCH] doc: fix SNI FAQ link (#10227) Signed-off-by: Lizan Zhou --- docs/root/faq/configuration/sni.rst | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/docs/root/faq/configuration/sni.rst b/docs/root/faq/configuration/sni.rst index 7cc8cf799e20..1e8da3f9c6d5 100644 --- a/docs/root/faq/configuration/sni.rst +++ b/docs/root/faq/configuration/sni.rst @@ -70,9 +70,9 @@ The following is a YAML example of the above requirement. How do I configure SNI for clusters? ==================================== -For clusters, a fixed SNI can be set in `UpstreamTlsContext `_. +For clusters, a fixed SNI can be set in :ref:`UpstreamTlsContext `. To derive SNI from HTTP `host` or `:authority` header, turn on -`auto_sni `_ to override the fixed SNI in +:ref:`auto_sni ` to override the fixed SNI in `UpstreamTlsContext`. If upstream will present certificates with the hostname in SAN, turn on -`auto_san_validation `_ too. +:ref:`auto_san_validation ` too. It still needs a trust CA in validation context in `UpstreamTlsContext` for trust anchor.