diff --git a/docs/modules/spark-k8s/pages/usage-guide/security.adoc b/docs/modules/spark-k8s/pages/usage-guide/security.adoc index 34012517..26ec0193 100644 --- a/docs/modules/spark-k8s/pages/usage-guide/security.adoc +++ b/docs/modules/spark-k8s/pages/usage-guide/security.adoc @@ -11,7 +11,7 @@ In this guide we show how to configure Spark applications to use Kerberos while == Prerequisites -It is assumed that you have a KDC server running in your cluster and that the Stackable Secret Operator is configured to provision the keytab files as described in xref:home:secret-operator:secretclass.adoc#backend-kerberoskeytab[secret-operator documentation]. +It is assumed that you have a KDC server running in your cluster and that the Stackable Secret Operator is configured to provision the keytab files as described in the xref:home:secret-operator:secretclass.adoc#backend-kerberoskeytab[secret-operator documentation]. For details on HDFS and Kerberos, see the xref:hdfs-operator:usage-guide:security.adoc[HDFS operator guide].