From 81f8f7c04ec70b9e513b2e40f8c2f29d105a7c4d Mon Sep 17 00:00:00 2001 From: trujillo-adam Date: Thu, 8 Jun 2023 14:33:31 -0700 Subject: [PATCH] fixed typo --- website/content/docs/k8s/connect/index.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/content/docs/k8s/connect/index.mdx b/website/content/docs/k8s/connect/index.mdx index a25df183c6..26060bab7e 100644 --- a/website/content/docs/k8s/connect/index.mdx +++ b/website/content/docs/k8s/connect/index.mdx @@ -13,7 +13,7 @@ Consul service mesh automates service-to-service authorization and encryption ac Consul service mesh is enabled by default when you install Consul on Kubernetes using the Consul Helm chart. Consul also automatically injects sidecars into the pods in your cluster that run Envoy. The sidecar proxies injected into are called Consul dataplanes and are enabled when `connectInject.default` is set to `false` in the Helm chart. Refer to the following documentation for additional information about these concepts: -- [Installation and Configuration](#installation-and-configuration) in this topic. +- [Installation and Configuration](#installation-and-configuration) in this topic - [Consul Helm chart reference](/consul/docs/k8s/helm) - [Simplified Service Mesh with Consul Dataplane](/consul/docs/connect/dataplane)