Skip to content

Commit 028e4c5

Browse files
committed
Fix local links
1 parent 269007b commit 028e4c5

File tree

19 files changed

+49
-49
lines changed

19 files changed

+49
-49
lines changed

docs/concepts/fs/feature_group/fg_statistics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ HSFS supports monitoring, validation, and alerting for features:
66

77
### Statistics
88

9-
When you create a Feature Group in HSFS, you can configure it to compute statistics over the features inserted into the Feature Group by setting the `statistics_config` dict parameter, see [Feature Group Statistics](../../../../user_guides/fs/feature_group/statistics/) for details.
9+
When you create a Feature Group in HSFS, you can configure it to compute statistics over the features inserted into the Feature Group by setting the `statistics_config` dict parameter, see [Feature Group Statistics](../../../user_guides/fs/feature_group/statistics.md) for details.
1010
Every time you write to the Feature Group, new statistics will be computed over all of the data in the Feature Group.
1111

1212
### Data Validation

docs/setup_installation/admin/auth.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,10 +28,10 @@ In the **Cluster Settings** _Authentication_ tab you can configure how users aut
2828

2929
2. **OAuth2**: if your organization already have an identity management system compatible with [OpenID Connect (OIDC)](https://openid.net/connect/) you can configure Hopsworks to use your identity provider by enabling **OAuth** as shown in the figure below.
3030
After enabling OAuth you can register your identity provider by clicking on **Add Identity Provider** button.
31-
See [Create client](../oauth2/create-client) for details.
31+
See [Create client](./oauth2/create-client.md) for details.
3232
3. **LDAP/Kerberos**: if your organization is using LDAP or Kerberos to manage users and services you can configure Hopsworks to use it as the user management system.
3333
You can enable LDAP/Kerberos by clicking on the checkbox, as shown in the figure below, and choosing LDAP or Kerberos.
34-
For more information on how to configure LDAP and Kerberos see [Configure LDAP](../ldap/configure-ldap) and [Configure Kerberos](../ldap/configure-krb).
34+
For more information on how to configure LDAP and Kerberos see [Configure LDAP](./ldap/configure-ldap.md) and [Configure Kerberos](./ldap/configure-krb.md).
3535

3636
<figure>
3737
<img src="../../../assets/images/admin/auth-config.png" alt="Authentication config" />

docs/setup_installation/admin/ldap/configure-krb.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Kerberos need some server configuration before you can enable it from the UI.
1010
## Prerequisites
1111

1212
A server configured with Kerberos.
13-
See [Server Configuration for Kerberos](../configure-server/#server-configuration-for-kerberos) for instruction on how to do this.
13+
See [Server Configuration for Kerberos](./configure-server.md#step-2-server-configuration-for-kerberos) for instruction on how to do this.
1414

1515
### Step 1: Enable Kerberos
1616

@@ -35,7 +35,7 @@ Finally, click on edit configuration and fill in the attributes.
3535
</figure>
3636

3737
- Account status: the status a user will be assigned when logging in for the first time.
38-
If a user is assigned a status different from *Activated* an admin needs to manually activate each user from the [User management](../../user).
38+
If a user is assigned a status different from *Activated* an admin needs to manually activate each user from the [User management](../user.md).
3939
- Group mapping: allows you to specify a mapping between LDAP groups and Hopsworks groups.
4040
The mapping is a semicolon separated string in the form ```Directory Administrators->HOPS_ADMIN;IT People-> HOPS_USER```.
4141
Default is empty.

docs/setup_installation/admin/ldap/configure-ldap.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ LDAP need some server configuration before you can enable it from the UI.
1010
## Prerequisites
1111

1212
A server configured with LDAP.
13-
See [Server Configuration for LDAP](../configure-server/#server-configuration-for-ldap) for instruction on how to do this.
13+
See [Server Configuration for LDAP](./configure-server.md#step-1-server-configuration-for-ldap) for instruction on how to do this.
1414

1515
### Step 1: Enable LDAP
1616

@@ -34,7 +34,7 @@ Finally, click on edit configuration and fill in the attributes.
3434
</figure>
3535

3636
- Account status: the status a user will be assigned when logging in for the first time.
37-
If a user is assigned a status different from *Activated* an admin needs to manually activate each user from the [User management](../../user).
37+
If a user is assigned a status different from *Activated* an admin needs to manually activate each user from the [User management](../user.md).
3838
- Group mapping: allows you to specify a mapping between LDAP groups and Hopsworks groups.
3939
The mapping is a semicolon separated string in the form ```Directory Administrators->HOPS_ADMIN;IT People-> HOPS_USER```.
4040
Default is empty.

docs/setup_installation/admin/ldap/configure-project-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ For example, if a user is removed from the LDAP group, they will also be removed
1111

1212
## Prerequisites
1313

14-
1. A server configured with LDAP or Kerberos. See [Server Configuration for Kerberos](../configure-server/#server-configuration-for-kerberos) and [Server Configuration for LDAP](../configure-server/#server-configuration-for-ldap) for instructions on how to do this.
14+
1. A server configured with LDAP or Kerberos. See [Server Configuration for Kerberos](./configure-server.md#step-2-server-configuration-for-kerberos) and [Server Configuration for LDAP](./configure-server.md#step-1-server-configuration-for-ldap) for instructions on how to do this.
1515
2. LDAP group mapping sync enabled. This can be done by setting the variable ```ldap_group_mapping_sync_enabled=true```.
1616

1717
See [Cluster Configuration](../variables.md) on how to change variable values in Hopsworks.

docs/setup_installation/admin/monitoring/export-metrics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
## Introduction
44

5-
Hopsworks services produce metrics which are centrally gathered by [Prometheus](https://prometheus.io/) and visualized in [Grafana](../grafana).
5+
Hopsworks services produce metrics which are centrally gathered by [Prometheus](https://prometheus.io/) and visualized in [Grafana](./grafana.md).
66
Although the system is self-contained, it is possible for another *federated* Prometheus instance to scrape these metrics or directly push them to another system.
77
This is useful if you have a centralized monitoring system with already configured alerts.
88

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
# Configure OAuth2 group to project mapping
2-
2+
33
## Introduction
44
A group-to-project mapping lets you automatically add all members of an OAuth2 group to a project, eliminating the need to add each user individually. To create a mapping, you simply select an OAuth2 group, choose the project it should be linked to, and assign the role that its members will have within that project.
55

66
Once a mapping is created, project membership is controlled through OAuth2 group membership. Any updates made to the OAuth2 group—such as adding or removing users—will automatically be reflected in Hopsworks. For example, if a user is removed from the OAuth2 group, they will also be removed from the corresponding project.
7-
7+
88
## Prerequisites
9-
1. A server configured with OAuth2. See [Register Identity Provider in Hopsworks](../create-client) for instructions on how to do this.
10-
2. OAuth2 group mapping sync enabled. This can be done by setting the variable ```oauth_group_mapping_sync_enabled=true```.
9+
1. A server configured with OAuth2. See [Register Identity Provider in Hopsworks](./create-client.md) for instructions on how to do this.
10+
2. OAuth2 group mapping sync enabled. This can be done by setting the variable ```oauth_group_mapping_sync_enabled=true```.
1111
See [Cluster Configuration](../variables.md) on how to change variable values in Hopsworks.
1212
<figure>
1313
<a href="../../../../assets/images/admin/project-mapping/configuration-variables.png">
@@ -24,61 +24,61 @@ If you can not find the variable ```oauth_group_mapping_sync_enabled``` create i
2424
</a>
2525
<figcaption>Create OAuth2 mapping enabled variable</figcaption>
2626
</figure>
27-
27+
2828
### Step 1: Create a mapping
2929
To create a mapping go to **Cluster Settings** by clicking on your name in the top right
3030
corner of the navigation bar and choosing *Cluster Settings* from the dropdown menu.
3131
In the _Project mapping_ tab, you can create a new mapping by clicking on _Create new mapping_.
32-
32+
3333
<figure>
3434
<a href="../../../../assets/images/admin/project-mapping/project-mapping-empty.png">
3535
<img src="../../../../assets/images/admin/project-mapping/project-mapping-empty.png" alt="Project mapping tab" />
3636
</a>
3737
<figcaption>Project mapping</figcaption>
3838
</figure>
39-
39+
4040
This will take you to the create mapping page shown below
4141
<figure>
4242
<a href="../../../../assets/images/admin/project-mapping/create-oauth-mapping.png">
4343
<img src="../../../../assets/images/admin/project-mapping/create-oauth-mapping.png" alt="Create mapping" />
4444
</a>
4545
<figcaption>Create mapping</figcaption>
4646
</figure>
47-
47+
4848
Here you can enter your OAuth2 group and map it to a project from the _Project_ drop down list.
4949
You can also choose the _Project role_ users will be assigned when they are added to the project.
50-
50+
5151
Finally, click on _Create mapping_ and go back to mappings. You should see the newly created mapping(s) as shown below.
52-
52+
5353
<figure>
5454
<a href="../../../../assets/images/admin/project-mapping/group-to-project-mappings.png">
5555
<img src="../../../../assets/images/admin/project-mapping/group-to-project-mappings.png" alt="Project mappings" />
5656
</a>
5757
<figcaption>Project mappings</figcaption>
5858
</figure>
59-
59+
6060
!!!Note
61-
Make sure the group names from your OAuth2 provider match the one you entered above.
61+
Make sure the group names from your OAuth2 provider match the one you entered above.
6262

6363
If your identity provider uses a claim name other than ```groups``` or ```roles``` to represent group information, be sure to specify that claim name in the **Group Claim** field when setting up your identity provider.
64-
64+
6565
### Step 2: Edit a mapping
66-
66+
6767
From the list of mappings click on the edit button (:material-pencil:). This will open a popup that will allow you to change the _remote group_, _project name_, and _project role_ of a mapping.
68-
68+
6969
<figure>
7070
<a href="../../../../assets/images/admin/project-mapping/edit-mapping.png">
7171
<img src="../../../../assets/images/admin/project-mapping/edit-mapping.png" alt="Edit mapping" />
7272
</a>
7373
<figcaption>Edit mapping</figcaption>
7474
</figure>
75-
75+
7676
!!!Warning
7777
Updating a mapping's _remote group_ or _project name_ will remove all members of the previous group from the project.
78-
78+
7979
### Step 3: Delete a mapping
80-
80+
8181
To delete a mapping click on the delete button.
82-
82+
8383
!!!Warning
8484
Deleting a mapping will remove all members of that group from the project.

docs/setup_installation/admin/oauth2/create-azure-client.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Click Register.
4040
### Step 2: Get the necessary fields for client registration
4141

4242
In the Overview section, copy the *Application (client) ID field*.
43-
We will use it in [Identity Provider registration](../create-client) under the name *Client id*.
43+
We will use it in [Identity Provider registration](./create-client.md) under the name *Client id*.
4444

4545
<p align="center">
4646
<figure>
@@ -50,7 +50,7 @@ We will use it in [Identity Provider registration](../create-client) under the n
5050
</p>
5151

5252
Click on *Endpoints* and copy the *OpenId Connect metadata document* endpoint excluding the *.well-known/openid-configuration* part.
53-
We will use it in [Identity Provider registration](../create-client) under the name *Connection URL*.
53+
We will use it in [Identity Provider registration](./create-client.md) under the name *Connection URL*.
5454

5555
<p align="center">
5656
<figure>
@@ -90,7 +90,7 @@ Click *Add*.
9090
</p>
9191

9292
Copy the secret.
93-
This will be used in [Identity Provider registration](../create-client) under the name *Client Secret*.
93+
This will be used in [Identity Provider registration](./create-client.md) under the name *Client Secret*.
9494

9595
<p align="center">
9696
<figure>

docs/setup_installation/admin/oauth2/create-client.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@
33
## Introduction
44

55
Before registering your identity provider in Hopsworks you need to create a client application in your identity provider and acquire a _client id_ and a _client secret_.
6-
An example on how to create a client using [Okta](https://www.okta.com/) and [Azure Active Directory](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) identity providers can be found in the following guides: [Create Okta Client](../create-okta-client) and [Create Azure Client](../create-azure-client).
6+
An example on how to create a client using [Okta](https://www.okta.com/) and [Azure Active Directory](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) identity providers can be found in the following guides: [Create Okta Client](./create-okta-client.md) and [Create Azure Client](./create-azure-client.md).
77

88
## Prerequisites
99

1010
Acquired a _client id_ and a _client secret_ from your identity provider.
1111

1212
### Step 1: Register a client
1313

14-
After acquiring the _client id_ and _client secret_ create the client in Hopsworks by [enabling OAuth2](../../auth) and clicking on _add another identity provider_ in the [Authentication configuration page](../../auth).
14+
After acquiring the _client id_ and _client secret_ create the client in Hopsworks by [enabling OAuth2](../auth.md) and clicking on _add another identity provider_ in the [Authentication configuration page](../auth.md).
1515
Then set base uri of your identity provider in _Connection URL_ give a name to your identity provider (the name will be used in the login page as an alternative login method) and set the _client id_ and _client secret_ in their respective fields, as shown in the figure below.
1616

1717
<figure>

docs/setup_installation/admin/oauth2/create-okta-client.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ You can also create mappings from groups in Okta to groups in Hopsworks.
4747
To achieve this you need to configure Okta to send _Groups_ with user information.
4848
To do this go to _Applications_ and select your application name.
4949
In the _Sign On_ tab click edit _OpenID Connect ID Token_ and select **Filter** for _Groups claim type_, then for _Groups claim filter_ add **groups** as the claim name, select **Match Regex** from the dropdown and .* (dot star) as Regex to match all groups.
50-
See [Group mapping](../create-client/#group-mapping) on how to do the mapping in Hopsworks.
50+
See [Group mapping](./create-client.md#group-mapping) on how to do the mapping in Hopsworks.
5151

5252
<figure>
5353
<img src="../../../../assets/images/admin/oauth2/okta-groups.png" alt="Group claim" />
@@ -57,7 +57,7 @@ See [Group mapping](../create-client/#group-mapping) on how to do the mapping in
5757
### Step 2: Get the necessary fields for client registration
5858

5959
After the application is created go back to _Applications_ and click on the application you just created.
60-
Use the _Okta domain_ (_Connection URL_), _client id_ and _client secret_ generated for your app in the [Identity Provider registration](../create-client) in Hopsworks.
60+
Use the _Okta domain_ (_Connection URL_), _client id_ and _client secret_ generated for your app in the [Identity Provider registration](./create-client.md) in Hopsworks.
6161

6262
<figure>
6363
<img src="../../../../assets/images/admin/oauth2/overview.png" alt="Application overview" />
@@ -66,4 +66,4 @@ Use the _Okta domain_ (_Connection URL_), _client id_ and _client secret_ genera
6666

6767
!!! note
6868

69-
When copying the domain in the figure above make sure to add the url scheme (http:// or https://) when using it in the _Connection URL_ in the [Identity Provider registration form](../create-client).
69+
When copying the domain in the figure above make sure to add the url scheme (http:// or https://) when using it in the _Connection URL_ in the [Identity Provider registration form](./create-client.md).

0 commit comments

Comments
 (0)