diff --git a/.htmltest.yml b/.htmltest.yml
index 50cbb62c3..cb2be4e3a 100644
--- a/.htmltest.yml
+++ b/.htmltest.yml
@@ -2,3 +2,4 @@ DirectoryPath: public
IgnoreDirectoryMissingTrailingSlash: true
CheckExternal: false
IgnoreAltMissing: true
+IgnoreInternalEmptyHash: true
diff --git a/config.yaml b/config.yaml
index 2cb2f1746..8e45fb269 100644
--- a/config.yaml
+++ b/config.yaml
@@ -259,7 +259,7 @@ languages:
- name: ブログ
url: "/blog"
weight: 5
-
+
params:
version: v0.20.0
githubRepository : falcosecurity/falco
diff --git a/content/en/blog/cloud-native-security-hub.md b/content/en/blog/cloud-native-security-hub.md
index 6554ddf2b..28e6db5c7 100644
--- a/content/en/blog/cloud-native-security-hub.md
+++ b/content/en/blog/cloud-native-security-hub.md
@@ -72,7 +72,7 @@ Keep reading to find out more on how to get involved and contribute, especially
The project was originally started by Sysdig, but maintaining the repositories, and building out rules will now be governed by the CNCF and the Falco community.
-If you are interested in getting involved with writing rules, or building out tooling around the new hub please reach out to [The official CNCF Falco Mailing List](https://lists.cncf.io/g/cncf-falco-dev) or join the [Falco slack channel](slack.sysdig.com).
+If you are interested in getting involved with writing rules, or building out tooling around the new hub please reach out to [The official CNCF Falco Mailing List](https://lists.cncf.io/g/cncf-falco-dev) or join the [Falco slack channel](https://slack.sysdig.com).
### Integrating with Falcoctl
diff --git a/content/en/docs/_index.md b/content/en/docs/_index.md
index ebcdfec12..dddccd12d 100644
--- a/content/en/docs/_index.md
+++ b/content/en/docs/_index.md
@@ -24,7 +24,7 @@ People often ask how Falco differs from [SELinux](https://en.wikipedia.org/wiki/
## How to use Falco
-Falco is deployed as a long-running daemon. You can install it as a [Debian](installation#debian)/[rpm](installation#rhel) package on a regular host or container host, you can deploy it as a [container](installation#docker), or you can build it [from source](source).
+Falco is deployed as a long-running daemon. You can install it as a [Debian](installation#debian)/[rpm](installation#centos-rhel) package on a regular host or container host, you can deploy it as a [container](installation#docker), or you can build it [from source](source).
Falco is configured via (1) a [rules file](rules) that defines which behaviors and events to watch for and (2) a [general configuration file](configuration). Rules are expressed in a high-level, human-readable language. We've provided a sample rules file [`./rules/falco_rules.yaml`](https://github.com/falcosecurity/falco/blob/master/rules/falco_rules.yaml) as a starting point—you can (and will likely want!) to adapt it to your environment.
diff --git a/content/en/docs/grpc/_index.md b/content/en/docs/grpc/_index.md
index a8616cc0e..284528fc8 100644
--- a/content/en/docs/grpc/_index.md
+++ b/content/en/docs/grpc/_index.md
@@ -7,8 +7,8 @@ Starting from version [0.18.0](https://github.com/falcosecurity/falco/releases/t
The current APIs are:
-- [schema definition](./outputs): Subscribe to Falco output events.
-- [schema definition](./version): Retrieve the Falco version.
+- [schema definition](outputs): Subscribe to Falco output events.
+- schema definition: Retrieve the Falco version. The current version is **{{< latest >}}**.
In order to interact with these APIs, the falcosecurity organization provides the [Go](./client-go) and the [Python](./client-python) clients.
diff --git a/content/en/docs/grpc/client-go.md b/content/en/docs/grpc/client-go.md
index df87ff470..162c4066d 100644
--- a/content/en/docs/grpc/client-go.md
+++ b/content/en/docs/grpc/client-go.md
@@ -5,7 +5,7 @@ weight: 2
The [client-go](https://github.com/falcosecurity/client-go) Go library provides:
-- [type and service mappings](https://godoc.org/github.com/falcosecurity/client-go/pkg/api/output) for the Falco gRPC API. For more information, see [output schema](./outputs).
+- [type and service mappings](https://godoc.org/github.com/falcosecurity/client-go/pkg/api/output) for the Falco gRPC API. For more information, see [output schema](../outputs).
- `Client` and `Config` structs aimed at simplifying the connection to the gRPC server. For more information, see [documentation](https://godoc.org/github.com/falcosecurity/client-go/pkg/client).
Refer to the [fully-functional example](https://github.com/falcosecurity/client-go/blob/master/examples/output/main.go) to see how the Go client connects to the Falco gRPC Outputs API and displays the events in JSON.
diff --git a/content/en/docs/installation.md b/content/en/docs/installation.md
index bad643725..10ab75f58 100644
--- a/content/en/docs/installation.md
+++ b/content/en/docs/installation.md
@@ -65,7 +65,7 @@ cd falco/integrations/k8s-using-daemonset
```shell
kubectl apply -f k8s-with-rbac/falco-account.yaml
```
-3. Create a service for the Falco pods. This will allow Falco to receive [Kubernetes Audit Log Events](event-sources/kubernetes-audit). If you're not planning on using this feature, you can skip this step.
+3. Create a service for the Falco pods. This will allow Falco to receive [Kubernetes Audit Log Events](../event-sources/kubernetes-audit). If you're not planning on using this feature, you can skip this step.
```shell
kubectl apply -f k8s-with-rbac/falco-service.yaml
```
@@ -84,7 +84,7 @@ k8s-using-daemonset$ cp ../../rules/falco_rules.* k8s-with-rbac/falco-config/
k8s-using-daemonset$ cp ../../rules/k8s_audit_rules.yaml k8s-with-rbac/falco-config/
```
-5. Add the custom rules for your environment to the `falco_rules.local.yaml` file and they will be picked up by Falco at start time. You can also modify the `falco.yaml` file to change any [configuration options](configuration/) required for your deployment. Create the configMap as follows:
+5. Add the custom rules for your environment to the `falco_rules.local.yaml` file and they will be picked up by Falco at start time. You can also modify the `falco.yaml` file to change any [configuration options](../configuration) required for your deployment. Create the configMap as follows:
```shell
kubectl create configmap falco-config --from-file=k8s-with-rbac/falco-config
```
@@ -208,7 +208,7 @@ sudo bash install_falco
### Package install {#package}
-#### CentOS/RHEL/Amazon Linux
+#### CentOS/RHEL/Amazon Linux {#centos-rhel}
1. Trust the falcosecurity GPG key and configure the yum repository:
diff --git a/content/en/docs/rules/supported-fields.md b/content/en/docs/rules/supported-fields.md
index eed9da07f..1a1f5962f 100644
--- a/content/en/docs/rules/supported-fields.md
+++ b/content/en/docs/rules/supported-fields.md
@@ -5,13 +5,13 @@ weight: 3
# Introduction
-Here are the fields supported by Falco. These fields can be used in the `condition` key of a Falco rule and well as the `output` key. Any fields included in the `output` key of a rule will also be included in the alert's `output_fields` object when [`json_output`](../alerts/#json-output) is set to `true`.
+Here are the fields supported by Falco. These fields can be used in the `condition` key of a Falco rule and well as the `output` key. Any fields included in the `output` key of a rule will also be included in the alert's `output_fields` object when [`json_output`](../../alerts#json-output) is set to `true`.
You can also see this set of fields via `falco --list=