Skip to content

Commit 8cf3f45

Browse files
committed
Docs review
1 parent 2705f68 commit 8cf3f45

File tree

8 files changed

+8
-8
lines changed

8 files changed

+8
-8
lines changed

articles/application-gateway/for-containers/alb-controller-release-notes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Instructions for new or existing deployments of ALB Controller are found in the
2727

2828
| ALB Controller Version | Gateway API Version | Kubernetes Version | Release Notes |
2929
| ---------------------- | ------------------- | ------------------ | ------------- |
30-
| 1.2.3| v1.1 | v1.26, v1.27, v1.28, v1.29, v1.30 | Gateway API v1.1, gRPC support, frontend mutual authentication, readiness probe fixes, custom health probe port and tls mode |
30+
| 1.2.3| v1.1 | v1.26, v1.27, v1.28, v1.29, v1.30 | Gateway API v1.1, gRPC support, frontend mutual authentication, readiness probe fixes, custom health probe port and TLS mode |
3131

3232
## Release history
3333

articles/application-gateway/for-containers/custom-health-probe.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ When the default health probe is used, the following values for each health prob
6868

6969
In both Gateway API and Ingress API, a custom health probe can be defined by defining a [_HealthCheckPolicyPolicy_ resource](api-specification-kubernetes.md#alb.networking.azure.io/v1.HealthCheckPolicy) and referencing a service the health probes should check against. As the service is referenced by an HTTPRoute or Ingress resource with a class reference to Application Gateway for Containers, the custom health probe is used for each reference.
7070

71-
In this example, the health probe emitted by Application Gateway for Containers sends the hostname contoso.com to the pods that make up _test-service_. The requested protocol is `http` with a path of `/`. A probe is emitted every 5 seconds and wait 3 seconds before determining the connection has timed out. If a response is received, an HTTP response code between 200 and 299 (inclusive of 200 and 299) is considered healthy, all other responses are considered unhealthy.
71+
In this example, the health probe emitted by Application Gateway for Containers sends the hostname contoso.com to the pods that make up _test-service_. The requested protocol is `http` with a path of `/`. A probe is emitted every 5 seconds and waits 3 seconds before determining the connection has timed out. If a response is received, an HTTP response code between 200 and 299 (inclusive of 200 and 299) is considered healthy, all other responses are considered unhealthy.
7272

7373
```bash
7474
kubectl apply -f - <<EOF

articles/application-gateway/for-containers/grpc.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -54,25 +54,25 @@ gRPC has four [rpc life cycles](https://grpc.io/docs/what-is-grpc/core-concepts/
5454

5555
In the unary life cycle, a request is made to the gRPC server and a response is returned.
5656

57-
![Diagram depicting unary gRPC life cycle.](./media/grpc/agc-grpc-unary.png)
57+
![Diagram depicting unary gRPC life cycle.](./media/grpc/grpc-unary.png)
5858

5959
### Client streaming RPC
6060

6161
In the client streaming life cycle, a request is made to the gRPC server, and then the client streams a sequence of additional messages to the server without the need for the server to return additional responses.
6262

63-
![Diagram depicting client streaming gRPC life cycle.](./media/grpc/agc-grpc-client-streaming.png)
63+
![Diagram depicting client streaming gRPC life cycle.](./media/grpc/grpc-client-streaming.png)
6464

6565
### Server streaming RPC
6666

6767
In the server streaming life cycle, a request is made to the gRPC server, and then the server streams a sequence of messages back to the client without the need for the client to return additional responses.
6868

69-
![Diagram depicting server streaming gRPC life cycle.](./media/grpc/agc-grpc-server-streaming.png)
69+
![Diagram depicting server streaming gRPC life cycle.](./media/grpc/grpc-server-streaming.png)
7070

7171
### Bidirectional streaming RPC
7272

7373
In the bidirectional streaming life cycle, a request is made to the gRPC server, and both the client and server send a sequence of messages, operating independently from each other.
7474

75-
![Diagram depicting bidirectional streaming gRPC life cycle.](./media/grpc/agc-grpc-bidrectional-streaming.png)
75+
![Diagram depicting bidirectional streaming gRPC life cycle.](./media/grpc/grpc-bidrectional-streaming.png)
7676

7777
## gRPC implementation in Application Gateway for Containers
7878

articles/application-gateway/for-containers/how-to-frontend-mtls-gateway-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,11 @@ Mutual Transport Layer Security (MTLS) is a process that relies on certificates
2424

2525
See the following figure:
2626

27-
![A diagram showing the Application Gateway for Containers frontend MTLS process.](./media/how-to-frontend-mtls-gateway-api/frontend-mtls.png)](./media/how-to-frontend-mtls-gateway-api/frontend-mtls.png)
27+
[![A diagram showing the Application Gateway for Containers frontend MTLS process.](./media/how-to-frontend-mtls-gateway-api/frontend-mtls.png)](./media/how-to-frontend-mtls-gateway-api/frontend-mtls.png#lightbox)
2828

2929
The valid client certificate flow shows a client presenting a certificate to the frontend of Application Gateway for Containers. Application Gateway for Containers determines the certificate is valid and proxies the request to the backend target. The response is ultimately returned to the client.
3030

31-
The revoked client certificate flow shows a client presenting a revoked certificate to the frontend of Application Gateway for Containers. Application Gateway for Containers determins the certificate is not valid and prevents the request from being proxied to the client. The client will receive an HTTP 400 bad request and corresponding reason.
31+
The revoked client certificate flow shows a client presenting a revoked certificate to the frontend of Application Gateway for Containers. Application Gateway for Containers determines the certificate is not valid and prevents the request from being proxied to the client. The client will receive an HTTP 400 bad request and corresponding reason.
3232

3333
## Prerequisites
3434

0 commit comments

Comments
 (0)