Skip to content

Commit cecfb0b

Browse files
committed
Acrolinx
1 parent b1199ca commit cecfb0b

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

articles/application-gateway/for-containers/custom-health-probe.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The following properties make up custom health probes:
3636
| (http) host | The hostname specified in the request to the backend target. |
3737
| (http) path | The specific path of the request. If a single file should be loaded, the path might be /index.html. |
3838
| (http -> match) statusCodes | Contains two properties, `start` and `end`, that define the range of valid HTTP status codes returned from the backend. |
39-
| UseTLS | UseTLS indicates whether health check should enforce TLS. If not specified, health check will use the same protocol as the service if the same port is used for health check. If the port is different, health check will be cleartext. |
39+
| UseTLS | UseTLS indicates whether health check should enforce TLS. If not specified, health check uses the same protocol as the service if the same port is used for health check. If the port is different, health check is cleartext. |
4040

4141
[![A diagram showing the Application Gateway for Containers using custom health probes to determine backend health.](./media/custom-health-probe/custom-health-probe.png)](./media/custom-health-probe/custom-health-probe.png#lightbox)
4242

@@ -59,7 +59,7 @@ When the default health probe is used, the following values for each health prob
5959
| (http) path | / |
6060
| UseTLS | HTTP for HTTP and HTTPS when TLS is specified. |
6161

62-
<sup>1</sup> HTTPS will be used when a backendTLSPolicy references a target backend service (for Gateway API implementation) or IngressExtension with a backendSetting protocol of HTTPS (for Ingress API implementation) is specified.
62+
<sup>1</sup> HTTPS is used when a backendTLSPolicy references a target backend service (for Gateway API implementation) or IngressExtension with a backendSetting protocol of HTTPS (for Ingress API implementation) is specified.
6363

6464
>[!Note]
6565
>Health probes are initiated with the `User-Agent` value of `Microsoft-Azure-Application-LB/AGC`.

articles/application-gateway/for-containers/grpc.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: greglin
1616

1717
[gRPC](https://grpc.io/docs/what-is-grpc/introduction/) is a modern, high-performance framework that evolves the age-old [remote procedure call (RPC)](https://en.wikipedia.org/wiki/Remote_procedure_call) protocol. At the application level, gRPC streamlines messaging between clients and back-end services. Originating from Google, gRPC is open source and part of the [Cloud Native Computing Foundation (CNCF)](https://www.cncf.io/) ecosystem of cloud-native offerings. CNCF considers gRPC an [incubating project](https://github.com/cncf/toc/blob/main/process/graduation_criteria.md). Incubating means end users are using the technology in production applications, and the project has a healthy number of contributors.
1818

19-
A typical gRPC client app will expose a local, in-process function that implements a business operation. Under the covers, that local function invokes another function on a remote machine. What appears to be a local call essentially becomes a transparent out-of-process call to a remote service. The RPC plumbing abstracts the point-to-point networking communication, serialization, and execution between computers.
19+
A typical gRPC client app exposes a local, in-process function that implements a business operation. Under the covers, that local function invokes another function on a remote machine. What appears to be a local call essentially becomes a transparent out-of-process call to a remote service. The RPC plumbing abstracts the point-to-point networking communication, serialization, and execution between computers.
2020

2121
In cloud-native applications, developers often work across programming languages, frameworks, and technologies. This *interoperability* complicates message contracts and the plumbing required for cross-platform communication. gRPC provides a "uniform horizontal layer" that abstracts these concerns. Developers code in their native platform focused on business functionality, while gRPC handles communication plumbing.
2222

@@ -70,7 +70,7 @@ In the server streaming life cycle, a request is made to the gRPC server, and th
7070

7171
### Bidirectional streaming RPC
7272

73-
In the bidirectional streaming life cycle, a request is made to the gRPC server, and both the client and server send a squence of messages, operating independently from eachother.
73+
In the bidirectional streaming life cycle, a request is made to the gRPC server, and both the client and server send a sequence of messages, operating independently from each other.
7474

7575
![Diagram depicting bidirectional streaming gRPC life cycle.](./media/grpc/agc-grpc-bidrectional-streaming.png)
7676

@@ -80,7 +80,7 @@ Application Gateway for Containers is able to proxy requests following each of t
8080

8181
### gRPC definition
8282

83-
Configuration is implemented through Kubernetes Kubernetes Gateway API by definition of a [GRPCRoute](https://gateway-api.sigs.k8s.io/api-types/grpcroute/) resource (no support is offered for gRPC in Ingress API for Application Gateway for Containers). Each GRPCRoute resource must reference a Gateway resource. More than one GRPCRoute resource may reference the same gateway provided the rules to handle the request are unique.
83+
Configuration is implemented through Kubernetes Gateway API by definition of a [GRPCRoute](https://gateway-api.sigs.k8s.io/api-types/grpcroute/) resource (no support is offered for gRPC in Ingress API for Application Gateway for Containers). Each GRPCRoute resource must reference a Gateway resource. More than one GRPCRoute resource may reference the same gateway provided the rules to handle the request are unique.
8484

8585
For example, the following GRPCRoute would be attached to a gateway called `Gateway-01`.
8686

@@ -109,11 +109,11 @@ spec:
109109
110110
### Health probes
111111
112-
By default, Application Gateway for Containers will attempt to initiate a TCP handshake to the backend port running the gRPC service. If the handshake completes, the backend will be considered healthy.
112+
By default, Application Gateway for Containers attempts to initiate a TCP handshake to the backend port running the gRPC service. If the handshake completes, the backend is considered healthy.
113113
114-
If using a HealthCheckPolicy for as a custom health probe, the defined policy will continue to probe.
114+
If using a HealthCheckPolicy as a custom health probe, the defined policy determines probe behavior.
115115
116-
Here is an example of a HealthCheckPolicy for a gRPC backend.
116+
Here's an example of a HealthCheckPolicy for a gRPC backend.
117117
118118
```yaml
119119
apiVersion: alb.networking.azure.io/v1

0 commit comments

Comments
 (0)