Skip to content

Commit da8168e

Browse files
authored
Update grpc.md
1 parent fecec92 commit da8168e

File tree

1 file changed

+4
-3
lines changed
  • aspnetcore/fundamentals/servers/yarp

1 file changed

+4
-3
lines changed

aspnetcore/fundamentals/servers/yarp/grpc.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ ms.topic: article
99
content_well_notification: AI-contribution
1010
ai-usage: ai-assisted
1111
---
12-
1312
# YARP Proxying gRPC
1413

1514
## Introduction
@@ -20,9 +19,10 @@ ai-usage: ai-assisted
2019

2120
gRPC requires HTTP/2 for most scenarios. HTTP/1.1 and HTTP/2 are enabled by default on ASP.NET Core servers (YARP's front end) but they require https (TLS) for HTTP/2 so YARP needs to be listening on a `https://` URL.
2221

23-
HTTP/2 over http (non-TLS) is only supported on Kestrel and requires specific settings. For details see [here](/aspnet/core/grpc/aspnetcore#server-options).
22+
HTTP/2 over http (non-TLS) is only supported on Kestrel and requires specific settings. For more information, see <xref:grpc/aspnetcore#server-options>.
2423

2524
This shows configuring Kestrel to use HTTP/2 over http (non-TLS):
25+
2626
```json
2727
{
2828
"Kestrel": {
@@ -40,7 +40,8 @@ This shows configuring Kestrel to use HTTP/2 over http (non-TLS):
4040

4141
YARP automatically negotiates HTTP/1.1 or HTTP/2 for outgoing proxy requests, but only for https (TLS). HTTP/2 over http (non-TLS) requires additional settings. Note that outgoing protocols are independent of incoming ones. E.g. https can be used for the incoming connection and http for the outgoing one, this is called TLS termination. For configuration details, see <xref:fundamentals/servers/yarp/http-client-config#httprequest>.
4242

43-
This shows configuring the outgoing proxy request to use HTTP/2 over http.
43+
The following shows how to configure the outgoing proxy request to use HTTP/2:
44+
4445
```json
4546
"cluster1": {
4647
"HttpRequest": {

0 commit comments

Comments
 (0)