Skip to content

Commit 4c79c37

Browse files
salonichf5ADubhlaoichsjberman
authored
Apply suggestions from code review
Co-authored-by: Alan Dooley <[email protected]> Co-authored-by: Saylor Berman <[email protected]>
1 parent d7be439 commit 4c79c37

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

content/ngf/overview/gateway-architecture.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ nd-product: NGF
77
nd-docs: DOCS-1413
88
---
99

10-
Learn about the architecture and design principles of NGINX Gateway Fabric -- a Kubernetes Gateway API implementation using NGINX as the data plane.
10+
Learn about the architecture and design principles of NGINX Gateway Fabric: a Kubernetes Gateway API implementation which uses NGINX as the data plane.
1111

1212
This document is intended for:
1313

@@ -51,7 +51,7 @@ Users can have multiple gateways running side-by-side in the same cluster. This
5151

5252
---
5353

54-
## High-Level Overview of NGINX Gateway Fabric in Action
54+
## High-level overview of NGINX Gateway Fabric in execution
5555

5656
This figure depicts an example of NGINX Gateway Fabric exposing three web applications within a Kubernetes cluster to clients on the internet:
5757

@@ -162,7 +162,7 @@ The figure shows:
162162
| **Applications** | - _Application A_: Deployed by Developer A (2 pods) and routed to by Gateway A.<br>- _Application B_: Deployed by Developer A (1 pod) and routed to by Gateway A.<br>- _Application C_: Deployed by Developer B (1 pod) and routed to by Gateway B. |
163163
| **NGINX Pods** | - _NGINX Pod A_: Handles traffic from Gateway A:<br>&nbsp;&nbsp;&nbsp;_NGINX Process A_: Routes to Application A and Application B.<br>&nbsp;&nbsp;&nbsp;_NGINX Agent A_: Updates configuration via gRPC.<br>- _NGINX Pod B_: Handles traffic from Gateway B:<br>&nbsp;&nbsp;&nbsp;_NGINX Process B_: Routes to Application C.<br>&nbsp;&nbsp;&nbsp;_NGINX Agent B_: Updates configuration via gRPC. |
164164
| **Traffic Flow** | - _Client A_:<br>&nbsp;&nbsp;&nbsp;1. Sends requests to `a.example.com` via Public Endpoint.<br>&nbsp;&nbsp;&nbsp;2. Routed to Application A by NGINX Process A.<br>- _Client B_:<br>&nbsp;&nbsp;&nbsp;1. Sends requests to `c.other-example.com` via Public Endpoint.<br>&nbsp;&nbsp;&nbsp;2. Routed to Application C by NGINX Process B. |
165-
| **Public Endpoint** | A shared entry point (TCP Load Balancer or NodePort) that exposes services externally and forwards client traffic into the cluster. |
165+
| **Public Endpoint** | A shared entry point (TCP Load Balancer or NodePort) that exposes the NGINX Service externally and forwards client traffic into the cluster. |
166166
| **Kubernetes API** | Acts as the central hub for resource management:<br>- Fetches Gateway API resources.<br>- Updates NGINX configuration dynamically via the NGF Pod. |
167167

168168
{{% /bootstrap-table %}}
@@ -242,22 +242,22 @@ NGINX Gateway Fabric supports both NGINX Open Source and NGINX Plus. While the p
242242
- Changes to upstream servers, such as application scaling (e.g., adding or removing pods in Kubernetes), can be applied using the [NGINX Plus API](http://nginx.org/en/docs/http/ngx_http_api_module.html).
243243
- This reduces the frequency of configuration reloads, minimizing potential disruptions and improving system stability during updates.
244244

245-
These features contribute to reduced downtime, improved performance during scaling events, and more fine-grained control over traffic management.
245+
These features enable reduced downtime, improved performance during scaling events, and more fine-grained control over traffic management.
246246

247247
---
248248

249-
### Resilience and Fault Isolation
249+
### Resilience and fault isolation
250250

251251
This architecture separates the control plane and data plane, creating clear operational boundaries that improve resilience and fault isolation. It also enhances scalability, security, and reliability while reducing the risk of failures affecting both components.
252252

253-
#### Control Plane Resilience
253+
#### Control plane resilience
254254

255255
In the event of a control plane failure or downtime:
256256
- Existing data plane pods continue serving traffic using their last-valid cached configurations.
257257
- Updates to routes or Gateways are temporarily paused, but stable traffic delivery continues without degradation.
258258
- Recovery restores functionality, resynchronizing configuration updates seamlessly.
259259

260-
#### Data Plane Resilience
260+
#### Data plane resilience
261261

262262
If a data plane pod encounters an outage or restarts:
263263
- Only routes tied to the specific linked Gateway object experience brief disruptions.

0 commit comments

Comments
 (0)