You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/ngf/overview/gateway-architecture.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ nd-product: NGF
7
7
nd-docs: DOCS-1413
8
8
---
9
9
10
-
Learn about the architecture and design principles of NGINX Gateway Fabric -- a Kubernetes Gateway API implementation using NGINX as the data plane.
10
+
Learn about the architecture and design principles of NGINX Gateway Fabric: a Kubernetes Gateway API implementation which uses NGINX as the data plane.
11
11
12
12
This document is intended for:
13
13
@@ -51,7 +51,7 @@ Users can have multiple gateways running side-by-side in the same cluster. This
51
51
52
52
---
53
53
54
-
## High-Level Overview of NGINX Gateway Fabric in Action
54
+
## High-level overview of NGINX Gateway Fabric in execution
55
55
56
56
This figure depicts an example of NGINX Gateway Fabric exposing three web applications within a Kubernetes cluster to clients on the internet:
57
57
@@ -162,7 +162,7 @@ The figure shows:
162
162
|**Applications**| - _Application A_: Deployed by Developer A (2 pods) and routed to by Gateway A.<br>- _Application B_: Deployed by Developer A (1 pod) and routed to by Gateway A.<br>- _Application C_: Deployed by Developer B (1 pod) and routed to by Gateway B. |
163
163
|**NGINX Pods**| - _NGINX Pod A_: Handles traffic from Gateway A:<br> • _NGINX Process A_: Routes to Application A and Application B.<br> • _NGINX Agent A_: Updates configuration via gRPC.<br>- _NGINX Pod B_: Handles traffic from Gateway B:<br> • _NGINX Process B_: Routes to Application C.<br> • _NGINX Agent B_: Updates configuration via gRPC. |
164
164
|**Traffic Flow**| - _Client A_:<br> 1. Sends requests to `a.example.com` via Public Endpoint.<br> 2. Routed to Application A by NGINX Process A.<br>- _Client B_:<br> 1. Sends requests to `c.other-example.com` via Public Endpoint.<br> 2. Routed to Application C by NGINX Process B. |
165
-
|**Public Endpoint**| A shared entry point (TCP Load Balancer or NodePort) that exposes services externally and forwards client traffic into the cluster. |
165
+
|**Public Endpoint**| A shared entry point (TCP Load Balancer or NodePort) that exposes the NGINX Service externally and forwards client traffic into the cluster. |
166
166
|**Kubernetes API**| Acts as the central hub for resource management:<br>- Fetches Gateway API resources.<br>- Updates NGINX configuration dynamically via the NGF Pod. |
167
167
168
168
{{% /bootstrap-table %}}
@@ -242,22 +242,22 @@ NGINX Gateway Fabric supports both NGINX Open Source and NGINX Plus. While the p
242
242
- Changes to upstream servers, such as application scaling (e.g., adding or removing pods in Kubernetes), can be applied using the [NGINX Plus API](http://nginx.org/en/docs/http/ngx_http_api_module.html).
243
243
- This reduces the frequency of configuration reloads, minimizing potential disruptions and improving system stability during updates.
244
244
245
-
These features contribute to reduced downtime, improved performance during scaling events, and more fine-grained control over traffic management.
245
+
These features enable reduced downtime, improved performance during scaling events, and more fine-grained control over traffic management.
246
246
247
247
---
248
248
249
-
### Resilience and Fault Isolation
249
+
### Resilience and fault isolation
250
250
251
251
This architecture separates the control plane and data plane, creating clear operational boundaries that improve resilience and fault isolation. It also enhances scalability, security, and reliability while reducing the risk of failures affecting both components.
252
252
253
-
#### Control Plane Resilience
253
+
#### Control plane resilience
254
254
255
255
In the event of a control plane failure or downtime:
256
256
- Existing data plane pods continue serving traffic using their last-valid cached configurations.
257
257
- Updates to routes or Gateways are temporarily paused, but stable traffic delivery continues without degradation.
0 commit comments