Or do they appear identical to a potentially hostile middle-box? Notwithstanding profiling of traffic flows which may out gRPC.
TLS/JA3 fingerprints may also be a problem, but assume they are handled in some way.
Documentation doesn't address this aspect.
gRPC (if we ignore exotic transports) is implemented on top of HTTP/2, so: gRPC is HTTP/2, but not all HTTP/2 is gRPC.
If you need to distinguish whether something is gRPC: