Skip to content

Commit 11c10a1

Browse files
authored
Merge pull request #270858 from spelluru/sbusissues0401
Service Bus doc issues
2 parents 2e2717a + 535e466 commit 11c10a1

File tree

3 files changed

+19
-17
lines changed

3 files changed

+19
-17
lines changed
-903 Bytes
Loading

articles/service-bus-messaging/message-transfers-locks-settlement.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -106,6 +106,9 @@ When the receiving client fails to process a message but wants the message to be
106106

107107
If a receiving client fails to process a message and knows that redelivering the message and retrying the operation won't help, it can reject the message, which moves it into the dead-letter queue by calling the [DeadLetter](/dotnet/api/azure.messaging.servicebus.servicebusreceiver.deadlettermessageasync) API on the message, which also allows setting a custom property including a reason code that can be retrieved with the message from the dead-letter queue.
108108

109+
> [!NOTE]
110+
> A dead-letter subqueue exists for a queue or a topic subscription only when you have the [dead-letter feature](service-bus-dead-letter-queues.md) enabled for the queue or subscription.
111+
109112
A special case of settlement is deferral, which is discussed in a [separate article](message-deferral.md).
110113

111114
The `Complete`, `DeadLetter`, or `RenewLock` operations might fail due to network issues, if the held lock has expired, or there are other service-side conditions that prevent settlement. In one of the latter cases, the service sends a negative acknowledgment that surfaces as an exception in the API clients. If the reason is a broken network connection, the lock is dropped since Service Bus doesn't support recovery of existing AMQP links on a different connection.

articles/service-bus-messaging/service-bus-premium-messaging.md

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,27 @@
11
---
2-
title: Azure Service Bus premium and standard tiers
2+
title: Azure Service Bus premium messaging tier
33
description: This article describes standard and premium tiers of Azure Service Bus. Compares these tiers and provides technical differences.
44
ms.topic: conceptual
55
ms.custom: devx-track-extended-java
66
ms.date: 05/02/2023
77
---
88

9-
# Service Bus Premium and Standard messaging tiers
9+
# Service Bus premium messaging tier
1010

1111
Service Bus Messaging, which includes entities such as queues and topics, combines enterprise messaging capabilities with rich publish-subscribe semantics at cloud scale. Service Bus Messaging is used as the communication backbone for many sophisticated cloud solutions.
1212

1313
The *Premium* tier of Service Bus Messaging addresses common customer requests around scale, performance, and availability for mission-critical applications. The Premium tier is recommended for production scenarios. Although the feature sets are nearly identical, these two tiers of Service Bus Messaging are designed to serve different use cases.
1414

1515
Some high-level differences are highlighted in the following table.
1616

17-
| Premium | Standard |
18-
| --- | --- |
19-
| High throughput |Variable throughput |
20-
| Predictable performance |Variable latency |
21-
| Fixed pricing |Pay as you go variable pricing |
22-
| Ability to scale workload up and down |N/A |
23-
| Message size up to 100 MB. For more information, see [Large message support](#large-messages-support). |Message size up to 256 KB |
17+
| Criteria | Premium | Standard |
18+
|--- | --- | --- |
19+
| Throughout | High throughput |Variable throughput |
20+
| Performance | Predictable performance |Variable latency |
21+
| Pricing | Fixed pricing |Pay as you go variable pricing |
22+
| Scale | Ability to scale workload up and down |N/A |
23+
| Message size | Message size up to 100 MB. For more information, see [Large message support](#large-messages-support). |Message size up to 256 KB |
24+
2425

2526
**Service Bus Premium Messaging** provides resource isolation at the CPU and memory level so that each customer workload runs in isolation. This resource container is called a *messaging unit*. Each premium namespace is allocated at least one messaging unit. You can purchase 1, 2, 4, 8 or 16 messaging units for each Service Bus Premium namespace. A single workload or entity can span multiple messaging units and the number of messaging units can be changed at will. The result is predictable and repeatable performance for your Service Bus-based solution.
2627

@@ -88,10 +89,10 @@ Azure Service Bus premium tier namespaces support the ability to send large mess
8889
Here are some considerations when sending large messages on Azure Service Bus -
8990

9091
- Supported on Azure Service Bus premium tier namespaces only.
91-
- Supported only when using the AMQP protocol. Not supported when using SBMP or HTTP protocols, in the premium tier, the maximum message size for these protocols is 1MB.
92+
- Supported only when using the AMQP protocol. Not supported when using SBMP or HTTP protocols, in the premium tier, the maximum message size for these protocols is 1 MB.
9293
- Supported when using [Java Message Service (JMS) 2.0 client SDK](how-to-use-java-message-service-20.md) and other language client SDKs.
9394
- Sending large messages result in decreased throughput and increased latency.
94-
- While 100 MB message payloads are supported, it's recommended to keep the message payloads as small as possible to ensure reliable performance from the Service Bus namespace.
95+
- While 100-MB message payloads are supported, it's recommended to keep the message payloads as small as possible to ensure reliable performance from the Service Bus namespace.
9596
- The max message size is enforced only for messages sent to the queue or topic. The size limit isn't enforced for the receive operation. It allows you to update the max message size for a given queue (or topic).
9697
- Batching isn't supported.
9798
- Service Bus Explorer doesn't support sending or receiving large messages.
@@ -121,12 +122,12 @@ The following network security features are available only in the premium tier.
121122
Configuring IP firewall using the Azure portal is available only for the premium tier namespaces. However, you can configure IP firewall rules for other tiers using Azure Resource Manager templates, CLI, PowerShell, or REST API. For more information, see [Configure IP firewall](service-bus-ip-filtering.md).
122123

123124
## Encryption of data at rest
124-
Azure Service Bus Premium provides encryption of data at rest with Azure Storage Service Encryption (Azure SSE). Service Bus Premium uses Azure Storage to store the data. All the data that's stored with Azure Storage is encrypted using Microsoft-managed keys. If you use your own key (also referred to as Bring Your Own Key (BYOK) or customer-managed key), the data is still encrypted using the Microsoft-managed key, but in addition the Microsoft-managed key is encrypted using the customer-managed key. This feature enables you to create, rotate, disable, and revoke access to customer-managed keys that are used for encrypting Microsoft-managed keys. Enabling the BYOK feature is a one time setup process on your namespace. For more information, see [Encrypting Azure Service Bus data at rest](configure-customer-managed-key.md).
125+
Azure Service Bus Premium provides encryption of data at rest with Azure Storage Service Encryption (Azure SSE). Service Bus Premium uses Azure Storage to store the data. All the data that's stored with Azure Storage is encrypted using Microsoft-managed keys. If you use your own key (also referred to as customer managed key (CMD) or customer-managed key), the data is still encrypted using the Microsoft-managed key, but in addition the Microsoft-managed key is encrypted using the customer-managed key. This feature enables you to create, rotate, disable, and revoke access to customer-managed keys that are used for encrypting Microsoft-managed keys. Enabling the CMK feature is a one time setup process on your namespace. For more information, see [Encrypting Azure Service Bus data at rest](configure-customer-managed-key.md).
125126

126127
## Partitioning
127128
There are some differences between the standard and premium tiers when it comes to partitioning.
128129

129-
- Partitioning is available at entity creation for all queues and topics in basic or standard SKUs. A namespace can have both partitioned and non-partitioned entities. Partitioning is available at namespace creation for the premium tier, and all queues and topics in that namespace will be partitioned. Any previously migrated partitioned entities in premium namespaces continue to work as expected.
130+
- Partitioning is available at entity creation for all queues and topics in basic or standard SKUs. A namespace can have both partitioned and nonpartitioned entities. Partitioning is available at namespace creation for the premium tier, and all queues and topics in that namespace will be partitioned. Any previously migrated partitioned entities in premium namespaces continue to work as expected.
130131
- When partitioning is enabled in the Basic or Standard SKUs, Service Bus creates 16 partitions. When partitioning is enabled in the premium tier, the number of partitions is specified during namespace creation.
131132

132133
For more information, see [Partitioning in Service Bus](service-bus-partitioning.md).
@@ -137,7 +138,7 @@ Azure Service Bus spreads the risk of catastrophic failures of individual machin
137138

138139
For a premium tier namespace, the outage risk is further spread across three physically separated facilities availability zones, and the service has enough capacity reserves to instantly cope with the complete, catastrophic loss of a datacenter. The all-active Azure Service Bus cluster model within a failure domain along with the availability zone support is superior to any on-premises message broker product in terms of resiliency against grave hardware failures and even catastrophic loss of entire datacenter facilities. Still, there might be grave situations with widespread physical destruction that even those measures can't sufficiently defend against.
139140

140-
The Service Bus Geo-disaster recovery feature is designed to make it easier to recover from a disaster of this magnitude and abandon a failed Azure region for good and without having to change your application configurations. Abandoning an Azure region typically involves several services and this feature primarily aims at helping to preserve the integrity of the composite application configuration. The feature is globally available for the Service Bus premium tier.
141+
The Service Bus Geo-disaster recovery feature is designed to make it easier to recover from a disaster of this magnitude and abandon a failed Azure region for good without having to change your application configurations. Abandoning an Azure region typically involves several services and this feature primarily aims at helping to preserve the integrity of the composite application configuration. The feature is globally available for the Service Bus premium tier.
141142

142143
For more information, see [Azure Service Bus Geo-disaster recovery](service-bus-geo-dr.md).
143144

@@ -148,7 +149,5 @@ The standard tier supports only JMS 1.1 subset focused on queues. For more infor
148149

149150
## Next steps
150151

151-
To learn more about Service Bus Messaging, see the following links:
152+
See the following article: [Automatically update messaging units](automate-update-messaging-units.md).
152153

153-
- [Automatically update messaging units](automate-update-messaging-units.md).
154-
- [Introducing Azure Service Bus Premium Messaging (blog post)](https://azure.microsoft.com/blog/introducing-azure-service-bus-premium-messaging/)

0 commit comments

Comments
 (0)