Skip to content

Commit 4e21deb

Browse files
authored
Add warning
1 parent 8e702da commit 4e21deb

File tree

2 files changed

+3
-7
lines changed

2 files changed

+3
-7
lines changed

articles/azure-signalr/signalr-howto-configure-application-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
5050
**Key point**: The rule applies to all claims with a certain claim name. The connection count aggregation is on the same claim (including claim name and claim value). The *ThrottleByUserIdRule* is a special case of this rule, applying to all connections with the userIdentity claim.
5151

5252

53-
> ### Avoid using too aggressive maxCount
53+
> #### Avoid using too aggressive maxCount
5454
> Client connections may close without completing the tcp handshake. SignalR service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeat failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
5555
5656

articles/azure-web-pubsub/howto-configure-application-firewall.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,6 @@ This guideline is divided into three parts:
3030
## Client Connection Count Rules
3131
Client Connection Count Rules restrict concurrent client connections. When a client attempts to establish a new connection, the rules are checked **sequentially**. If any rule is violated, the connection is rejected with a status code 429.
3232

33-
### Rule introduction
34-
3533
#### ThrottleByUserIdRule
3634
This rule limits the concurrent connections of a user. For example, if a user opens multiple browser tabs or logs in using different devices, you can use this rule to restrict the number of concurrent connections for that user.
3735

@@ -44,10 +42,8 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
4442
**Note:** It's not guaranteed by default that tokens generated by the SDK are different each time. Though each token contains a timestamp, this timestamp might be the same if vast tokens are generated within seconds. To avoid identical tokens, insert a random claim into the token claims. Refer to [Configure access token](#configure-access-token).
4543

4644

47-
### Best Practice
48-
#### Avoid using too aggressive maxCount
49-
50-
Client connections may close without completing the tcp handshake. Web PubSub service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeat failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
45+
> #### Avoid using too aggressive maxCount
46+
> Client connections may close without completing the tcp handshake. SignalR service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeat failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
5147
5248

5349

0 commit comments

Comments
 (0)