Skip to content

Commit 55789bf

Browse files
committed
Resource lock doesn't work from SB Explorer
1 parent f9f0e42 commit 55789bf

File tree

1 file changed

+15
-4
lines changed

1 file changed

+15
-4
lines changed

articles/service-bus-messaging/service-bus-troubleshooting-guide.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The following steps may help you with troubleshooting connectivity/certificate/t
2929
</Detail>
3030
</Error>
3131
```
32-
- Run the following command to check if any port is blocked on the firewall. Ports used are 443 (HTTPS), 5671 and 5672 (AMQP) and 9354 (Net Messaging/SBMP). Depending on the library you use, other ports are also used. Here is the sample command that check whether the 5671 port is blocked. C
32+
- Run the following command to check if any port is blocked on the firewall. Ports used are 443 (HTTPS), 5671 and 5672 (AMQP) and 9354 (Net Messaging/SBMP). Depending on the library you use, other ports are also used. Here's the sample command that check whether the 5671 port is blocked. C
3333

3434
```powershell
3535
tnc <yournamespacename>.servicebus.windows.net -port 5671
@@ -40,7 +40,7 @@ The following steps may help you with troubleshooting connectivity/certificate/t
4040
```shell
4141
telnet <yournamespacename>.servicebus.windows.net 5671
4242
```
43-
- When there are intermittent connectivity issues, run the following command to check if there are any dropped packets. This command will try to establish 25 different TCP connections every 1 second with the service. Then, you can check how many of them succeeded/failed and also see TCP connection latency. You can download the `psping` tool from [here](/sysinternals/downloads/psping).
43+
- When there are intermittent connectivity issues, run the following command to check if there are any dropped packets. This command tries to establish 25 different TCP connections every 1 second with the service. Then, you can check how many of them succeeded/failed and also see TCP connection latency. You can download the `psping` tool from [here](/sysinternals/downloads/psping).
4444

4545
```shell
4646
.\psping.exe -n 25 -i 1 -q <yournamespace>.servicebus.windows.net:5671 -nobanner
@@ -62,7 +62,7 @@ The following steps may help you with troubleshooting connectivity/certificate/t
6262
Backend service upgrades and restarts may cause these issues in your applications.
6363

6464
### Resolution
65-
If the application code uses SDK, the [retry policy](/azure/architecture/best-practices/retry-service-specific#service-bus) is already built in and active. The application will reconnect without significant impact to the application/workflow.
65+
If the application code uses SDK, the [retry policy](/azure/architecture/best-practices/retry-service-specific#service-bus) is already built in and active. The application reconnects without significant impact to the application/workflow.
6666

6767
## Unauthorized access: Send claims are required
6868

@@ -84,7 +84,7 @@ To learn how to assign permissions to roles, see [Authenticate a managed identit
8484
## Service Bus Exception: Put token failed
8585

8686
### Symptoms
87-
You'll receive the following error message:
87+
You receive the following error message:
8888

8989
`Microsoft.Azure.ServiceBus.ServiceBusException: Put token failed. status-code: 403, status-description: The maximum number of '1000' tokens per connection has been reached.`
9090

@@ -117,6 +117,17 @@ Specify the full Azure Resource Manager ID of the subnet that includes the name
117117
Remove-AzServiceBusVirtualNetworkRule -ResourceGroupName myRG -Namespace myNamespace -SubnetId "/subscriptions/SubscriptionId/resourcegroups/ResourceGroup/myOtherRG/providers/Microsoft.Network/virtualNetworks/myVNet/subnets/mySubnet"
118118
```
119119

120+
## Resource locks don't work when using the data plane SDK
121+
122+
### Symptoms
123+
You have configured a delete lock on a Service Bus namespace, but you're able to delete resources in the namespace (queues, topics, etc.) by using the Service Bus Explorer.
124+
125+
### Cause
126+
Resource lock is preserved in Azure Resource Manager (control plane) and it doesn't prevent the data plane SDK call from deleting the resource directly from the namespace. The standalone Service Bus Explorer uses the data plane SDK, so the deletion goes through.
127+
128+
### Resolution
129+
We recommend that you use the Azure Resource Manager based API via Azure portal, PowerShell, CLI, or Resource Manager template to delete entities so that the resource lock will prevent the resources from being accidentally deleted.
130+
120131
## Next steps
121132
See the following articles:
122133

0 commit comments

Comments
 (0)