You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/load-testing/how-to-parameterize-load-tests.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ To use secrets with Azure Load Testing, you perform the following steps:
47
47
48
48
You can use Azure Key Vault to pass secret values to your test script in Azure Load Testing. You add a reference to the secret in the Azure Load Testing configuration. Azure Load Testing then uses this reference to retrieve the secret value in the test script.
49
49
50
-
You also need to grant Azure Load Testing access to your Azure key vault to retrieve the secret value.
50
+
You also need to grant Azure Load Testing access to your Azure Key Vault to retrieve the secret value.
51
51
52
52
> [!NOTE]
53
53
> If you run a load test as part of your CI/CD process, you might also use the related secret store. Skip to [Use the CI/CD secret store](#cicd_secrets).
@@ -57,11 +57,11 @@ You also need to grant Azure Load Testing access to your Azure key vault to retr
57
57
1.[Add the secret value to your key vault](/azure/key-vault/secrets/quick-create-portal#add-a-secret-to-key-vault), if you haven't already done so.
58
58
59
59
> [!IMPORTANT]
60
-
> If you restricted access to your Azure key vault by a firewall or virtual networking, follow these steps to [grant access to trusted Azure services](/azure/key-vault/general/overview-vnet-service-endpoints#grant-access-to-trusted-azure-services).
60
+
> If you restricted access to your Azure Key Vault by a firewall or virtual networking, follow these steps to [grant access to trusted Azure services](/azure/key-vault/general/overview-vnet-service-endpoints#grant-access-to-trusted-azure-services).
61
61
62
62
1. Retrieve the key vault **secret identifier** for your secret. You use this secret identifier to configure your load test.
63
63
64
-
The **secret identifier** is the full URI of the secret in the Azure key vault. Optionally, you can also include a version number. For example, `https://myvault.vault.azure.net/secrets/mysecret/` or `https://myvault.vault.azure.net/secrets/mysecret/abcdef01-2345-6789-0abc-def012345678`.
64
+
The **secret identifier** is the full URI of the secret in the Azure Key Vault. Optionally, you can also include a version number. For example, `https://myvault.vault.azure.net/secrets/mysecret/` or `https://myvault.vault.azure.net/secrets/mysecret/abcdef01-2345-6789-0abc-def012345678`.
65
65
66
66
#### Add the secret to your load test
67
67
@@ -89,7 +89,7 @@ You also need to grant Azure Load Testing access to your Azure key vault to retr
89
89
90
90
* If you're configuring a CI/CD workflow and use Azure Key Vault, you can specify the reference identity in the YAML configuration file by using the `keyVaultReferenceIdentity` property. For more information about the syntax, see the [Test configuration YAML reference](./reference-test-config-yaml.md).
Copy file name to clipboardExpand all lines: articles/load-testing/includes/include-grant-key-vault-access-secrets.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,9 @@ ms.date: 10/19/2023
12
12
13
13
When you store load test secrets or certificates in Azure Key Vault, your load testing resource uses a [managed identity](../how-to-use-a-managed-identity.md) for accessing the key vault. After you configure the manage identity, you need to grant the managed identity of your load testing resource permissions to read these values from the key vault.
14
14
15
-
To grant your Azure load testing resource permissions to read secrets or certificates from your Azure key vault:
15
+
To grant your Azure load testing resource permissions to read secrets or certificates from your Azure Key Vault:
16
16
17
-
1. In the [Azure portal](https://portal.azure.com/), go to your Azure key vault resource.
17
+
1. In the [Azure portal](https://portal.azure.com/), go to your Azure Key Vault resource.
18
18
19
19
If you don't have a key vault, follow the instructions in [Azure Key Vault quickstart](/azure/key-vault/secrets/quick-create-cli) to create one.
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/service-bus-prefetch.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,6 +29,8 @@ You can set **prefetch_count** on the [azure.servicebus.ServiceBusReceiver](/pyt
29
29
30
30
While messages are available in the prefetch buffer, any subsequent receive calls are immediately fulfilled from the buffer. The buffer is replenished in the background as space becomes available. If there are no messages available for delivery, the receive operation empties the buffer and then waits or blocks, as expected.
31
31
32
+
It's important to note that `PrefetchCount` defines the maximum number of messages that can exist in the local buffer at any time. This also means that it acts as a strict upper limit on how many messages can be processed concurrently. If `MaxConcurrentCalls` is set higher than `PrefetchCount`, the processor will not be able to utilize all concurrent message handlers, as only up to `PrefetchCount` messages can be active in memory at once.
33
+
32
34
## Why is Prefetch not the default option?
33
35
Prefetch speeds up the message flow by having a message readily available for local retrieval before the application asks for one. This throughput gain is the result of a trade-off that the application author must make explicitly.
0 commit comments