Skip to content

Commit 80ecf24

Browse files
authored
Merge pull request #299245 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 0753483 + 6077b4c commit 80ecf24

File tree

3 files changed

+8
-6
lines changed

3 files changed

+8
-6
lines changed

articles/load-testing/how-to-parameterize-load-tests.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ To use secrets with Azure Load Testing, you perform the following steps:
4747

4848
You can use Azure Key Vault to pass secret values to your test script in Azure Load Testing. You add a reference to the secret in the Azure Load Testing configuration. Azure Load Testing then uses this reference to retrieve the secret value in the test script.
4949

50-
You also need to grant Azure Load Testing access to your Azure key vault to retrieve the secret value.
50+
You also need to grant Azure Load Testing access to your Azure Key Vault to retrieve the secret value.
5151

5252
> [!NOTE]
5353
> If you run a load test as part of your CI/CD process, you might also use the related secret store. Skip to [Use the CI/CD secret store](#cicd_secrets).
@@ -57,11 +57,11 @@ You also need to grant Azure Load Testing access to your Azure key vault to retr
5757
1. [Add the secret value to your key vault](/azure/key-vault/secrets/quick-create-portal#add-a-secret-to-key-vault), if you haven't already done so.
5858

5959
> [!IMPORTANT]
60-
> If you restricted access to your Azure key vault by a firewall or virtual networking, follow these steps to [grant access to trusted Azure services](/azure/key-vault/general/overview-vnet-service-endpoints#grant-access-to-trusted-azure-services).
60+
> If you restricted access to your Azure Key Vault by a firewall or virtual networking, follow these steps to [grant access to trusted Azure services](/azure/key-vault/general/overview-vnet-service-endpoints#grant-access-to-trusted-azure-services).
6161
6262
1. Retrieve the key vault **secret identifier** for your secret. You use this secret identifier to configure your load test.
6363

64-
The **secret identifier** is the full URI of the secret in the Azure key vault. Optionally, you can also include a version number. For example, `https://myvault.vault.azure.net/secrets/mysecret/` or `https://myvault.vault.azure.net/secrets/mysecret/abcdef01-2345-6789-0abc-def012345678`.
64+
The **secret identifier** is the full URI of the secret in the Azure Key Vault. Optionally, you can also include a version number. For example, `https://myvault.vault.azure.net/secrets/mysecret/` or `https://myvault.vault.azure.net/secrets/mysecret/abcdef01-2345-6789-0abc-def012345678`.
6565

6666
#### Add the secret to your load test
6767

@@ -89,7 +89,7 @@ You also need to grant Azure Load Testing access to your Azure key vault to retr
8989

9090
* If you're configuring a CI/CD workflow and use Azure Key Vault, you can specify the reference identity in the YAML configuration file by using the `keyVaultReferenceIdentity` property. For more information about the syntax, see the [Test configuration YAML reference](./reference-test-config-yaml.md).
9191

92-
#### Grant access to your Azure key vault
92+
#### Grant access to your Azure Key Vault
9393

9494
[!INCLUDE [include-grant-key-vault-access-secrets](includes/include-grant-key-vault-access-secrets.md)]
9595

articles/load-testing/includes/include-grant-key-vault-access-secrets.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ ms.date: 10/19/2023
1212

1313
When you store load test secrets or certificates in Azure Key Vault, your load testing resource uses a [managed identity](../how-to-use-a-managed-identity.md) for accessing the key vault. After you configure the manage identity, you need to grant the managed identity of your load testing resource permissions to read these values from the key vault.
1414

15-
To grant your Azure load testing resource permissions to read secrets or certificates from your Azure key vault:
15+
To grant your Azure load testing resource permissions to read secrets or certificates from your Azure Key Vault:
1616

17-
1. In the [Azure portal](https://portal.azure.com/), go to your Azure key vault resource.
17+
1. In the [Azure portal](https://portal.azure.com/), go to your Azure Key Vault resource.
1818

1919
If you don't have a key vault, follow the instructions in [Azure Key Vault quickstart](/azure/key-vault/secrets/quick-create-cli) to create one.
2020

articles/service-bus-messaging/service-bus-prefetch.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ You can set **prefetch_count** on the [azure.servicebus.ServiceBusReceiver](/pyt
2929
3030
While messages are available in the prefetch buffer, any subsequent receive calls are immediately fulfilled from the buffer. The buffer is replenished in the background as space becomes available. If there are no messages available for delivery, the receive operation empties the buffer and then waits or blocks, as expected.
3131

32+
It's important to note that `PrefetchCount` defines the maximum number of messages that can exist in the local buffer at any time. This also means that it acts as a strict upper limit on how many messages can be processed concurrently. If `MaxConcurrentCalls` is set higher than `PrefetchCount`, the processor will not be able to utilize all concurrent message handlers, as only up to `PrefetchCount` messages can be active in memory at once.
33+
3234
## Why is Prefetch not the default option?
3335
Prefetch speeds up the message flow by having a message readily available for local retrieval before the application asks for one. This throughput gain is the result of a trade-off that the application author must make explicitly.
3436

0 commit comments

Comments
 (0)