Skip to content

Commit 909ae30

Browse files
authored
Merge pull request #281553 from spelluru/sbusfreshness0722
Service Bus freshness - July 2024
2 parents 343ea66 + 86a7b1c commit 909ae30

File tree

5 files changed

+81
-67
lines changed

5 files changed

+81
-67
lines changed

articles/service-bus-messaging/duplicate-detection.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
title: Azure Service Bus duplicate message detection | Microsoft Docs
33
description: This article explains how you can detect duplicates in Azure Service Bus messages. The duplicate message can be ignored and dropped.
44
ms.topic: article
5-
ms.date: 06/08/2023
5+
ms.date: 07/23/2024
66
---
77

88
# Duplicate detection
99

10-
If an application fails due to a fatal error immediately after it sends a message, and the restarted application instance erroneously believes that the prior message delivery didn't occur, a subsequent send causes the same message to appear in the system twice.
10+
If an application fails due to a fatal error immediately after sending a message, and the restarted application instance erroneously believes that the prior message delivery didn't occur, a subsequent send causes the same message to appear in the system twice.
1111

1212
It's also possible for an error at the client or network level to occur a moment earlier, and for a sent message to be committed into the queue, with the acknowledgment not successfully returned to the client. This scenario leaves the client in doubt about the outcome of the send operation.
1313

@@ -21,7 +21,7 @@ Enabling duplicate detection helps keep track of the application-controlled `Mes
2121

2222
Application control of the identifier is essential, because only that allows the application to tie the `MessageId` to a business process context from which it can be predictably reconstructed when a failure occurs.
2323

24-
For a business process in which multiple messages are sent in the course of handling some application context, the `MessageId` may be a composite of the application-level context identifier, such as a purchase order number, and the subject of the message, for example, **12345.2017/payment**.
24+
For a business process in which multiple messages are sent in the course of handling some application context, the `MessageId` can be a composite of the application-level context identifier, such as a purchase order number, and the subject of the message, for example, **12345.2017/payment**.
2525

2626
The `MessageId` can always be some GUID, but anchoring the identifier to the business process yields predictable repeatability, which is desired for using the duplicate detection feature effectively.
2727

@@ -36,7 +36,7 @@ The `MessageId` can always be some GUID, but anchoring the identifier to the bus
3636

3737
## Duplicate detection window size
3838

39-
Apart from just enabling duplicate detection, you can also configure the size of the duplicate detection history time window during which message-ids are retained. This value defaults to 10 minutes for queues and topics, with a minimum value of 20 seconds to maximum value of 7 days.
39+
Apart from just enabling duplicate detection, you can also configure the size of the duplicate detection history time window during which message IDs are retained. This value defaults to 10 minutes for queues and topics, with a minimum value of 20 seconds to maximum value of 7 days.
4040

4141
Enabling duplicate detection and the size of the window directly impact the queue (and topic) throughput, since all recorded message IDs must be matched against the newly submitted message identifier.
4242

9.12 KB
Loading

articles/service-bus-messaging/service-bus-managed-service-identity.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Managed identities for Azure resources with Service Bus
33
description: This article describes how to use managed identities to access with Azure Service Bus entities (queues, topics, and subscriptions).
44
ms.topic: article
5-
ms.date: 06/15/2023
5+
ms.date: 07/22/2024
66
---
77

88
# Authenticate a managed identity with Microsoft Entra ID to access Azure Service Bus resources
@@ -12,14 +12,14 @@ Here are the high-level steps to use a managed identity to access a Service Bus
1212

1313
1. Enable managed identity for your client app or environment. For example, enable managed identity for your Azure App Service app, Azure Functions app, or a virtual machine in which your app is running. Here are the articles that help you with this step:
1414
- [Configure managed identities for App Service and Azure Functions](../app-service/overview-managed-identity.md)
15-
- [Configure managed identities for Azure resources on a VM](../active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm.md)
15+
- [Configure managed identities for Azure resources on a virtual machine (VM)](../active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm.md)
1616
1. Assign Azure Service Bus Data Owner, Azure Service Bus Data Sender, or Azure Service Bus Data Receiver role to the managed identity at the appropriate scope (Azure subscription, resource group, Service Bus namespace, or Service Bus queue or topic). For instructions to assign a role to a managed identity, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.yml).
1717
1. In your application, use the managed identity and the endpoint to Service Bus namespace to connect to the namespace.
1818

1919
For example, in .NET, you use the [ServiceBusClient](/dotnet/api/azure.messaging.servicebus.servicebusclient.-ctor#azure-messaging-servicebus-servicebusclient-ctor(system-string-azure-core-tokencredential)) constructor that takes `TokenCredential` and `fullyQualifiedNamespace` (a string, for example: `cotosons.servicebus.windows.net`) parameters to connect to Service Bus using the managed identity. You pass in [DefaultAzureCredential](/dotnet/api/azure.identity.defaultazurecredential), which derives from `TokenCredential` and uses the managed identity. In `DefaultAzureCredentialOptions`, set the `ManagedIdentityClientId` to the ID of client's managed identity.
2020

2121
```csharp
22-
string fullyQualifiedNamespace = "<your Namespace>.servicebus.windows.net>";
22+
string fullyQualifiedNamespace = "<your namespace>.servicebus.windows.net>";
2323
string userAssignedClientId = "<your managed identity client ID>";
2424

2525
var credential = new DefaultAzureCredential(
@@ -35,7 +35,7 @@ Here are the high-level steps to use a managed identity to access a Service Bus
3535
> You can disable local or SAS key authentication for a Service Bus namespace and allow only Microsoft Entra authentication. For step-by-step instructions, see [Disable local authentication](disable-local-authentication.md).
3636

3737
## Azure built-in roles for Azure Service Bus
38-
Microsoft Entra authorizes access to secured resources through [Azure role-based access control (Azure RBAC)](../role-based-access-control/overview.md). Azure Service Bus defines a set of Azure built-in roles that encompass common sets of permissions used to access Service Bus entities. You can also define custom roles for accessing the data.
38+
Microsoft Entra authorizes access to secured resources through [Azure role-based access control (RBAC)](../role-based-access-control/overview.md). Azure Service Bus defines a set of Azure built-in roles that encompass common sets of permissions used to access Service Bus entities. You can also define custom roles for accessing the data.
3939

4040
Azure provides the following Azure built-in roles for authorizing access to a Service Bus namespace:
4141

@@ -51,7 +51,7 @@ Before you assign an Azure role to a managed identity, determine the scope of ac
5151
The following list describes the levels at which you can scope access to Service Bus resources, starting with the narrowest scope:
5252

5353
- **Queue**, **topic**, or **subscription**: Role assignment applies to the specific Service Bus entity.
54-
- **Service Bus namespace**: Role assignment spans the entire topology of Service Bus under the namespace and to the consumer group associated with it.
54+
- **Service Bus namespace**: Role assignment spans the entire topology of Service Bus under the namespace.
5555
- **Resource group**: Role assignment applies to all the Service Bus resources under the resource group.
5656
- **Subscription**: Role assignment applies to all the Service Bus resources in all of the resource groups in the subscription.
5757

0 commit comments

Comments
 (0)