You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/duplicate-detection.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,12 @@
2
2
title: Azure Service Bus duplicate message detection | Microsoft Docs
3
3
description: This article explains how you can detect duplicates in Azure Service Bus messages. The duplicate message can be ignored and dropped.
4
4
ms.topic: article
5
-
ms.date: 06/08/2023
5
+
ms.date: 07/23/2024
6
6
---
7
7
8
8
# Duplicate detection
9
9
10
-
If an application fails due to a fatal error immediately after it sends a message, and the restarted application instance erroneously believes that the prior message delivery didn't occur, a subsequent send causes the same message to appear in the system twice.
10
+
If an application fails due to a fatal error immediately after sending a message, and the restarted application instance erroneously believes that the prior message delivery didn't occur, a subsequent send causes the same message to appear in the system twice.
11
11
12
12
It's also possible for an error at the client or network level to occur a moment earlier, and for a sent message to be committed into the queue, with the acknowledgment not successfully returned to the client. This scenario leaves the client in doubt about the outcome of the send operation.
13
13
@@ -21,7 +21,7 @@ Enabling duplicate detection helps keep track of the application-controlled `Mes
21
21
22
22
Application control of the identifier is essential, because only that allows the application to tie the `MessageId` to a business process context from which it can be predictably reconstructed when a failure occurs.
23
23
24
-
For a business process in which multiple messages are sent in the course of handling some application context, the `MessageId`may be a composite of the application-level context identifier, such as a purchase order number, and the subject of the message, for example, **12345.2017/payment**.
24
+
For a business process in which multiple messages are sent in the course of handling some application context, the `MessageId`can be a composite of the application-level context identifier, such as a purchase order number, and the subject of the message, for example, **12345.2017/payment**.
25
25
26
26
The `MessageId` can always be some GUID, but anchoring the identifier to the business process yields predictable repeatability, which is desired for using the duplicate detection feature effectively.
27
27
@@ -36,7 +36,7 @@ The `MessageId` can always be some GUID, but anchoring the identifier to the bus
36
36
37
37
## Duplicate detection window size
38
38
39
-
Apart from just enabling duplicate detection, you can also configure the size of the duplicate detection history time window during which message-ids are retained. This value defaults to 10 minutes for queues and topics, with a minimum value of 20 seconds to maximum value of 7 days.
39
+
Apart from just enabling duplicate detection, you can also configure the size of the duplicate detection history time window during which message IDs are retained. This value defaults to 10 minutes for queues and topics, with a minimum value of 20 seconds to maximum value of 7 days.
40
40
41
41
Enabling duplicate detection and the size of the window directly impact the queue (and topic) throughput, since all recorded message IDs must be matched against the newly submitted message identifier.
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/service-bus-managed-service-identity.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Managed identities for Azure resources with Service Bus
3
3
description: This article describes how to use managed identities to access with Azure Service Bus entities (queues, topics, and subscriptions).
4
4
ms.topic: article
5
-
ms.date: 06/15/2023
5
+
ms.date: 07/22/2024
6
6
---
7
7
8
8
# Authenticate a managed identity with Microsoft Entra ID to access Azure Service Bus resources
@@ -12,14 +12,14 @@ Here are the high-level steps to use a managed identity to access a Service Bus
12
12
13
13
1. Enable managed identity for your client app or environment. For example, enable managed identity for your Azure App Service app, Azure Functions app, or a virtual machine in which your app is running. Here are the articles that help you with this step:
14
14
-[Configure managed identities for App Service and Azure Functions](../app-service/overview-managed-identity.md)
15
-
-[Configure managed identities for Azure resources on a VM](../active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm.md)
15
+
-[Configure managed identities for Azure resources on a virtual machine (VM)](../active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm.md)
16
16
1. Assign Azure Service Bus Data Owner, Azure Service Bus Data Sender, or Azure Service Bus Data Receiver role to the managed identity at the appropriate scope (Azure subscription, resource group, Service Bus namespace, or Service Bus queue or topic). For instructions to assign a role to a managed identity, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.yml).
17
17
1. In your application, use the managed identity and the endpoint to Service Bus namespace to connect to the namespace.
18
18
19
19
For example, in .NET, you use the [ServiceBusClient](/dotnet/api/azure.messaging.servicebus.servicebusclient.-ctor#azure-messaging-servicebus-servicebusclient-ctor(system-string-azure-core-tokencredential)) constructor that takes `TokenCredential` and `fullyQualifiedNamespace` (a string, for example: `cotosons.servicebus.windows.net`) parameters to connect to Service Bus using the managed identity. You pass in [DefaultAzureCredential](/dotnet/api/azure.identity.defaultazurecredential), which derives from `TokenCredential` and uses the managed identity. In `DefaultAzureCredentialOptions`, set the `ManagedIdentityClientId` to the ID of client's managed identity.
@@ -35,7 +35,7 @@ Here are the high-level steps to use a managed identity to access a Service Bus
35
35
>YoucandisablelocalorSASkeyauthenticationfor a Service Bus namespace and allow only Microsoft Entra authentication. For step-by-step instructions, see [Disable local authentication](disable-local-authentication.md).
36
36
37
37
## Azure built-in roles for Azure Service Bus
38
-
MicrosoftEntraauthorizesaccesstosecuredresourcesthrough [Azurerole-basedaccesscontrol (AzureRBAC)](../role-based-access-control/overview.md). AzureServiceBusdefinesasetofAzurebuilt-inrolesthatencompasscommonsetsofpermissionsusedtoaccessServiceBusentities. Youcanalsodefinecustomrolesfor accessing the data.
38
+
MicrosoftEntraauthorizesaccesstosecuredresourcesthrough [Azurerole-basedaccesscontrol (RBAC)](../role-based-access-control/overview.md). AzureServiceBusdefinesasetofAzurebuilt-inrolesthatencompasscommonsetsofpermissionsusedtoaccessServiceBusentities. Youcanalsodefinecustomrolesfor accessing the data.
39
39
40
40
Azure provides the following Azure built-in roles for authorizing access to a Service Bus namespace:
41
41
@@ -51,7 +51,7 @@ Before you assign an Azure role to a managed identity, determine the scope of ac
0 commit comments