Skip to content

Commit c3e61b1

Browse files
Merge pull request #236680 from spelluru/sbusupdates0502
JMS doesn't support receiving over sessions
2 parents 1df563d + 55789bf commit c3e61b1

File tree

3 files changed

+21
-7
lines changed

3 files changed

+21
-7
lines changed

articles/service-bus-messaging/jms-developer-guide.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Azure Service Bus JMS 2.0 developer guide
33
description: How to use the Java Message Service (JMS) 2.0 API to communicate with Azure Service Bus
44
ms.topic: article
5-
ms.date: 02/12/2022
5+
ms.date: 05/02/2023
66
---
77

88
# Azure Service Bus JMS 2.0 developer guide
@@ -174,6 +174,9 @@ A session can be created from the connection object as shown below.
174174
Session session = connection.createSession(false, Session.CLIENT_ACKNOWLEDGE);
175175
```
176176

177+
> [!NOTE]
178+
> JMS API doesn't support receiving messages from service bus queues or topics with messaging sessions enabled.
179+
177180
#### Session modes
178181

179182
A session can be created with any of the below modes.

articles/service-bus-messaging/service-bus-premium-messaging.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Service Bus premium and standard tiers
33
description: This article describes standard and premium tiers of Azure Service Bus. Compares these tiers and provides technical differences.
44
ms.topic: conceptual
55
ms.custom: ignite-2022
6-
ms.date: 10/12/2022
6+
ms.date: 05/02/2023
77
---
88

99
# Service Bus Premium and Standard messaging tiers
@@ -87,7 +87,7 @@ Azure Service Bus premium tier namespaces support the ability to send large mess
8787

8888
Here are some considerations when sending large messages on Azure Service Bus -
8989
* Supported on Azure Service Bus premium tier namespaces only.
90-
* Supported only when using the AMQP protocol. Not supported when using the SBMP protocol.
90+
* Supported only when using the AMQP protocol. Not supported when using SBMP or HTTP protocols.
9191
* Supported when using [Java Message Service (JMS) 2.0 client SDK](how-to-use-java-message-service-20.md) and other language client SDKs.
9292
* Sending large messages will result in decreased throughput and increased latency.
9393
* While 100 MB message payloads are supported, it's recommended to keep the message payloads as small as possible to ensure reliable performance from the Service Bus namespace.

articles/service-bus-messaging/service-bus-troubleshooting-guide.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The following steps may help you with troubleshooting connectivity/certificate/t
2929
</Detail>
3030
</Error>
3131
```
32-
- Run the following command to check if any port is blocked on the firewall. Ports used are 443 (HTTPS), 5671 and 5672 (AMQP) and 9354 (Net Messaging/SBMP). Depending on the library you use, other ports are also used. Here is the sample command that check whether the 5671 port is blocked. C
32+
- Run the following command to check if any port is blocked on the firewall. Ports used are 443 (HTTPS), 5671 and 5672 (AMQP) and 9354 (Net Messaging/SBMP). Depending on the library you use, other ports are also used. Here's the sample command that check whether the 5671 port is blocked. C
3333

3434
```powershell
3535
tnc <yournamespacename>.servicebus.windows.net -port 5671
@@ -40,7 +40,7 @@ The following steps may help you with troubleshooting connectivity/certificate/t
4040
```shell
4141
telnet <yournamespacename>.servicebus.windows.net 5671
4242
```
43-
- When there are intermittent connectivity issues, run the following command to check if there are any dropped packets. This command will try to establish 25 different TCP connections every 1 second with the service. Then, you can check how many of them succeeded/failed and also see TCP connection latency. You can download the `psping` tool from [here](/sysinternals/downloads/psping).
43+
- When there are intermittent connectivity issues, run the following command to check if there are any dropped packets. This command tries to establish 25 different TCP connections every 1 second with the service. Then, you can check how many of them succeeded/failed and also see TCP connection latency. You can download the `psping` tool from [here](/sysinternals/downloads/psping).
4444

4545
```shell
4646
.\psping.exe -n 25 -i 1 -q <yournamespace>.servicebus.windows.net:5671 -nobanner
@@ -62,7 +62,7 @@ The following steps may help you with troubleshooting connectivity/certificate/t
6262
Backend service upgrades and restarts may cause these issues in your applications.
6363

6464
### Resolution
65-
If the application code uses SDK, the [retry policy](/azure/architecture/best-practices/retry-service-specific#service-bus) is already built in and active. The application will reconnect without significant impact to the application/workflow.
65+
If the application code uses SDK, the [retry policy](/azure/architecture/best-practices/retry-service-specific#service-bus) is already built in and active. The application reconnects without significant impact to the application/workflow.
6666

6767
## Unauthorized access: Send claims are required
6868

@@ -84,7 +84,7 @@ To learn how to assign permissions to roles, see [Authenticate a managed identit
8484
## Service Bus Exception: Put token failed
8585

8686
### Symptoms
87-
You'll receive the following error message:
87+
You receive the following error message:
8888

8989
`Microsoft.Azure.ServiceBus.ServiceBusException: Put token failed. status-code: 403, status-description: The maximum number of '1000' tokens per connection has been reached.`
9090

@@ -117,6 +117,17 @@ Specify the full Azure Resource Manager ID of the subnet that includes the name
117117
Remove-AzServiceBusVirtualNetworkRule -ResourceGroupName myRG -Namespace myNamespace -SubnetId "/subscriptions/SubscriptionId/resourcegroups/ResourceGroup/myOtherRG/providers/Microsoft.Network/virtualNetworks/myVNet/subnets/mySubnet"
118118
```
119119

120+
## Resource locks don't work when using the data plane SDK
121+
122+
### Symptoms
123+
You have configured a delete lock on a Service Bus namespace, but you're able to delete resources in the namespace (queues, topics, etc.) by using the Service Bus Explorer.
124+
125+
### Cause
126+
Resource lock is preserved in Azure Resource Manager (control plane) and it doesn't prevent the data plane SDK call from deleting the resource directly from the namespace. The standalone Service Bus Explorer uses the data plane SDK, so the deletion goes through.
127+
128+
### Resolution
129+
We recommend that you use the Azure Resource Manager based API via Azure portal, PowerShell, CLI, or Resource Manager template to delete entities so that the resource lock will prevent the resources from being accidentally deleted.
130+
120131
## Next steps
121132
See the following articles:
122133

0 commit comments

Comments
 (0)