You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/service-bus-premium-messaging.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Azure Service Bus premium and standard tiers
3
3
description: This article describes standard and premium tiers of Azure Service Bus. Compares these tiers and provides technical differences.
4
4
ms.topic: conceptual
5
5
ms.custom: ignite-2022
6
-
ms.date: 10/12/2022
6
+
ms.date: 05/02/2023
7
7
---
8
8
9
9
# Service Bus Premium and Standard messaging tiers
@@ -87,7 +87,7 @@ Azure Service Bus premium tier namespaces support the ability to send large mess
87
87
88
88
Here are some considerations when sending large messages on Azure Service Bus -
89
89
* Supported on Azure Service Bus premium tier namespaces only.
90
-
* Supported only when using the AMQP protocol. Not supported when using the SBMP protocol.
90
+
* Supported only when using the AMQP protocol. Not supported when using SBMP or HTTP protocols.
91
91
* Supported when using [Java Message Service (JMS) 2.0 client SDK](how-to-use-java-message-service-20.md) and other language client SDKs.
92
92
* Sending large messages will result in decreased throughput and increased latency.
93
93
* While 100 MB message payloads are supported, it's recommended to keep the message payloads as small as possible to ensure reliable performance from the Service Bus namespace.
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/service-bus-troubleshooting-guide.md
+15-4Lines changed: 15 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ The following steps may help you with troubleshooting connectivity/certificate/t
29
29
</Detail>
30
30
</Error>
31
31
```
32
-
- Run the following command to check if any port is blocked on the firewall. Ports used are 443 (HTTPS), 5671 and 5672 (AMQP) and 9354 (Net Messaging/SBMP). Depending on the library you use, other ports are also used. Here is the sample command that check whether the 5671 port is blocked. C
32
+
- Run the following command to check if any port is blocked on the firewall. Ports used are 443 (HTTPS), 5671 and 5672 (AMQP) and 9354 (Net Messaging/SBMP). Depending on the library you use, other ports are also used. Here's the sample command that check whether the 5671 port is blocked. C
- When there are intermittent connectivity issues, run the following command to check if there are any dropped packets. This command will try to establish 25 different TCP connections every 1 second with the service. Then, you can check how many of them succeeded/failed and also see TCP connection latency. You can download the `psping` tool from [here](/sysinternals/downloads/psping).
43
+
- When there are intermittent connectivity issues, run the following command to check if there are any dropped packets. This command tries to establish 25 different TCP connections every 1 second with the service. Then, you can check how many of them succeeded/failed and also see TCP connection latency. You can download the `psping` tool from [here](/sysinternals/downloads/psping).
@@ -62,7 +62,7 @@ The following steps may help you with troubleshooting connectivity/certificate/t
62
62
Backend service upgrades and restarts may cause these issues in your applications.
63
63
64
64
### Resolution
65
-
If the application code uses SDK, the [retry policy](/azure/architecture/best-practices/retry-service-specific#service-bus) is already built in and active. The application will reconnect without significant impact to the application/workflow.
65
+
If the application code uses SDK, the [retry policy](/azure/architecture/best-practices/retry-service-specific#service-bus) is already built in and active. The application reconnects without significant impact to the application/workflow.
66
66
67
67
## Unauthorized access: Send claims are required
68
68
@@ -84,7 +84,7 @@ To learn how to assign permissions to roles, see [Authenticate a managed identit
84
84
## Service Bus Exception: Put token failed
85
85
86
86
### Symptoms
87
-
You'll receive the following error message:
87
+
You receive the following error message:
88
88
89
89
`Microsoft.Azure.ServiceBus.ServiceBusException: Put token failed. status-code: 403, status-description: The maximum number of '1000' tokens per connection has been reached.`
90
90
@@ -117,6 +117,17 @@ Specify the full Azure Resource Manager ID of the subnet that includes the name
## Resource locks don't work when using the data plane SDK
121
+
122
+
### Symptoms
123
+
You have configured a delete lock on a Service Bus namespace, but you're able to delete resources in the namespace (queues, topics, etc.) by using the Service Bus Explorer.
124
+
125
+
### Cause
126
+
Resource lock is preserved in Azure Resource Manager (control plane) and it doesn't prevent the data plane SDK call from deleting the resource directly from the namespace. The standalone Service Bus Explorer uses the data plane SDK, so the deletion goes through.
127
+
128
+
### Resolution
129
+
We recommend that you use the Azure Resource Manager based API via Azure portal, PowerShell, CLI, or Resource Manager template to delete entities so that the resource lock will prevent the resources from being accidentally deleted.
0 commit comments