Skip to content

Commit d9f2410

Browse files
Merge pull request #244777 from spelluru/sbussupport0712
Service Bus supportability issues
2 parents b1997d1 + fe29f58 commit d9f2410

File tree

2 files changed

+20
-3
lines changed

2 files changed

+20
-3
lines changed

articles/service-bus-messaging/service-bus-geo-dr.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,11 @@ You first create or use an existing primary namespace, and a new secondary names
8787
1. Manually fail over to the secondary namespace.
8888
1. Select **Failover** on the toolbar.
8989
1. Confirm that you want to fail over to the secondary namespace by typing in your alias.
90-
1. Turn ON the **Safe Failover** option to safely fail over to the secondary namespace. This feature makes sure that pending Geo-DR replications are completed before switching over to the secondary.
90+
1. Turn ON the **Safe Failover** option to safely fail over to the secondary namespace.
91+
92+
> [!NOTE]
93+
> - The safe failover makes sure that pending Geo-DR replications are completed before switching over to the secondary. Whereas forced or manual failover doesn't wait for pending replications to be completed before switching over to the secondary.
94+
> - Currently, the safe failover fails if the primary and secondary namespaces aren't in the same Azure subscription.
9195
1. Then, select **Failover**.
9296

9397
:::image type="content" source="./media/service-bus-geo-dr/failover-page.png" alt-text="Screenshot showing the Failover page.":::

articles/service-bus-messaging/service-bus-troubleshooting-guide.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Remove-AzServiceBusVirtualNetworkRule -ResourceGroupName $resourceGroupName -Nam
108108
```
109109

110110
### Cause
111-
The Azure Resource Manager ID that you specified for the subnet may be invalid. This may happen when the virtual network is in a different resource group from the one that has the Service Bus namespace. If you don't explicitly specify the resource group of the virtual network, the CLI command constructs the Azure Resource Manager ID by using the resource group of the Service Bus namespace. So, it fails to remove the subnet from the network rule.
111+
The Azure Resource Manager ID that you specified for the subnet may be invalid. This issue may happen when the virtual network is in a different resource group from the one that has the Service Bus namespace. If you don't explicitly specify the resource group of the virtual network, the CLI command constructs the Azure Resource Manager ID by using the resource group of the Service Bus namespace. So, it fails to remove the subnet from the network rule.
112112

113113
### Resolution
114114
Specify the full Azure Resource Manager ID of the subnet that includes the name of the resource group that has the virtual network. For example:
@@ -126,7 +126,20 @@ You have configured a delete lock on a Service Bus namespace, but you're able to
126126
Resource lock is preserved in Azure Resource Manager (control plane) and it doesn't prevent the data plane SDK call from deleting the resource directly from the namespace. The standalone Service Bus Explorer uses the data plane SDK, so the deletion goes through.
127127

128128
### Resolution
129-
We recommend that you use the Azure Resource Manager based API via Azure portal, PowerShell, CLI, or Resource Manager template to delete entities so that the resource lock will prevent the resources from being accidentally deleted.
129+
We recommend that you use the Azure Resource Manager based API via Azure portal, PowerShell, CLI, or Resource Manager template to delete entities so that the resource lock prevents the resources from being accidentally deleted.
130+
131+
## Entity is no longer available
132+
133+
### Symptoms
134+
You see an error that the entity is no longer available.
135+
136+
### Cause
137+
The resource may have been deleted. Follow these steps to identify why the entity was deleted.
138+
139+
- Check the activity log to see if there's an Azure Resource Manager request for deletion.
140+
- Check the operational log to see if there was a direct API call for deletion. To learn how to collect an operational log, see [Collection and routing](monitor-service-bus.md#collection-and-routing). For the schema and an example of an operation log, see [Operation logs](monitor-service-bus-reference.md#operational-logs)
141+
- Check the operation log to see if there was an `autodeleteonidle` related deletion.
142+
130143

131144
## Next steps
132145
See the following articles:

0 commit comments

Comments
 (0)