Skip to content

Commit e2fc4d8

Browse files
authored
Merge pull request #1 from spelluru/patch-144
Acrolynx fixes
2 parents 63de930 + 412206b commit e2fc4d8

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/event-hubs/resource-governance-with-app-groups.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ You can create an application group using the Azure portal by following these st
3838
1. For **SAS key name**, select the SAS policy that can be used as a security context for this application group.You can select **Add SAS Policy** to add a new policy and then associate with the application group.
3939

4040
:::image type="content" source="./media/resource-governance-with-app-groups/Create-application-groups-with-namespace-shared-access-key.png" alt-text="Screenshot of the Add application group page with Namespace Shared access policy option selected.":::
41-
1. If you selected **Event Hub Shared access policy**:
41+
1. If you selected **Event Hubs Shared access policy**:
4242
1. For **SAS key name**, copy the SAS policy name from Event Hubs "Shared Access Policies" Page and paste into textbox
4343

4444
:::image type="content" source="./media/resource-governance-with-app-groups/Create-application-groups-with-eventhub shared-access-key.png" alt-text="Screenshot of the Add application group page with Event Hub Shared access policy option selected.":::
@@ -53,9 +53,9 @@ Review the auto-generated **Client group ID**, which is the unique ID associated
5353

5454
| Security Context type | Auto-generated client group ID|
5555
| ---| --- |
56-
| Namespace Shared Access Key | `NamespaceSASKeyName=<NamespaceLevelKeyName>` |
56+
| Namespace shared access key | `NamespaceSASKeyName=<NamespaceLevelKeyName>` |
5757
| AAD App ID | `AADAppID=<AppID>` |
58-
| EventHub Shared Access Key | `EntitySASKeyName=<EntityLevelKeyName>` |
58+
| Event Hubs shared access key | `EntitySASKeyName=<EntityLevelKeyName>` |
5959
6060
> [!NOTE]
6161
> All existing application groups created with namespace shared access key would continue to work with client group ID starting with `SASKeyName`. However all new application groups would have updated client group ID as shown above.
@@ -125,7 +125,7 @@ New-AzEventHubApplicationGroup -ResourceGroupName myresourcegroup -NamespaceName
125125
To learn more about the PowerShell command, see [`New-AzEventHubApplicationGroup`](/powershell/module/az.eventhub/new-azeventhubapplicationgroup).
126126

127127
### [ARM template](#tab/arm)
128-
The following example shows how to create an application group using an ARM template. In this example, the application group is associated with an existing SAS policy name `contososaspolicy` by setting the client `AppGroupIdentifier` as `NamespaceSASKeyName=contososaspolicy`. The application group policies are also defined in the ARM template.You must set ClientAppGroupIdentifier based on the security context type you are choosing. Please review the [table](#supported-security-context-type) above to know supported Security context type
128+
The following example shows how to create an application group using an ARM template. In this example, the application group is associated with an existing SAS policy name `contososaspolicy` by setting the client `AppGroupIdentifier` as `NamespaceSASKeyName=contososaspolicy`. The application group policies are also defined in the ARM template. You must set ClientAppGroupIdentifier based on the security context type you are choosing. Please review the [table](#supported-security-context-type) above to know supported Security context type
129129

130130

131131
```json
@@ -368,7 +368,7 @@ You can use the below example query to find out all the throttled requests in ce
368368
| where Outcome_s =="Throttled"
369369
370370
```
371-
Due to restrictions at protocol level, throttled request logs are not generated for consumer operations with Event Hub ( OutgoingMessages/ OutgoingBytes). when reqeusts are throttled at consumer side, you would observe sluggish egress throughput.
371+
Due to restrictions at protocol level, throttled request logs are not generated for consumer operations with Event Hub ( `OutgoingMessages` or `OutgoingBytes`). when requests are throttled at consumer side, you would observe sluggish egress throughput.
372372

373373
## Next steps
374374

0 commit comments

Comments
 (0)