You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/event-hubs/resource-governance-with-app-groups.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ You can create an application group using the Azure portal by following these st
38
38
1. For **SAS key name**, select the SAS policy that can be used as a security context for this application group.You can select **Add SAS Policy** to add a new policy and then associate with the application group.
39
39
40
40
:::image type="content" source="./media/resource-governance-with-app-groups/Create-application-groups-with-namespace-shared-access-key.png" alt-text="Screenshot of the Add application group page with Namespace Shared access policy option selected.":::
41
-
1. If you selected **Event Hub Shared access policy**:
41
+
1. If you selected **Event Hubs Shared access policy**:
42
42
1. For **SAS key name**, copy the SAS policy name from Event Hubs "Shared Access Policies" Page and paste into textbox
43
43
44
44
:::image type="content" source="./media/resource-governance-with-app-groups/Create-application-groups-with-eventhub shared-access-key.png" alt-text="Screenshot of the Add application group page with Event Hub Shared access policy option selected.":::
@@ -53,9 +53,9 @@ Review the auto-generated **Client group ID**, which is the unique ID associated
53
53
54
54
| Security Context type | Auto-generated client group ID|
> All existing application groups created with namespace shared access key would continue to work with client group ID starting with `SASKeyName`. However all new application groups would have updated client group ID as shown above.
To learn more about the PowerShell command, see [`New-AzEventHubApplicationGroup`](/powershell/module/az.eventhub/new-azeventhubapplicationgroup).
126
126
127
127
### [ARM template](#tab/arm)
128
-
The following example shows how to create an application group using an ARM template. In this example, the application group is associated with an existing SAS policy name `contososaspolicy` by setting the client `AppGroupIdentifier` as `NamespaceSASKeyName=contososaspolicy`. The application group policies are also defined in the ARM template.You must set ClientAppGroupIdentifier based on the security context type you are choosing. Please review the [table](#supported-security-context-type) above to know supported Security context type
128
+
The following example shows how to create an application group using an ARM template. In this example, the application group is associated with an existing SAS policy name `contososaspolicy` by setting the client `AppGroupIdentifier` as `NamespaceSASKeyName=contososaspolicy`. The application group policies are also defined in the ARM template.You must set ClientAppGroupIdentifier based on the security context type you are choosing. Please review the [table](#supported-security-context-type) above to know supported Security context type
129
129
130
130
131
131
```json
@@ -368,7 +368,7 @@ You can use the below example query to find out all the throttled requests in ce
368
368
| where Outcome_s =="Throttled"
369
369
370
370
```
371
-
Due to restrictions at protocol level, throttled request logs are not generated for consumer operations with Event Hub ( OutgoingMessages/ OutgoingBytes). when reqeusts are throttled at consumer side, you would observe sluggish egress throughput.
371
+
Due to restrictions at protocol level, throttled request logs are not generated for consumer operations with Event Hub ( `OutgoingMessages` or `OutgoingBytes`). when requests are throttled at consumer side, you would observe sluggish egress throughput.
0 commit comments