Skip to content

Commit f51a27f

Browse files
committed
Event Hubs updates
1 parent 2454ce2 commit f51a27f

File tree

3 files changed

+17
-1
lines changed

3 files changed

+17
-1
lines changed

articles/event-hubs/event-hubs-diagnostic-logs.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -144,6 +144,16 @@ Autoscale log JSON includes elements listed in the following table:
144144
| ResourceId | Azure Resource Manager resource ID. |
145145
| Message | Informational message, which provides details about auto-inflate action. The message contains previous and current value of throughput unit for a given namespace and what triggered the inflate of the TU. |
146146

147+
Here's an example autoscale event:
148+
149+
```json
150+
{
151+
"TrackingId": "fb1b3676-bb2d-4b17-85b7-be1c7aa1967e",
152+
"Message": "Scaled-up EventHub TUs (UpdateStartTimeUTC: 5/13/2020 7:48:36 AM, PreviousValue: 1, UpdatedThroughputUnitValue: 2, AutoScaleReason: 'IncomingMessagesPerSecond reached 2170')",
153+
"ResourceId": "/subscriptions/0000000-0000-0000-0000-000000000000/resourcegroups/testrg/providers/microsoft.eventhub/namespaces/namespace-name"
154+
}
155+
```
156+
147157
## Kafka coordinator logs schema
148158
Kafka coordinator log JSON includes elements listed in the following table:
149159

articles/event-hubs/event-hubs-ip-filtering.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,9 @@ This section shows you how to use the Azure portal to create IP firewall rules f
5252
2. For **address range**, enter a specific IPv4 address or a range of IPv4 address in CIDR notation.
5353
3. Specify whether you want to **allow trusted Microsoft services to bypass this firewall**.
5454

55+
> [!WARNING]
56+
> If you choose the **Selected networks** option and don't specify an IP address or address range, the service will allow traffic from all networks.
57+
5558
![Firewall - All networks option selected](./media/event-hubs-firewall/firewall-selected-networks-trusted-access-disabled.png)
5659
3. Select **Save** on the toolbar to save the settings. Wait for a few minutes for the confirmation to show up on the portal notifications.
5760

articles/service-bus-messaging/service-bus-ip-filtering.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ editor: spelluru
1010
ms.service: service-bus
1111
ms.devlang: na
1212
ms.topic: article
13-
ms.date: 12/20/2019
13+
ms.date: 05/14/2020
1414
ms.author: aschhab
1515

1616
---
@@ -52,6 +52,9 @@ This section shows you how to use the Azure portal to create IP firewall rules f
5252
2. For **address range**, enter a specific IPv4 address or a range of IPv4 address in CIDR notation.
5353
3. Specify whether you want to **allow trusted Microsoft services to bypass this firewall**.
5454

55+
> [!WARNING]
56+
> If you choose the **Selected networks** option and don't specify an IP address or address range, the service will allow traffic from all networks.
57+
5558
![Firewall - All networks option selected](./media/service-bus-ip-filtering/firewall-selected-networks-trusted-access-disabled.png)
5659
3. Select **Save** on the toolbar to save the settings. Wait for a few minutes for the confirmation to show up on the portal notifications.
5760

0 commit comments

Comments
 (0)