%3CLINGO-SUB%20id%3D%22lingo-sub-1411467%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Service%20Bus%20Explorer%20preview%20on%20Azure%20Portal!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1411467%22%20slang%3D%22en-US%22%3E%3CP%3EI%20didn't%20find%20any%20information%20about%20how%20security%20roles%20affect%20use%20of%20Service%20Bus%20Explorer%2C%20but%20when%20I%20tested%20it%20with%20a%20user%20that%20has%20the%20general%20%22Reader%22%20role%20it%20looks%20like%20they%20were%20able%20to%20get%20into%20the%20tool%2C%20but%20could%20not%20perform%20any%20actions.%20Preventing%20this%20user%20from%20Send%20and%20Receive%20operations%20seems%20logical%2C%20but%20I%20was%20hoping%20that%20they%20would%20be%20able%20to%20Peek%20messages.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIt%20would%20be%20nice%20if%20this%20feature%20honored%20the%20role-based%20access%20controls%20to%20determine%2C%20based%20on%20user%2C%20whether%20to%20allow%26nbsp%3B%3CSTRONG%3ESend%3C%2FSTRONG%3E%2C%26nbsp%3B%3CSTRONG%3EReceive%3C%2FSTRONG%3E%2C%20and%26nbsp%3B%3CSTRONG%3EPeek%3C%2FSTRONG%3E.%20I%20would%20expect%20Peek%20to%20be%20more%20broadly%20available%20than%20Send%20and%20Receive.%20The%20concern%20I%20have%20with%20the%20OSS%26nbsp%3B%20tool%20and%20that%20this%20feature%20seems%20to%20share%20is%20that%20it%20requires%20the%20RootManageSharedAccessKey%2C%20which%20sort%20of%20give%20the%20keys%20to%20the%20kingdom%20to%20any%20user%20that%20has%20it.%20I'd%20like%20to%20be%20able%20to%20give%20users%20the%20ability%20to%20view%2Fmonitor%2Ftroubleshoot%20(Peek%20seems%20handy%20for%20this)%20without%20the%20ability%20to%20change%20either%20messages%20or%20resources.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1297254%22%20slang%3D%22en-US%22%3EAnnouncing%20Service%20Bus%20Explorer%20preview%20on%20Azure%20Portal!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1297254%22%20slang%3D%22en-US%22%3E%3CP%3EToday%2C%20we're%20please%20to%20announce%20the%20preview%20of%20the%20%3CSTRONG%3EService%20Bus%20Explorer%20%3C%2FSTRONG%3Etool%20on%20the%20Azure%20Portal.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAzure%20Service%20Bus%3C%2FSTRONG%3E%2C%20like%20most%20other%20PaaS%20offerings%2C%20has%202%20sets%20of%20operations%20that%20can%20be%20performed%20against%20it.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EManagement%20operations%3C%2FSTRONG%3E%20like%20CRUD%20(Create%2C%20Read%2C%20Update%20and%20Delete)%20on%20Service%20Bus%20namespaces%2C%20Queues%2C%20Topics%2C%20Subscriptions%20and%20Filters.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EData%20Operations%3C%2FSTRONG%3E%20like%20Send%2C%20Receive%20and%20Peek%20on%20Queues%2C%20Topics%20and%20Subscriptions.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhile%20management%20operations%20have%20always%20been%20available%20via%20the%20portal%2C%20our%20customers%20have%20leveraged%20tools%20such%20as%20the%20community%20managed%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fpaolosalvatori%2FServiceBusExplorer%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EService%20Bus%20Explorer%20OSS%20tool%3C%2FA%3E%26nbsp%3Bfor%20the%20data%20operations.%20In%20a%20quest%20to%20reduce%20the%20dependence%20on%20different%20tools%20our%20customers%20need%20to%20use%20to%20provision%2C%20manage%20and%20test%20the%20Service%20Bus%20namespace%2C%20we%20have%20built%20support%20for%20the%20data%20operations%20functionality%20right%20into%20the%20portal.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20access%20this%20tool%2C%20select%20the%20namespace%20and%20the%20specific%20Queue%20or%20Topic%20within%20that%20namespace%20you%20would%20like%20to%20send%20and%20receive%20messages%20from.%20Once%20there%2C%20select%20the%20%22Service%20Bus%20Explorer%20(preview)%22%20from%20the%20left%20menu%20navigation%20pane.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22leftnavmenu-selected.PNG%22%20style%3D%22width%3A%20345px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F183530i0F441331535A0384%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22leftnavmenu-selected.PNG%22%20alt%3D%22leftnavmenu-selected.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20currently%20support%20the%20below%20operations%20-%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EQueues%3CUL%3E%0A%3CLI%3E'Send'%20to%20a%20Queue%3C%2FLI%3E%0A%3CLI%3E'Receive'%20from%20a%20Queue.%20This%20is%20a%20destructive%20receive%20(aka%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fservice-bus-messaging%2Fservice-bus-performance-improvements%3Ftabs%3Dnet-standard-sdk%23receive-mode%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EReceiveAndDelete%3C%2FA%3E%20mode)%3C%2FLI%3E%0A%3CLI%3E'Peek'%20from%20a%20Queue.%20Up%20to%2032%20messages%20can%20be%20peeked%20at%20a%20time.%3C%2FLI%3E%0A%3CLI%3E'Receive'%20from%20DeadLetterQueue.%20You%20can%20also%20receive%20from%20the%20deadletter%20sub-queue%20of%20the%20queue.%3C%2FLI%3E%0A%3CLI%3E'Peek'%20from%20the%20DeadLetterQueue.%20You%20can%20also%20peek%20from%20the%20deadletter%20sub-queue%20of%20the%20queue.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3ETopics%3CUL%3E%0A%3CLI%3E'Send'%20to%20a%20Topic.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3ESubscriptions%3CUL%3E%0A%3CLI%3E'Peek'%20from%20a%20Subscriptions%20on%20a%20Topic.%20You%20can%20peek%20up%20to%2032%20messages%20at%20a%20time.%3C%2FLI%3E%0A%3CLI%3E'Receive'%20from%20a%20Subscription.%20This%20is%20a%20destructive%20receive%20(just%20like%20in%20Queues).%3C%2FLI%3E%0A%3CLI%3E'Peek'%20from%20the%20DeadLetter%20Subscription.%20You%20can%20also%20peek%20messages%20from%20the%20deadletter%20sub-entity%20of%20the%20subscription.%3C%2FLI%3E%0A%3CLI%3E'Receive'%20from%20the%20DeadLetter%20Subscription.%20You%20can%20also%20receive%20messages%20from%20the%20deadletter%20sub-entity%20of%20the%20subscription.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20learn%20more%20about%20the%20Service%20Bus%20Explorer%20tool%2C%20please%20refer%20to%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fservice-bus-messaging%2Fexplorer%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1297254%22%20slang%3D%22en-US%22%3E%3CP%3ESend%2C%20Receive%20and%20Peek%20from%20Queues%2C%20Topics%20and%20Subscriptions%20-%20now%20from%20the%20Azure%20Portal%20itself!%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1297254%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3Eazure%20service%20bus%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1566329%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Service%20Bus%20Explorer%20preview%20on%20Azure%20Portal!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1566329%22%20slang%3D%22en-US%22%3E%3CP%3EI%20can't%20peek%20a%20message%20on%20a%20session-enabled%20queue.%20Is%20this%20unsupported%20in%20the%20preview%3F%20Wouldn't%20the%20U.I.%20require%20specifying%20a%20session%20id%20to%20peek%20at%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Today, we're please to announce the preview of the Service Bus Explorer tool on the Azure Portal.

 

Azure Service Bus, like most other PaaS offerings, has 2 sets of operations that can be performed against it.

  • Management operations like CRUD (Create, Read, Update and Delete) on Service Bus namespaces, Queues, Topics, Subscriptions and Filters.
  • Data Operations like Send, Receive and Peek on Queues, Topics and Subscriptions.

 

While management operations have always been available via the portal, our customers have leveraged tools such as the community managed Service Bus Explorer OSS tool for the data operations. In a quest to reduce the dependence on different tools our customers need to use to provision, manage and test the Service Bus namespace, we have built support for the data operations functionality right into the portal.

 

To access this tool, select the namespace and the specific Queue or Topic within that namespace you would like to send and receive messages from. Once there, select the "Service Bus Explorer (preview)" from the left menu navigation pane.

 

leftnavmenu-selected.PNG

 

We currently support the below operations - 

 

  • Queues
    • 'Send' to a Queue
    • 'Receive' from a Queue. This is a destructive receive (aka ReceiveAndDelete mode)
    • 'Peek' from a Queue. Up to 32 messages can be peeked at a time.
    • 'Receive' from DeadLetterQueue. You can also receive from the deadletter sub-queue of the queue.
    • 'Peek' from the DeadLetterQueue. You can also peek from the deadletter sub-queue of the queue.
  • Topics
    • 'Send' to a Topic.
  • Subscriptions
    • 'Peek' from a Subscriptions on a Topic. You can peek up to 32 messages at a time.
    • 'Receive' from a Subscription. This is a destructive receive (just like in Queues).
    • 'Peek' from the DeadLetter Subscription. You can also peek messages from the deadletter sub-entity of the subscription.
    • 'Receive' from the DeadLetter Subscription. You can also receive messages from the deadletter sub-entity of the subscription.

 

To learn more about the Service Bus Explorer tool, please refer to the documentation.

 

2 Comments
Occasional Visitor

I didn't find any information about how security roles affect use of Service Bus Explorer, but when I tested it with a user that has the general "Reader" role it looks like they were able to get into the tool, but could not perform any actions. Preventing this user from Send and Receive operations seems logical, but I was hoping that they would be able to Peek messages.

 

It would be nice if this feature honored the role-based access controls to determine, based on user, whether to allow SendReceive, and Peek. I would expect Peek to be more broadly available than Send and Receive. The concern I have with the OSS  tool and that this feature seems to share is that it requires the RootManageSharedAccessKey, which sort of give the keys to the kingdom to any user that has it. I'd like to be able to give users the ability to view/monitor/troubleshoot (Peek seems handy for this) without the ability to change either messages or resources.

 

Thanks!

Occasional Visitor

I can't peek a message on a session-enabled queue. Is this unsupported in the preview? Wouldn't the U.I. require specifying a session id to peek at?