Partager via


ApplicationGroup Class

The Application Group object.

Variables are only populated by the server, and will be ignored when sending a request.

Inheritance
azure.mgmt.eventhub.v2022_01_01_preview.models._models_py3.ProxyResource
ApplicationGroup

Constructor

ApplicationGroup(*, is_enabled: bool | None = None, client_app_group_identifier: str | None = None, policies: List[_models.ApplicationGroupPolicy] | None = None, **kwargs: Any)

Keyword-Only Parameters

Name Description
is_enabled

Determines if Application Group is allowed to create connection with namespace or not. Once the isEnabled is set to false, all the existing connections of application group gets dropped and no new connections will be allowed.

client_app_group_identifier
str

The Unique identifier for application group.Supports SAS(SASKeyName=KeyName) or AAD(AADAppID=Guid).

policies

List of group policies that define the behavior of application group. The policies can support resource governance scenarios such as limiting ingress or egress traffic.

Variables

Name Description
id
str

Fully qualified resource ID for the resource. Ex - /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}. # pylint: disable=line-too-long

name
str

The name of the resource.

type
str

The type of the resource. E.g. "Microsoft.EventHub/Namespaces" or "Microsoft.EventHub/Namespaces/EventHubs".

location
str

The geo-location where the resource lives.

system_data

The system meta data relating to this resource.

is_enabled

Determines if Application Group is allowed to create connection with namespace or not. Once the isEnabled is set to false, all the existing connections of application group gets dropped and no new connections will be allowed.

client_app_group_identifier
str

The Unique identifier for application group.Supports SAS(SASKeyName=KeyName) or AAD(AADAppID=Guid).

policies

List of group policies that define the behavior of application group. The policies can support resource governance scenarios such as limiting ingress or egress traffic.