An Azure real-time data ingestion service.
Event Hubs and Azure Monitor diagnostics are documented as independent destinations that receive the same diagnostic categories (for example, StorageRead/StorageWrite/StorageDelete), but the provided context does not describe any Azure-side behavior where:
- A subset of Azure Files diagnostic events is intentionally written only to the archive (Storage) destination and not to Event Hubs, or
- Specific operations (CreateDirectory, CreateFile, PutRange, GetFile, DeleteFile, DeleteDirectory) or specific file shares/paths are selectively excluded from the Event Hub stream while still being written to the archive.
The context does describe how Event Hubs consumers work and how gaps can arise on the consumer side due to offsets and checkpointing:
- Event Hubs uses a pull model; consumers request events from partitions.
- Each consumer group has its own independent view of the stream and tracks its own position via offsets.
- Checkpointing is explicitly the responsibility of the consumer. The service exposes offsets, but the consumer must persist them.
- If checkpointing is incorrect or inconsistent (for example, custom database-backed checkpoints), a consumer can:
- Skip events (by checkpointing an offset ahead of what was fully processed),
- Re-read events (if checkpointing lags behind), or
- Show apparent gaps if multiple instances compete for partition ownership or if offsets are mismanaged.
From the documented behavior:
- A consumer group’s view is entirely determined by its stored offsets and checkpointing logic. If the archive destination shows all 10 events but the consumer group only sees one, the documented mechanism that can cause such a selective gap is consumer-side offset/checkpoint handling, not a documented Azure-side filter on diagnostics.
- The guidance for checkpointing emphasizes that when using a checkpoint store (for example, Azure Blob Storage), each consumer group should have its own container and that checkpointing is critical for correct resumption and failover. Custom checkpoint implementations must provide equivalent correctness guarantees.
Regarding verification and validation:
- The context states that Event Hubs diagnostic logs (Archive Logs, Operational Logs, Runtime Audit Logs, Application Metric Logs) are written into Azure Monitor Logs tables and can be queried with Log Analytics. These logs capture information about Event Hubs operations and can be used to validate that Event Hubs is emitting diagnostic information, but the context does not provide a specific method to correlate individual Azure Files diagnostic records with their corresponding Event Hub messages.
- The Event Hubs monitoring reference notes that all logs are stored as JSON and can be queried, but it does not describe a built-in mechanism to prove that a particular Azure Files diagnostic record was or was not published to a specific Event Hub partition.
Given the available documentation in the context, the only clearly described mechanisms that can explain selective gaps between what exists in the archive and what is visible to a consumer group are related to Event Hubs consumer behavior: offsets, checkpointing, and consumer group state. No Azure-side feature or filter is documented here that would selectively drop or exclude specific Azure Files diagnostic events from the Event Hub destination while still writing them to the archive.
References: