Storage

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Make the $logs container read only

    We need to be sure that all audit logs are there and can not be modified/deleted. Now it is possible to delete audit log files from the $logs folder.

    18 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  General  ·  Flag idea as inappropriate…  ·  Admin →
  2. SFTP (and FTPS) protocol support for Azure Files

    Exposing the SFTP protocol would facilitate a bunch of scenarios where today 2 VMs (with all the management overhead that implies) are required.

    4,611 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    183 comments  ·  Files  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the feedback! We are interested in collecting feedback on this request – please vote for it if this is something you like to see.

    We’re also interested in learning more what people want to use the SFTP/FTPS for and which protocol they prefer. Please feel free to leave us a comment letting us know more detail!

    Thanks,

    Will Gries
    Program Manager, Azure Files

  3. Provide retention policies for Azure File Sync Snapshots

    Provide retention policies for AFS snapshots.
    Retention policies define the time period/interval and define the total amount of snapshots retained.
    These amount of (retained) snapshots should be categorized in Hourly (h:00), Daily (0:00), Weekly (Sunday), Monthly (1st day of month) and are part of the retention policies.
    Garbage collection takes care of removing expired snapshots.

    57 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Files  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the feedback! Azure File Sync automatically takes share snapshots and file snapshots for internal use. We also have our own logic about when to remove these snapshots. We’re interested to know what you think about this – please vote for this item and comment below if you think we need better/different controls/reporting for this.

    If what you actually want is the ability to do snapshots and have retention policies for snapshots for the purpose of Backup, please vote on this item: https://feedback.azure.com/forums/217298-storage/suggestions/31827694-schedule-snapshots-of-azure-file-shares

    Thanks,

    Will Gries
    Program Manager, Azure Files

  4. CORS Rule

    Currently we are able to enable CORS with exact domain(ex: http://www.abc.com) or all origin ("*"). can you provide feature for supporting all sub domains say http://*.abc.com so that CORS will enabled for all sub domains of abc.com and restricted for all other domains.

    9 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Blobs  ·  Flag idea as inappropriate…  ·  Admin →
  5. Azure File Sync: allow turning off ACL sync

    Given untrusted servers within a sync group, want to sync file contents but not sync ACL's. ACL's will be set on servers independently of Sync.

    9 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Files  ·  Flag idea as inappropriate…  ·  Admin →
  6. Make blob storage publisher publish snapshot events for Event Grid

    Currently the blob storage publisher can publish BlobCreated and BlobDeleted when an object is created/update and deleted respectively. However no events are published when a blob is snapshotted.

    6 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Blobs  ·  Flag idea as inappropriate…  ·  Admin →
  7. Add Azure File sync compatibility with Windows Server 2012

    Please add Azure File sync compatibility with Windows Server 2012

    Till today there are only agents for Windows Server 2012 R2 and 2016.

    Windows Server 2012 supports SMB 3.0, WMF 5.1 (and Powershell AzureRM 4.3.1) as listed System Requirements.

    So maybe it should work? Thanks a lot

    62 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Files  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the feedback! Although 2012 and 2012 R2 are quite similar from a user perspective, we don’t believe that it’s a completely trivial port to get Azure File Sync running on Windows Server 2012.

    We are however very open to bringing this to 2012, so please help us prioritize this work based on your continued votes!

    Thanks,

    Will Gries
    Program Manager, Azure Files

  8. We would like to audit/log delete operations on Azure blob storage containers. Currently we can only do this at a Storage Account layer.

    We are simply looking for more granularity with our storage logging in Azure. If someone were to view/delete our blob containers, we would like to see these operations logged and have the ability to alert on them.

    22 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Blobs  ·  Flag idea as inappropriate…  ·  Admin →
  9. Support multiple storage accounts in Azure Storage Emulator

    The Azure Storage Emulator only supports a single fixed account (devstoreaccount1).

    This makes integration testing and development on the same machine a pain, as we would like to be able to clear the integration testing account entirely before and after each test sequence, without removing development data.

    The connection string to the new account could use the extended syntax (see https://docs.microsoft.com/en-us/azure/storage/common/storage-use-emulator#authenticating-requests-against-the-storage-emulator - not "UseDevelopmentStorage=true"), with the same account key but a different account name, and if need be, different ports for blob/table/queue endpoints.

    97 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Storage Emulator  ·  Flag idea as inappropriate…  ·  Admin →

    Thank you for your feedback. Providing this functionality is on our backlog but there is no ETA we can share at this time. We have logged this request in the GitHub repository for the new open source storage emulator, Azurite. Please continue the discussion there: https://github.com/Azure/Azurite/issues/40. We will provide updates when they become available on this ask as well as in the GitHub repository. For any further questions, or to discuss your specific scenario, send us an email at azurestoragefeedback@microsoft.com.

  10. Enhance Azure Files / Azure File Sync to include document icons

    In Azure Files (specifically with Azure File Sync), it would enhance the user experience if the document icons would show what we're used to on a File Server vs the generic icons.

    63 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Files  ·  Flag idea as inappropriate…  ·  Admin →
  11. Manage SAS Token by Name and Include in Audit Logs

    Give SAS tokens a name when generating then:
    - allow report/table of all generated token
    - allow revoke of exisiting token (or modification of access)
    - use the SAS token name in storage audit logs

    At the moment, the storage access logs do not show any useful information about who has made access, and this is critical to a practical audit function.

    28 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  General  ·  Flag idea as inappropriate…  ·  Admin →

    Thank you for your feedback. Currently you can use a stored access policy to manage revocation of an existing token. You are also able to track requests made using an existing stored access policy in the storage account logs. See https://docs.microsoft.com/en-us/azure/storage/common/storage-dotnet-shared-access-signature-part-1#controlling-a-sas-with-a-stored-access-policy for more details. For any further questions, or to discuss your specific scenario, send us an email at azurestoragefeedback@microsoft.com.

  12. Support mounting Azure file shares in FreeBSD

    Support mounting an Azure file share in FreeBSD. Currently FreeBSD is unable to mount Azure file shares.

    12 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Files  ·  Flag idea as inappropriate…  ·  Admin →

    Thank you for your feedback! In this case, the reason why an Azure file share cannot be mounted on FreeBSD is because of the SMB support provided in the OS distribution rather than a limitation we have on the Azure Files service side. That said, we have contributed to Linux to support SMB 3.0 with encryption in the past, so we would like to investigate how to make Azure Files work on FreeBSD as well.

    To help us prioritize this ask, please continue to vote for this item.

    Thanks,

    Will Gries
    Program Manager, Azure Files

  13. Server side delete, rename of virtual folder

    Currently if I have millions of documents inside a virtual folder, there is not way to delete them without actually iterating through everything, which is extremely time consuming (weeks to process deletions)

    For example, if you have multiple containers, which in turn have multiple virtual folders with millions of blobs, moving, renaming or deleting the "folder" is impossible without some painfully slow iterating through everything.

    thanks!

    15 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Blobs  ·  Flag idea as inappropriate…  ·  Admin →
  14. Automatically mount an Azure file share to a Windows clients using GPO

    Momently its not possible to map a azure file storage share via GPO, because the two fields for username and password are greyed out.

    205 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    5 comments  ·  Files  ·  Flag idea as inappropriate…  ·  Admin →
  15. Azure Storage - Delete Blob with Snap Shot Fails - Error 409 Conflict

    We were creating a snapshot each time we updated a blob to preserve the version of the blob. However when we tried to delete the blob we received Error 409 Conflict (error msg did not tell us why). When we changed the delete statement from await blockBlob.DeleteIfExistsAsync() to await blockBlob.DeleteIfExistsAsync(DeleteSnapshotsOption.IncludeSnapshots, null, null, null) the delete worked. Apparently having snapshots associated to a blob causes a delete conflict. Makes sense but can we have a more descriptive error message? Thanks!

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  0 comments  ·  Blobs  ·  Flag idea as inappropriate…  ·  Admin →
  16. Physical Import/Export Locations

    Physical Import/Export Locations (perhaps Microsoft Retail Stores) where we can bring our drives to have data uploaded/downloaded from Azure, without the delay of shipping. If this also removed the per drive cost, we could also partition our data across more drives, improving performance further.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Import/Export  ·  Flag idea as inappropriate…  ·  Admin →
  17. Provide a way to encrypt or obfuscate blob names

    My application stores a lot of files containing user data, where each blob is named after a corresponding primary-key in a relational database.

    Currently my blob storage container is private and all requests for blobs are proxied through my web application.

    To reduce server load I would like to expose the blobs directly, however this would mean exposing the raw blob name to end-users, which gives away the unencrypted database primary-key value.

    I know I can prevent access to blobs using Shared Access Signatures however I don't need that kind of security - I just want to obfuscate blob names…

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Blobs  ·  Flag idea as inappropriate…  ·  Admin →
  18. Storage Explorer v0.8.12 breaks if HOMEDRIVE offline

    V0.8.12 update has broken Storage Explorer for me with an "Unknown Error" when starting. As the error refers to "P:/" I suspect it is something to do with the HOMEDRIVE environment variable that points to that drive. This is a network drive enforced upon my by group policy but which I never use. As I am currently engaged in trial Azure development I generally have to work offline from the corporate network due to proxy server and firewall restrictions we are not yet ready to lift.

    I am working with our internal support to try and get GP exceptions but…

    6 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Storage Explorer  ·  Flag idea as inappropriate…  ·  Admin →
  19. Remove or dramatically increase the max number of stored access policies per container, file share, table, or queue

    Today the maximum policy you can have is 5. This is way to low as we are using blob storage in a data sharing scenario between providers and consumers and we need to use policies to be able to revoke issued SAS tokens in this sharing scenario. 5 policies means that we can only control 5 SAS keys that can be revoked. We need a lot more.

    39 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  General  ·  Flag idea as inappropriate…  ·  Admin →
  20. Attach VHD(x) to more than one VM at the same time

    Attach VHD(x) to more than one VM at the same time

    Having an option to attach the same VHD to a set of VMs would allow creating real HA clusters for single node applications - like databases. Storage could work just like iSCSI/FC/SAS SAN, being presented to two nodes, mounted on one. Also that would allow usage of GFS/OCFS2 filesystems to share data between cluster nodes if desired. AzureFiles suffers from every problem SMB have and is unreliable at best. The only other option is shared-nothing filesystems like moosefs/glusterfs.

    as far as I know there is "Shared VHDX" functionality in…

    67 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Unmanaged Disks Storage  ·  Flag idea as inappropriate…  ·  Admin →
← Previous 1 3 4 5 6 7
  • Don't see your idea?

Feedback and Knowledge Base