Thank you for taking the time to vote for this item.
We are proposing to address this by increasing the limit to 1600 and purging using first in first out.
53 votes13 comments · Azure Active Directory » Role-based Access Control · Flag idea as inappropriate… · Admin →
Just wanted to leave a quick update, we’re continuing to work on this feature and will share details in the near future.
/Stuart and Balaji
Agreed this is needed!
Duplicate of: https://feedback.azure.com/forums/911473-azure-management-groups/suggestions/34391878-allow-custom-rbac-definitions-at-the-management-gr
I apologize about the delay but Custom RBAC Support is now available in Production. You are able to to create role definitions at the MG scope and assign them to inherited MGs and Subs.
There is a bug that is in the portal where the new custom role is not showing when you are trying to do a role assignment on an inherited child MG/Sub. This should be resolved soon and PowerShell, CLI, and API are all working. I will not do any announcements yet on the availability of the feature until the portal bug is fixed. Once that is fixed we will do blog announcements and I will mark the feature complete here.
Is this feature still on track? Currently implementing MG, and we are missing custom roles support as well.
28 votesplanned · 0 comments · Azure Monitor-Log Analytics » Extensibility / Partner scenarios · Flag idea as inappropriate… · Admin →
I agree this would make this feature much more powerful. It should trigger on any alert and allow us to decide what happens with it in the Playbook. You could abviously achieve a similar result using an Azure Monitor Alert that triggers on Activity Log "Activate" events (per subscription) and run a LogicApp from an Action group, but it would make more sense to have this integrated in ASC.
We are working on this but we don’t have a public ETA to share at this time. We will keep you updated as we get closer.
Any update on this? Having no login information is especially problematic for SPN logins since no conditional access can be applied to them.
17 votes1 comment · Azure Monitor-Log Analytics » Log Management and Log Collection Policy · Flag idea as inappropriate… · Admin →
We plan to add Resource ID data to all records in the system.
Thanks, good to know. Is an estimated timeline available for this change (Weeks, months)?JH shared this idea ·
Thanks for the feedback! We will look at making these modifications to starting a runbook job.
Agreed, very much needed additions!
250 votesplanned · AdminAzure IaaS Engineering Team (Azure IaaS Engineering Team, Microsoft, Microsoft Azure) responded
We are planning several improvements in this space that will enable better control over updates which are applied to VMs.
At this point our recommendation is to move resources into a new Resource Group with the new name.
I agree, outbound internet access should not be a requirement for VM Extensions in general.
It would also help if we could run a simple Post CMD during deployment (similar to CMDLINES.TXT in the old days), for example to setup connectivity (e.g. Proxy)
Please also cross-file this item for the Backup service team, as they triage from here http://feedback.azure.com/forums/258995-azure-backup-and-scdpm
1 vote1 comment · Azure Monitor-Log Analytics » Solutions / Packs Gallery and new IP ideas · Flag idea as inappropriate… · Admin →
Thanks for the feedback.
We can definitely do this
72 votes1 comment · Azure Monitor-Log Analytics » Log Management and Log Collection Policy · Flag idea as inappropriate… · Admin →
Thanks for the suggestion. We’re looking to add more support for Azure services and this will help us prioritize.