Adin Ermie

My feedback

  1. 744 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    105 comments  ·  Virtual Machines  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie supported this idea  · 
  2. 17 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Monitor » Webhook  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie supported this idea  · 
  3. 51 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    planned  ·  4 comments  ·  Azure Governance  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie supported this idea  · 
  4. 48 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Azure Monitor-Log Analytics » Extensibility  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie supported this idea  · 
  5. 58 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    unplanned  ·  5 comments  ·  Azure portal » Dashboards + tiles  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie supported this idea  · 
  6. 26 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Storage » Managed Disk Storage  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie supported this idea  · 
  7. 290 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    16 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie commented  · 

    I wrote a blog post detailing this scenario, which you can find here: https://adinermie.com/using-application-security-groups-asgs-with-vnet-peering-and-their-limitations/

    Adin Ermie shared this idea  · 
  8. 108 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    planned  ·  20 comments  ·  Azure Governance » Azure Policy  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie supported this idea  · 
  9. 77 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Site Recovery  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie commented  · 

    This sounds like something we can do through either a custom OMS Solution and/or Power BI dashboard.

  10. 120 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Site Recovery  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie supported this idea  · 
  11. 26 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    Adin Ermie supported this idea  · 
  12. 63 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Storage » Files  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie shared this idea  · 
  13. 439 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    42 comments  ·  Azure Backup » PaaS Backup  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie commented  · 

    Web Apps, Azure SQL, Azure Automation Runbooks/schedules, Azure Monitor custom created Alers

  14. 263 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    started  ·  11 comments  ·  Azure Backup » Reporting  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie supported this idea  · 
  15. 105 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    planned  ·  8 comments  ·  Lab Services  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie commented  · 

    Instead of restricting startup to "Every Monday at 7 AM ET", include more granularity like "The last Friday of every month".

    We're planning on using this to auto-start a testing lab, in which we need to perform monthly tests against new software versions (but only once a month).

    So it would be more efficient to configure the startup to occur on the last business day, etc. of the month; first thing in the morning so that the systems are up and running, ready for the testing for the day.

    Adin Ermie supported this idea  · 
  16. 191 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    unplanned  ·  15 comments  ·  Azure Backup  ·  Flag idea as inappropriate…  ·  Admin →
    Adin Ermie commented  · 

    This should have been supported from day 1.

  17. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Azure Monitor-Log Analytics » My Dashboard  ·  Flag idea as inappropriate…  ·  Admin →
  18. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Azure Monitor-Log Analytics  ·  Flag idea as inappropriate…  ·  Admin →
  19. 212 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    12 comments  ·  Site Recovery  ·  Flag idea as inappropriate…  ·  Admin →
    under review  ·  ruturajd responded

    We are working to understand the requirements of this feature and deliver it. If you have any scenarios or examples that might help us take a decision kindly give a detailed comment below.

    Adin Ermie supported this idea  · 
  20. 34 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)

    Currently, you can add your users fro the ‘settings’ page and invite either LiveID or AAD users/groups to access the workspace directly from https://preview.opinsights.azure.com/

    You can have direct agents and SCOM management groups that live in different subscriptions than the one the workspace is linked to. The only scenario that is limited at the moment is ingesting data from storage accounts (WAD data). We are investigating for how many this is important enough to allow cross-subscription reading of Storage accounts.

    Also read this other thread for an additional requirement we have heard in this area http://feedback.azure.com/forums/267889-azure-operational-insights/suggestions/6519233-improve-multitenancy-for-managed-services-provider#comments

← Previous 1

Feedback and Knowledge Base