Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature list and also gives us insight into the potential impact of implementing the suggested feature
193 votesstarted · 6 comments · Networking » Azure Front Door Service · Flag idea as inappropriate… · Admin →
Echo what Dennis has already said, having ability to add/re-write custom headers will make AFD much more attractive for scenarios where you can host content in storage and want to ensure security headers are applied.
43 votestriaged · 4 comments · Networking » Azure Front Door Service · Flag idea as inappropriate… · Admin →
I'd like header rewrite features similar to App Gateway v2 so I can add security headers like CSP etc to static hosting in storage
valid suggestion subject to upvote
230 votesstarted · 15 comments · Networking » Azure Front Door Service · Flag idea as inappropriate… · Admin →
There was some confusion about this feature due to the documentation for it and UX originally released had a bug.
The IP Restrictions feature works as an ALLOW list, rather than a DENY list as originally stated.
The ask here is still valid, there are other services in azure (like SQL) that have UI to explicitly allow other azure services to reach the database. While this is convenient for development scenarios, it’s not a good idea for securing the resource.
We’ll keep an eye on this request and see if it gathers more up-votes.
Same issue really with Azure DevOps agents not being able to view the site during a deployment so UI tests fail.
Would be great to either give the same option as azure sql does or allow importing of ip restrictions in a more workable manner. File upload (ideally in same format as we can get for IP ranges for Azure)
Thank you for your feedback. Enabling multiple custom domains for a single storage account is planned for the coming year. We will provide updates when they become available. For any further questions, or to discuss your specific scenario, send us an email at email@example.com.
208 votes10 comments · Azure Kubernetes Service (AKS) » Integration with Azure services · Flag idea as inappropriate… · Admin →
Still no news to share, just to add that we are investigating options on modifications for the App Service multi-tenant offering with enhanced capabilities.
Thank you for all the votes and feedback. We have started work on this and the capability will be supported soon. If you would like to get in touch with us to discuss your scenarios, please fill this form: https://aka.ms/ApplicationGatewayCohort
We have started work on the Vnet integration for Linux sites. The feature is currently in preview.
I will update this status as the engineering team progresses.
I didn't see any announcement at Ignite? Or am I missing something
21 votes1 comment · Azure Kubernetes Service (AKS) » Integration with Azure services · Flag idea as inappropriate… · Admin →
We plan to add the auto-start to the regular Compute blade at some point. However, if you create the VMs in a Lab, the auto-start is already available.
Also, we do de-allocate.
Thanks for the input!
Engineering has begun work on this.
Beyond redundancy I work with clients who run SaaS solutions deployed to IaaS across regions for different customers and being able to "domain join" their VMs to their AAD would be fantastic. Currently the option of running VPN gateways back to a VNET to enable this isn't an option
Hey folks, sorry for the late update. Some backend changes were made to alleviate this issue but I believe it doesn’t solve it for everyone yet. Let me go get some details and come back with a better update. Thanks!
Looking forward to an update soon, thoroughly bored of the incognito window dance whenever I want to access different subscriptions
Thank you for the feedback. We will look into this.