Steve DiStefano
My feedback
-
23 votes
Steve DiStefano supported this idea ·
-
106 votes
We’ve started the Auto-Purge work, with this current design: https://github.com/AzureCR/specs/tree/master/auto-purge
Please provide feedback here: https://github.com/AzureCR/specs/issues/1
Steve DiStefano supported this idea ·
-
22 votes
Steve DiStefano supported this idea ·
-
30 votes
Steve DiStefano supported this idea ·
-
48 votesunder review · 3 comments · Azure Backup » Retention and Storage · Flag idea as inappropriate… · Admin →
Steve DiStefano supported this idea ·
-
265 votes
Steve DiStefano supported this idea ·
-
39 votes
Steve DiStefano commented
I see this working now. For a couple months actually. As long as you sign in with a credential of your AAD Tenant which has at least a reader role in at least one subscription. Nice job
Steve DiStefano supported this idea ·
-
18 votes
Steve DiStefano supported this idea ·
-
50 votes
Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature backlog and also gives us insight into the potential impact of implementing the suggested feature.
Steve DiStefano supported this idea ·
-
1,908 votes
We’ve moved this ask to the backlog due to technical challenges in reserving Public IP addresses during stop state.
Steve DiStefano supported this idea ·
-
50 votes
Thank you for taking the time to vote on this request. Work on this has commenced. We will email you once it is completed. Feel free to reach out if you have any additional feedback.
If you are interested in participating in the preview of this feature please email back.
Steve DiStefano supported this idea ·
-
36 votes
Steve DiStefano supported this idea ·
-
11 votes
Steve DiStefano supported this idea ·
-
180 votes
Steve DiStefano supported this idea ·
-
8 votes0 comments · Azure Kubernetes Service (AKS) » Support for Kubernetes features · Flag idea as inappropriate… · Admin →
Steve DiStefano supported this idea ·
-
281 votes
We’re looking at using information from the Windows Security Center to collect status from non-Microsoft antimalware products.
Steve DiStefano supported this idea ·
-
189 votes4 comments · Azure Kubernetes Service (AKS) » Support for Kubernetes features · Flag idea as inappropriate… · Admin →
Steve DiStefano supported this idea ·
-
149 votes
We are looking at ways to support this scenario where one active instance/one or more passive instances can be supported and flows are not impacted.
— ChristianSteve DiStefano supported this idea ·
-
190 votes
Not currently in plan. We are exploring other solutions for this scenario.
— Christian -
572 votes
We’re working on planning this feature.
— ChristianSteve DiStefano supported this idea ·
Does this not address the concern. If you are using an NVA then you must use UDR Routing. If using UDR Routing, here is an option.
You can disable the automatic route propagation from the VPN gateway. Create a routing table with the "Disable BGP route propagation" option, and associate the routing table to the subnets to prevent the route distribution to those subnets. For more information, see Virtual network routing table. ref: https://docs.microsoft.com/en-us/azure/virtual-network/manage-route-table