74 votes3 comments · Azure Kubernetes Service (AKS) » Support for Kubernetes features · Flag idea as inappropriate… · Admin →
An error occurred while saving the commentGaurav commented
Great news – static IP range for Azure Integration Runtime is now available in all ADF regions! You can whitelist specific IP ranges for ADF as part of firewall rules. The IPs are documented here: https://docs.microsoft.com/en-us/azure/data-factory/azure-integration-runtime-ip-addresses#azure-integration-runtime-ip-addresses-specific-regions. Static IP ranges for gov cloud and China cloud will be published soon!
Please refer to this blog post on how you can use various mechanisms including trusted Azure service and static IP to secure data access through ADF:
Service tag support will be made available in next few weeks. Please stay tuned!
If your network security requirement calls for ADF support for VNet and cannot be met using Trusted Azure service (released in Oct 2019), static IP range (released in Jan 2020), or service tag (upcoming), please vote for VNet feature here: https://feedback.azure.com/forums/270578-data-factory/suggestions/37105363-data-factory-should-be-able-to-use-vnet-without-re
Thank you for your feedback. We’re considering this for a future release of Azure Search.
Azure Search Product Team
Thank you for all the feedback folks. This is on our radar and we will consider this in a future release. We will reach back out when it is on the roadmap and can share when we have an update. Please vote for this feature and comment on your scenario below.
56 votesunplanned · AdminAzure Stream Analytics Team on UserVoice (Product Manager, Microsoft Azure) responded
At this time, we are not planning to add a direct connection to Elastic Search. However, as a workaround, you can output data to blob storage or SQL tables, and index them with Elastic Search. More information here: https://docs.microsoft.com/en-us/azure/search/search-semi-structured-data
Please let the feedback keep coming. We are listening!
Rest assured we still have this request in mind and are continually reviewing it. Please keep your feedback coming!
Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature list and also gives us insight into the potential impact of implementing the suggested feature
Thanks for the feedback, we are exploring options to cover this scenario, Application Security Groups it’s a good start
https://docs.microsoft.com/en-us/azure/virtual-network/create-network-security-group-previewGaurav shared this idea ·
285 votesplanned · AdminAzure IaaS Engineering Team (Azure IaaS Engineering Team, Microsoft, Microsoft Azure) responded
We are planning several improvements in this space that will enable better control over updates which are applied to VMs.
We have made some great progress on this idea and most of our services today do support move resources across groups.
We are still working towards 100% support and while we do that it would be great if you can help us prioritize the missing services.
Please file individual asks on each service category present in uservoice and vote for it.
Azure Portal Team
Thank you for this suggestion! It has been escalated to the Windows Azure engineering team for further evaluation. We will post here to gather additional information as-appropriate.
For the notification related events, we can only report if the message was successfully sent to the respective provider’s PNS. The actual delivery of the message is handled by the PNS and we don’t have any direct visibility in this. Where we can add some hooks are instances where maybe the registration expires etc. Let me know if there are any other places you will find this useful.