Tomasz K

My feedback

  1. 495 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    28 comments  ·  SQL Database  ·  Flag idea as inappropriate…  ·  Admin →
    Tomasz K supported this idea  · 
    Tomasz K commented  · 

    Managed instances in preview (as per https://docs.microsoft.com/en-us/azure/sql-database/sql-database-managed-instance-transact-sql-information ) " GETDATE() and other built-in date/time functions always returns time in UTC time zone. See GETDATE". This will be available in GA?

  2. 56 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Azure Search » Crawlers  ·  Flag idea as inappropriate…  ·  Admin →
    Tomasz K supported this idea  · 
  3. 707 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Service Bus  ·  Flag idea as inappropriate…  ·  Admin →
    Tomasz K supported this idea  · 
  4. 21 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure mobile app  ·  Flag idea as inappropriate…  ·  Admin →

    We can add support for deleting resources, if that’s important. Confirming via a secret would require additional work from the ARM team to support that flow. Fingerprint confirmation is easy enough, since that’d just be an added confirmation. Deleting locked resources is also do-able with an extra confirmation.

    Tomasz K supported this idea  · 
  5. 148 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Hi folks! I apologies for the delay in response and I deeply appreciate your feedback. I understand how important this feature is for your and your users. We do not yet have plans to implement this feature, but please keep voting if this is important to you to help us prioritize appropriately.

    Tomasz K supported this idea  · 
  6. 3,848 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    130 comments  ·  Azure Cosmos DB  ·  Flag idea as inappropriate…  ·  Admin →

    Reopening this user voice item as our support for Skip/Take (Offset/Limit) was only limited to single partition queries.

    Update.

    The newly released .NET SDK v3 now includes support for x-partition queries using Offset/Limit. You can learn more about v3 SDK and try it and provide feedback on our github repo here.
    github.com/azure/azure-cosmos-dotnet-v3

    We will also be back-porting this functionality to our .NET v2 SDK. This work will begin shortly and we anticipate it to be released in September.

    Once that is released we will mark this feature as complete.

    Thank you for your patience and votes.

    Tomasz K supported this idea  · 
  7. 3,141 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    124 comments  ·  Storage » Files  ·  Flag idea as inappropriate…  ·  Admin →

    Hi everyone,

    We recently announce the General Availability of Azure Active Directory Domain Services (Azure AD DS) authentication for Azure Files! By enabling integration with Azure AD DS, you can mount your Azure file share over SMB using Azure AD credentials from Azure AD DS domain joined Windows VMs with NTFS ACLs enforced. For more details, please refer to our blog post:http://aka.ms/azure-file-aadds-authentication-ga-blog.

    A part of the GA announcement, we shared the upcoming plan to extend the authentication support to Active Directory (AD) either hosted on-premises or in cloud. If you need an Azure Files solution with AD authentication today, you can consider installing Azure File Sync (AFS) on your Windows File Servers where AD integration is fully supported.

    If you are interested to hear future updates on Azure Files Active Directory Authentication, please complete this sign-up survey:https://aka.ms/AzureFilesADAuthPreviewSurvey.

    Thanks,
    Azure Files Team

    Tomasz K supported this idea  · 
  8. 1,062 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  16 comments  ·  Service Fabric  ·  Flag idea as inappropriate…  ·  Admin →
    Tomasz K supported this idea  · 
  9. 385 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  2 comments  ·  Service Fabric  ·  Flag idea as inappropriate…  ·  Admin →
    Tomasz K supported this idea  · 
  10. 224 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    5 comments  ·  Web Apps » API Apps  ·  Flag idea as inappropriate…  ·  Admin →
    Tomasz K supported this idea  · 
  11. 1,113 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    74 comments  ·  Azure portal » Resource management  ·  Flag idea as inappropriate…  ·  Admin →

    Hey Folks,

    We have made some great progress on this idea and most of our services today do support move resources across groups.

    We are still working towards 100% support and while we do that it would be great if you can help us prioritize the missing services.

    Please file individual asks on each service category present in uservoice and vote for it.

    Thanks,
    Azure Portal Team

    Tomasz K supported this idea  · 
  12. 235 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    22 comments  ·  Azure portal » Resource management  ·  Flag idea as inappropriate…  ·  Admin →
    Tomasz K supported this idea  · 
  13. 1,170 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    36 comments  ·  Cloud Services (Web and Worker Role)  ·  Flag idea as inappropriate…  ·  Admin →
    Tomasz K supported this idea  · 
  14. 2,849 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    173 comments  ·  Signup and Billing  ·  Flag idea as inappropriate…  ·  Admin →

    Quick update,

    We have been considering all of the risks and investigating the steps required to ensure we implement this feature with high positive impact and low to no negative impact.

    After this investigation we have decided we will enable Pay-As-You-Go customers the option to configure a spending limit on a Pay-As-You-Go subscription, with appropriate safeguards and measures to prevent both service abuse and production service failure.

    We have not yet finished determining the details of what this feature will look like, nor do we have a timeline for release, but we have heard your voices and have added this feature to our backlog.

    Thanks for your continued feedback,

    -Adam (Azure Billing Team)

    Tomasz K supported this idea  · 

Feedback and Knowledge Base