Gonzalo Parra

My feedback

  1. 175 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    6 comments  ·  SQL Database  ·  Flag idea as inappropriate…  ·  Admin →
    Gonzalo Parra supported this idea  · 
  2. 43 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    Gonzalo Parra supported this idea  · 
  3. 43 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    34 comments  ·  SQL Managed Instance  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for bringing this up. We currently don’t have plans for MSDTC support yet.
    Can you please let us know more about your scenario and how much effort it would take to re-write your application, how big of a blocker it is?

    Implementing MSDTC support in cloud environment is not a trivial ask. We need to make sure that there is a demand for this and it has higher priority than other features.

    Gonzalo Parra supported this idea  · 
  4. 366 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    22 comments  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →

    We have raised the limit to 100 recently. We are regularly reviewing the limits and will continue to look for opportunities to raise the limits even further. If you have scenarios requiring limits higher than what is supported, please add your scenario details here (if you are comfortable with that) or raise an issue with Azure support and we will get back to you.

    Gonzalo Parra commented  · 

    We host 100's of sites and having such a low limit makes this service practically useless, the limit needs to be exponentially higher, in the 1000's for it to be really useful. Not sure if this would require a separate idea but allowing multiple host names (unlimited or very high limit) per listener would really help, wildcards solves the problem for some cases but not most.

    Also, if the problem is performance related, how come the limit is fixed and not size dependent? shouldn't the Large AG be able to handle a lot more than the Medium or Small?

  5. 780 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    30 comments  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →
  6. 131 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    6 comments  ·  Storage » AzCopy  ·  Flag idea as inappropriate…  ·  Admin →
    Gonzalo Parra supported this idea  · 
  7. 3,010 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    125 comments  ·  Storage » Files  ·  Flag idea as inappropriate…  ·  Admin →

    Hi everyone,

    We recently announce the General Availability of Azure Active Directory Domain Services (Azure AD DS) authentication for Azure Files! By enabling integration with Azure AD DS, you can mount your Azure file share over SMB using Azure AD credentials from Azure AD DS domain joined Windows VMs with NTFS ACLs enforced. For more details, please refer to our blog post:http://aka.ms/azure-file-aadds-authentication-ga-blog.

    A part of the GA announcement, we shared the upcoming plan to extend the authentication support to Active Directory (AD) either hosted on-premises or in cloud. If you need an Azure Files solution with AD authentication today, you can consider installing Azure File Sync (AFS) on your Windows File Servers where AD integration is fully supported.

    If you are interested to hear future updates on Azure Files Active Directory Authentication, please complete this sign-up survey:https://aka.ms/AzureFilesADAuthPreviewSurvey.

    Thanks,
    Azure Files Team

    Gonzalo Parra supported this idea  · 
  8. 229 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    16 comments  ·  Storage » General  ·  Flag idea as inappropriate…  ·  Admin →
    Gonzalo Parra commented  · 

    This is an important requirement so we can have control over the RTO, otherwise its a big question mark...

  9. 212 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    12 comments  ·  Site Recovery  ·  Flag idea as inappropriate…  ·  Admin →
    under review  ·  ruturajd responded

    We are working to understand the requirements of this feature and deliver it. If you have any scenarios or examples that might help us take a decision kindly give a detailed comment below.

    Gonzalo Parra supported this idea  · 
  10. 14 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Virtual Machines  ·  Flag idea as inappropriate…  ·  Admin →
    Gonzalo Parra supported this idea  · 
  11. 156 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    unplanned  ·  13 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    Gonzalo Parra supported this idea  · 
  12. 10 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  (General Feedback) » azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
    Gonzalo Parra commented  · 

    This would be really useful.

    We have to publish our static IPs for our customers to be able to allow access on their firewalls. Right now its all over the place and they need to add a bunch of IP addresses to their rules. It would be great if we could just reserve (and pay for) a range of contiguous public IPs to be allocated as we need among our services / VMs and only a single range of IPs to our customers...

    Gonzalo Parra supported this idea  · 
  13. 77 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Networking » VPN Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    Gonzalo Parra supported this idea  · 
  14. 940 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    48 comments  ·  Networking » DNS  ·  Flag idea as inappropriate…  ·  Admin →
    Gonzalo Parra commented  · 

    Agree with this, allowing zone transfers so Azure DNS can be used as secondary DNS service for split brain DNS configurations would be really useful.

    Gonzalo Parra supported this idea  · 
  15. 97 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    8 comments  ·  Signup and Billing  ·  Flag idea as inappropriate…  ·  Admin →
    Gonzalo Parra supported this idea  · 
  16. 132 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    8 comments  ·  Signup and Billing  ·  Flag idea as inappropriate…  ·  Admin →
    Gonzalo Parra supported this idea  · 
  17. 1,905 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    171 comments  ·  Signup and Billing  ·  Flag idea as inappropriate…  ·  Admin →

    Hey folks, sorry for the late update. Some backend changes were made to alleviate this issue but I believe it doesn’t solve it for everyone yet. Let me go get some details and come back with a better update. Thanks!

    John

    Gonzalo Parra shared this idea  · 

Feedback and Knowledge Base