takekazu.omi

My feedback

  1. 27 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Additional Services » Key Vault  ·  Flag idea as inappropriate…  ·  Admin →
    takekazu.omi commented  · 

    Now "Virtual network service endpoints" is supported. Is it not enough ?
    https://docs.microsoft.com/en-us/azure/key-vault/key-vault-overview-vnet-service-endpoints

  2. 14 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Additional Services » Key Vault  ·  Flag idea as inappropriate…  ·  Admin →
    takekazu.omi supported this idea  · 
  3. 151 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    We are still taking requests for onboarding to the preview of Application Insights variable retention. Some features required to enable this via self-service are taking longer than expected, but we are still working it, and in the meantime will be glad to enable your Application Insights resource to have different retention settings.

    The first iteration of this feature will allow setting retention up to 2 years in several increments for each Application Insights resource (e.g. not by data type). The pricing for this will follow the same Azure Monitor log data retention pricing as used by Log Analytics.

    We will be able to onboard a limited number of customers manually in the coming weeks. If you’re interested, please send me (dalek@microsoft.com) the instrumentation key(s) of your Application Insights resource(s), and the desired retention duration (30, 60, 120, 180, 270, 365, 550 or 730 days).

    Thank you
    Dale Koetke

    takekazu.omi supported this idea  · 
    takekazu.omi commented  · 

    The Application Insights retention period should also be the same as Log Analytics. I was forwarding to Log Analytics with Application Insights Connector management solution when storage for more than 90 days was required.
    https://docs.microsoft.com/ja-jp/azure/azure-monitor/platform/app-insights-connector
    However, the Application Insights Connector was retired in 6/30.
    It is inconvenient that the Connector management solution is discontinued prior to this ticket.

  4. 118 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    13 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →

    Given that a Azure AD B2C tenant should only be used for configuring Azure AD B2C, would having programmatic API’s to configure all of the Azure AD B2C settings be useful or is there more that you are looking to achieve using ARM templates?

    /Parakh

    takekazu.omi supported this idea  · 
  5. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  1 comment  ·  SQL Server » Suggestions  ·  Flag idea as inappropriate…  ·  Admin →
    takekazu.omi supported this idea  · 
  6. 29 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    unplanned  ·  0 comments  ·  Batch  ·  Flag idea as inappropriate…  ·  Admin →
    takekazu.omi supported this idea  · 
  7. 56 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Batch  ·  Flag idea as inappropriate…  ·  Admin →
    takekazu.omi supported this idea  · 
  8. 2 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Batch  ·  Flag idea as inappropriate…  ·  Admin →
    takekazu.omi shared this idea  · 
  9. 182 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    planned  ·  7 comments  ·  Batch  ·  Flag idea as inappropriate…  ·  Admin →
    takekazu.omi commented  · 

    I really want MSI support. MSI makes it easy to use AD authentication and easily creates secure applications.

    It is not secure for applications to store secrets in environment variables or application configuration files. If we can use MSI, it's easy to access the secret in KeyVault.

    MSI is a great Azure feature. You should support MSI with Azure Batch.

    takekazu.omi supported this idea  · 
  10. 212 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    unplanned  ·  3 comments  ·  Batch  ·  Flag idea as inappropriate…  ·  Admin →
    takekazu.omi supported this idea  · 
  11. 1,559 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    58 comments  ·  Azure Cosmos DB » Management  ·  Flag idea as inappropriate…  ·  Admin →
    takekazu.omi supported this idea  · 
  12. 93 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    10 comments  ·  Azure Database for MySQL  ·  Flag idea as inappropriate…  ·  Admin →

    Cross-region read replicas are now available in public preview. You can create up to five read-only replicas in any region supported by the MySQL service.

    To get started, please use the Azure portal to select the location for your read replica: https://docs.microsoft.com/en-us/azure/mysql/howto-read-replicas-portal#create-a-read-replica

    Thanks,
    Andrea Lam on behalf of the Azure DB for MySQL team

    takekazu.omi supported this idea  · 
  13. 1,070 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    26 comments  ·  Storage » General  ·  Flag idea as inappropriate…  ·  Admin →

    Thank you for your feedback. We view this ask as a set of related features.

    Soft delete for blobs enables you to save and recover your data where blobs or blob snapshots are deleted. It does not protect against container or account deletion. This feature is currently generally available. You can see the announcement here: https://azure.microsoft.com/en-us/blog/soft-delete-for-azure-storage-blobs-ga/ and the full documentation here: https://docs.microsoft.com/en-us/azure/storage/blobs/storage-blob-soft-delete

    Object versioning will also offer object-level protection, and will offer a few incremental improvements to soft delete. Specifically, it will make recovery of deleted data easier. This feature is planned for the coming year.

    Container soft delete will protect against container-level deletion and modification. This feature is planned for the coming year as well.

    Native support for blob backup will protect against account-level deletion and modification, and is currently on our backlog.

    We will provide updates when they become available. For any further questions, or to discuss your…

    takekazu.omi supported this idea  · 
  14. 18 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Storage » Tables  ·  Flag idea as inappropriate…  ·  Admin →
    takekazu.omi supported this idea  · 
  15. 460 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    started  ·  28 comments  ·  Cloud Services (Web and Worker Role)  ·  Flag idea as inappropriate…  ·  Admin →
    takekazu.omi supported this idea  · 

Feedback and Knowledge Base