Gerald Wiltse

My feedback

  1. 3,662 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    74 comments  ·  Azure Cosmos DB » SQL API  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse commented  · 

    It turns out that if you use the Mongo driver, you are able do partial updates. I have no idea how it achieves this if the REST API does not have any documented mechanism, but it does.

  2. 387 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    49 comments  ·  Azure Functions  ·  Flag idea as inappropriate…  ·  Admin →

    Hi all,

    We’re pleased to announce a public preview of our Key Vault references feature, which you can learn more about here: https://azure.microsoft.com/en-us/blog/simplifying-security-for-serverless-and-web-apps-with-azure-functions-and-app-service/

    There are some limitations to the initial preview, but we’re hoping to address those very soon. We’re looking forward to your feedback!

    Thank you,
    Matthew, Azure Functions team

    Gerald Wiltse commented  · 

    Food for thought, this recent development in .NET Core might reduce the amount of custom code you need for this.

    https://docs.microsoft.com/en-us/aspnet/core/security/key-vault-configuration#controlling-access-to-the-clientsecret

    Gerald Wiltse commented  · 

    I believe I read somewhere that this had basically been accepted and if so, this is just a ping to update status here.

    Gerald Wiltse supported this idea  · 
  3. 13 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    5 comments  ·  Azure IoT  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse commented  · 

    This would be nice, machine.io is an amazing iot solution which does this. Shows a good precedent.

  4. 91 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  Azure IoT  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse supported this idea  · 
  5. 431 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Service Bus  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse supported this idea  · 
  6. 28 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Service Bus  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse commented  · 

    There's already a suggestion you may wish to vote for: https://feedback.azure.com/forums/216926-service-bus/suggestions/15257919-encrypted-queues One would expect that adding the encryption to service bus would propagate to services that are built on it.

  7. 28 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  Azure Functions  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse supported this idea  · 
  8. 2,922 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    121 comments  ·  Storage » Files  ·  Flag idea as inappropriate…  ·  Admin →

    Hi folks,

    We have shipped a public preview of integration with AAD DS: https://azure.microsoft.com/blog/azure-active-directory-integration-for-smb-access-now-in-public-preview/

    What we have in preview is a first step along a much larger roadmap for integration with AAD/AD for authentication and authorization. As the blog post says, this initial preview is really about Windows cloud VM access to the Azure file share with an AAD identity. Future refreshes to this feature will add non-Windows (Linux, macOS, etc) support, and the ability to mount the Azure file shares on-premises with your AAD identity. You can learn more about this in our Ignite session as well (at around 22:00): https://www.youtube.com/watch?v=GMzh2M66E9o

    We’ll keep you updated on our progress. In the meantime, don’t hesitate to continue posting feedback on this feature below.

    Thanks,

    Will Gries
    Program Manager, Azure Files

    Gerald Wiltse commented  · 

    Can you share any information about the target use cases? For example, is there any chance of bringing azure files into the user space with a sync client?

    Gerald Wiltse commented  · 

    The market has proven that a good multi-platform sync client like Dropbox is imperative for any modern storage solution. While mapping drives is useful, and works for some use cases, I believe a sync client a logical step in the near future for Azure Files.

    Background:
    Sharepoint online has been the Microsoft cloud file sharing solution for a few years now. However, countless articles and bloggers made it very clear: Sharepoint is a big web front end, which runs on IIS and SQL and WebDAV for file hosting, and will never be the best file sharing platform for this reason.

    Azure Files is a platform that has the potential to fill in the gaps left by Sharepoint (and every other cloud-file storage provider for that matter). Because of the proximity to Azure AD and Sharepoint Online, it is uniquely positioned to become a one-of-a-kind file sharing service with fully integrated ACL's based on Azure AD Users and Groups. While that is another feature request entirely, that type of security combined with a sync client would enable Office 365 organizations everywhere (like my clients) to stop fighting with Sharepoint storage on a daily basis for some types of data, and still leverage their very robust pre-existing security group and permission strategy.

    Gerald Wiltse commented  · 

    Yes, this is the single biggest thing I have been waiting for with Azure Files. It's awesome to be able to mount azure files shares over the internet with SMB 3.0 now, and the security keys are a reasonable security mechanism for server-side mounting, but it's time to add a layer for user-based security, integrated with Azure AD.

    Gerald Wiltse supported this idea  · 
  9. 8 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Gerald Wiltse shared this idea  · 
  10. 7 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Gerald Wiltse shared this idea  · 
  11. 43 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  3 comments  ·  Stream Analytics  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse commented  · 

    We are also wondering about the potential synergies between ASA and Operational insights/OMS. It does seem that Op Insights would just provide some really great functionality around server logs, while it would be amazing to also work with the data in PowerBI via ASA. It's worth noting, we currently only want the log analytic functionality of OMS, so we would like that to somehow be a consumable unit without baggage. Hopefully someone has a vision about all that.

  12. 66 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    8 comments  ·  Automation » Desired State Configuration  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse supported this idea  · 
  13. 417 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    40 comments  ·  Azure Backup » PaaS Backup  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse supported this idea  · 
  14. 256 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    started  ·  7 comments  ·  Azure Backup » IaaS VM  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse supported this idea  · 
  15. 1,720 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  90 comments  ·  Azure Backup  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse supported this idea  · 
  16. 405 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  13 comments  ·  Storage » Files  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse shared this idea  · 
  17. 4 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  SQL Database  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse supported this idea  · 
    Gerald Wiltse commented  · 

    I am amazed at how frustrating and unforgiving the new portal is when creating resources. Here is one specific element that can be fairly easily improved. This has been a problem for over a year, I assumed it would get fixed quickly. It didn't.

    Here's what's happened multiple times.

    In a hurry, browse SQL Databases, filter by my desired subscription "IT Subscription". Database I want doesn't exist yet, need to create:

    Click Add Database
    Define a Name
    Select "new database server" -> Define all the associated options for that
    Select Pricing Tier
    Select Collation Options
    Select Resource Group... wait... these aren't the right resource groups.
    Select correct subscription.... oh god, everything lost, start from scratch
    :(

    This is a very basic UX Flaw. Because resource group and database server are dependent children of the subscription selection, they should not appear as neighbors to it in the selection list, and CERTAINLY should not appear BEFORE it...

    Please at LEAST make Subscription the FIRST choice on the list, since it determines the options that follow. A more appropriate fix would be to represent them as parent/children. In the case of the new UI, I suppose this would spawn more blades which is pretty gross IMO. Still it might be the right solution.

    However, a more broadly useful improvement for this situation would be to permit the migration of things from subscription to subscription, and RG to RG after built.

    I know, there are other requests for this already, and i'm sure it's extremely difficult on the backend (otherwise it would be done). This is one of those reasons why it is so.

  18. 701 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    started  ·  115 comments  ·  Azure portal » Search + navigation  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse supported this idea  · 
  19. 23 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Logic Apps » Connectors  ·  Flag idea as inappropriate…  ·  Admin →
    Gerald Wiltse commented  · 

    I have looked into this. Fantastic job on packaging this thing and making the deployment from GITHUB to azure so turnkey. I'm truly amazed. This sendgrid connector will no doubt be a very popular addition.

    It seems to do what it promises, but not the particular feature I requested. My Request was to receive email into Azure Logic App the way sendgrid does.

    Thank you for your efforts nontheless.

    Gerald Wiltse commented  · 

    Thank you for executing this. I will take a look and report back.

    Gerald Wiltse shared this idea  · 

Feedback and Knowledge Base