Second what Rapahel said. I mean why couldn't these be exposed in a similar fashion to what github does with their raw sub-domain?
Thanks for the feedback! We are interested in collecting feedback on this request – please vote for it if this is something you like to see.
We’re also interested in learning more what people want to use the SFTP/FTPS for and which protocol they prefer. Please feel free to leave us a comment letting us know more detail!
Program Manager, Azure Files
Additionally support with Azure AD and/or AAD B2C that permissions can be scaled by user account.
This integration work is started. Log Analytics will be one of export options in diagnostic setting. It’s estimated to have public preview by Nov CY2019. Before this built-in connection is offered, you can refer https://azure.microsoft.com/en-us/blog/query-azure-storage-analytics-logs-in-azure-log-analytics/ to build short term solution to export logs to Log Analytics.
For any further questions, or to discuss your specific scenario, send us an email at firstname.lastname@example.org.
Has there been any update on this? We tried to use the following the 'oms-azure-storage-analytics-solution' solution which is in GitHub, link at bottom, however this did not work. Any update would be greatly appreciated.
Thank you for taking the time to vote on this request. Work on this has commenced. We will email you once it is completed.
If you are interested in participating in the preview please email back.
247 votesunder review · 27 comments · Azure Key Vault » Managing application secrets · Flag idea as inappropriate… · Admin →
Totally concur, right now we having to investigate a 3rd party IaaS solution in order to get functionality of this kind. This is a major pain point since we are trying to move to a completely PaaS footprint.
While this is something we do not have planned in the short term. You can use community tools such as this: https://github.com/devkimchi/ARM-Templates-in-YAML
CLI and Poweshell for scaling is available in ASE v2 through the same App Service commands.
We are expanding CLI and PowerShell support more down the road.
This is something we’re thinking about, but would like to ensure that we’re providing a sufficiently robust set of capabilities within the template language syntax itself.
What scenarios are “overly complicated and hard to maintain”? This will help us understand where we need to invest.
During one of the ignite demos someone presented a way to leverage event grid, function apps, and a cosmos db. Using this they should that they were exporting ARM Templates based on changes to a Resource Group directly to cosmos db. The github repo is called 'azure-arm-events'.
We are working on supporting the copy() function in outputs – combined with the reference() function should help with these scenarios. We will email you once it is completed. Feel free to reach out if you have any additional feedback.
I asked about this functionality during ignite and they mentioned that they want include this. Brian Moore did mention in his ignite session that you can do a reference() function within ARM can provide a resource. Hopefully this helps you, the link is below.
Thank you for taking the time to vote on this idea. Could you please provide more details on your ask here as this can be accomplished today.
I apologize about the delay but Custom RBAC Support is now available in Production. You are able to to create role definitions at the MG scope and assign them to inherited MGs and Subs.
There is a bug that is in the portal where the new custom role is not showing when you are trying to do a role assignment on an inherited child MG/Sub. This should be resolved soon and PowerShell, CLI, and API are all working. I will not do any announcements yet on the availability of the feature until the portal bug is fixed. Once that is fixed we will do blog announcements and I will mark the feature complete here.
Thank you for your feedback. Providing this functionality is on our backlog but there is no ETA we can share at this time. We will provide updates when they become available. For any further questions, or to discuss your specific scenario, send us an email at email@example.com.
Also would be good to have on Application Gateways too
8 votes2 comments · Azure Active Directory » Role-based Access Control · Flag idea as inappropriate… · Admin →
Highly highly second this! Only having the ability to define permissions with the read, write, action, or delete functions is very limiting. Especially when we have developers who will need to change an existing resources.
The lack of the differentiation seems to be an oversight since they are two distinct pieces of functionality.