Dillon Brown
My feedback
-
4 votes
An error occurred while saving the comment -
1 vote
Dillon Brown shared this idea ·
-
21 votes
An error occurred while saving the comment -
14 votes
Dillon Brown supported this idea ·
-
23 votesunder review · 8 comments · Azure Governance » Azure Resource Graph · Flag idea as inappropriate… · Admin →
Dillon Brown supported this idea ·
-
4 votes
Dillon Brown supported this idea ·
-
1 vote
Thanks for the valid suggestion. Your feedback is now open for the user community to upvote & comment on. This allows us to effectively prioritize your request against our existing feature backlog and also gives us insight into the potential impact of implementing the suggested feature.
Dillon Brown shared this idea ·
-
3 votes
Dillon Brown shared this idea ·
-
40 votes
An error occurred while saving the comment Dillon Brown commented
This is covered by the AzureMonitor service tag now.
-
972 votes
Thank you for the feedback. We understand the limitation and will update this ticket as information becomes available.
- Jason
Dillon Brown supported this idea ·
-
1 vote
Dillon Brown shared this idea ·
-
46 votes
An error occurred while saving the comment Dillon Brown commented
Is this item complete now? There is a tutorial about "filtering" inbound traffic but it talks about DNAT and both the network and application rules seem to only be offered in the outbound direction.
https://docs.microsoft.com/en-us/azure/firewall/tutorial-firewall-dnat -
4 votes
Dillon Brown supported this idea ·
-
172 votes
While this feature is under review, Shared Access Signatures (http://blogs.msdn.com/b/windowsazurestorage/archive/2012/06/12/introducing-table-sas-shared-access-signature-queue-sas-and-update-to-blob-sas.aspx) can be used to specify exact permissions for a table, partition, or entity, and distribute those to calling applications. Using this can reduce the risk of accidental deletions.
An error occurred while saving the comment Dillon Brown commented
This workaround is not much better than SAS, but if you stop short of giving the users full key access to the account and instead assign appropriate Data Action operations using RBAC, you can allow read, write etc. while preventing deletion.
https://docs.microsoft.com/en-us/azure/storage/common/storage-auth-aad-rbac?toc=%2fazure%2fstorage%2fqueues%2ftoc.json -
46 votes
An error occurred while saving the comment Dillon Brown commented
I believe this one is done:
https://docs.microsoft.com/en-us/azure/backup/backup-azure-linux-app-consistent -
30 votes
Just an update that we still have this on our backlog. If it gains more user support, we will look to prioritize this and add the view to our internal support center.
Thanks,
OdedDillon Brown supported this idea ·
-
10 votes
Dillon Brown shared this idea ·
-
24 votes
This is definitely needed!
Let us know if there are specific cases where you’d like to be able to look at costs by the tags when they were applied vs. the current state of tags viewed retroactively. Understanding your needs will help ensure we cover the specifics for you.
Dillon Brown shared this idea ·
-
216 votes
This is a great idea and we would like to implement it though there are a few dependencies we need to meet first. We are leaving this on the roadmap for now to see if it gains more customer support which will help with prioritization.
Thanks,
OdedDillon Brown supported this idea ·
-
40 votes
No change here due to low activity, leaving as unplanned. Keep the votes coming.
—Colby
Dillon Brown supported this idea ·
https://azure.microsoft.com/en-us/blog/service-healing-auto-recovery-of-virtual-machines/
Even Standard disks have SLA now. This can be marked Complete if anyone ever looks at it.