Mike

My feedback

  1. 1,745 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    34 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →
    Mike supported this idea  · 
  2. 579 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    84 comments  ·  Azure Active Directory » Azure AD Connect  ·  Flag idea as inappropriate…  ·  Admin →
    started  ·  Azure AD Team responded

    Hi everyone,
    Thanks for your interest on this feature. This capability is still in the pipeline. The initial estimate was obviously off and we are looking at a new timeline. We are aware of the benefit of having this rollover made automatic and the interest you have on the feature, and that’s how we are looking at it while prioritizing it against other capabilities requests.
    Thanks for your patience!

    Jairo Cadena
    Principal Program Manager
    Microsoft Identity

    An error occurred while saving the comment
    Mike commented  · 

    cool that you're still working on this, just checking in again because I keep seeing the warning icon when I look at AD connect and there's never enough time to do it manually.

  3. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  (General Feedback) » Other  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Mike commented  · 

    I'd be happy to brainstorm ideas that would work while fitting in with the theme of how Azure is setup to be easy to use. I think doing it in a way that wouldn't cause confusion to most users who don't understand the difference would be the key. It could go in the Advanced application restart as another option and maybe it should be phrased differently from 'recycle'... in Advanced application restart where you can restart each w3wp instance, that is like a cold restart... the code beneath seems to do a stop of the app pool and maybe even the site and then start it. The new one, even though it should call recycle under the covers to leverage any application initialization support that is already built in and working, could be called something like a 'warm reset' or something. I seriously need this a couple of times a month and the best workaround i've found is to modify a property on the app service to force it to recycle.

    Mike shared this idea  · 
  4. 1 vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  SQL Server » Bugs  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Mike commented  · 

    Just had a similar issue and the error was the same with no description. turns out it was a permissions issue in case anyone else sees this and comes across it. The suggestion here should be to make the error message less cryptic when there's a permission issue.

  5. 35 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Mike supported this idea  · 
  6. 287 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    An error occurred while saving the comment
    Mike commented  · 

    I'm not sure I agree with this line of thinking for all devices. In a connected world, devices are prone to getting hacked at any time, regardless of if it was lost. Also, forcing a device to be reauthorized once every 60 days ensures that a device has not unknowingly been lost. I found this post looking for a way to lower the 60 day limit for certain high level accounts.

  7. 64 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    An error occurred while saving the comment
    Mike commented  · 

    I just read up on security defaults and I wanted to post this somewhere, 'Well done!' on making this a standard for all accounts. At one point in order to get MFA you had purchase an AD Premium and I remember posting some feedback that you should never have to pay for security. So, bravo on making this move to make it simple and effective for all accounts to be protected and not charging for it. I agree too that setting up one account to exclude for emergency access would be nice. I know that I can go through the process of setting up in conditional access but the exception account would make it convenient to not have to go through that process, or to be concerned that I might not set it up right since I don't do that every day.

    Mike supported this idea  · 
  8. 57 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Logic Apps  ·  Flag idea as inappropriate…  ·  Admin →
    Mike supported this idea  · 
  9. 937 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  163 comments  ·  SQL Server » Suggestions  ·  Flag idea as inappropriate…  ·  Admin →
    Mike supported this idea  · 
  10. 1,635 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    181 comments  ·  SQL Server » Suggestions  ·  Flag idea as inappropriate…  ·  Admin →

    Unfortunately the complexity to implement dark mode into SSMS v18 is prohibitive and this item remains unplanned. Regular updates and improvements to SQL Server Management Studio are continuing, but most of the net new innovations in the graphical tooling space can be expected to be seen in Azure Data Studio.

    -Drew

    Mike supported this idea  · 
  11. 118 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    8 comments  ·  Cost Management » Budgets + alerts  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Mike commented  · 

    One more scenario: For the Azure services that have 'serverless' options those can go from a daily low $ to maxing out your credit card without knowing about it. At least being clued into that as quickly as possible would help.

    An error occurred while saving the comment
    Mike commented  · 

    I just went looking for a way to set a daily alert, let me give you the scenario. Sometimes I might be testing something to see how it's going to price out for me or a customer. Having an alert that resets daily really helps me to test it and not forget to turn it off. You might be wondering, 'why not just use a monthly alert and set it really low.' That might works but if I'm playing with the settings trying to get down to a budget then I have to keep remembering to go in and resetting the alert.

    Another scenario: By setting a daily budget amount at 99% of the norm, I get a much quicker notice when something is running hotter (dollar-wise) than expected. Like for example maybe a team member changed a setting and didn't know the price consequences. That quicker insight helps me to manage something I'm spending on that I don't use and don't need.

    Mike supported this idea  · 
  12. 41 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  SQL Database  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Mike commented  · 

    I hope this has always been planned to roll out in-memory OLTP for lower tiers and was started at the higher tiers to work out the technicalities. Otherwise it kind of defeats the purpose of what cloud is touted for, i.e. the ability to start small and scale up as needed. By offering In-Memory OLTP only on the upper tiers it doesn't give the same advantages to the smaller guys who don't have the big budgets. We're running standard and the price jump to premium or vcores would be an unjustifiable gross overallocation of resources for our needs just to get In-Memory OLTP. So because of that our caching and temp tables are consuming a vast amount of unnecessary DTUs. Either way we're wasting money. Cloud should be helping the little guys so they can become big guys.

    If as the OP says the difference is because of version number of sql server, and it's easier to make a new Standard v2 tier to be able to phase out the older sql, that would work for us at this time, we'd take the time to convert.

    Mike supported this idea  · 
  13. 4 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Signup and Billing  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Mike commented  · 
    Mike supported this idea  · 
  14. 118 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    8 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Mike commented  · 

    I think you can mark this one as done now right? I read a blog post a while back that this behavior was changed and according to this documentation this setting is not swapped between slots: https://docs.microsoft.com/en-us/azure/app-service/deploy-staging-slots

    I updated my sites months ago to have the staging slot settings for 'Always On' to OFF and it hasn't been an issue any more. I've also just now tested it one more time and it's working well!

    Nicely done and thanks!

    An error occurred while saving the comment
    Mike commented  · 

    15 votes in only 6 weeks, that's not bad. Any updates on this? I guess this is harder than it seems?

    An error occurred while saving the comment
    Mike commented  · 

    Any updates on this? This continues to be a pain point for me.

    An error occurred while saving the comment
    Mike commented  · 

    Thanks for the updates Oded and Ruslan. As a workaround for now, does anyone know if I set Always On=false and use something like uptime robot to ping the site is that sufficient to keep it always on? I read somewhere that it won't work for free accounts, but obviously in this case i'm thinking about using it as a workaround on standard or premium tier.

    Mike shared this idea  · 
  15. 76 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  Azure Active Directory » B2B  ·  Flag idea as inappropriate…  ·  Admin →

    We’re working on a few features in this space that will likely help address this scenario but don’t have an ETA yet to share. Thanks to the folks who have added additional details of what they’re looking for, and if you have more scenarios for how this capability could help you please do add them as comments.

    Thanks,
    Elisabeth

    Mike supported this idea  · 
  16. 1,141 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    74 comments  ·  Azure portal » Resource management  ·  Flag idea as inappropriate…  ·  Admin →

    Hey Folks,

    We have made some great progress on this idea and most of our services today do support move resources across groups.

    We are still working towards 100% support and while we do that it would be great if you can help us prioritize the missing services.

    Please file individual asks on each service category present in uservoice and vote for it.

    Thanks,
    Azure Portal Team

    Mike supported this idea  · 
  17. 74 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  3 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    Mike supported this idea  · 
  18. 143 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    unplanned  ·  15 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    Mike supported this idea  · 
  19. 171 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    14 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    Mike supported this idea  · 
  20. 251 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    unplanned  ·  7 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    Mike supported this idea  · 
← Previous 1

Feedback and Knowledge Base