Torben Knerr
My feedback
-
129 votes
this feature is in public preview now. https://docs.microsoft.com/en-us/graph/api/resources/trustframeworkpolicy?view=graph-rest-beta.
We are working on managing policy keys programmatically.
Torben Knerr supported this idea ·
-
4 votes
Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature list and also gives us insight into the potential impact of implementing the suggested feature
Torben Knerr supported this idea ·
-
470 votes
We have initiated the work on enabling backup for blob storage and is underway, ETA: H1CY20.
For more details, please reach out to AskAzureBackupTeam@microsoft.com
Torben Knerr supported this idea ·
-
886 votes
There are multiple responses to this suggestion.
Support for SQL-like syntax for UPDATE, DELETE and INSERT INTO are not on our road map at this time.
However, the underlying functionality for an UPDATE, SET is essentially a PATCH. This functionality we are actively working on. See this User Voice item here to track for future updates. https://feedback.azure.com/forums/263030-azure-cosmos-db/suggestions/6693091-be-able-to-do-partial-updates-on-document
Thank you for your suggestion.
Torben Knerr supported this idea ·
-
1,824 votes
We want to share the great news that ADF has been added to the list of “Trusted Azure service” for Azure Key Vault and Azure Storage (blob & ADLS Gen2)!! Now you can enable “Allow trusted Microsoft services” on AKV and Azure Storage for better network security, and your ADF pipelines will continue to run. There are two caveats to pay attention to: (1) In order for ADF to be considered as one of the “Trusted Microsoft services” you need to use MSI to authenticate to AKV or Azure Storage in the linked service definition, and (2) If you are running Mapping Data Flow activity – “Trusted Azure service” is not supported for Data Flow just yet and we are working hard on it.
What is coming up? Here are the additional enhancements we are making for better network security:
- Static IP range for Azure Integration Runtime so that…Torben Knerr supported this idea ·
Torben Knerr commented
OMG, yes. If not providing a whitelistable IP address, please provide support for vNet integration or service endpoint integration for Data Factory (with Azure-hosted integration runtime for sure)!
-
52 votes
Backup of blobs is planned for the coming semesters. We would suggest you to follow this related idea also:
https://feedback.azure.com/forums/258995-azure-backup-and-scdpm/suggestions/31241989-backup-azure-paas-resources-Utsav
Torben Knerr supported this idea ·
-
39 votes
Torben Knerr commented
Update: I finally got the deployment to work by removing a custom blocking outbound rule (which was lower prio than the required allowing rule -- but the rule validation check seems to ignore this)
Details here: https://github.com/MicrosoftDocs/azure-docs/issues/18737#issuecomment-475124457
Torben Knerr commented
I have gotten the inbound rule to work as suggested above. However still no luck with the outbound rule.
Even with Any, Any, Any, Any -> Allow I am still getting the "ApplicationGatewaySubnetOutboundTrafficBlockedByNetworkSecurityGroup" rule validation error during deployment.
It's just impossible to deploy AppGateway v2 due to this rule validation issue
Torben Knerr commented
Struggling with the exact same thing here. I have the ports allowed, but the NSG rule is not "open enough" as it seems, and the error message is not helpful at all as it states the contradiction of the actual rules we have...
Torben Knerr supported this idea ·
-
12 votes3 comments · Azure Monitor-Application Insights » Metrics & charting · Flag idea as inappropriate… · Admin →
Torben Knerr commented
See also the related question here:
https://social.msdn.microsoft.com/Forums/en-US/d983bc99-3393-4601-b029-7e1480123f66/how-to-access-the-time-range-selected-in-query-editor-from-within-a-query?forum=ApplicationInsights#fda06753-1e7b-4e95-be73-4fd3741aa8f7Official docs for bin_auto() here:
https://docs.microsoft.com/en-us/azure/kusto/query/bin-autofunctionTorben Knerr shared this idea ·
-
50 votes
Torben Knerr supported this idea ·
-
215 votes
Torben Knerr commented
support for file:///c:/foo/template.json URI please! :)
Torben Knerr supported this idea ·
-
34 votes
Torben Knerr supported this idea ·
-
229 votes
Thank you for your feedback. We are working on customer controlled failover for both disaster and DR drill scenarios. Please contact xstoredr@microsoft.com for more details about enrolling in a private preview, and for any further questions.
Torben Knerr supported this idea ·
-
1,380 votes
We haven’t forgotten about this request! This is something we would like to bring in the future, but we cannot provide a timeline at this time.
Thank you for using UserVoice!
JasonTorben Knerr supported this idea ·
-
1 vote
Torben Knerr commented
Note: for the specific case I found a way to configure an empty sink for the specific event with id 17523. This only works if you define the sink for each EtwProvider separately, but not globally for the DiagnosticMonitorConfiguration.
I didn't find this documented anywhere, but retrieving the WadConfig.xsd revealed that this is possible. You can get the xsd like so:
(Get-AzureServiceAvailableExtension -ExtensionName 'PaaSDiagnostics' -ProviderNamespace 'Microsoft.Azure.Diagnostics').PublicConfigurationSchema | Out-File –Encoding utf8 -FilePath 'C:\temp\WadConfig.xsd'
Example wadCfg configuration with events for 17523 filtered out:
"WadCfg": {
"DiagnosticMonitorConfiguration": {
"overallQuotaInMB": "50000",
"EtwProviders": {
"EtwEventSourceProviderConfiguration": [{
"provider": "Microsoft-ServiceFabric-Actors",
"scheduledTransferKeywordFilter": "1",
"scheduledTransferPeriod": "PT5M",
"DefaultEvents": {
"eventDestination": "ServiceFabricReliableActorEventTable",
"sinks": "applicationInsights"
}
},
{
"provider": "Microsoft-ServiceFabric-Services",
"scheduledTransferPeriod": "PT5M",
"DefaultEvents": {
"eventDestination": "ServiceFabricReliableServiceEventTable",
"sinks": "applicationInsights"
}
}
],
"EtwManifestProviderConfiguration": [{
"provider": "cbd93bc2-71e5-4566-b3a7-595d8eeca6e8",
"scheduledTransferLogLevelFilter": "Information",
"scheduledTransferKeywordFilter": "4611686018427387912",
"scheduledTransferPeriod": "PT5M",
"Event": [
{
"id": 17523,
"sinks": ""
}
],
"DefaultEvents": {
"eventDestination": "ServiceFabricSystemEventTable",
"sinks": "applicationInsights"
}
}]
}
},
"SinksConfig": {
"Sink": [
{
"name": "applicationInsights",
"ApplicationInsights": "[reference(concat('microsoft.insights/components/', variables('monAppInsightsName'))).InstrumentationKey]"
}
]
}
},Torben Knerr shared this idea ·
-
19 votes
Torben Knerr supported this idea ·
-
3 votes1 comment · Azure Monitor-Application Insights » Service monitoring and diagnostics · Flag idea as inappropriate… · Admin →
Torben Knerr commented
This is similar to my need here:
https://feedback.azure.com/forums/357324-application-insights/suggestions/33476608-ability-to-exclude-specific-requests-from-performaMore specifically, I want to filter out the health check endpoints which heavily pollute the statistics
Torben Knerr supported this idea ·
-
6 votes0 comments · Azure Monitor-Application Insights » Service monitoring and diagnostics · Flag idea as inappropriate… · Admin →
Torben Knerr shared this idea ·
Critical: Storage (Blob, Table)