Torben Knerr

My feedback

  1. 129 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    10 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Torben Knerr supported this idea  · 
  2. 4 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Virtual Machines » Bugs  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature list and also gives us insight into the potential impact of implementing the suggested feature

    Torben Knerr supported this idea  · 
  3. 470 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    42 comments  ·  Azure Backup » PaaS Backup  ·  Flag idea as inappropriate…  ·  Admin →
    Torben Knerr supported this idea  · 
    Torben Knerr commented  · 

    Critical: Storage (Blob, Table)

  4. 886 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    7 comments  ·  Azure Cosmos DB » SQL API  ·  Flag idea as inappropriate…  ·  Admin →

    There are multiple responses to this suggestion.

    Support for SQL-like syntax for UPDATE, DELETE and INSERT INTO are not on our road map at this time.

    However, the underlying functionality for an UPDATE, SET is essentially a PATCH. This functionality we are actively working on. See this User Voice item here to track for future updates. https://feedback.azure.com/forums/263030-azure-cosmos-db/suggestions/6693091-be-able-to-do-partial-updates-on-document

    Thank you for your suggestion.

    Torben Knerr supported this idea  · 
  5. 1,824 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    72 comments  ·  Data Factory  ·  Flag idea as inappropriate…  ·  Admin →

    We want to share the great news that ADF has been added to the list of “Trusted Azure service” for Azure Key Vault and Azure Storage (blob & ADLS Gen2)!! Now you can enable “Allow trusted Microsoft services” on AKV and Azure Storage for better network security, and your ADF pipelines will continue to run. There are two caveats to pay attention to: (1) In order for ADF to be considered as one of the “Trusted Microsoft services” you need to use MSI to authenticate to AKV or Azure Storage in the linked service definition, and (2) If you are running Mapping Data Flow activity – “Trusted Azure service” is not supported for Data Flow just yet and we are working hard on it.

    What is coming up? Here are the additional enhancements we are making for better network security:
    - Static IP range for Azure Integration Runtime so that…

    Torben Knerr supported this idea  · 
    Torben Knerr commented  · 

    OMG, yes. If not providing a whitelistable IP address, please provide support for vNet integration or service endpoint integration for Data Factory (with Azure-hosted integration runtime for sure)!

  6. 52 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Azure Backup » PaaS Backup  ·  Flag idea as inappropriate…  ·  Admin →
    Torben Knerr supported this idea  · 
  7. 39 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    5 comments  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    Torben Knerr commented  · 

    Update: I finally got the deployment to work by removing a custom blocking outbound rule (which was lower prio than the required allowing rule -- but the rule validation check seems to ignore this)

    Details here: https://github.com/MicrosoftDocs/azure-docs/issues/18737#issuecomment-475124457

    Torben Knerr commented  · 

    I have gotten the inbound rule to work as suggested above. However still no luck with the outbound rule.

    Even with Any, Any, Any, Any -> Allow I am still getting the "ApplicationGatewaySubnetOutboundTrafficBlockedByNetworkSecurityGroup" rule validation error during deployment.

    It's just impossible to deploy AppGateway v2 due to this rule validation issue

    Torben Knerr commented  · 

    Struggling with the exact same thing here. I have the ports allowed, but the NSG rule is not "open enough" as it seems, and the error message is not helpful at all as it states the contradiction of the actual rules we have...

    Torben Knerr supported this idea  · 
  8. 12 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Torben Knerr shared this idea  · 
  9. 50 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Service Fabric  ·  Flag idea as inappropriate…  ·  Admin →
    Torben Knerr supported this idea  · 
  10. 215 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  15 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    Torben Knerr commented  · 

    support for file:///c:/foo/template.json URI please! :)

    Torben Knerr supported this idea  · 
  11. 34 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  (General Feedback) » Availability  ·  Flag idea as inappropriate…  ·  Admin →
    Torben Knerr supported this idea  · 
  12. 229 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    16 comments  ·  Storage » General  ·  Flag idea as inappropriate…  ·  Admin →
    Torben Knerr supported this idea  · 
  13. 1,380 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    43 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →
    Torben Knerr supported this idea  · 
  14. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Diagnostics and Monitoring  ·  Flag idea as inappropriate…  ·  Admin →
    Torben Knerr commented  · 

    Note: for the specific case I found a way to configure an empty sink for the specific event with id 17523. This only works if you define the sink for each EtwProvider separately, but not globally for the DiagnosticMonitorConfiguration.

    I didn't find this documented anywhere, but retrieving the WadConfig.xsd revealed that this is possible. You can get the xsd like so:

    (Get-AzureServiceAvailableExtension -ExtensionName 'PaaSDiagnostics' -ProviderNamespace 'Microsoft.Azure.Diagnostics').PublicConfigurationSchema | Out-File –Encoding utf8 -FilePath 'C:\temp\WadConfig.xsd'

    Example wadCfg configuration with events for 17523 filtered out:

    "WadCfg": {
    "DiagnosticMonitorConfiguration": {
    "overallQuotaInMB": "50000",
    "EtwProviders": {
    "EtwEventSourceProviderConfiguration": [{
    "provider": "Microsoft-ServiceFabric-Actors",
    "scheduledTransferKeywordFilter": "1",
    "scheduledTransferPeriod": "PT5M",
    "DefaultEvents": {
    "eventDestination": "ServiceFabricReliableActorEventTable",
    "sinks": "applicationInsights"
    }
    },
    {
    "provider": "Microsoft-ServiceFabric-Services",
    "scheduledTransferPeriod": "PT5M",
    "DefaultEvents": {
    "eventDestination": "ServiceFabricReliableServiceEventTable",
    "sinks": "applicationInsights"
    }
    }
    ],
    "EtwManifestProviderConfiguration": [{
    "provider": "cbd93bc2-71e5-4566-b3a7-595d8eeca6e8",
    "scheduledTransferLogLevelFilter": "Information",
    "scheduledTransferKeywordFilter": "4611686018427387912",
    "scheduledTransferPeriod": "PT5M",
    "Event": [
    {
    "id": 17523,
    "sinks": ""
    }
    ],
    "DefaultEvents": {
    "eventDestination": "ServiceFabricSystemEventTable",
    "sinks": "applicationInsights"
    }
    }]
    }
    },
    "SinksConfig": {
    "Sink": [
    {
    "name": "applicationInsights",
    "ApplicationInsights": "[reference(concat('microsoft.insights/components/', variables('monAppInsightsName'))).InstrumentationKey]"
    }
    ]
    }
    },

    Torben Knerr shared this idea  · 
  15. 19 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure Active Directory » Azure AD Connect  ·  Flag idea as inappropriate…  ·  Admin →
    Torben Knerr supported this idea  · 
  16. 3 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Torben Knerr commented  · 

    This is similar to my need here:
    https://feedback.azure.com/forums/357324-application-insights/suggestions/33476608-ability-to-exclude-specific-requests-from-performa

    More specifically, I want to filter out the health check endpoints which heavily pollute the statistics

    Torben Knerr supported this idea  · 
  17. 6 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Torben Knerr shared this idea  · 

Feedback and Knowledge Base