James Dumont le Douarec
My feedback
-
2 votes
James Dumont le Douarec shared this idea ·
-
4 votes
James Dumont le Douarec supported this idea ·
-
7 votes
An error occurred while saving the comment -
2 votes0 comments · Azure Active Directory » Role-based Access Control · Flag idea as inappropriate… · Admin →
James Dumont le Douarec shared this idea ·
-
4 votes
James Dumont le Douarec shared this idea ·
-
396 votes
James Dumont le Douarec supported this idea ·
-
13 votes
James Dumont le Douarec shared this idea ·
-
1 vote
An error occurred while saving the comment James Dumont le Douarec commented
Hi,
the Terraform resource is available here : https://www.terraform.io/docs/providers/azurerm/r/databricks_workspace.html
And since azurerm 1.42.0 VNet injection is supported!Regards,
James -
11 votes
James Dumont le Douarec shared this idea ·
-
1 vote
James Dumont le Douarec shared this idea ·
-
12 votes
James Dumont le Douarec shared this idea ·
-
114 votes
James Dumont le Douarec supported this idea ·
-
119 votes
An error occurred while saving the comment James Dumont le Douarec commented
Great news to see this request « planned » using a (PAT) person access token between Data Factory and Databricks is not really nice for a Infra connection service as it’s associated to an end user.
James Dumont le Douarec supported this idea ·
-
2,411 votes
We’re currently evaluating an option that will provide the functionality offered by nested groups, but removes the complexity nested groups adds. We appreciate your patience on this ask and want to ensure we deliver a solution that benefits all of our customers. Below are use cases that we’d like for you to stack rank, with #1 being priority for you. We thank you for the continued comments and feedback.
Use case A: nested group in a cloud security group inherits apps assignment
Use case B: nested group in a cloud security group inherits license assignment
Use case C: nesting groups under Office 365 groupsAn error occurred while saving the comment James Dumont le Douarec commented
#1 : A
#2 : B
#3 : CJames Dumont le Douarec supported this idea ·
-
95 votes
James Dumont le Douarec supported this idea ·
-
16 votes
An error occurred while saving the comment James Dumont le Douarec commented
Voted!
Got the confirmation here that it's not supported : https://social.msdn.microsoft.com/Forums/en-US/7d02a624-a909-450b-8bd2-906d0d2103bd/preserve-acl-between-adsl-gen-2-when-using-a-data-factory-copy-data-pipeline?forum=AzureDataLake
I did the following tests through a Data Factory copy data pipeline and got surprised of the results:
- ADLS gen 1 to ADLS gen 2 : could preserve ACL (see https://docs.microsoft.com/en-us/azure/data-factory/connector-azure-data-lake-store#preserve-acls-to-data-lake-storage-gen2)
- ADLS gen 2 to ADLS gen 1: couldn't preserve ACL (the option could be set on the json code but it's erased at each run)
- ADLS gen 2 to ADLS gen 2: couldn't preserve ACL (the error message is : Copy with preserving ACL is not supported from AzureBlobFS to AzureBlobFS)
James Dumont le Douarec supported this idea ·
-
36 votes
James Dumont le Douarec supported this idea ·
-
1 vote
James Dumont le Douarec shared this idea ·
-
124 votes
James Dumont le Douarec supported this idea ·
-
685 votes
We are very excited to announce the public preview of Azure Data Factory Managed Virtual Network.
With this new feature, you can provision the Azure Integration Runtime in Managed Virtual Network and leverage Private Endpoints to securely connect to supported data stores. Your data traffic between Azure Data Factory Managed Virtual Network and data stores goes through Azure Private Link which provides secured connectivity and eliminate your data exposure to the public internet. With the Managed Virtual Network along with Private Endpoints, you can also offload the burden of managing virtual network to Azure Data Factory and protect against the data exfiltration.
To learn more about Azure Data Factory Managed Virtual Network, see https://azure.microsoft.com/blog/azure-data-factory-managed-virtual-network/
James Dumont le Douarec supported this idea ·
Hello,
could you please check that you did enable NSG Flow with Traffic Analytics sent to a Log Analytics Workspace?
You can check that with the following "Azure Resource Graph Explorer" command, it will output all NSG with Flow Logs & Traffic Analytics -->
Resources
| where type =~ 'Microsoft.Network/networkWatchers/flowlogs'
| extend provisioningState = parse_json(properties).provisioningState
| extend workspaceResourceId = tostring(parse_json(parse_json(parse_json(properties).flowAnalyticsConfiguration).networkWatcherFlowAnalyticsConfiguration).workspaceResourceId)
| extend targetResourceId = tostring(parse_json(properties).targetResourceId)
| where workspaceResourceId != "" and provisioningState == "Succeeded"
| project ["NSG with Traffic Analytics"]=targetResourceId