Update: Microsoft will be moving away from UserVoice sites on a product-by-product basis throughout the 2021 calendar year. We will leverage 1st party solutions for customer feedback. Learn more here.

David Gard

My feedback

  1. 177 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    15 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for bringing this to our attention. Your feedback is now open for the user community to upvote & comment on. This allows us to effectively prioritize your request against our existing feature backlog and also gives us insight into the potential impact of implementing the suggested feature.

    An error occurred while saving the comment
    David Gard commented  · 

    This is very much needed. Not being able to PATCH Key Vault Access Polices, so needing to know whether to use 'recover' or 'default' as the 'createMode' when deploying is an obvious use case (to avoid wiping manually added access policies), but I'm sure there are many others.

  2. 57 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    11 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature backlog and also gives us insight into the potential impact of implementing the suggested feature.

    An error occurred while saving the comment
    David Gard commented  · 

    It's truely disappointing that this is still not available.

    In our case, we want to use SAS tokens generated by the ARM template (listServiceSas() and listAccountSas), but because we're unable to generate an expirey date in the future by using utcNow() we've had to go a different way.

    The closest I can get for a short lived token is -
    [replace(parameters('utcNow'), '##', padLeft(string(add(int(parameters('utcNowHour')), 1)), 2, '0'))]

    The 'utcNow' parameter has a default value of "[utcNow('yyyy-MM-ddT##:mm:ssZ')]".
    The 'utcNowHour' parameter has a default value of "[utcNow('HH')]".

    Please implement this feature properly. It will be useful to a huge amount of users.

    David Gard supported this idea  · 
  3. 46 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    12 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    David Gard supported this idea  · 
  4. 8 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Logic Apps » Connectors  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    David Gard commented  · 

    The documentation linked to suggests a name of 'Log-Type' for the custom log name parameter. However, if you include a dash ('-') character in the name, the action fails with the error "InvalidLogType".

    An error occurred while saving the comment
    David Gard commented  · 

    This is very slow at present. It takes 10-15 minutes for logs sent from a Logic App run to appear in Log Analytics.

Feedback and Knowledge Base