AdminAzure App Service team (Product Owner, Microsoft Azure)

My feedback

  1. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Web Apps » Diagnostics  ·  Flag idea as inappropriate…  ·  Admin →
    AdminAzure App Service team (Product Owner, Microsoft Azure) shared this idea  · 
  2. 79 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    9 comments  ·  Azure Functions  ·  Flag idea as inappropriate…  ·  Admin →

    Moving this work item to unplanned, as it is clear that this request is no for a global throughput limit.

    We do now offer the ability to limit your maximum instances in the Premium plan, which will allow you to avoid swamping downstream resources. https://docs.microsoft.com/en-us/azure/azure-functions/functions-premium-plan#plan-and-sku-settings

    We prioritized that above a max call per X limit, because our only control to limit throughput is to outright deny some number of requests above a threshold.

    Keep the feedback coming!
    Alex
    Azure Functions Team

    AdminAzure App Service team (Product Owner, Microsoft Azure) commented  · 

    Merging this with duplicate request for throttling.

    AdminAzure App Service team (Product Owner, Microsoft Azure) commented  · 

    Merging this with a duplicate related to global throttling controls. We believe that an actual per-execution throttle will be more effective than a server limit.

  3. 123 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    11 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →

    The support for TLS 1.3 in Web Apps will be implemented once the underlying infrastructure supports it. We still don't have an ETA on that being added.

    Thanks,
    Oded

  4. 2 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Azure Stack » PaaS  ·  Flag idea as inappropriate…  ·  Admin →
    AdminAzure App Service team (Product Owner, Microsoft Azure) commented  · 

    Tenant applications in Azure App Service on Azure Stack can be backed up to Azure or Azure Stack storage. Tenants must use Standard SKUs to have this feature available to them, it is not a feature available to apps deploy in Shared or Free App Service Plans.

  5. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →
    AdminAzure App Service team (Product Owner, Microsoft Azure) commented  · 

    Could you please provide more details on the scenario? Is your problem with HD Insights or App Service?

  6. 11 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  API Management  ·  Flag idea as inappropriate…  ·  Admin →
    AdminAzure App Service team (Product Owner, Microsoft Azure) commented  · 

    This looks like a problem with API Management. Moving this issue over to the APIM UserVoice queue.

    Alex
    Azure App Service Team

  7. 47 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    10 comments  ·  Web Apps » App Service Environment  ·  Flag idea as inappropriate…  ·  Admin →

    Hi Thomas,

    Some feedback from our team:

    We do not update the SSL binding on rare cases, and we do have the code working just that it happens on a different task. This is definitely a bug we will be fixing as soon as we can. Most likely will be dealt with in June.

    Thanks,
    Oded

    AdminAzure App Service team (Product Owner, Microsoft Azure) commented  · 

    Just to update that we still have this work on our backlog but it has been delayed a bit. Our intention is to improve the UX to do a sync with the certificates after change.

    Thanks for the additional details in GH. I'll have the engineers on our team sync with the doc folks that answered here.

    Oded

  8. 161 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    14 comments  ·  Web Apps » Notifications  ·  Flag idea as inappropriate…  ·  Admin →
    AdminAzure App Service team (Product Owner, Microsoft Azure) commented  · 

    Just to comment here that this is still something we want to pursue, but it has been lower in priority compared with other deliverables we are working on.

    Thanks,
    Oded

  9. 6 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Web Apps » Linux  ·  Flag idea as inappropriate…  ·  Admin →
    AdminAzure App Service team (Product Owner, Microsoft Azure) commented  · 

    Understood. We still don't have the capability to scale each container separately.

    Currently, scaling happens at the App Service Plan level and all containers in multi-containers are hosted in the same plan, therefore scale together.

    We haven't decided yet if we will pursue this use case, but we will leave the request open here to gather potential customer support.

    Thanks,
    Oded

    AdminAzure App Service team (Product Owner, Microsoft Azure) commented  · 

    Thanks again for feedback.

    The specific use case as you stated in the comment is on our roadmap. We will update status once we have a timeline.

    Thanks,
    Yi

  10. 11 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →

    This item is still on our backlog for review, but did not make it into update 3. We will continue to review this for Azure App Service on Azure Stack.

  11. 417 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    7 comments  ·  API Management » Security  ·  Flag idea as inappropriate…  ·  Admin →
    AdminAzure App Service team (Product Owner, Microsoft Azure) supported this idea  · 
  12. 34 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Web Apps » App Service Environment  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for your feedback. We will take this into consideration for our Python3.6 offering (currently in development).

    Asavari

  13. 3 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Moved feature request to App Insights.

  14. 27 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    7 comments  ·  Azure Functions  ·  Flag idea as inappropriate…  ·  Admin →
    AdminAzure App Service team (Product Owner, Microsoft Azure) supported this idea  · 
  15. 8 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  (General Feedback) » Other  ·  Flag idea as inappropriate…  ·  Admin →

    Moved to management in App Insights.

  16. 2 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  SQL Database  ·  Flag idea as inappropriate…  ·  Admin →

    Moving item to Azure SQL uservoice

  17. 17 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure Functions » Proxies  ·  Flag idea as inappropriate…  ·  Admin →

    Merging this with a similar item

  18. 81 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →

    Moved request to the Application Gateway forum.

  19. 15 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Networking » DNS  ·  Flag idea as inappropriate…  ·  Admin →

    Moved to the networking forum for follow up.

  20. 20 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Networking » VPN Gateway  ·  Flag idea as inappropriate…  ·  Admin →

    Hi Matt,

    Thanks for the feedback. The status of this ask is a bit complicated – it’s partially working, but partially in progress:

    1. For existing SSTP P2S VPN, there is no solution but to download the VPN client package again.

    2. For IKEv2 P2S VPN, it works by P2S client reconnecting to the Azure VPN gateway. Once they connect again, they will get the new routes. This will apply to changes in VNet address spaces (including VNet peering), newly added S2S/VNet-to-VNet connections, or new routes learned via BGP.

    3. The caveat for (2) is that it currently works on Mac and Linux, but Windows require a KB/Update that will be released shortly.

    We will provide an update to this item once the Windows update is available.

    Thanks,
    Yushun [MSFT]

    AdminAzure App Service team (Product Owner, Microsoft Azure) commented  · 

    moved to the networking forum to solve routing between gateway types.

    Thanks,
    Oded

← Previous 1 3

Feedback and Knowledge Base