This is a duplicate of this feedback item:
Thank you for this feedback. The hybrid story is very important to us, and we are working to bring new capabilities for you to utilize. Stay tuned.
Hi, we are looking at possible improvements we can make in replication of networking components. Would be great if you can share some insights on what features you’d like us to build, by filling this survey : https://aka.ms/networkreplicationsurvey
Currently working to understand the requirements for scenarios. Will update the thread soon
This would be a very good improvement of the ASR service.
We have IaaS web servers with multiple IIS sites. Each site is bound to a unique static IP. This ensures that we can have dedicated listener ports for 80/443, without adding additional NICs that add multi-homing complexity.
This is being worked on currently.
Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature list and also gives us insight into the potential impact of implementing the suggested feature
This would be a really nice feature. I know the standard answer is "use an internal Load Balancer for your private connection" but that just adds another layer of complexity, not to mention requires consideration for outbound SNAT rules.
We’re currently making enhancements to the scheduler and investigating whether integrating local server timezones in scheduling makes sense.
Any movement on this item? It would decrease our update schedules a significant amount.
This would really be great, and allow for simplification of the scheduled deployments in a huge way.
Thanks for your feedback, we are working on this.
- Anavi N [MSFT]
Prompting again because this is really holding us back from implementing simple IaaS within Azure - so many hurdles to go through to support this!
We have GA’d dynamic groups for Azure, and dynamic groups (dynamic saved searches) for non-Azure machines is in public preview.
Thanks for your interest on this feature. This capability is still in the pipeline. The initial estimate was obviously off and we are looking at a new timeline. We are aware of the benefit of having this rollover made automatic and the interest you have on the feature, and that’s how we are looking at it while prioritizing it against other capabilities requests.
Thanks for your patience!
Principal Program Manager
This is in our backlog. We will update as we make progress on the feature request.
54 votes7 comments · Azure Monitor-Log Analytics » Agent Management (OnPrem components) / Connectivity / Setup · Flag idea as inappropriate… · Admin →
We’re aware of an issue that can cause this error to be logged when the Update Assessment solution is installed.
You can check if this is what you’re seeing my temporarily removing the Update Assessment solution and confirming the errors stop.
The Update Assessment solution functionality is not affected and you can safely ignore this error.
This is still an issue, and despite the "safely ignore this issue" advice, ignoring errors in the event log is not standard practice.
This would be great - ability to store an artifact of a deployment run for compliance reasons.
I second this - for Update Management, we really need the ability to implement things like scheduled deployments with dynamic groups and reboot suppression through PowerShell, and this just doesn't seem possible right now.
Thanks for the feedback. We’ll look into this as part of the move to native Cost Management.Jeff Miles shared this idea ·
Hey folks, thanks for the interest in this, and we have some good news to share. Configurable lockout is in development now (mostly done, actually) and we’re aiming for June or July public preview.
For configurable password complexity, length, etc, we hear you. Longer passwords are in planning now, and we’re thinking about our approach to how we want to enable the other configurability features. I don’t have any more details to share on this for now, but we do have interest in building features.