Microsoft Support & Discussions
Free PC Help Forum microsoft products support and discussions. If you need help with Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product you can post here. If you want to discuss Microsoft and their line of products you can do that here also.
84,928 topics in this forum
-
AKS Review - 1.2: Networking - AKS Networking & Private Connectivity
by Guest ormeikop-msft- 0 replies
- 0 views
AKS Networking Available Network Models for AKS In AKS, you can deploy a cluster that uses one of the following network models, which provide network connectivity for your AKS clusters: Kubenet networking: The network resources are typically created and configured as the AKS cluster is deployed. Conserves IP address space: Each pod uses an IP from a separate CIDR range (virtual), this is only accessible from the cluster and can be reused across multiple AKS clusters. Additional NAT, which means some network overhead and some minimal latency, consider this on certain scenarios where latency is critical. Source IP of the packet is always the n…
-
Lesson Learned #272: Execution Timeout Expired error message importing a Bacpac file
by Guest Jose_Manuel_Jurado- 0 replies
- 0 views
Today, I worked on a service request that our customer got the following error message: Execution Timeout Expired. The timeout period elapsed prior to completion of the operation or the server is not responding importing a bacpac file, in this situation, was at the moment that SQLPackage was enabling (rebuilding) an index, for example, Enabling index 'IX_MyIndex'... The first thing that we need to know that Import a bacpac using SQL Server Management Studio, SQLPackage or Azure Portal is not a restore backup. Importing bacpac means this project will perform the following steps: Create the structure based on Model.Xml. Disabling the indexes and constrains. …
-
AI MVP ‘Storyteller’ Vlad’s Tutorial for AI developers
by Guest RieMoriguchi- 0 replies
- 0 views
Vlad Iliescu is the AI MVP in Romania who is a storyteller as well as a passionate community leader in sharing his ideas and tips on his website. Vlad recently published his latest technical blog, How to run Stable Diffusion Web UI on Azure ML compute instances. He says, “Stable Diffusion has opened a new way of creating art to the masses, much more accessible than models locked behind APIs.” This blog shows how-to run AUTOMATIC1111’s Stable Diffusion Web UI on Azure Machine Learning compute instance. “Having had experience with Azure ML Compute Instances in the past, and knowing about the new Azure ML CLI, I wanted to see how easy it is to set up Stable…
-
Here's how to avoid hitting the limits on free Codespaces
by Guest alfredodeza- 0 replies
- 0 views
Before going through the suggestions, there are two key aspects to understand how quotas are affected: Every Codespace that has been created and not deleted can consume your included quota. Running Codespaces will use both CPU core-hours and storage, while stopped Codespaces will consume your storage quota only. Although it can be tricky to find out how exactly your Codespaces are consuming your monthly quotas, here are four solid suggestions to reduce your spending on your personal account. 1. Delete Codespaces aggressively Delete Codespaces instances after each use and change the default retention period to 1 day (default is 30). Go to “Default r…
-
Tracking Financial Crime with Azure Confidential Computing and Sarus Smart Privacy Solution
by Guest wopauli- 0 replies
- 0 views
Tracking Financial Crime with Azure Confidential Computing and Sarus Smart Privacy Solution Authors: Maxime Agostini, Lindsey Allen, and Wolfgang M. Pauli Combining Azure confidential computing capabilities with Sarus unlocks new possibilities to combine sensitive data from multiple parties. Working with multiple banks, we demonstrated how a joint solution can track financial crime by pooling transaction data. It significantly improved the prediction power compared to siloed data while achieving the highest standards of data security and privacy. Confidential computing solutions are increasingly popular to manipulate sensitive data. They bring un…
-
Microsoft Entra - 5 identity priorities for 2023
by Guest Abdi_Saeedabadi- 0 replies
- 0 views
Happy New Year everyone! To kick off 2023, we’re sharing five identity priorities to help you get more out of your security investments. These recommendations are based on our experience serving thousands of customers, collaborating across the industry, and working hard to protect the digital economy from ever-evolving threats. At a high level, these priorities are: Protect against identity compromise using a “Defense in Depth” approach. Modernize identity security to do more with less. Protect access holistically by configuring identity and network access solutions to work together. Simplify and automate identity governance. Verify remote …
-
Lesson Learned #271: ApplicationIntent parameter when is not available option in connection string
by Guest Jose_Manuel_Jurado- 0 replies
- 0 views
Today, I worked on a service request that our customer is using a 3rd party tool that has not option to specify the setting ApplicationIntent=Readonly in the connection string. The database is business critical tier with ReadScale feature enabled. As you can see in the following diagram, If the SQL connection string is configured with ApplicationIntent=ReadOnly, the application will be redirected to a read-only replica of that database or managed instance. In the following link you can find more information about the read only replica: Read queries on replicas - Azure SQL Database & SQL Managed Instance | Microsoft Learn Using this 3rd party too…
-
Armchair Architects: Architects vs. The Ivory Tower
by Guest EricCharran- 0 replies
- 0 views
Welcome back to another episode of Armchair Architects. Have you ever heard people say that it’s like architects are in the ivory tower? This may seem a bit controversial, but we’re going to talk about the roles and the relationships of architects themselves to the rest of the organization. People have this notion that architects are sitting up in the stone castle speaking their wisdom down to the peasants. Where did that come from and is this a common stereotype? It may help to talk about our own failures. In my journey, early in my career, we thought it would be good to gather a whole group of really talented architects, think of them like chefs and put th…
-
Announcing enhanced metrics for Azure Postgres Flexible Server
by Guest varun-dhawan- 0 replies
- 0 views
PostgreSQL is the world’s, most popular database and it powers data for some of the world’s largest organizations. At Microsoft, our mission is to empower every person and organization on the planet to achieve more. It is therefore our firm commitment to continually bring the best of PostgreSQL and Azure innovations to a broad community of users. Enhanced Metrics Azure Postgres Flexible Server makes it easy for customers to setup, run, scale, and monitor their Postgres workloads. As is often the case with Azure’s customer-centric design, we take care of all the operational overheads to give our customers more time to focus on building their business logic. One…
-
Architect More Secure Cloud Apps
by Guest Zachary Cavanell- 0 replies
- 0 views
Protect against ransomware and other threats as you build new cloud-based services and migrate or modernize existing apps and services. Get guidance for where to start, with a free new assessment with security recommendations and a prioritized list tailored for your organization, apps, and services. Azure expert, Matt McSpirit, joins Jeremy Chapman to share how to architect your apps and services for Zero Trust security. Start a free assessment. Get actionable guidance to implement policies and rules. Stop attacks in their tracks with a Stop an attacker at the front door. Know your risks. Have a plan. Apply security recommend…
-
-
- FPCH Admin
- 0 replies
- 195 views
Protecting sensitive content is a top priority for security and compliance administrators across all organizations. With Microsoft Purview Information Protection, you have the ability to track and regulate user access to content with sensitivity labels. However, with the accelerated adoption of apps and the evolution of our threat landscape, administrators need to ensure that the same protection of the sensitivity content available to users is also available to the apps running in their organization. We wanted to share more details around the recent feature rollout for insights and remediation for sensitive content identified by Microsoft Purview Information Protec…
Last reply by AWS, -
-
Released: SCOM Management Packs for Azure SQL Database, SQL Server, RS, AS (7.0.42.0)
by Guest EbruErsan- 0 replies
- 0 views
Updates to Azure SQL Database, SQL Server, Reporting Services, and Analysis Services Management Packs are available (7.0.42.0). You can download the MPs from the links below. Majority of the changes are based on your direct feedback. Thank you. Download Microsoft System Center Management Pack for Azure SQL Database from Official Microsoft Download Center Download Microsoft System Center Management Pack for SQL Server from Official Microsoft Download Cen... Download Microsoft System Center Management Pack for SQL Server Analysis Services from Official Micr... Download Microsoft System Center Management Pack for SQL Server Reporting Services from Official M…
-
Best practices to secure your Azure Virtual WAN
by Guest Hezi_Bahry- 0 replies
- 0 views
In this guest blog post, Hezi Bahry, Manager of Product Management Cloud Security at Check Point Software Technologies, details how Check Point’s CloudGuard can bolster Azure Virtual WAN security. To best address today’s modernized IT requirements, many organizations choose a distributed environment strategy, which includes the use of different infrastructures serving different business needs, as in Figure 1 below. Global organizations may have a large on-premises datacenter, with tens or hundreds of branch offices around the world; they utilize Microsoft Azure’s global presence to serve different business needs. Such a decentralized IT environment requires organiz…
-
Synapse Connectivity Series Part #2 - Inbound Synapse Private Endpoints
by Guest FonsecaSergio- 0 replies
- 0 views
This is part 2 of a series related to Synapse Connectivity - the link below references the previous blog article: Synapse Connectivity Series Part #1 - Inbound SQL DW connections on Public Endpoints This blog article will feature Synapse Private Endpoint. The foundation of this article was based on a previous post - Azure SQL DB Private Link / Private Endpoint - Connectivity Troubleshooting) which I will go more in depth with Synapse specific features. This post does not cover: Managed Private Endpoints that are private endpoints, but from Synapse resources (ADF / Spark) to reach external resources. I will have this covered in the next blog article of …
-
SAP Oracle 19c System Refresh Guide on Azure VMs using Azure NetApp Files Snapshots with AzAcSnap
by Guest GeertVanTeylingen- 0 replies
- 0 views
Table of Contents Version Authors Overview Disclaimer Assumptions Preparation Lab System Overview Source System GR1 Mount points GR1 fstab entries GR1 Oracle Control File Locations GR1 (default locations) Oracle pfile and spfile locations GR1 (default locations) Oracle trace file location GR1 (default location) Lab System Overview Target System XR1 Mount points XR1 fstab entries XR1 Oracle Control File Locations XR1 (default locations) Oracle pfile and spfile locations XR1 (default locations) Oracle trace file location XR1 (default location) AzAcSnap AzAcSnap command to orchestrate the online Oracle back…
-
Spacecraft mission planning with Azure
by Guest Ron Vincent- 0 replies
- 0 views
Mission planning is a set of techniques for executing actions on spacecraft resources and formulating tasks in accordance with requirements. Depending on the context of the mission, such as earth observation, communications, navigation, astronomical or cosmological purposes, mission planning involves the following: Define Objectives and on Constraints Define Alternative Mission Concepts and Designs Evaluate Alternative Mission Concepts Define and Allocate System Requirements1 Each mission is unique because it involves distinctive goals, constraints, optimizations, operating environments, strategies and tactics, orbits, and many other considerations. Howeve…
-
Upcoming Developer & Technical Events in the UK - Updated for 2023
by Guest AdamJ89- 0 replies
- 0 views
Hello from the Microsoft Developer UK team! Here's a list of upcoming events taking place in the UK in 2023 - we hope to see you virtually or in-person! Don't forget to visit our Microsoft UK Developer site at Microsoft UK Developers. There you can find a wide array of tech resources and links to communities across the UK. Date Location Event Name Description Registration Link 1 Feb London & Hybrid Reactor London Meetup Join us for Microsoft Reactor London's very own meetup! Join our Cloud Advocates & Reactor community members for tech talks and demos. Coming Soon -- will be published on aka.ms/ReactorLondon …
-
Contributor stories: Manasa Ramalinga
by Guest Sherrylist- 0 replies
- 0 views
If you have ever taken any training modules or learned something new by going through the official documentation, the material you used was probably written or co-authored by one or many contributors. These individuals often are volunteers who offer their time and expertise to cover knowledge gaps in our portfolio or to keep the existing content current. In this series, we’ll be interviewing repeat contributors to the Microsoft Learn platform to get to know them better and to learn what motivates them to keep contributing. Today we are interviewing Manasa Ramalinga. Manasa is a Senior Cloud Solutions Architect and an experienced data science leader from the US C…
-
Lesson Learned #270:DBCC FLUSHAUTHCACHE vs Client with IP address is not allowed to access server
by Guest Jose_Manuel_Jurado- 0 replies
- 0 views
Today, I worked on a service request that our customer got the following error message: Cannot open server 'servername' requested by the login. Client with IP address 'XXX.XXX.XXX.XXX' is not allowed to access the server. To enable access, use the Windows Azure Management Portal or run sp_set_firewall_rule on the master database to create a firewall rule for this IP address or address range. It may take up to five minutes for this change to take effect. Sometimes, depending on how the cache works or when the update about the firewall rules have been done, it is important to run the command DBCC FLUSHAUTHCACHE to empties the database authentication cache containing …
-
Build a Training Request solution using the Power Platform
by Guest khanya_dludlu- 0 replies
- 0 views
Meet Phiwayinkosi Khanye Dludlu Introduction Hi, I am Phiwayinkosi Khanya Dludlu , a student at the Durban University of Technology doing a Bachelor's in Information and Communications Technology. I am an aspiring Power Apps Developer, using Power Apps to solve problems and automate business processes. Late last year I was part of a Power Platform Bootcamp hosted by Greenlight Solutions in partnership with the Durban University of Technology and Someleze Diko, a Microsoft Cloud Advocate. As part of the Bootcamp, we were all required to create solutions for different scenarios. I was assigned to create a training request solution. The scenarios is as follows…
-
Start your Tech Career in 2023 from Zero to Hero
by Guest theoyinbooke- 0 replies
- 0 views
Welcome to 2023 Let's start with a warm welcome to 2023. This is the year to grow your career in Tech from Zero to Hero. I want you to stay really close to this Tech Blog this year and we have a lot planned to help you grow and realize your tech career dream. Starting a tech career can be a very daunting task, especially if you're not sure where to begin. Since the tech industry is constantly evolving, it is now much more difficult to keep up with the latest trends and technologies. But with the right knowledge and skills, you can land a rewarding and lucrative career in tech. Here's what you need to know to get started. Identify and Chose a Tech Car…
-
The Azure FinOps Guide
by Guest Dolev_Shor- 0 replies
- 0 views
This article centralizes Azure FinOps (Financial Operations) information and tools to enabling a better understanding and optimization of cloud costs. The main purposes of this guide is to help customers do more with less by: Identifying cost-saving opportunities Optimizing cloud efficiency Gaining a better understanding and control of cloud costs Contribution to this guide The community is encouraged to contribute to this guide! For any content suggestion please visit this GitHub Repository. Table Of Contents What is FinOps? Overview Tools Ways to Optimize Assessment Learning Content General Calculators Cost Management Ad…
-
Observability using ADX
by Guest Charitha_Basani- 0 replies
- 0 views
Observability using ADX The customers are looking for cost effective tools for enterprise monitoring initiatives of their tech infrastructure. Wanted to share my successful experience of customer scenarios where ADX is the critical component for building a scalable ‘Observability Monitoring solution’. It is a fully managed data service for streaming rapidly changing data and converting it into real-time insights. This can be accomplished with deeper analysis into the behaviors of the Network, Application, Services, Databases, or any technical instances that generate logs. The goal is to design a comprehensive operational monitoring with proactive controls. 3 Pillar…
-
Instance level public ip address configuration in the cloud service.
by Guest Frank_Pan- 0 replies
- 0 views
An Instance-Level Public IP Address (PIP) unlike the Virtual IP Address (VIP) is not load balanced. While the virtual ip is assigned to the cloud service and shared by all virtual machines and role instances in it, the public ip is associated only with a single instance’s NIC. The public ip is particularly useful in multi-instance deployments where each instance can be reachable independently from the Internet. The picture below illustrates the value of PIP and differentiates it from the VIP. The blog will help you understand how to configure the instance level public ip. For some background knowledge, please find the reference Instance-Level Public IP …
-
Switch to the new Defender for Storage pricing plan
by Guest fbinotto- 0 replies
- 0 views
Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia. If you missed, a new pricing plan has been announced for Microsoft Defender for Storage. The legacy pricing plan (per-transaction) is priced at $0.02 per 10K transactions, which can become a bit expensive if the Storage Account has a very large number of transactions. The new pricing plan (per-storage-account) is priced at $10 per storage account which includes 73M transactions. Storage Accounts exceeding 73M transactions will be charged $0.1492 per 1M transactions. We have made available a workbook which can scan all your storage accounts and provide the…