Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VM Scale Set & Application Security Groups #7853

Closed
JamesDLD opened this issue Apr 29, 2018 — with docs.microsoft.com · 3 comments
Closed

VM Scale Set & Application Security Groups #7853

JamesDLD opened this issue Apr 29, 2018 — with docs.microsoft.com · 3 comments

Comments

Copy link

Hello,

could you please plan a new feature to permit the attachment of VM Scale Set to Application Security Groups?
This will be very useful if it could be automated when scaling up, another point is that at the build we could not anticipate the VM Scale Set nic IPs, so it’s difficult to associate NSG rules.
The current most effective way I see at the moment is to add one VM Scale Set in a dedicated subnet, link an NSG to it and target or source the IP CIDR of the subnet.

Thanks
James


Document Details

Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.

@mimckitt
Copy link
Contributor

@JamesDLD thanks for the feedback! I would suggest you leave this feature suggestion on our Uservoice page: https://feedback.azure.com/forums/216843-virtual-machines

In fact, this is where the "Give Product Feedback" link on the doc pages brings you do:
image

I will close this for now but please feel free to post that feedback on Uservoice and post the link here for others to see as well.

@JamesDLD
Copy link
Author

Just did it here : https://feedback.azure.com/forums/216843-virtual-machines/suggestions/34102438-vm-scale-set-application-security-groups

Do not hesitate to vote 😉

@mimckitt
Copy link
Contributor

Thanks @JamesDLD! I added my up votes as well :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants