M365 Show Podcast

Stop Using Default Gateway Settings: Fix Your Power Platform Connectivity NOW!

🔍 Key Topics Covered 1) The Misunderstood Middleman — What the Gateway Actually Does

  • The real flow: Service → Gateway cluster → Host → Data source → Return (auth, TLS, translation, buffering—not a “dumb relay”).
  • Modes that matter: Standard (enterprise/clustered), Personal (single-user—don’t use for shared), VNet Gateway (Azure VNet for zero inbound).
  • Why memory, CPU, encryption, and temp files make the Gateway a processing engine, not a pipe.
2) Default Settings = Hidden Performance Killers
  • Concurrency: default = “polite queue”; fix by raising parallel queries (within host capacity).
  • Buffer sizing: avoid disk spill; give RAM breathing room.
  • AV exclusions: exclude Gateway install/cache/log paths from real-time scanning.
  • StreamBeforeRequestCompletes: great on low-latency LANs; risky over high-latency VPNs.
  • Updates reset tweaks: post-update amnesia can tank refresh time—re-apply your tuning.
3) The Network Factor — Routing, Latency & Cold-Potato Reality
  • Let traffic egress locally to the nearest Microsoft edge POP; ride the Microsoft global backbone.
  • Stop hair-pinning through corporate VPNs/proxies “for control” (adds hops, latency, TLS inspection delays).
  • Use Microsoft Network routing preference for sensitive/interactive analytics; reserve “Internet option” for bulk/low-priority.
  • Latency compounds; bad routing nullifies every other optimization.
4) Hardware & Hosting — Build a Real Gateway Host
  • Practical specs: ≥16 GB RAM, 8+ physical cores, SSD/NVMe for cache/logs.
  • VMs are fine if CPU/memory are reserved (no overcommit); otherwise go physical.
  • Clusters (2+ nodes) for load & resilience; keep versions/configs aligned.
  • Measure what matters: Gateway Performance report + PerfMon (CPU, RAM, private bytes, query duration).
5) Proactive Optimization & Maintenance
  • Don’t auto-update to prod; stage, test, then promote.
  • Keep/restore config backups (cluster & data source settings).
  • Weekly health dashboards: correlate spikes with refresh schedules; spread workloads.
  • PowerShell health checks (status, version, queue depth); scheduled proactive restarts.
  • Baseline & document: OS build, .NET, ports, AV exclusions; treat Gateway like real infrastructure.
🧠 Key Takeaways
  • The Gateway is infrastructure, not middleware: tune it, monitor it, scale it.
  • Fix the two killers: routing (egress local → MS backbone) and concurrency/buffers (match to host).
  • Spec a host like you mean it: RAM, cores, SSD, cluster.
  • Protect performance from updates: stage, verify, and only then upgrade.
  • Latency beats hardware every time—get off the VPN detour.
✅ Implementation Checklist (Copy/Paste)
  • Verify mode: Standard Gateway (not Personal); cluster at least 2 nodes.
  • Raise concurrency per data source/node; increase buffers (monitor RAM).
  • Place cache/logs on SSD/NVMe; set AV exclusions for Gateway paths.
  • Review StreamBeforeRequestCompletes based on network latency.
  • Route egress locally; bypass VPN/proxy for M365/Power Platform endpoints.
  • Confirm Microsoft Network routing preference for analytic traffic.
  • Host sizing: ≥16 GB RAM, 8+ cores, reserved if virtualized.
  • Enable & review Gateway Performance report; add PerfMon counters.
  • Implement PowerShell health checks + scheduled, graceful service restarts.
  • Stage updates on a secondary node; keep config/version backups; document baseline.
🎧 Listen & Subscribe If this episode shaved 40 minutes off your refresh window, follow the show and turn on notifications. Next up: routing optimization across M365—edge POP testing, endpoint allow-lists, and how to spot fake “healthy” paths that quietly burn your SLA.



Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.

Follow us on:
LInkedIn
Substack