Skip to content

Commit 6b3af30

Browse files
committed
Fixed blocking issues
1 parent 382f693 commit 6b3af30

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

articles/search/search-howto-run-reset-indexers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ An indexer job runs in a managed execution environment. Currently, there are two
4242

4343
Indexer execution environments include:
4444

45-
+ A private execution environment that runs on search nodes, specific to your search service.
45+
+ A private execution environment that runs on content processors that are specific to your search service.
4646

4747
+ A multitenant environment with content processors, managed and secured by Microsoft at no extra cost. This environment is used to offload computationally intensive processing, leaving service-specific resources available for routine operations. Whenever possible, most indexer jobs are executed in the multitenant environment.
4848

@@ -51,7 +51,7 @@ Indexer limits vary for each environment:
5151
| Workload | Maximum duration | Maximum jobs | Execution environment |
5252
|----------|------------------|---------------------|-----------------------------|
5353
| Private execution | 24 hours | One indexer job per [search unit](search-capacity-planning.md#concepts-search-units-replicas-partitions) <sup>1</sup>. | Indexing doesn't run in the background. Instead, the search service will balance all indexing jobs against ongoing queries and object management actions (such as creating or updating indexes). When running indexers, you should expect to see [some query latency](search-performance-analysis.md#impact-of-indexing-on-queries) if indexing volumes are large. |
54-
| Multitenant| 2 hours <sup>2</sup> | Indeterminate <sup>3</sup> | Because the content processing cluster is multitenant, nodes are added to meet demand. If you experience a delay in on-demand or scheduled execution, it's probably because the system is either adding nodes or waiting for one to become available.|
54+
| Multitenant| 2 hours <sup>2</sup> | Indeterminate <sup>3</sup> | Because the content processing cluster is multitenant, content processors are added to meet demand. If you experience a delay in on-demand or scheduled execution, it's probably because the system is either adding processors or waiting for one to become available.|
5555

5656
<sup>1</sup> Search units can be [flexible combinations](search-capacity-planning.md#partition-and-replica-combinations) of partitions and replicas, but indexer jobs aren't tied to one or the other. In other words, if you have 12 units, you can have 12 indexer jobs running concurrently in private execution, no matter how the search units are deployed.
5757

articles/search/search-howto-schedule-indexers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ Let’s consider an example to make this more concrete. Suppose we configure an
132132

133133
**What happens if indexing fails repeatedly on the same document?**
134134

135-
If an indexer is set to a certain schedule but repeatedly fails on the same document each time, the indexer will begin running on a less frequent interval (up to the maximum interval of at least once every 2 hours or 24 hours, depending on different implementation factors) until it successfully makes progress again. If you believe you have fixed whatever the underlying issue, you can [run the indexer manually](search-howto-run-reset-indexers.md), and if indexing succeeds, the indexer will return to its regular schedule.
135+
If an indexer is set to a certain schedule but repeatedly fails on the same document each time, the indexer will begin running on a less frequent interval (up to the maximum interval of at least once every 2 hours or 24 hours, depending on different implementation factors) until it successfully makes progress again. If you believe you have fixed the underlying issue, you can [run the indexer manually](search-howto-run-reset-indexers.md), and if indexing succeeds, the indexer will return to its regular schedule.
136136

137137
## Next steps
138138

articles/search/search-security-manage-encryption-keys.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -115,15 +115,15 @@ Azure AI Search encryption supports RSA keys of sizes 2048, 3072 and 4096. For m
115115

116116
## Step 2: Create a security principal
117117

118-
You have several options for setting up Azure AI Search access to the encryption key at run time. The simplest approach is to retrieve the key using the managed identity of your search service. You can use either a system or user-managed identity. Doing so allows you to omit the steps for application registration and application secrets. Alternatively, you can create and register a Microsoft Entra application and have the search service provides the application ID on requests.
118+
You have several options for setting up Azure AI Search access to the encryption key at run time. The simplest approach is to retrieve the key using the managed identity of your search service. You can use either a system or user-managed identity. Doing so allows you to omit the steps for application registration and application secrets. Alternatively, you can create and register a Microsoft Entra application and have the search service provide the application ID on requests.
119119

120120
We recommend using a managed identity. A managed identity enables your search service to authenticate to Azure Key Vault without storing credentials (ApplicationID or ApplicationSecret) in code. The lifecycle of this type of managed identity is tied to the lifecycle of your search service, which can only have one system assigned managed identity. For more information about how managed identities work, see [What are managed identities for Azure resources](/azure/active-directory/managed-identities-azure-resources/overview).
121121

122122
### [**System-managed identity**](#tab/managed-id-sys)
123123

124124
Enable the system assigned managed identity for your search service.
125125

126-
![Turn on system assigned managed identity](./media/search-managed-identities/turn-on-system-assigned-identity.png "Turn on system assigned managed identity")
126+
![Turn on system assigned managed identity](./media/search-managed-identities/turn-on-system-assigned-identity.png "Screenshot showing how to turn on the system-assigned managed identity.")
127127

128128
### [**User-managed identity (preview)**](#tab/managed-id-user)
129129

@@ -349,7 +349,7 @@ PATCH https://management.azure.com/subscriptions/<your-subscription-Id>/resource
349349

350350
We recommend using the [autorotation capabilities of Azure Key Vault](/azure/key-vault/keys/how-to-configure-key-rotation), but you can also rotate keys manually.
351351

352-
When you change a key or its version, any object that uses the key must first be updated to use the new key\version **before** deleting the previous key\version. Failing to do so will render the object unusable, as it won't be able to decrypt the content once key access is lost. Although restoring key vault access permissions at a later time will restore content access.
352+
When you change a key or its version, any object that uses the key must first be updated to use the new values **before** you delete the old values. Otherwise, the object becomes unusable because it can't be decrypted.
353353

354354
1. [Determine the key used by an index or synonym map](search-security-get-encryption-keys.md).
355355

@@ -365,7 +365,7 @@ For performance reasons, the search service caches the key for up to several hou
365365

366366
With customer-managed key encryption, you might notice latency for both indexing and queries due to the extra encrypt/decrypt work. Azure AI Search doesn't log encryption activity, but you can monitor key access through key vault logging.
367367

368-
We reommend that you [enable logging](/azure/key-vault/general/logging) as part of key vault configuration.
368+
We recommend that you [enable logging](/azure/key-vault/general/logging) as part of key vault configuration.
369369

370370
1. [Create a log analytics workspace](/azure/azure-monitor/logs/quick-create-workspace).
371371

0 commit comments

Comments
 (0)