Skip to content

Commit 7fe7280

Browse files
committed
logic apps sku limitation
1 parent b8aecb6 commit 7fe7280

File tree

2 files changed

+6
-3
lines changed

2 files changed

+6
-3
lines changed

articles/search/search-how-to-index-logic-apps-indexers.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ After the wizard completes, you have the following components:
4141
| Component | Location | Description |
4242
|-----------|----------|------------|
4343
| Search index | Azure AI Search | Contains indexed content from a supported Logic Apps connector. The index schema is a default index created by the wizard. You can add extra elements, such as scoring profile or semantic configuration, but you can't change existing fields. You view, manage, and access the search index on Azure AI Search. |
44-
| Logic app resource and workflow | Azure Logic Apps | You can view the running workflow, or you can open the designer in Azure Logic Apps to edit the workflow, as you regularly do if you'd started from Azure Logic Apps instead. You can edit and extend the workflow, but exercise caution so as to not break the indexing pipeline. |
44+
| Logic app resource and workflow | Azure Logic Apps | You can view the running workflow, or you can open the designer in Azure Logic Apps to edit the workflow, as you regularly do if you'd started from Azure Logic Apps instead. You can edit and extend the workflow, but exercise caution so as to not break the indexing pipeline. The workflow created by the wizard uses the **Consumption** hosting option. |
4545
| Logic app templates | Azure Logic Apps | Up to two templates created per workflow: one for on-demand indexing, and a second template for scheduled indexing. You can modify the indexing schedule in the **Index multiple documents** step of the workflow. |
4646

4747
## Prerequisites
@@ -101,6 +101,7 @@ Currently, the public preview has these limitations:
101101
+ Vectorization supports text embedding only.
102102
+ Deletion detection isn't supported. You must manually [delete orphaned documents](search-howto-reindex.md#delete-orphan-documents) from the index.
103103
+ Duplicate documents in the search index are a known issue in this preview. Consider deleting objects and starting over if this becomes an issue.
104+
+ No support for private endpoints in the logic app workflow created by the portal wizard. The workflow is hosted using the [**Consumption** hosting option](/azure/logic-apps/single-tenant-overview-compare) and is subject to its constraints. To use the **Standard** hosting option, use a programmatic approach to creating the workflow. Use the [2025-05-01-preview REST API](/rest/api/searchservice/operation-groups?view=rest-searchservice-2025-05-01-preview&preserve-view=true) or a prerelease Azure SDK package that provides the feature.
104105

105106
## Create a logic app workflow
106107

articles/search/search-query-access-control-rbac-enforcement.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,8 @@ Azure Data Lake Storage (ADLS) Gen2 provides an access model that makes fine-gra
2929

3030
This section lists the order of operations for ACL enforcement at query time. Operations vary depending on whether you use Azure RBAC scope or Microsoft Entra ID group or user IDs.
3131

32-
### 1. User permissions input
32+
### 1. User permissions input
33+
3334
The end-user application sends user permission as part of the search query request. The following table lists the source of the user permissions Azure AI Search uses for ACL enforcement:
3435

3536
| Permission type | Source |
@@ -39,6 +40,7 @@ The end-user application sends user permission as part of the search query reque
3940
| rbacScope | Permissions the user from `x-ms-query-source-authorization` has on a storage container |
4041

4142
### 2. Security filter construction
43+
4244
Azure AI Search dynamically constructs security filters based on the user permissions provided. These security filters are automatically appended to any filters that might come in with the query if the index has the permission filter option enabled.
4345

4446
For Azure RBAC, permissions are list of resource ID strings, and there must an Azure role assignment (Storage Blob Data Reader) on the data the source that grants access to the security principal token in the authorization header. The filter excludes documents if there's no role assignment for the principal behind the access token on the request.
@@ -56,7 +58,7 @@ The security filter efficiently matches the userIds, groupIds, and rbacScope fro
5658

5759
## Query example
5860

59-
Here's an example of a query request. The query token is passed in the request header.
61+
Here's an example of a query request from [sample code](https://github.com/Azure-Samples/azure-search-rest-samples/tree/main/Quickstart-ACL). The query token is passed in the request header.
6062

6163
```http
6264
POST {{endpoint}}/indexes/stateparks/docs/search?api-version=2025-05-01-preview

0 commit comments

Comments
 (0)