Skip to content

Commit 8be5549

Browse files
Merge pull request #4826 from gmndrg/main
Update search-indexer-securing-resources.md
2 parents 5a35b69 + c241213 commit 8be5549

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

articles/search/search-indexer-securing-resources.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: azure-ai-search
1010
ms.custom:
1111
- ignite-2023
1212
ms.topic: conceptual
13-
ms.date: 12/19/2024
13+
ms.date: 05/12/2025
1414
---
1515

1616
# Indexer access to content protected by Azure network security
@@ -79,7 +79,6 @@ For any given indexer run, Azure AI Search determines the best environment in wh
7979
| Private | Internal to a search service. Indexers running in the private environment share computing resources with other indexing and query workloads on the same search service. If you set up a private connection between an indexer and your data, such as a shared private link, this is the only execution environment you can use and it's used automatically. |
8080
| multitenant | Managed and secured by Microsoft at no extra cost. It isn't subject to any network provisions under your control. This environment is used to offload computationally intensive processing, leaving service-specific resources available for routine operations. Examples of resource-intensive indexer jobs include skillsets, processing large documents, or processing a high volume of documents. |
8181

82-
For Standard2 services and higher, you can configure an indexer to always use the private environment. However, skillset processing always executes in the multitenant environment, even if you configure your search service to use the private environment. For more information about indexer configuration, see [Create an indexer](search-how-to-create-indexers.md?tabs=indexer-rest#create-an-indexer).
8382

8483
### Setting up IP ranges for indexer execution
8584

0 commit comments

Comments
 (0)