Skip to content

Commit ca779c4

Browse files
authored
Merge pull request #5415 from haileytap/hailey-newly-owned-content
[Azure Search] Update eligible tiers for SPLs
2 parents fa8e0ad + 763feaa commit ca779c4

File tree

2 files changed

+44
-45
lines changed

2 files changed

+44
-45
lines changed

articles/search/search-index-azure-sql-managed-instance-with-managed-identity.md

Lines changed: 18 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: azure-ai-search
99
ms.custom:
1010
- ignite-2023
1111
ms.topic: conceptual
12-
ms.date: 05/29/2025
12+
ms.date: 06/04/2025
1313
---
1414

1515
# Set up an indexer connection to Azure SQL Managed Instance using a managed identity
@@ -18,7 +18,7 @@ This article describes how to set up an Azure AI Search indexer connection to [S
1818

1919
You can use a system-assigned managed identity or a user-assigned managed identity (preview). Managed identities are Microsoft Entra logins and require Azure role assignments to access data in SQL Managed Instance.
2020

21-
Before learning more about this feature, it's recommended that you understand what an indexer is and how to set up an indexer for your data source. More information can be found at the following links:
21+
Before learning more about this feature, we recommended that you understand what an indexer is and how to set up an indexer for your data source. More information can be found at the following links:
2222

2323
* [Indexer overview](search-indexer-overview.md)
2424
* [SQL Managed Instance indexer](search-how-to-index-sql-database.md)
@@ -29,30 +29,29 @@ Before learning more about this feature, it's recommended that you understand wh
2929

3030
* Microsoft Entra admin role on SQL Managed Instance:
3131

32-
To assign read permissions on SQL Managed Instance, you must be an Azure Global Admin with a SQL Managed Instance. See [Configure and manage Microsoft Entra authentication with SQL Managed Instance](/azure/azure-sql/database/authentication-aad-configure) and follow the steps to provision a Microsoft Entra admin (SQL Managed Instance).
32+
To assign read permissions on SQL Managed Instance, you must be an Azure Global Admin with a SQL Managed Instance. See [Configure and manage Microsoft Entra authentication with SQL Managed Instance](/azure/azure-sql/database/authentication-aad-configure) and follow the steps to provision a Microsoft Entra admin (SQL Managed Instance).
3333

34-
* [Configure a public endpoint and network security group in SQL Managed Instance](search-how-to-index-sql-managed-instance.md) to allow connections from Azure AI Search. Connecting through a Shared Private Link when using a managed identity isn't currently supported.
34+
* [Configure a public endpoint and network security group in SQL Managed Instance](search-how-to-index-sql-managed-instance.md) to allow connections from Azure AI Search. Connecting through a shared private link when using a managed identity isn't currently supported.
3535

36-
## 1 - Assign permissions to read the database
36+
## Assign permissions to read the database
3737

3838
Follow these steps to assign the search service system managed identity permission to read the SQL Managed database.
3939

4040
1. Connect to your SQL Managed Instance through SQL Server Management Studio (SSMS) by using one of the following methods:
4141

4242
- [Configure a point-to-site connection from on-premises](/azure/azure-sql/managed-instance/point-to-site-p2s-configure)
43-
- [Configure an Azure VM](/azure/azure-sql/managed-instance/connect-vm-instance-configure)
43+
- [Configure an Azure virtual machine](/azure/azure-sql/managed-instance/connect-vm-instance-configure)
4444

4545
1. Authenticate with your Microsoft Entra account.
4646

4747
:::image type="content" source="./media/search-index-azure-sql-managed-instance-with-managed-identity/sql-login.png" alt-text="Showing screenshot of the Connect to Server dialog.":::
4848

49-
1. From the left pane, locate the SQL database you are using as data source for indexing and right-click it. Select **New Query**.
49+
1. From the left pane, locate the SQL database you're using as data source for indexing and right-click it. Select **New Query**.
5050

5151
:::image type="content" source="./media/search-index-azure-sql-managed-instance-with-managed-identity/new-sql-query.png" alt-text="Showing screenshot of new SQL query.":::
5252

53-
1. In the T-SQL window, copy the following commands and include the brackets around your search service name. Click on **Execute**.
53+
1. In the T-SQL window, copy the following commands and include the brackets around your search service name. Select **Execute**.
5454

55-
5655
```sql
5756
CREATE USER [insert your search service name here or user-assigned managed identity name] FROM EXTERNAL PROVIDER;
5857
EXEC sp_addrolemember 'db_datareader', [insert your search service name here or user-assigned managed identity name];
@@ -68,9 +67,9 @@ sp_droprolemember 'db_datareader', [insert your search service name or user-assi
6867
DROP USER IF EXISTS [insert your search service name or user-assigned managed identity name];
6968
```
7069

71-
## 2 - Add a role assignment
70+
## Add a role assignment
7271

73-
In this step, you'll give your Azure AI Search service permission to read data from your SQL Managed Instance.
72+
In this step, you give your Azure AI Search service permission to read data from your SQL Managed Instance.
7473

7574
1. In the Azure portal, navigate to your SQL Managed Instance page.
7675
1. Select **Access control (IAM)**.
@@ -86,15 +85,15 @@ In this step, you'll give your Azure AI Search service permission to read data f
8685

8786
:::image type="content" source="./media/search-index-azure-sql-managed-instance-with-managed-identity/add-role-assignment.png" alt-text="Showing screenshot of the member role assignment.":::
8887

89-
## 3 - Create the data source
88+
## Create the data source
9089

9190
Create the data source and provide a system-assigned managed identity.
9291

9392
### System-assigned managed identity
9493

95-
The [REST API](/rest/api/searchservice/data-sources/create), Azure portal, and the [.NET SDK](/dotnet/api/azure.search.documents.indexes.models.searchindexerdatasourceconnection) support system-assigned managed identity.
94+
The [REST API](/rest/api/searchservice/data-sources/create), Azure portal, and the [.NET SDK](/dotnet/api/azure.search.documents.indexes.models.searchindexerdatasourceconnection) support system-assigned managed identity.
9695

97-
When you're connecting with a system-assigned managed identity, the only change to the data source definition is the format of the "credentials" property. You'll provide an Initial Catalog or Database name and a `ResourceId` that has no account key or password. The `ResourceId` must include the subscription ID of SQL Managed Instance, the resource group of SQL Managed instance, and the name of the SQL database.
96+
When you're connecting with a system-assigned managed identity, the only change to the data source definition is the format of the "credentials" property. You provide an Initial Catalog or Database name and a `ResourceId` that has no account key or password. The `ResourceId` must include the subscription ID of SQL Managed Instance, the resource group of SQL Managed instance, and the name of the SQL database.
9897
9998
Here's an example of how to create a data source to index data from a storage account using the [Create Data Source](/rest/api/searchservice/data-sources/create) REST API and a managed identity connection string. The managed identity connection string format is the same for the REST API, .NET SDK, and the Azure portal.
10099

@@ -115,11 +114,11 @@ api-key: [admin key]
115114
}
116115
```
117116

118-
## 4 - Create the index
117+
## Create the index
119118

120119
The index specifies the fields in a document, attributes, and other constructs that shape the search experience.
121120

122-
Here's a [Create Index](/rest/api/searchservice/indexes/create) REST API call with a searchable `booktitle` field:
121+
Here's a [Create Index](/rest/api/searchservice/indexes/create) REST API call with a searchable `booktitle` field:
123122
124123
```http
125124
POST https://[service name].search.windows.net/indexes?api-version=2024-07-01
@@ -135,9 +134,9 @@ api-key: [admin key]
135134
}
136135
```
137136
138-
## 5 - Create the indexer
137+
## Create the indexer
139138
140-
An indexer connects a data source with a target search index, and provides a schedule to automate the data refresh. Once the index and data source have been created, you're ready to create the indexer.
139+
An indexer connects a data source with a target search index, and provides a schedule to automate the data refresh. Once the index and data source are created, you're ready to create the indexer.
141140

142141
Here's a [Create Indexer](/rest/api/searchservice/indexers/create) REST API call with an Azure SQL indexer definition. The indexer runs when you submit the request.
143142
@@ -155,7 +154,7 @@ api-key: [admin key]
155154
156155
## Troubleshooting
157156
158-
If you get an error when the indexer tries to connect to the data source that says that the client is not allowed to access the server, take a look at [common indexer errors](./search-indexer-troubleshooting.md).
157+
If you get an error when the indexer tries to connect to the data source that says that the client isn't allowed to access the server, see the [common indexer errors](./search-indexer-troubleshooting.md).
159158

160159
You can also rule out any firewall issues by trying the connection with and without restrictions in place.
161160

0 commit comments

Comments
 (0)