Skip to content

Commit db26427

Browse files
Merge pull request #1845 from HeidiSteen/heidist-uuf
[azure search] Ported changes from corrupt PR to new PR
2 parents 0c3b3a3 + a97e2b6 commit db26427

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

articles/search/search-security-network-security-perimeter.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,17 +9,16 @@ ms.service: azure-ai-search
99
ms.custom:
1010
- ignite-2024
1111
ms.topic: how-to
12-
ms.date: 10/23/2024
12+
ms.date: 12/05/2024
1313
---
1414

1515
# Add a search service to a network security perimeter
1616

1717
> [!IMPORTANT]
18-
> Azure AI Search support for network security perimeter is in public preview under supplemental terms of use. It's available in [regions providing the feature](/azure/private-link/network-security-perimeter-concepts).
18+
> Azure AI Search support for network security perimeter is in public preview under [supplemental terms of use](https://azure.microsoft.com/support/legal/preview-supplemental-terms/). It's available in [regions providing the feature](/azure/private-link/network-security-perimeter-concepts).
1919
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
20-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2120
>
22-
> Be sure to review the [limitations and considerations](#limitations-and-considerations) section before you start.
21+
> Review the [limitations and considerations](#limitations-and-considerations) section before you start.
2322
2423
This article explains how to join an Azure AI Search service to a [network security perimeter](/azure/private-link/network-security-perimeter-concepts) to control network access to your search service. By joining a network security perimeter, you can:
2524

@@ -35,6 +34,8 @@ You can add a search service to a network security perimeter in the Azure portal
3534

3635
* Supported indexer data sources are currently limited to [Azure Blob Storage](search-howto-indexing-azure-blob-storage.md), [Azure Cosmos DB for NoSQL](./search-howto-index-cosmosdb.md), and [Azure SQL Database](search-how-to-index-sql-database.md).
3736

37+
* Currently, within the perimeter, indexer connections to Azure PaaS for data retrieval is the primary use case. For outbound skills-driven API calls to Azure AI services, Azure OpenAI, or the Azure AI Foundry model catalog, or for inbound calls from the Azure AI Foundry for "chat with your data" scenarios you must [configure inbound and outbound rules](#add-an-inbound-access-rule) to allow the requests through the perimeter. If you require private connections for [structure-aware chunking](search-how-to-semantic-chunking.md) and vectorization, you should [create a shared private link](search-indexer-howto-access-private.md) and a private network.
38+
3839
## Prerequisites
3940

4041
* An existing network security perimeter. You can [create one to associate with your search service](/azure/private-link/create-network-security-perimeter-portal).
@@ -47,7 +48,7 @@ Azure Network Security Perimeter allows administrators to define a logical netwo
4748

4849
You can add Azure AI Search to a network security perimeter so that all indexing and query requests occur within the security boundary.
4950

50-
1. In the Azure portal, create or find the network security perimeter service for your subscription.
51+
1. In the Azure portal, find the network security perimeter service for your subscription.
5152

5253
1. Select **Resources** from the left-hand menu.
5354

0 commit comments

Comments
 (0)