You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can choose to be more restrictive in the inbound access to your managed SQL instance by modifying the current rule (`public_endpoint_inbound`) with 2 rules) -
34
+
> You can choose to be more restrictive in the inbound access to your managed SQL instance by modifying the current rule (`public_endpoint_inbound`) with 2 rules) -
35
35
>
36
-
> 1. Allowing inbound access from the `AzureCognitiveSearch`[service tag](https://docs.microsoft.com/azure/virtual-network/service-tags-overview#available-service-tags) ("SOURCE" = `AzureCognitiveSearch`)
36
+
> * Allowing inbound access from the `AzureCognitiveSearch`[service tag](https://docs.microsoft.com/azure/virtual-network/service-tags-overview#available-service-tags) ("SOURCE" = `AzureCognitiveSearch`)
37
37
>
38
-
> 2. Allowing inbound access from the IP address of the search service, which can be obtained by pinging its fully qualified domain name (eg., `<your-search-service-name>.search.windows.net`). ("SOURCE" = `IP address`)
38
+
> * Allowing inbound access from the IP address of the search service, which can be obtained by pinging its fully qualified domain name (eg., `<your-search-service-name>.search.windows.net`). ("SOURCE" = `IP address`)
39
39
40
40
## Get public endpoint connection string
41
41
Make sure you use the connection string for the **public endpoint** (port 3342, not port 1433).
> Indexers have limited support for accessing data sources and other resources that are secured by Azure network security mechanisms. Currently, indexers can only access data sources via corresponding IP address range restriction mechanisms or NSG rules when applicable. Details for accessing each supported data source can be found below.
@@ -34,16 +34,16 @@ Azure Storage, CosmosDB and Azure SQL provide a configurable firewall. There's n
34
34
35
35
There are 2 options for allowing indexers to access these resources in such an instance:
36
36
37
-
1. Disable the firewall, by allowing access from **All Networks** (if feasible).
38
-
2. Alternatively, you can allow access for the IP address of your search service and the IP address range of `AzureCognitiveSearch`[service tag](https://docs.microsoft.com/azure/virtual-network/service-tags-overview#available-service-tags) in the firewall rules of your resource (IP address range restriction).
37
+
* Disable the firewall, by allowing access from **All Networks** (if feasible).
38
+
* Alternatively, you can allow access for the IP address of your search service and the IP address range of `AzureCognitiveSearch`[service tag](https://docs.microsoft.com/azure/virtual-network/service-tags-overview#available-service-tags) in the firewall rules of your resource (IP address range restriction).
39
39
40
40
Details for configuring IP address range restrictions for each data source type can be found from the following links:
**Limitation**: As stated in the documentation above for Azure Storage, IP address range restrictions will only work if your search service and your storage account are in different regions.
49
49
@@ -61,11 +61,11 @@ The `AzureCognitiveSearch` service tag can be directly used in the inbound [NSG
61
61
62
62
More details for accessing data in a SQL managed instance are outlined [here](search-howto-connecting-azure-sql-mi-to-azure-search-using-indexers.md)
63
63
64
-
### CosmosDB Indexing isn't enabled
64
+
### CosmosDB "Indexing" isn't enabled
65
65
66
66
Azure Cognitive Search has an implicit dependency on Cosmos DB indexing. If you turn off automatic indexing in Cosmos DB, Azure Cognitive Search returns a successful state, but fails to index container contents. For instructions on how to check settings and turn on indexing, see [Manage indexing in Azure Cosmos DB](https://docs.microsoft.com/azure/cosmos-db/how-to-manage-indexing-policy#use-the-azure-portal).
0 commit comments