Skip to content

Commit 095185d

Browse files
author
Arvind Krishnaa Jagannathan
committed
incorporate PR feedback
1 parent 2f4dc4d commit 095185d

File tree

2 files changed

+12
-12
lines changed

2 files changed

+12
-12
lines changed

articles/search/search-howto-connecting-azure-sql-mi-to-azure-search-using-indexers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,11 +31,11 @@ Check the Network Security Group has the correct **Inbound security rules** that
3131
![NSG Inbound security rule](media/search-howto-connecting-azure-sql-mi-to-azure-search-using-indexers/nsg-rule.png "NSG Inbound security rule")
3232

3333
> [!NOTE]
34-
You can choose to be more restrictive in the inbound access to your managed SQL instance by modifying the current rule (`public_endpoint_inbound`) with 2 rules) -
34+
> You can choose to be more restrictive in the inbound access to your managed SQL instance by modifying the current rule (`public_endpoint_inbound`) with 2 rules) -
3535
>
36-
> 1. Allowing inbound access from the `AzureCognitiveSearch` [service tag](https://docs.microsoft.com/azure/virtual-network/service-tags-overview#available-service-tags) ("SOURCE" = `AzureCognitiveSearch`)
36+
> * Allowing inbound access from the `AzureCognitiveSearch` [service tag](https://docs.microsoft.com/azure/virtual-network/service-tags-overview#available-service-tags) ("SOURCE" = `AzureCognitiveSearch`)
3737
>
38-
> 2. Allowing inbound access from the IP address of the search service, which can be obtained by pinging its fully qualified domain name (eg., `<your-search-service-name>.search.windows.net`). ("SOURCE" = `IP address`)
38+
> * Allowing inbound access from the IP address of the search service, which can be obtained by pinging its fully qualified domain name (eg., `<your-search-service-name>.search.windows.net`). ("SOURCE" = `IP address`)
3939
4040
## Get public endpoint connection string
4141
Make sure you use the connection string for the **public endpoint** (port 3342, not port 1433).

articles/search/search-indexer-troubleshooting.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Indexers can run into a number of issues when indexing data into Azure Cognitive
1919
* [Document processing](#document-processing-errors)
2020
* [Document ingestion to an index](#index-errors)
2121

22-
## Connection Errors
22+
## Connection errors
2323

2424
> [!NOTE]
2525
> Indexers have limited support for accessing data sources and other resources that are secured by Azure network security mechanisms. Currently, indexers can only access data sources via corresponding IP address range restriction mechanisms or NSG rules when applicable. Details for accessing each supported data source can be found below.
@@ -34,16 +34,16 @@ Azure Storage, CosmosDB and Azure SQL provide a configurable firewall. There's n
3434

3535
There are 2 options for allowing indexers to access these resources in such an instance:
3636

37-
1. Disable the firewall, by allowing access from **All Networks** (if feasible).
38-
2. Alternatively, you can allow access for the IP address of your search service and the IP address range of `AzureCognitiveSearch` [service tag](https://docs.microsoft.com/azure/virtual-network/service-tags-overview#available-service-tags) in the firewall rules of your resource (IP address range restriction).
37+
* Disable the firewall, by allowing access from **All Networks** (if feasible).
38+
* Alternatively, you can allow access for the IP address of your search service and the IP address range of `AzureCognitiveSearch` [service tag](https://docs.microsoft.com/azure/virtual-network/service-tags-overview#available-service-tags) in the firewall rules of your resource (IP address range restriction).
3939

4040
Details for configuring IP address range restrictions for each data source type can be found from the following links:
4141

42-
1. [Azure Storage](https://docs.microsoft.com/azure/storage/common/storage-network-security#grant-access-from-an-internet-ip-range)
42+
* [Azure Storage](https://docs.microsoft.com/azure/storage/common/storage-network-security#grant-access-from-an-internet-ip-range)
4343

44-
2. [Cosmos DB](https://docs.microsoft.com/azure/storage/common/storage-network-security#grant-access-from-an-internet-ip-range)
44+
* [Cosmos DB](https://docs.microsoft.com/azure/storage/common/storage-network-security#grant-access-from-an-internet-ip-range)
4545

46-
3. [Azure SQL](https://docs.microsoft.com/azure/sql-database/sql-database-firewall-configure#create-and-manage-ip-firewall-rules)
46+
* [Azure SQL](https://docs.microsoft.com/azure/sql-database/sql-database-firewall-configure#create-and-manage-ip-firewall-rules)
4747

4848
**Limitation**: As stated in the documentation above for Azure Storage, IP address range restrictions will only work if your search service and your storage account are in different regions.
4949

@@ -61,11 +61,11 @@ The `AzureCognitiveSearch` service tag can be directly used in the inbound [NSG
6161

6262
More details for accessing data in a SQL managed instance are outlined [here](search-howto-connecting-azure-sql-mi-to-azure-search-using-indexers.md)
6363

64-
### CosmosDB Indexing isn't enabled
64+
### CosmosDB "Indexing" isn't enabled
6565

6666
Azure Cognitive Search has an implicit dependency on Cosmos DB indexing. If you turn off automatic indexing in Cosmos DB, Azure Cognitive Search returns a successful state, but fails to index container contents. For instructions on how to check settings and turn on indexing, see [Manage indexing in Azure Cosmos DB](https://docs.microsoft.com/azure/cosmos-db/how-to-manage-indexing-policy#use-the-azure-portal).
6767

68-
## Document Processing Errors
68+
## Document processing errors
6969

7070
### Unprocessable or unsupported documents
7171

@@ -100,7 +100,7 @@ api-key: [admin key]
100100
}
101101
```
102102

103-
## Index Errors
103+
## Index errors
104104

105105
### Missing documents
106106

0 commit comments

Comments
 (0)