Skip to content

Commit 2be1e0b

Browse files
authored
Merge pull request #193561 from HeidiSteen/heidist-fix
Minor updates to docs, PR clean up
2 parents 0989e7b + 1d3ddce commit 2be1e0b

5 files changed

+18
-14
lines changed

articles/search/search-howto-managed-identities-cosmos-db.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ ms.date: 02/11/2022
1414

1515
# Set up an indexer connection to a Cosmos DB database using a managed identity
1616

17-
This article describes how to set up an indexer connection to an Azure Cosmos DB database using a managed identity instead of providing credentials in the data source object connection string.
17+
This article describes how to set up an Azure Cognitive Search indexer connection to an Azure Cosmos DB database using a managed identity instead of providing credentials in the data source object connection string.
1818

19-
You can use a system-assigned managed identity or a user-assigned managed identity (preview).
19+
You can use a system-assigned managed identity or a user-assigned managed identity (preview). Managed identities are Azure AD logins and require Azure role assignments to access data in Cosmos DB.
2020

2121
Before learning more about this feature, it is recommended that you have an understanding of what an indexer is and how to set up an indexer for your data source. More information can be found at the following links:
2222

articles/search/search-howto-managed-identities-sql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ ms.date: 02/11/2022
1414

1515
# Set up an indexer connection to Azure SQL Database using a managed identity
1616

17-
This article describes how to set up an indexer connection to Azure SQL Database using a managed identity instead of providing credentials in the data source object connection string.
17+
This article describes how to set up an Azure Cognitive Search indexer connection to Azure SQL Database using a managed identity instead of providing credentials in the data source object connection string.
1818

19-
You can use a system-assigned managed identity or a user-assigned managed identity (preview).
19+
You can use a system-assigned managed identity or a user-assigned managed identity (preview). Managed identities are Azure AD logins and require Azure role assignments to access data in Azure SQL.
2020

2121
Before learning more about this feature, it is recommended that you have an understanding of what an indexer is and how to set up an indexer for your data source. More information can be found at the following links:
2222

articles/search/search-howto-managed-identities-storage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ ms.date: 03/10/2022
1414

1515
# Set up a connection to an Azure Storage account using a managed identity
1616

17-
This article describes how to set up an indexer connection to an Azure Storage account using a managed identity instead of providing credentials in the data source object connection string.
17+
This article describes how to set up an Azure Cognitive Search indexer connection to an Azure Storage account using a managed identity instead of providing credentials in the data source object connection string.
1818

19-
You can use a system-assigned managed identity or a user-assigned managed identity (preview).
19+
You can use a system-assigned managed identity or a user-assigned managed identity (preview). Managed identities are Azure AD logins and require Azure role assignments to access data in Azure Storage.
2020

2121
This article assumes familiarity with indexer concepts and configuration. If you're new to indexers, start with these links:
2222

articles/search/search-indexer-howto-access-ip-restricted.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,9 @@ On behalf of an indexer, a search service will issue outbound calls to an extern
1717

1818
This article explains how to find the IP address of your search service and configure an inbound IP rule on an Azure Storage account. While specific to Azure Storage, this approach also works for other Azure resources that use IP firewall rules for data access, such as Cosmos DB and Azure SQL.
1919

20-
> [!NOTE]
21-
> IP firewall rules for a storage account are only effective if the storage account and the search service are in different regions. If your setup does not permit this, we recommend utilizing the [trusted service exception option](search-indexer-howto-access-trusted-service-exception.md) as an alternative.
20+
## Prerequisites
21+
22+
The storage account and the search service must be in different regions. If your setup doesn't permit this, try the [trusted service exception](search-indexer-howto-access-trusted-service-exception.md) or [resource instance rule](../storage/common/storage-network-security.md#grant-access-from-azure-resource-instances-preview).
2223

2324
## Get a search service IP address
2425

articles/search/search-security-overview.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,8 @@ Cognitive Search has three basic network traffic patterns:
3030

3131
Inbound requests that target a search service endpoint consist of:
3232

33-
+ Creating and managing indexes, indexers, and other objects
34-
+ Sending requests for indexing, running indexer jobs, executing skills
33+
+ Creating or managing indexes, indexers, data sources, skillsets, or synonym lists
34+
+ Running indexers and skillsets
3535
+ Querying an index
3636

3737
For inbound access to data and operations on your search service, you can implement a progression of security measures, starting with [network security features](#service-access-and-authentication). You can create either inbound rules in an IP firewall, or private endpoints that fully shield your search service from the public internet.
@@ -42,9 +42,9 @@ Independent of network security, all inbound requests must be authenticated. Key
4242

4343
Outbound requests from a search service to other applications are typically made by indexers for text-based indexing and some aspects of AI enrichment. Outbound requests include both read and write operations. Outbound requests are made by the search service on its own behalf, and on the behalf of an indexer or skillset.
4444

45-
+ Indexer connects to external data sources to read in data for indexing.
46-
+ Indexer writes to Azure Storage when creating knowledge stores, persisting cached enrichments, and persisting debug sessions.
47-
+ A custom skill connects to an Azure function or app to run external code that's hosted off-service. The request for external processing is sent during skillset execution.
45+
+ Indexers [connect to external data sources](search-indexer-securing-resources.md) to read in data for indexing.
46+
+ Indexers write to Azure Storage when creating knowledge stores, persisting cached enrichments, and persisting debug sessions.
47+
+ Custom skills connect to an Azure function or app to run external code that's hosted off-service. The request for external processing is sent during skillset execution.
4848
+ Search connects to Azure Key Vault for a customer-managed key used to encrypt and decrypt sensitive data.
4949

5050
Outbound connections can be made using a resource's full access connection string that includes a key or a database login, or an Azure AD login ([a managed identity](search-howto-managed-identities-data-sources.md)) if you're using Azure Active Directory.
@@ -53,7 +53,10 @@ If your Azure resource is behind a firewall, you'll need to [create rules that a
5353

5454
### Internal traffic
5555

56-
Internal requests are secured and managed by Microsoft. Internal traffic consists of service-to-service calls for tasks like authentication and authorization through Azure Active Directory, diagnostic logging in Azure Monitor, private endpoint connections, and requests made to Cognitive Services for built-in skills.
56+
Internal requests are secured and managed by Microsoft. Internal traffic consists of:
57+
58+
+ Service-to-service calls for tasks like authentication and authorization through Azure Active Directory, diagnostic logging in Azure Monitor, and private endpoint connections.
59+
+ Requests made to Cognitive Services APIs for built-in skills.
5760

5861
<a name="service-access-and-authentication"></a>
5962

0 commit comments

Comments
 (0)