Skip to content

Commit bf0f5c7

Browse files
authored
Merge pull request #202376 from HeidiSteen/heidist-support-case
Tweaks to last update
2 parents 30cd981 + af7eb4f commit bf0f5c7

File tree

1 file changed

+13
-11
lines changed

1 file changed

+13
-11
lines changed

articles/search/search-indexer-securing-resources.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -82,15 +82,17 @@ If the Azure resource that provides source data exists behind a firewall, you'll
8282

8383
[Azure service tags](../virtual-network/service-tags-overview.md) have a published range of IP addresses for each service. You can find these IPs using the [discovery API](../virtual-network/service-tags-overview.md#use-the-service-tag-discovery-api) or a [downloadable JSON file](../virtual-network/service-tags-overview.md#discover-service-tags-by-using-downloadable-json-files). IP ranges are allocated by region, so check your search service region before you start.
8484

85-
When setting the IP rule for the multi-tenant environment, certain SQL data sources support a simple approach for IP address specification. Instead of enumerating all of the IP addresses in the rule, you can create a [Network Security Group rule](../virtual-network/network-security-groups-overview.md) that specifies the `AzureCognitiveSearch` service tag. You can specify the service tag if your data source is either:
85+
When setting the IP rule for the multi-tenant environment, certain SQL data sources support a simple approach for IP address specification. Instead of enumerating all of the IP addresses in the rule, you can create a [Network Security Group rule](../virtual-network/network-security-groups-overview.md) that specifies the `AzureCognitiveSearch` service tag.
86+
87+
You can specify the service tag if your data source is either:
8688

8789
- [SQL Server on Azure virtual machines](./search-howto-connecting-azure-sql-iaas-to-azure-search-using-indexers.md#restrict-access-to-the-azure-cognitive-search)
8890

8991
- [SQL Managed Instances](./search-howto-connecting-azure-sql-mi-to-azure-search-using-indexers.md#verify-nsg-rules)
9092

91-
If you specified the service tag for the multi-tenant environment IP rule, you'll still need an explicit IP rule for the private execution environment (meaning the search service itself) obtained through `nslookup`.
93+
Notice that if you specified the service tag for the multi-tenant environment IP rule, you'll still need an explicit inbound rule for the private execution environment (meaning the search service itself), as obtained through `nslookup`.
9294

93-
## Choosing a data access approach
95+
## Choosing a connectivity approach
9496

9597
When integrating Azure Cognitive Search into a solution that runs on a virtual network, consider the following constraints:
9698

@@ -110,31 +112,31 @@ Given the above constrains, your choices for achieving search integration in a v
110112

111113
Configuring an IP firewall is free. A private endpoint, which is based on Azure Private Link, has a billing impact.
112114

113-
### Billing impact of Azure Private Link
115+
### Working with a private endpoint
114116

115-
- A shared private link requires a billable search service, where the minimum tier is either Basic for text-based indexing or Standard 2 (S2) for skills-based indexing. See [tier limits on the number of private endpoints](search-limits-quotas-capacity.md#shared-private-link-resource-limits) for details.
117+
This section summarizes the main steps for setting up a private endpoint for outbound indexer connections. This summary might help you decide whether a private endpoint is the best choice for your scenario. Detailed steps are covered in [How to make outbound connections through a private endpoint](search-indexer-howto-access-private.md).
116118

117-
- Inbound and outbound connections are subject to [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
119+
#### Billing impact of Azure Private Link
118120

119-
### Working with a private endpoint
121+
- A shared private link requires a billable search service, where the minimum tier is either Basic for text-based indexing or Standard 2 (S2) for skills-based indexing. See [tier limits on the number of private endpoints](search-limits-quotas-capacity.md#shared-private-link-resource-limits) for details.
120122

121-
This section summarizes the main steps for setting up a private endpoint for outbound indexer connections. This summary might help you decide whether a private endpoint is the best choice for your scenario. Detailed steps are covered in [How to make outbound connections through a private endpoint](search-indexer-howto-access-private.md).
123+
- Inbound and outbound connections are subject to [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
122124

123-
### Step 1: Create a private endpoint to the secure resource
125+
#### Step 1: Create a private endpoint to the secure resource
124126

125127
You'll create a shared private link using either the portal pages of your search service or through the [Management API](/rest/api/searchmanagement/2020-08-01/shared-private-link-resources/create-or-update).
126128

127129
In Azure Cognitive Search, your search service must be at least the Basic tier for text-based indexers, and S2 for indexers with skillsets.
128130

129131
A private endpoint connection will accept requests from the private indexer execution environment, but not the multi-tenant environment. You'll need to disable multi-tenant execution as described in step 3 to meet this requirement.
130132

131-
### Step 2: Approve the private endpoint connection
133+
#### Step 2: Approve the private endpoint connection
132134

133135
When the (asynchronous) operation that creates a shared private link resource completes, a private endpoint connection will be created in a "Pending" state. No traffic flows over the connection yet.
134136

135137
You'll need to locate and approve this request on your secure resource. Depending on the resource, you can complete this task using Azure portal. Otherwise, use the [Private Link Service REST API](/rest/api/virtualnetwork/privatelinkservices/updateprivateendpointconnection).
136138

137-
### Step 3: Force indexers to run in the "private" environment
139+
#### Step 3: Force indexers to run in the "private" environment
138140

139141
For private endpoint connections, it's mandatory to set the `executionEnvironment` of the indexer to `"Private"`. This step ensures that all indexer execution is confined to the private environment provisioned within the search service.
140142

0 commit comments

Comments
 (0)