You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/search-indexer-securing-resources.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,15 +82,17 @@ If the Azure resource that provides source data exists behind a firewall, you'll
82
82
83
83
[Azure service tags](../virtual-network/service-tags-overview.md) have a published range of IP addresses for each service. You can find these IPs using the [discovery API](../virtual-network/service-tags-overview.md#use-the-service-tag-discovery-api) or a [downloadable JSON file](../virtual-network/service-tags-overview.md#discover-service-tags-by-using-downloadable-json-files). IP ranges are allocated by region, so check your search service region before you start.
84
84
85
-
When setting the IP rule for the multi-tenant environment, certain SQL data sources support a simple approach for IP address specification. Instead of enumerating all of the IP addresses in the rule, you can create a [Network Security Group rule](../virtual-network/network-security-groups-overview.md) that specifies the `AzureCognitiveSearch` service tag. You can specify the service tag if your data source is either:
85
+
When setting the IP rule for the multi-tenant environment, certain SQL data sources support a simple approach for IP address specification. Instead of enumerating all of the IP addresses in the rule, you can create a [Network Security Group rule](../virtual-network/network-security-groups-overview.md) that specifies the `AzureCognitiveSearch` service tag.
86
+
87
+
You can specify the service tag if your data source is either:
86
88
87
89
-[SQL Server on Azure virtual machines](./search-howto-connecting-azure-sql-iaas-to-azure-search-using-indexers.md#restrict-access-to-the-azure-cognitive-search)
If you specified the service tag for the multi-tenant environment IP rule, you'll still need an explicit IP rule for the private execution environment (meaning the search service itself) obtained through `nslookup`.
93
+
Notice that if you specified the service tag for the multi-tenant environment IP rule, you'll still need an explicit inbound rule for the private execution environment (meaning the search service itself), as obtained through `nslookup`.
92
94
93
-
## Choosing a data access approach
95
+
## Choosing a connectivity approach
94
96
95
97
When integrating Azure Cognitive Search into a solution that runs on a virtual network, consider the following constraints:
96
98
@@ -110,31 +112,31 @@ Given the above constrains, your choices for achieving search integration in a v
110
112
111
113
Configuring an IP firewall is free. A private endpoint, which is based on Azure Private Link, has a billing impact.
112
114
113
-
### Billing impact of Azure Private Link
115
+
### Working with a private endpoint
114
116
115
-
- A shared private link requires a billable search service, where the minimum tier is either Basic for text-based indexing or Standard 2 (S2) for skills-based indexing. See [tier limits on the number of private endpoints](search-limits-quotas-capacity.md#shared-private-link-resource-limits) for details.
117
+
This section summarizes the main steps for setting up a private endpoint for outbound indexer connections. This summary might help you decide whether a private endpoint is the best choice for your scenario. Detailed steps are covered in [How to make outbound connections through a private endpoint](search-indexer-howto-access-private.md).
116
118
117
-
- Inbound and outbound connections are subject to [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
119
+
#### Billing impact of Azure Private Link
118
120
119
-
### Working with a private endpoint
121
+
- A shared private link requires a billable search service, where the minimum tier is either Basic for text-based indexing or Standard 2 (S2) for skills-based indexing. See [tier limits on the number of private endpoints](search-limits-quotas-capacity.md#shared-private-link-resource-limits) for details.
120
122
121
-
This section summarizes the main steps for setting up a private endpoint for outbound indexer connections. This summary might help you decide whether a private endpoint is the best choice for your scenario. Detailed steps are covered in [How to make outbound connections through a private endpoint](search-indexer-howto-access-private.md).
123
+
- Inbound and outbound connectionsare subject to [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
122
124
123
-
### Step 1: Create a private endpoint to the secure resource
125
+
####Step 1: Create a private endpoint to the secure resource
124
126
125
127
You'll create a shared private link using either the portal pages of your search service or through the [Management API](/rest/api/searchmanagement/2020-08-01/shared-private-link-resources/create-or-update).
126
128
127
129
In Azure Cognitive Search, your search service must be at least the Basic tier for text-based indexers, and S2 for indexers with skillsets.
128
130
129
131
A private endpoint connection will accept requests from the private indexer execution environment, but not the multi-tenant environment. You'll need to disable multi-tenant execution as described in step 3 to meet this requirement.
130
132
131
-
### Step 2: Approve the private endpoint connection
133
+
####Step 2: Approve the private endpoint connection
132
134
133
135
When the (asynchronous) operation that creates a shared private link resource completes, a private endpoint connection will be created in a "Pending" state. No traffic flows over the connection yet.
134
136
135
137
You'll need to locate and approve this request on your secure resource. Depending on the resource, you can complete this task using Azure portal. Otherwise, use the [Private Link Service REST API](/rest/api/virtualnetwork/privatelinkservices/updateprivateendpointconnection).
136
138
137
-
### Step 3: Force indexers to run in the "private" environment
139
+
####Step 3: Force indexers to run in the "private" environment
138
140
139
141
For private endpoint connections, it's mandatory to set the `executionEnvironment` of the indexer to `"Private"`. This step ensures that all indexer execution is confined to the private environment provisioned within the search service.
0 commit comments