Skip to content

Commit c44e902

Browse files
committed
Fixed formatting bug on numbered steps
1 parent d97aad1 commit c44e902

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/search/search-howto-connecting-azure-sql-iaas-to-azure-search-using-indexers.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41,17 +41,17 @@ Azure Cognitive Search requires an encrypted channel for all indexer requests ov
4141

4242
Although SQL Server Configuration Manager is often used for this task, you can't use it for this scenario. It won't find the imported certificate because the FQDN of the VM on Azure doesn't match the FQDN as determined by the VM (it identifies the domain as either the local computer or the network domain to which it's joined). When names don't match, use regedit to specify the certificate.
4343

44-
1. In regedit, browse to this registry key: `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft SQL Server\[MSSQL13.MSSQLSERVER]\MSSQLServer\SuperSocketNetLib\Certificate`.
44+
1. In regedit, browse to this registry key: `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft SQL Server\[MSSQL13.MSSQLSERVER]\MSSQLServer\SuperSocketNetLib\Certificate`.
4545

46-
The `[MSSQL13.MSSQLSERVER]` part varies based on version and instance name.
46+
The `[MSSQL13.MSSQLSERVER]` part varies based on version and instance name.
4747

4848
1. Set the value of the **Certificate** key to the **thumbprint** (without spaces) of the TLS/SSL certificate you imported to the VM.
4949

5050
There are several ways to get the thumbprint, some better than others. If you copy it from the **Certificates** snap-in in MMC, you'll probably pick up an invisible leading character [as described in this support article](https://support.microsoft.com/kb/2023869/), which results in an error when you attempt a connection. Several workarounds exist for correcting this problem. The easiest is to backspace over and then retype the first character of the thumbprint to remove the leading character in the key value field in regedit. Alternatively, you can use a different tool to copy the thumbprint.
5151

5252
1. Grant permissions to the service account.
5353

54-
Make sure the SQL Server service account is granted appropriate permission on the private key of the TLS/SSL certificate. If you overlook this step, SQL Server won't start. You can use the **Certificates** snap-in or **CertUtils** for this task.
54+
Make sure the SQL Server service account is granted appropriate permission on the private key of the TLS/SSL certificate. If you overlook this step, SQL Server won't start. You can use the **Certificates** snap-in or **CertUtils** for this task.
5555

5656
1. Restart the SQL Server service.
5757

@@ -71,9 +71,9 @@ The links below provide instructions on NSG configuration for VM deployments. Us
7171

7272
1. Add the search IP address to the IP filter list of the security group. Either one of following articles explains the steps:
7373

74-
+ [Tutorial: Filter network traffic with a network security group using the Azure portal](/azure/virtual-network/tutorial-filter-network-traffic)
74+
+ [Tutorial: Filter network traffic with a network security group using the Azure portal](/azure/virtual-network/tutorial-filter-network-traffic)
7575

76-
+ [Create, change, or delete a network security group](/azure/virtual-network/manage-network-security-group)
76+
+ [Create, change, or delete a network security group](/azure/virtual-network/manage-network-security-group)
7777

7878
IP addressing can pose a few challenges that are easily overcome if you're aware of the issue and potential workarounds. The remaining sections provide recommendations for handling issues related to IP addresses in the ACL.
7979

0 commit comments

Comments
 (0)