Skip to content

Commit c79956a

Browse files
authored
Merge pull request #202668 from HeidiSteen/heidist-support-case
Edits to network security docs
2 parents 0c93bc1 + 9469e58 commit c79956a

File tree

3 files changed

+35
-16
lines changed

3 files changed

+35
-16
lines changed

articles/search/search-indexer-howto-access-ip-restricted.md

Lines changed: 31 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,15 @@ This article explains how to find the IP address of your search service and conf
2222
2323
## Get a search service IP address
2424

25-
1. Determine the fully qualified domain name (FQDN) of your search service. This will look like `<search-service-name>.search.windows.net`. You can find the FQDN by looking up your search service on the Azure portal.
25+
1. Get the fully qualified domain name (FQDN) of your search service. This will look like `<search-service-name>.search.windows.net`. You can find the FQDN by looking up your search service on the Azure portal.
2626

2727
:::image type="content" source="media\search-indexer-howto-secure-access\search-service-portal.png" alt-text="Screenshot of the search service Overview page." border="true":::
2828

2929
1. Look up the IP address of the search service by performing a `nslookup` (or a `ping`) of the FQDN on a command prompt. Make sure you remove the "https://" prefix from the FQDN.
3030

3131
1. Copy the IP address so that you can specify it on an inbound rule in the next step. In the example below, the IP address that you should copy is "150.0.0.1".
3232

33-
```azurepowershell
33+
```bash
3434
nslookup contoso.search.windows.net
3535
Server: server.example.org
3636
Address: 10.50.10.50
@@ -43,23 +43,40 @@ This article explains how to find the IP address of your search service and conf
4343

4444
## Get the Azure portal IP address
4545

46-
If you're using the Azure portal or the [Import Data wizard](search-import-data-portal.md) to create an indexer, you'll need an inbound rule for the Azure portal.
46+
If you're using the Azure portal or the [Import Data wizard](search-import-data-portal.md) to create an indexer, you'll need an inbound rule for the Azure portal as well.
4747

48-
To get the portal IP address, perform `nslookup` on `stamp2.ext.search.windows.net`, which is the domain of the traffic manager.
48+
To get the portal's IP address, perform `nslookup` (or `ping`) on `stamp2.ext.search.windows.net`, which is the domain of the traffic manager. For nslookup, the IP address is visible in the "Non-authoritative answer" portion of the response.
4949

50-
For nslookup, the IP address be visible in the "Non-authoritative answer" portion of the response. For ping, the request will time out, but the IP address will be visible in the response. For example, in the message "Pinging azsyrie.northcentralus.cloudapp.azure.com [52.252.175.48]", the IP address is "52.252.175.48".
50+
In the example below, the IP address that you should copy is "52.252.175.48".
51+
52+
```bash
53+
$ nslookup stamp2.ext.search.windows.net
54+
Server: ZenWiFi_ET8-0410
55+
Address: 192.168.50.1
56+
57+
Non-authoritative answer:
58+
Name: azsyrie.northcentralus.cloudapp.azure.com
59+
Address: 52.252.175.48
60+
Aliases: stamp2.ext.search.windows.net
61+
azs-ux-prod.trafficmanager.net
62+
azspncuux.management.search.windows.net
63+
```
5164

5265
Clusters in different regions connect to different traffic managers. Regardless of the domain name, the IP address returned from the ping is the correct one to use when defining an inbound firewall rule for the Azure portal in your region.
5366

67+
For ping, the request will time out, but the IP address will be visible in the response. For example, in the message "Pinging azsyrie.northcentralus.cloudapp.azure.com [52.252.175.48]", the IP address is "52.252.175.48".
68+
5469
## Get IP addresses for "AzureCognitiveSearch" service tag
5570

56-
We also require customers to create an inbound rule that allows requests from the [multi-tenant execution environment](search-indexer-securing-resources.md#indexer-execution-environment) to ensure we optimize the resource availability for search services. This step explains how to get the range of IP addresses needed for this inbound rule.
71+
You'll also need to create an inbound rule that allows requests from the [multi-tenant execution environment](search-indexer-securing-resources.md#indexer-execution-environment). This environment is managed by Microsoft and it's used to offload processing intensive jobs that could otherwise overwhelm your search service. This section explains how to get the range of IP addresses needed to create this inbound rule.
5772

58-
An IP address range is defined for each region that supports Azure Cognitive Search. You can get this IP address range from the `AzureCognitiveSearch` service tag.
73+
An IP address range is defined for each region that supports Azure Cognitive Search. You'll need to specify the full range to ensure the success of requests originating from the multi-tenant execution environment.
5974

60-
1. Get the IP address ranges for the `AzureCognitiveSearch` service tag using either the [discovery API](../virtual-network/service-tags-overview.md#use-the-service-tag-discovery-api) or the [downloadable JSON file](../virtual-network/service-tags-overview.md#discover-service-tags-by-using-downloadable-json-files).
75+
You can get this IP address range from the `AzureCognitiveSearch` service tag.
6176

62-
1. If the search service is the Azure Public cloud, download the [Azure Public JSON file](https://www.microsoft.com/download/details.aspx?id=56519).
77+
1. Use either the [discovery API](../virtual-network/service-tags-overview.md#use-the-service-tag-discovery-api) or the [downloadable JSON file](../virtual-network/service-tags-overview.md#discover-service-tags-by-using-downloadable-json-files).
78+
79+
If the search service is the Azure Public cloud, download the [Azure Public JSON file](https://www.microsoft.com/download/details.aspx?id=56519).
6380

6481
1. Open the JSON file and search for "AzureCognitiveSearch". For a search service in WestUS2, the IP addresses for the multi-tenant indexer execution environment are:
6582

@@ -89,21 +106,23 @@ An IP address range is defined for each region that supports Azure Cognitive Sea
89106

90107
1. For IP addresses have the "/32" suffix, drop the "/32" (40.91.93.84/32 becomes 40.91.93.84 in the rule definition). All other IP addresses can be used verbatim.
91108

109+
1. Copy all of the IP addresses for the region.
110+
92111
## Add IP addresses to IP firewall rules
93112

94-
Now that you have the necessary IP addresses, you can set up the inbound rule. The easiest way to add IP address ranges to a storage account's firewall rule is through the Azure portal.
113+
Now that you have the necessary IP addresses, you can set up the inbound rules. The easiest way to add IP address ranges to a storage account's firewall rule is through the Azure portal.
95114

96115
1. Locate the storage account on the portal and open **Networking** on the left navigation pane.
97116

98117
1. In the **Firewall and virtual networks** tab, choose **Selected networks**.
99118

100119
:::image type="content" source="media\search-indexer-howto-secure-access\storage-firewall.png" alt-text="Screenshot of Azure Storage Firewall and virtual networks page" border="true":::
101120

102-
1. Add the IP addresses obtained previously in the address range and select **Save**. You should have rules for the search service, Azure portal (optional), plus all of the IP ranges for the "AzureCognitiveSearch" service tag for your region
121+
1. Add the IP addresses obtained previously in the address range and select **Save**. You should have rules for the search service, Azure portal (optional), plus all of the IP addresses for the "AzureCognitiveSearch" service tag for your region.
103122

104123
:::image type="content" source="media\search-indexer-howto-secure-access\storage-firewall-ip.png" alt-text="Screenshot of the IP address section of the page." border="true":::
105124

106-
It can take five to ten minutes for the firewall rules to be updated, after which indexers should be able to access the data in the storage account.
125+
It can take five to ten minutes for the firewall rules to be updated, after which indexers should be able to access storage account data behind the firewall.
107126

108127
## Next Steps
109128

articles/search/search-indexer-howto-access-private.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Many Azure resources, such as Azure storage accounts, can be configured to accep
1717

1818
For [Azure Storage](../storage/common/storage-network-security.md?tabs=azure-portal), if both the storage account and the search service are in the same region, outbound traffic uses a private IP address to communicate to storage and occurs over the Microsoft backbone network. For this scenario, you can omit private endpoints through Azure Cognitive Search. For other Azure PaaS resources, we suggest that you review the networking documentation for those resources to determine whether a private endpoint is helpful.
1919

20-
To create a shared private link, use the Azure portal or the [Create Or Update Shared Private Link](/rest/api/searchmanagement/2020-08-01/shared-private-link-resources/create-or-update) operation in the Azure Cognitive Search Management REST API.
20+
To create a private endpoint that an indexer can use, use the Azure portal or the [Create Or Update Shared Private Link](/rest/api/searchmanagement/2020-08-01/shared-private-link-resources/create-or-update) operation in the Azure Cognitive Search Management REST API. A private endpoint that's used by your search service is created using Cognitive Search APIs or the portal pages for Azure Cognitive Search.
2121

2222
## Terminology
2323

articles/search/search-indexer-securing-resources.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 06/20/2022
1313

1414
# Indexer access to content protected by Azure network security
1515

16-
If your search application requirements include an Azure virtual network, this concept article explains how a search indexer can access content that's protected by network security. It describes the outbound traffic patterns and indexer execution environments. It also covers the network protections supported by Cognitive Search and factors that might influence your approach. Finally, because Azure Storage is used for both data access and persistent storage, this article also covers network considerations that are specific to search and storage connectivity.
16+
If your search application requirements include an Azure virtual network, this concept article explains how a search indexer can access content that's protected by network security. It describes the outbound traffic patterns and indexer execution environments. It also covers the network protections supported by Cognitive Search and factors that might influence your security strategy. Finally, because Azure Storage is used for both data access and persistent storage, this article also covers network considerations that are specific to search and storage connectivity.
1717

1818
Looking for step-by-step instructions instead? See [How to configure firewall rules to allow indexer access](search-indexer-howto-access-ip-restricted.md) or [How to make outbound connections through a private endpoint](search-indexer-howto-access-private.md).
1919

@@ -102,9 +102,9 @@ When integrating Azure Cognitive Search into a solution that runs on a virtual n
102102

103103
Given the above constrains, your choices for achieving search integration in a virtual network are:
104104

105-
- Configure an inbound firewall rule on your Azure resource that admits indexer requests for data.
105+
- Configure an inbound firewall rule on your Azure PaaS resource that admits indexer requests for data.
106106

107-
- Configure an outbound connection that makes indexer connections using a [private endpoint](../private-link/private-endpoint-overview.md).
107+
- Configure an outbound connection from Search that makes indexer connections using a [private endpoint](../private-link/private-endpoint-overview.md).
108108

109109
For a private endpoint, the search service connection to your protected resource is through a *shared private link*. A shared private link is an [Azure Private Link](../private-link/private-link-overview.md) resource that's created, managed, and used from within Cognitive Search. If your resources are fully locked down (running on a protected virtual network, or otherwise not available over a public connection), a private endpoint is your only choice.
110110

0 commit comments

Comments
 (0)