Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,99 @@
{
"parameters": {
"searchServiceName": "mysearchservice",
"resourceGroupName": "rg1",
"api-version": "2022-09-01",
"subscriptionId": "subid",
"service": {
"location": "westus",
"tags": {
"app-name": "My e-commerce app"
},
"sku": {
"name": "standard"
},
"properties": {
"replicaCount": 3,
"partitionCount": 1,
"hostingMode": "default",
"encryptionWithCmk": {
"enforcement": "Enabled"
}
}
}
},
"responses": {
"200": {
"body": {
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchservice",
"name": "mysearchservice",
"location": "westus",
"type": "Microsoft.Search/searchServices",
"tags": {
"app-name": "My e-commerce app"
},
"sku": {
"name": "standard"
},
"properties": {
"replicaCount": 3,
"partitionCount": 1,
"status": "provisioning",
"statusDetails": "",
"hostingMode": "default",
"provisioningState": "provisioning",
"publicNetworkAccess": "enabled",
"networkRuleSet": {
"ipRules": []
},
"privateEndpointConnections": [],
"sharedPrivateLinkResources": [],
"encryptionWithCmk": {
"enforcement": "Enabled",
"encryptionComplianceStatus": "Compliant"
},
"disableLocalAuth": false,
"authOptions": {
"apiKeyOnly": {}
}
}
}
},
"201": {
"body": {
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchservice",
"name": "mysearchservice",
"location": "westus",
"type": "Microsoft.Search/searchServices",
"tags": {
"app-name": "My e-commerce app"
},
"sku": {
"name": "standard"
},
"properties": {
"replicaCount": 3,
"partitionCount": 1,
"status": "provisioning",
"statusDetails": "",
"hostingMode": "default",
"provisioningState": "provisioning",
"publicNetworkAccess": "enabled",
"networkRuleSet": {
"ipRules": []
},
"privateEndpointConnections": [],
"sharedPrivateLinkResources": [],
"encryptionWithCmk": {
"enforcement": "Enabled",
"encryptionComplianceStatus": "Compliant"
},
"disableLocalAuth": false,
"authOptions": {
"apiKeyOnly": {}
}
}
}
}
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
{
"parameters": {
"searchServiceName": "mysearchservice",
"resourceGroupName": "rg1",
"api-version": "2022-09-01",
"subscriptionId": "subid",
"service": {
"tags": {
"app-name": "My e-commerce app",
"new-tag": "Adding a new tag"
},
"properties": {
"replicaCount": 2,
"encryptionWithCmk": {
"enforcement": "Enabled"
}
}
}
},
"responses": {
"200": {
"body": {
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchservice",
"name": "mysearchservice",
"location": "westus",
"type": "Microsoft.Search/searchServices",
"tags": {
"app-name": "My e-commerce app",
"new-tag": "Adding a new tag"
},
"sku": {
"name": "standard"
},
"properties": {
"replicaCount": 2,
"partitionCount": 1,
"status": "provisioning",
"statusDetails": "",
"hostingMode": "default",
"provisioningState": "provisioning",
"publicNetworkAccess": "enabled",
"networkRuleSet": {
"ipRules": []
},
"privateEndpointConnections": [],
"sharedPrivateLinkResources": [],
"encryptionWithCmk": {
"enforcement": "Enabled",
"encryptionComplianceStatus": "Compliant"
},
"disableLocalAuth": false,
"authOptions": {
"apiKeyOnly": {}
}
}
}
}
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -381,6 +381,9 @@
},
"SearchCreateOrUpdateServiceDisableLocalAuth": {
"$ref": "./examples/SearchCreateOrUpdateServiceDisableLocalAuth.json"
},
"SearchCreateOrUpdateServiceWithCmkEnforcement": {
"$ref": "./examples/SearchCreateOrUpdateServiceWithCmkEnforcement.json"
}
},
"description": "Creates or updates a search service in the given resource group. If the search service already exists, all properties will be updated with the given values.",
Expand Down Expand Up @@ -462,6 +465,9 @@
},
"SearchUpdateServiceDisableLocalAuth": {
"$ref": "./examples/SearchUpdateServiceDisableLocalAuth.json"
},
"SearchUpdateServiceWithCmkEnforcement": {
"$ref": "./examples/SearchUpdateServiceWithCmkEnforcement.json"
}
},
"description": "Updates an existing search service in the given resource group.",
Expand Down Expand Up @@ -1472,6 +1478,67 @@
},
"description": "Indicates that either the API key or an access token from Azure Active Directory can be used for authentication."
},
"EncryptionWithCmk": {
"type": "object",
"properties": {
"enforcement": {
"description": "Describes how a search service should enforce having one or more non customer encrypted resources.",
"type": "string",
"enum": [
"Disabled",
"Enabled",
"Unspecified"
],
"x-ms-enum": {
"name": "SearchEncryptionWithCmk",
"modelAsString": false,
"values": [
{
"value": "Disabled",
"name": "Disabled",
"description": "No enforcement will be made and the search service can have non customer encrypted resources."
},
{
"value": "Enabled",
"name": "Enabled",
"description": "Search service will be marked as non-compliant if there are one or more non customer encrypted resources."
},
{
"value": "Unspecified",
"name": "Unspecified",
"description": "Enforcement policy is not explicitly specified, with the behavior being the same as if it were set to 'Disabled'."
}
]
}
},
"encryptionComplianceStatus": {
"readOnly": true,
"description": "Describes whether the search service is compliant or not with respect to having non customer encrypted resources. If a service has more than one non customer encrypted resource and 'Enforcement' is 'enabled' then the service will be marked as 'nonCompliant'.",
"type": "string",
"enum": [
"Compliant",
"NonCompliant"
],
"x-ms-enum": {
"name": "SearchEncryptionComplianceStatus",
"modelAsString": false,
"values": [
{
"value": "Compliant",
"name": "Compliant",
"description": "Indicates that the search service is compliant, either because number of non customer encrypted resources is zero or enforcement is disabled."
},
{
"value": "NonCompliant",
"name": "NonCompliant",
"description": "Indicates that the search service has more than 1 non customer encrypted resources."
}
]
}
}
},
"description": "Describes a policy that determines how resources within the search service are to be encrypted with Customer Managed Keys."
},
"PrivateEndpointConnection": {
"properties": {
"properties": {
Expand Down Expand Up @@ -2048,6 +2115,10 @@
"$ref": "#/definitions/NetworkRuleSet",
"description": "Network specific rules that determine how the Azure Cognitive Search service may be reached."
},
"encryptionWithCmk": {
"$ref": "#/definitions/EncryptionWithCmk",
"description": "Specifies any policy regarding encryption of resources (such as indexes) using customer manager keys within a search service."
},
"disableLocalAuth": {
"type": "boolean",
"x-nullable": true,
Expand Down