An Azure search service with built-in artificial intelligence capabilities that enrich information to help identify and explore relevant content at scale.
The error occurs because the storage account has publicNetworkAccess: Disabled, and Azure AI Search cannot reach it under the current network/security configuration.
To connect Azure AI Search to a private Azure Data Lake Storage Gen2 account, do the following checks and fixes:
- Use trusted service + managed identity (same-region, firewall-based access)
- In the storage account:
- Go to Security + networking > Networking.
- On Public access > Manage, set Public network access scope to Enable from selected networks (not fully disabled).
- Under Exceptions, enable Allow trusted Microsoft services to access this resource.
- Still in the storage account, under Access control (IAM):
- Assign Storage Blob Data Reader to the Azure AI Search service’s managed identity (system-assigned) at minimum.
- If write is needed (enrichment cache, knowledge store, etc.), also assign Storage Blob Data Contributor.
- In Azure AI Search:
- Configure the data source/indexer to use managed identity authentication to the ADLS Gen2 account.
- Then test the connection using the Import data wizard, selecting ADLS Gen2 and Authenticate using managed identity. If it advances without error, the connection works.
- In the storage account:
- If the storage account must keep
publicNetworkAccess: Disabled- When public network access is fully disabled, access is only possible via private endpoints.
- Ensure:
- A private endpoint exists for the storage account (blob/dfs) in the same virtual network where the Azure AI Search S2 resource can reach it.
- For S2 search with skillsets, configure a shared private link from Azure AI Search to the storage account as documented for indexers with private endpoints.
- If using Azure OpenAI “On Your Data” or similar architecture, also:
- Enable the storage account as a trusted service for Azure AI Search and Azure OpenAI based on managed identity.
- Use private endpoints from client machines if they also need access.
- Check firewall rules if using
Enable from selected networks- If you switch from
DisabledtoEnable from selected networks:- Make sure any required virtual networks or resource instance rules are configured so that Azure AI Search is allowed.
- Do not rely on IP rules alone if the connection is via managed identity and trusted service.
- If you switch from
In summary, either:
- Allow selected networks + trusted Microsoft services and use managed identity from Azure AI Search, or
- Keep public access disabled but ensure private endpoints/shared private link are correctly configured so the search service can reach the storage account.
References:
- Make indexer connections to Azure Storage as a trusted service
- Configure a search service to connect using a managed identity
- Network and access configuration for Azure OpenAI On Your Data
- Network and access configuration for Azure OpenAI On Your Data (classic)
- Set the default public network access rule for an Azure Storage account