Creating a Crawling Module Source

Once you have started your workers, you can login to the Coveo Cloud Administration Console to create a content source (see Typical Crawling Module Use and Logging in to Coveo Cloud V2). The following on-premises content can be crawled using the Coveo On-Premises Crawling Module (refer to the source-specific documentation for more information):

You can also use the Coveo Cloud V2 Platform API to provide Coveo with the content you want to make searchable (see Source API).

Indexing Secured Content

Starting March 26, 2020, Coveo will progressively release connector improvements allowing you to create sources indexing permissions that will be up and running within minutes. Prior to these improvements, you needed the Coveo team to perform some additional work on a source of secured content to make it operational.

The following table lists the dates on which a new version of the connector has been released.

Source Release date Comment
SharePoint Server April 22 When you create or duplicate a source on or after this date, edit your Crawling Module configuration to create a security worker that will execute security identity updates.
Confluence Self-Hosted
Jira Software Self-Hosted
March 26 When you create or duplicate a source on or after this date, edit your Crawling Module configuration to create a security worker that will execute security identity updates.
Database
File System
Jive Server
N/A If you want to index secured content and take access permissions into account, contact Coveo Support.

Sources created before the above dates are no longer supported, but still operational. Should any configuration change be required on such a source, we recommend duplicating the source and deleting the original version. You can then edit the duplicate as desired, and this source will soon be operational without requiring any intervention from the Coveo team.

For more information on sources that index permissions and on how Coveo handles these permissions, see Coveo Cloud Management of Security Identities and Item Permissions.

What’s Next?

Recommended Articles