A few quick review comments:
1. http://local.doc.arvados.org/install/configure-azure-blob-storage.html has outdated azure cli commands. Change to:
azure config mode arm
~$ az login
~$ az group create exampleGroupName eastus2
~$ az storage account create --sku Standard_LRS --kind BlobStorage --encryption-services blob --access-tier Hot --https-only true --location eastus2 --resource-group exampleGroupName --name exampleStorageAccountName
~$ az storage account keys list --resource-group exampleGroupName --account-name exampleStorageAccountName
[
{
"keyName": "key1",
"permissions": "Full",
"value": "zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz=="
},
{
"keyName": "key2",
"permissions": "Full",
"value": "yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy=="
}
]
~$ AZURE_STORAGE_ACCOUNT="exampleStorageAccountName" \
AZURE_STORAGE_ACCESS_KEY="zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz==" \
az storage container create --name exampleContainerName
2. http://local.doc.arvados.org/install/install-dispatch-cloud.html
=> ClientSecret is unmasked in the example configuration
=> Add some detail on setting up those credentials:
a) SubscriptionID and TenantID: from output of `az account list`, e.g.:
$ az account list
[
{
"cloudName": "AzureCloud",
"id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXX",
"isDefault": true,
"name": "Your Subscription",
"state": "Enabled",
"tenantId": "YYYYYYYY-YYYY-YYYY-YYYYYYYY",
"user": {
"name": "you@example.com",
"type": "user"
}
}
]
SubscriptionID is XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXX and TenantID is YYYYYYYY-YYYY-YYYY-YYYYYYYY.
c) We you need to create a "service principal" to use as a delegated authority for API access.
$ az ad app create --display-name "Arvados Dispatch Cloud (ClusterID)" --homepage "https://arvados.org" --identifier-uris "https://ClusterID.arvadosapi.com" --end-date 2299-12-31 --password <Your_Password>
$ az ad sp create "<appId>"
(appId is part of the response of the previous command)
$ az role assignment create --assignee "<objectId>" --role Owner --scope /subscriptions/{subscriptionId}/
(objectId is part of the response of the previous command)
ClientID is the 'appId' value.
ClientSecret is what was provided as 'Your_Password'.