My last post, where I was talking about encrypting VMs, took several pages to just explain/screenshot/etc. At the end, I thought it'd be nice to link to the full PS runbook, but I didn't have any webserver place to easily store it. "Use your damn website you goof," I thought...pft, too easy. Let's make it hard.
- Use Azure BLOB Storage (boring, too easy you say...mkay, keep going).
- Do it all in PowerShell (okay, a few more steps...keep going)
- Use a storage account that was created in ARM mode (there ya go).
You may be aware, the Azure ARM stuff is still catching up with the ASM stuff, so we need to poke around some.
In old ASM PowerShell, I could do things like
get-azurestorageaccount which still works, but it only returns ASM created storage. Me, I created my storage account in ARM mode, so there should be a
get-azurermstorageaccount - yep, there is. So that's good.
Next, in old ASM PowerShell, I could do this:
new-azurestoragecontainer which is great. Logic would tell me that therefore there is a
new-azurermstoragecontainer - nope...why I haven't the foggiest, but I suspect it will be along shortly. Here's what I managed to do.
$storagekeys = get-azurermstorageaccountkey -resourcegroupname <my resource group name> -name <my storage account name>
$context = new-azurestoragecontext -storageaccountname <my storage account name> -storageaccountkey $storagekey.key1
Now, I have myself something I can work with - the first thing I needed to do was create a container. Since there is no
new-azurermstoragecontainer but there IS
new-azurestoragecontainer which takes a
-context parameter, this should work:
new-azurestoragecontainer -name mycontainer -permission container -context $context
Note: The new-azurestoragecontext just builds an API object, it doesn't do any validation, so make sure your stuff is right
Now, I can upload my script to the container and we're done!
set-azurestorageblobcontent -file <my local file path> -container mycontainer -context $context