<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Create Storage Credential 500 Response in Get Started Discussions</title>
    <link>https://community.databricks.com/t5/get-started-discussions/create-storage-credential-500-response/m-p/60068#M6520</link>
    <description>&lt;P&gt;I'm trying to create storage credentials for an Azure Databricks Connector at the workspace level with a service principal that has the &lt;A href="https://docs.databricks.com/api/azure/workspace/storagecredentials/create#azure_managed_identity" target="_self"&gt;CREATE_STORAGE_CREDENTIAL&lt;/A&gt;&amp;nbsp;but is NOT an account admin. For this test, the SP has the owner role on the connector.&lt;/P&gt;&lt;P&gt;I've tried this via Terraform, Databricks CLI and Databricks CLI API with a 500 response (or an error with no message) in all cases.&lt;/P&gt;&lt;P&gt;Simplified Terraform:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;resource "azurerm_databricks_access_connector" "managed" {
  name = format("ac-%s-%s", local.oldw_environment, local.business_unit)
  resource_group_name = data.azurerm_resource_group.oldw.name
  location = data.azurerm_resource_group.oldw.location

  identity {
    type = "SystemAssigned"
  }
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CLI call:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;databricks storage-credentials create --json '{"name": "manual_test", "azure_managed_identity": {"access_connector_id": "/subscriptions/$MY_SUB_ID/resourceGroups/$MY_RG/providers/Microsoft.Databricks/accessConnectors/manual-test"}, "skip_validation": true}' -p $MY_PROFILE --debug&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CLI response:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;15:11:11  INFO start pid=38926 version=0.211.0 args="databricks, storage-credentials, create, --json, {\"name\": \"manual_test\", \"azure_managed_identity\": {\"access_connector_id\": \"/subscriptions/$MY_SUB_ID/resourceGroups/$MY_RG/providers/Microsoft.Databricks/accessConnectors/manual-test\"}, \"skip_validation\": true}, -p, dev, --debug"
15:11:11 DEBUG Loading dev profile from /Users/sgrosen/.databrickscfg pid=38926 sdk=true
15:11:11  INFO Generating AAD token for Service Principal ($SP_ID) pid=38926 sdk=true
15:11:11 DEBUG POST /$TENANT_ID/oauth2/token
&amp;gt; [non-JSON document of 19 bytes]. &amp;lt;http.RoundTripper&amp;gt;
&amp;lt; HTTP/1.1 200 OK
&amp;lt; {
&amp;lt;   "access_token": "**REDACTED**",
&amp;lt;   "expires_in": "3599",
&amp;lt;   "expires_on": "1707775871",
&amp;lt;   "ext_expires_in": "3599",
&amp;lt;   "not_before": "1707771971",
&amp;lt;   "resource": "2ff814a6-3304-4ab8-85cb-cd0e6f879c1d",
&amp;lt;   "token_type": "Bearer"
&amp;lt; } pid=38926 sdk=true
15:11:12 DEBUG POST /$TENANT_ID/oauth2/token
&amp;gt; [non-JSON document of 19 bytes]. &amp;lt;http.RoundTripper&amp;gt;
&amp;lt; HTTP/1.1 200 OK
&amp;lt; {
&amp;lt;   "access_token": "**REDACTED**",
&amp;lt;   "expires_in": "3599",
&amp;lt;   "expires_on": "1707775871",
&amp;lt;   "ext_expires_in": "3599",
&amp;lt;   "not_before": "1707771971",
&amp;lt;   "resource": "https://management.core.windows.net/",
&amp;lt;   "token_type": "Bearer"
&amp;lt; } pid=38926 sdk=true
15:11:12 DEBUG non-retriable error:  pid=38926 sdk=true
15:11:12 DEBUG POST /api/2.1/unity-catalog/storage-credentials
&amp;gt; {
&amp;gt;   "azure_managed_identity": {
&amp;gt;     "access_connector_id": "/subscriptions/$MY_SUB_ID/resourceGroups/$MY_RG/pro... (56 more bytes)"
&amp;gt;   },
&amp;gt;   "name": "manual_test",
&amp;gt;   "skip_validation": true
&amp;gt; }
&amp;lt; HTTP/2.0 500 Internal Server Error
&amp;lt; {
&amp;lt;   "details": [
&amp;lt;     {
&amp;lt;       "@type": "type.googleapis.com/google.rpc.RequestInfo",
&amp;lt;       "request_id": "3e023b35-1fdf-4004-bd87-b5b3ef54e4df",
&amp;lt;       "serving_data": ""
&amp;lt;     }
&amp;lt;   ],
&amp;lt;   "error_code": "INTERNAL_ERROR",
&amp;lt;   "message": ""
&amp;lt; } pid=38926 sdk=true
Error:
15:11:12 ERROR failed execution pid=38926 exit_code=1 error=&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas on what is going wrong here? Up until this point, the only storage credentials created have been created manually by account admins. Our group is trying to automate this process but running into this problem.&lt;/P&gt;</description>
    <pubDate>Tue, 13 Feb 2024 15:23:03 GMT</pubDate>
    <dc:creator>ledbutter</dc:creator>
    <dc:date>2024-02-13T15:23:03Z</dc:date>
    <item>
      <title>Create Storage Credential 500 Response</title>
      <link>https://community.databricks.com/t5/get-started-discussions/create-storage-credential-500-response/m-p/60068#M6520</link>
      <description>&lt;P&gt;I'm trying to create storage credentials for an Azure Databricks Connector at the workspace level with a service principal that has the &lt;A href="https://docs.databricks.com/api/azure/workspace/storagecredentials/create#azure_managed_identity" target="_self"&gt;CREATE_STORAGE_CREDENTIAL&lt;/A&gt;&amp;nbsp;but is NOT an account admin. For this test, the SP has the owner role on the connector.&lt;/P&gt;&lt;P&gt;I've tried this via Terraform, Databricks CLI and Databricks CLI API with a 500 response (or an error with no message) in all cases.&lt;/P&gt;&lt;P&gt;Simplified Terraform:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;resource "azurerm_databricks_access_connector" "managed" {
  name = format("ac-%s-%s", local.oldw_environment, local.business_unit)
  resource_group_name = data.azurerm_resource_group.oldw.name
  location = data.azurerm_resource_group.oldw.location

  identity {
    type = "SystemAssigned"
  }
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CLI call:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;databricks storage-credentials create --json '{"name": "manual_test", "azure_managed_identity": {"access_connector_id": "/subscriptions/$MY_SUB_ID/resourceGroups/$MY_RG/providers/Microsoft.Databricks/accessConnectors/manual-test"}, "skip_validation": true}' -p $MY_PROFILE --debug&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CLI response:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;15:11:11  INFO start pid=38926 version=0.211.0 args="databricks, storage-credentials, create, --json, {\"name\": \"manual_test\", \"azure_managed_identity\": {\"access_connector_id\": \"/subscriptions/$MY_SUB_ID/resourceGroups/$MY_RG/providers/Microsoft.Databricks/accessConnectors/manual-test\"}, \"skip_validation\": true}, -p, dev, --debug"
15:11:11 DEBUG Loading dev profile from /Users/sgrosen/.databrickscfg pid=38926 sdk=true
15:11:11  INFO Generating AAD token for Service Principal ($SP_ID) pid=38926 sdk=true
15:11:11 DEBUG POST /$TENANT_ID/oauth2/token
&amp;gt; [non-JSON document of 19 bytes]. &amp;lt;http.RoundTripper&amp;gt;
&amp;lt; HTTP/1.1 200 OK
&amp;lt; {
&amp;lt;   "access_token": "**REDACTED**",
&amp;lt;   "expires_in": "3599",
&amp;lt;   "expires_on": "1707775871",
&amp;lt;   "ext_expires_in": "3599",
&amp;lt;   "not_before": "1707771971",
&amp;lt;   "resource": "2ff814a6-3304-4ab8-85cb-cd0e6f879c1d",
&amp;lt;   "token_type": "Bearer"
&amp;lt; } pid=38926 sdk=true
15:11:12 DEBUG POST /$TENANT_ID/oauth2/token
&amp;gt; [non-JSON document of 19 bytes]. &amp;lt;http.RoundTripper&amp;gt;
&amp;lt; HTTP/1.1 200 OK
&amp;lt; {
&amp;lt;   "access_token": "**REDACTED**",
&amp;lt;   "expires_in": "3599",
&amp;lt;   "expires_on": "1707775871",
&amp;lt;   "ext_expires_in": "3599",
&amp;lt;   "not_before": "1707771971",
&amp;lt;   "resource": "https://management.core.windows.net/",
&amp;lt;   "token_type": "Bearer"
&amp;lt; } pid=38926 sdk=true
15:11:12 DEBUG non-retriable error:  pid=38926 sdk=true
15:11:12 DEBUG POST /api/2.1/unity-catalog/storage-credentials
&amp;gt; {
&amp;gt;   "azure_managed_identity": {
&amp;gt;     "access_connector_id": "/subscriptions/$MY_SUB_ID/resourceGroups/$MY_RG/pro... (56 more bytes)"
&amp;gt;   },
&amp;gt;   "name": "manual_test",
&amp;gt;   "skip_validation": true
&amp;gt; }
&amp;lt; HTTP/2.0 500 Internal Server Error
&amp;lt; {
&amp;lt;   "details": [
&amp;lt;     {
&amp;lt;       "@type": "type.googleapis.com/google.rpc.RequestInfo",
&amp;lt;       "request_id": "3e023b35-1fdf-4004-bd87-b5b3ef54e4df",
&amp;lt;       "serving_data": ""
&amp;lt;     }
&amp;lt;   ],
&amp;lt;   "error_code": "INTERNAL_ERROR",
&amp;lt;   "message": ""
&amp;lt; } pid=38926 sdk=true
Error:
15:11:12 ERROR failed execution pid=38926 exit_code=1 error=&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas on what is going wrong here? Up until this point, the only storage credentials created have been created manually by account admins. Our group is trying to automate this process but running into this problem.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 15:23:03 GMT</pubDate>
      <guid>https://community.databricks.com/t5/get-started-discussions/create-storage-credential-500-response/m-p/60068#M6520</guid>
      <dc:creator>ledbutter</dc:creator>
      <dc:date>2024-02-13T15:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: Create Storage Credential 500 Response</title>
      <link>https://community.databricks.com/t5/get-started-discussions/create-storage-credential-500-response/m-p/60114#M6521</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/99640"&gt;@ledbutter&lt;/a&gt;&amp;nbsp;, hope you are doing well today!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have gone through the details and this issue might be related to&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://github.com/databricks/cli/issues/1080" target="_blank"&gt;https://github.com/databricks/cli/issues/1080&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please refer to this for more details:&amp;nbsp;&lt;A href="https://github.com/databricks/cli/issues/1108" target="_blank"&gt;https://github.com/databricks/cli/issues/1108&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please let me know if this helps and leave a like if this information is useful, followups are appreciated.&lt;BR /&gt;Kudos&lt;BR /&gt;Ayushi&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 05:27:37 GMT</pubDate>
      <guid>https://community.databricks.com/t5/get-started-discussions/create-storage-credential-500-response/m-p/60114#M6521</guid>
      <dc:creator>Ayushi_Suthar</dc:creator>
      <dc:date>2024-02-14T05:27:37Z</dc:date>
    </item>
    <item>
      <title>Re: Create Storage Credential 500 Response</title>
      <link>https://community.databricks.com/t5/get-started-discussions/create-storage-credential-500-response/m-p/60238#M6522</link>
      <description>&lt;P&gt;Thanks for the links! I will watch those issues.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 16:20:40 GMT</pubDate>
      <guid>https://community.databricks.com/t5/get-started-discussions/create-storage-credential-500-response/m-p/60238#M6522</guid>
      <dc:creator>ledbutter</dc:creator>
      <dc:date>2024-02-14T16:20:40Z</dc:date>
    </item>
  </channel>
</rss>

