AzStackHciArcIntegration/AzStackHci.ArcIntegration.Helpers.psm1

Import-LocalizedData -BindingVariable lanTxt -FileName AzStackHci.ArcIntegration.Strings.psd1

class HealthModel
{
    # Attributes for Azure Monitor schema
    [string]$Name #Name of the individual test/rule/alert that was executed. Unique, not exposed to the customer.
    [string]$Title #User-facing name; one or more sentences indicating the direct issue.
    [string]$Severity #Severity of the result (Critical, Warning, Informational, Hidden) - this answers how important the result is. Critical is the only update-blocking severity.
    [string]$Description #Detailed overview of the issue and what impact the issue has on the stamp.
    [psobject]$Tags #Key-value pairs that allow grouping/filtering individual tests. For example, "Group": "ReadinessChecks", "UpdateType": "ClusterAware"
    [string]$Status #The status of the check running (i.e. Failed, Succeeded, In Progress) - this answers whether the check ran, and passed or failed.
    [string]$Remediation #Set of steps that can be taken to resolve the issue found.
    [string]$TargetResourceID #The unique identifier for the affected resource (such as a node or drive).
    [string]$TargetResourceName #The name of the affected resource.
    [string]$TargetResourceType #The type of resource being referred to (well-known set of nouns in infrastructure, aligning with Monitoring).
    [datetime]$Timestamp #The Time in which the HealthCheck was called.
    [psobject[]]$AdditionalData #Property bag of key value pairs for additional information.
    [string]$HealthCheckSource #The name of the services called for the HealthCheck (I.E. Test-AzureStack, Test-Cluster).
}

class AzStackHciArcIntegrationTarget : HealthModel {}

function Test-ExistingArcResources {
    [CmdletBinding()]
    param (
        [string]
        $SubscriptionId,
        [string]
        $ArcResourceGroupName,
        [string[]]
        $NodeNames
    )
    try
    {

        #TODO:check if the cmdlet is there, if it is not there, it means it is a different machine, we will fail the test
        $hciRegCmdlet =  Get-Command Get-AzureStackHCI -Type Cmdlet -ErrorAction Ignore
        if($null -eq $hciRegCmdlet)
        {
            # If Get-AzureStackHCI, is not found, fail validation, indicating, validation can only run on HCI OS
            $detail = $lanTxt.ArcValidationNotSupported
            $status = 'Failed'
            Log-Info $detail
        }
        elseif ($(Get-AzureStackHCI).RegistrationStatus -ne "NotYet")
        {
            # Validation can only be done on un-registred cluster, when run on any other registration state, we will skip the validation
            $detail = $lanTxt.ClusterAlreadyRegistered
            $status = 'Succeeded'
            Log-Info $detail
        }
        elseif (!$(Get-AzContext))
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'Failed'
            Log-Info $detail -Type Warning
        }
        else
        {
            $HCApiVersion = "2022-03-10"
            $sameNodeNames = [System.Collections.ArrayList]::new()
            $msg = "Verifying subscription ID : {0}, Resource Group: {1}, Node Names {2}" -f $SubscriptionId, $ArcResourceGroupName, ($NodeNames -join ',')
            Log-Info  $msg
            forEach ($clusNode in $NodeNames)
            {
                $machineResourceId = "/Subscriptions/" + $SubscriptionId + "/resourceGroups/" + $ArcResourceGroupName + "/providers/Microsoft.HybridCompute/machines/" + $clusNode
                $arcMachineResource = Get-AzResource -ResourceId $machineResourceId -ApiVersion $HCApiVersion -ErrorAction Ignore
                if ($Null -ne $arcMachineResource)
                {
                    $sameNodeNames.Add($clusNode) | Out-Null
                }
            }
            if ($sameNodeNames.Count -gt 0)
            {
                $sameNodeNamesAsList = $sameNodeNames -join ","
                $detail = $lanTxt.ArcMachineAlreadyExistsInResourceGroupError -f $sameNodeNamesAsList, $ArcResourceGroupName
                $status = 'Failed'
                Log-Info $detail -Type Warning
            }
            else
            {
                $detail = $lanTxt.ArcMachineNotFound -f $ArcResourceGroupName
                $status = 'Succeeded'
                Log-Info $detail
            }
        }
        $instanceResult = New-Object AzStackHciArcIntegrationTarget
        $instanceResult.Name = 'AzStackHci_ArcIntegration_ResourceGroup_Check'
        $instanceResult.Title = 'Test ARC ResourceGroup'
        $instanceResult.Severity = 'Critical'
        $instanceResult.Description = "Checking ARC ResourceGroup clean"
        $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
        $instanceResult.TargetResourceID = 'ARC ResourceGroup'
        $instanceResult.TargetResourceName = 'ARC ResourceGroup'
        $instanceResult.TargetResourceType = 'ResourceGroup'
        $instanceResult.Timestamp = [datetime]::UtcNow
        $instanceResult.HealthCheckSource = $ENV:EnvChkrId
        $AdditionalData = @()
        $AdditionalData += New-Object -TypeName PSObject -Property @{
            Source    = $ENV:COMPUTERNAME
            Resource  = 'ARC ResourceGroup'
            Detail    = $detail
            Status    = $status
            TimeStamp = [datetime]::UtcNow
        }
        $instanceResult.AdditionalData = $AdditionalData
        $instanceResult.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
        $instanceResult
    }
    catch
    {
        throw ("Error validating ARC Resource Group : {0}" -f $_.Exception)
    }
}

function Test-ArcAgentNotConnectedToDifferentResource
{
    param
    (
        [string]
        $SubscriptionId,
        [string]
        $ArcResourceGroupName,
        [string[]]
        $NodeNames,
        [System.Management.Automation.Runspaces.PSSession[]]
        $PSSession
    )
    try
    {
        #TODO:check if the cmdlet is there, if it is not there, it means it is a different machine, we will fail the test
        $hciRegCmdlet =  Get-Command Get-AzureStackHCI -Type Cmdlet -ErrorAction Ignore
        if($null -eq $hciRegCmdlet)
        {
            # If Get-AzureStackHCI, is not found, fail validation, indicating, validation can only run on HCI OS
            $detail = $lanTxt.ArcValidationNotSupported
            $status = 'Failed'
            Log-Info $detail
        }
        elseif ($(Get-AzureStackHCI).RegistrationStatus -ne "NotYet")
        {
            # Validation can only be done on un-registred cluster, when run on any other registration state, we will skip the validation
            $detail = $lanTxt.ClusterAlreadyRegistered
            $status = 'Succeeded'
            Log-Info $detail
        }
        elseif ($null -eq $PSSession)
        {
            $detail = $lanTxt.SessionNotProvided
            $status = 'Succeeded'
            Log-Info $detail
        }
        else
        {
            $NodesAlreadyArcEnabledDifferentResource = [System.Collections.ArrayList]::new()
            foreach ($nodeSession in $PSSession)
            {
                try
                {
                    Microsoft.PowerShell.Core\Invoke-Command -Session $nodeSession -ErrorAction Stop -ArgumentList $lanTxt.ArcAgentExePath -ScriptBlock {
                        if(Test-Path -Path $args[0])
                        {
                            $arcAgentStatus = Invoke-Expression -Command "& 'C:\Program Files\AzureConnectedMachineAgent\azcmagent.exe' show -j"

                            # Parsing the status received from Arc agent
                            $arcAgentStatusParsed = $arcAgentStatus | ConvertFrom-Json

                            # Throw an error if the node is Arc enabled to a different resource group or subscription id
                            # Agent can be is "Connected" or disconnected state. If the resource name property on the agent is empty, that means, it is cleanly disconnected , and just the exe exists
                            # If the resourceName exists and agent is in "Disconnected" state, indicates agent has temporary connectivity issues to the cloud
                            if(-not ([string]::IsNullOrEmpty($arcAgentStatusParsed.resourceName)) -And (($arcAgentStatusParsed.subscriptionId -ne $Using:SubscriptionId) -or ($arcAgentStatusParsed.resourceGroup -ne $Using:ArcResourceGroupName)))
                            {
                                $differentResourceExceptionMessage = ("{0}: Subscription Id: {1}, Resource Group: {2}" -f $Using:nodeSession.ComputerName, $arcAgentStatusParsed.subscriptionId, $arcAgentStatusParsed.resourceGroup)
                                throw $differentResourceExceptionMessage
                            }
                        }
                    }
                }
                catch
                {
                    if(($null -ne $_.Exception.Message) -and $_.Exception.Message.Contains($nodeSession.ComputerName) -and $_.Exception.Message.Contains("Subscription Id") -and $_.Exception.Message.Contains("Resource Group"))
                    {
                        $NodesAlreadyArcEnabledDifferentResource.Add($_.Exception.Message) | Out-Null
                    }
                    else
                    {
                        throw ("Error verifying Arc registration state for node: {0} with exception: {1}" -f $nodeSession.ComputerName, $_.Exception.Message)
                    }
                }
            }

            if($NodesAlreadyArcEnabledDifferentResource.Length -gt 0)
            {
                $NodesAlreadyArcEnabledDifferentResource = $NodesAlreadyArcEnabledDifferentResource -join "`n"
                $detail = $lanTxt.ArcAlreadyEnabledInADifferentResourceError -f $NodesAlreadyArcEnabledDifferentResource
                $status = 'Failed'
                Log-Info $detail
            }
            else
            {
                $detail = $lanTxt.ArcNotEnabledInADifferentResource
                $status = 'Succeeded'
                Log-Info $detail
            }
        }
        $instanceResult = New-Object AzStackHciArcIntegrationTarget
        $instanceResult.Name = 'AzStackHci_ArcIntegration_ArcMachinesState_Check'
        $instanceResult.Title = 'Check Arc for servers machines state'
        $instanceResult.Severity = 'Critical'
        $instanceResult.Description = "Check if Arc for servers machines are already connected to a different subscription id or resource group"
        $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
        $instanceResult.TargetResourceID = 'Arc for Servers'
        $instanceResult.TargetResourceName = 'Arc for Servers'
        $instanceResult.TargetResourceType = 'Arc for Servers'
        $instanceResult.Timestamp = [datetime]::UtcNow
        $instanceResult.HealthCheckSource = $ENV:EnvChkrId
        $AdditionalData = @()
        $AdditionalData += New-Object -TypeName PSObject -Property @{
            Source    = $ENV:COMPUTERNAME
            Resource  = 'Arc for Servers'
            Detail    = $detail
            Status    = $status
            TimeStamp = [datetime]::UtcNow
        }
        $instanceResult.AdditionalData = $AdditionalData
        $instanceResult.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
        $instanceResult
    }
    catch
    {
        throw ("Exception while checking Nodes Arc connection state: {0}" -f $_.Exception.Message)
    }
}

function Test-IsRegionValid
{
    [CmdletBinding()]
    param (
        [string]
        $Region
    )
    try
    {
        if(!$(Get-AzContext))
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'Failed'
            Log-Info $detail
        }
        elseif ([string]::IsNullOrEmpty($Region))
        {
            $detail = $lanTxt.RegionRequired
            $status = 'Succeeded'
            Log-Info $detail
        }
        else
        {
            $Region = Normalize-RegionName -Region $Region
            $locations = Retry-Command -ScriptBlock { (Get-AzResourceProvider -ProviderNamespace Microsoft.AzureStackHCI).Where{($_.ResourceTypes.ResourceTypeName -eq 'clusters' -and $_.RegistrationState -eq 'Registered')}.Locations } -RetryIfNullOutput $true
            Log-Info ("RP supported regions : $locations")
            $locations | foreach {
                $regionName = Normalize-RegionName -Region $_
                if ($regionName -eq $Region)
                {
                    # Supported region
                    $detail = $lanTxt.RegionVerified
                    $status = 'Succeeded'
                    Log-Info $detail
                }
            }

            if($status -ne 'Succeeded')
            {
                $detail = $lanTxt.RegionNotVerified -f $Region
                $status = 'Failed'
                Log-Info $detail
            }

            $instanceResult = New-Object AzStackHciArcIntegrationTarget
            $instanceResult.Name = 'AzStackHci_ArcIntegration_Region_Check'
            $instanceResult.Title = 'Verify Azure Region'
            $instanceResult.Severity = 'Critical'
            $instanceResult.Description = "Checking Azure Region"
            $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
            $instanceResult.TargetResourceID = 'Azure Region'
            $instanceResult.TargetResourceName = 'Azure Region'
            $instanceResult.TargetResourceType = 'Region'
            $instanceResult.Timestamp = [datetime]::UtcNow
            $instanceResult.HealthCheckSource = $ENV:EnvChkrId
            $AdditionalData = @()
            $AdditionalData += New-Object -TypeName PSObject -Property @{
                Source    = $ENV:COMPUTERNAME
                Resource  = 'Azure Region'
                Detail    = $detail
                Status    = $status
                TimeStamp = [datetime]::UtcNow
            }
            $instanceResult.AdditionalData = $AdditionalData
            $instanceResult.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $instanceResult
        }
    }
    catch
    {
        throw ("Exception while validating Region : {0}" -f $_.Exception)
    }
}

function Test-ResourceGroupLimit
{
    [CmdletBinding()]
    param (
        [string]
        $SubscriptionId,
        [string]
        $ArcResourceGroupName,
        [string]
        $RegistrationResourceGroupName
    )
    try
    {
        $azureContext = Get-AzContext
        if(!$azureContext)
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'Failed'
            Log-Info $detail
        }
        else
        {
            $newRGCount = 0
            $hciRG = Get-AzResourceGroup -Name $RegistrationResourceGroupName -ErrorAction SilentlyContinue
            if([string]::IsNullOrEmpty($hciRG))
            {
                $newRGCount++
            }

            if($ArcResourceGroupName -ne $RegistrationResourceGroupName)
            {
                $arcRG = Get-AzResourceGroup -Name $ArcResourceGroupName -ErrorAction SilentlyContinue
                if([string]::IsNullOrEmpty($arcRG))
                {
                    $newRGCount++
                }
            }

            $totalRGCount = (Get-AzResourceGroup -ErrorAction SilentlyContinue).Count
            if(($totalRGCount + $newRGCount) -gt 980)
            {
                $detail = $lanTxt.ResourceGroupLimitReached -f $SubscriptionId, ($totalRGCount + $newRGCount - 980)
                $status = 'Failed'
                Log-Info $detail
            }
            else
            {
                $detail = $lanTxt.ResourceGroupLimitCheckSucceeded -f $SubscriptionId
                $status = 'Succeeded'
                Log-Info $detail
            }

            $instanceResult = New-Object AzStackHciArcIntegrationTarget
            $instanceResult.Name = 'AzStackHci_ArcIntegration_ResourceGroupLimit_Check'
            $instanceResult.Title = 'Verify Resource group limit'
            $instanceResult.Severity = 'Critical'
            $instanceResult.Description = "Checking Azure Resource group limit"
            $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
            $instanceResult.TargetResourceID = 'Azure Resource Group'
            $instanceResult.TargetResourceName = 'Azure Resource Group'
            $instanceResult.TargetResourceType = 'ResourceGroup'
            $instanceResult.Timestamp = [datetime]::UtcNow
            $instanceResult.HealthCheckSource = $ENV:EnvChkrId
            $AdditionalData = @()
            $AdditionalData += New-Object -TypeName PSObject -Property @{
                Source    = $ENV:COMPUTERNAME
                Resource  = 'Azure Resource Group'
                Detail    = $detail
                Status    = $status
                TimeStamp = [datetime]::UtcNow
            }
            $instanceResult.AdditionalData = $AdditionalData
            $instanceResult.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $instanceResult
        }
    }
    catch
    {
        throw ("Exception while verifying resource group limit : {0}" -f $_.Exception)
    }
}

function Test-ResourceCountLimit
{
    [CmdletBinding()]
    param (
        [string]
        $SubscriptionId,
        [string]
        $RegistrationResourceGroupName
    )
    try
    {
        $azureContext = Get-AzContext
        if(!$azureContext)
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'Failed'
            Log-Info $detail
        }
        else
        {
            try
            {
                $resourcesInHCIRg = Get-AzResource -ResourceGroupName $RegistrationResourceGroupName -ResourceType "Microsoft.AzureStackHCI/clusters" -ErrorAction Stop
                if($resourcesInHCIRg.Count -ge 800)
                {
                    $detail = $lanTxt.ResourceLimitReached -f $RegistrationResourceGroupName, $SubscriptionId
                    $status = 'Failed'
                    Log-Info $detail
                }
                else
                {
                    $detail = $lanTxt.ResourceLimitCheckSucceeded -f $RegistrationResourceGroupName
                    $status = 'Succeeded'
                    Log-Info $detail
                }
            }
            catch
            {
                $detail = $lanTxt.MissingPermissions -f "Verify Resource count limit in Registration resource group"
                $status = 'Succeeded'
                Log-Info $detail
            }

            $instanceResult = New-Object AzStackHciArcIntegrationTarget
            $instanceResult.Name = 'AzStackHci_ArcIntegration_ResourceLimit_Check'
            $instanceResult.Title = 'Verify Resource limit'
            $instanceResult.Severity = 'Critical'
            $instanceResult.Description = "Checking Azure Stack HCI Cluster Resource limit in Registration resource group"
            $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
            $instanceResult.TargetResourceID = 'Azure Stack HCI Cluster Resource'
            $instanceResult.TargetResourceName = 'Azure Stack HCI Cluster Resource'
            $instanceResult.TargetResourceType = 'Cluster'
            $instanceResult.Timestamp = [datetime]::UtcNow
            $instanceResult.HealthCheckSource = $ENV:EnvChkrId
            $AdditionalData = @()
            $AdditionalData += New-Object -TypeName PSObject -Property @{
                Source    = $ENV:COMPUTERNAME
                Resource  = 'Azure Stack HCI Cluster Resource'
                Detail    = $detail
                Status    = $status
                TimeStamp = [datetime]::UtcNow
            }
            $instanceResult.AdditionalData = $AdditionalData
            $instanceResult.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $instanceResult
        }
    }
    catch
    {
        throw ("Exception while verifying azure stack hci resource count limit : {0}" -f $_.Exception)
    }
}

function Test-RoleAssignmentCountLimit
{
    [CmdletBinding()]
    param (
        [string]
        $SubscriptionId
    )
    try
    {
        $azureContext = Get-AzContext
        if(!$azureContext)
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'Failed'
            Log-Info $detail
        }
        else
        {
            try
            {
                $roleAssignments = Get-AzRoleAssignment -ErrorAction Stop
                if($roleAssignments.Count -ge 4000)
                {
                    $detail = $lanTxt.RoleAssignmentLimitReached -f $SubscriptionId
                    $status = 'Failed'
                    Log-Info $detail
                }
                else
                {
                    $detail = $lanTxt.RoleAssignmentLimitSuccessfullyVerified -f $SubscriptionId
                    $status = 'Succeeded'
                    Log-Info $detail
                }
            }
            catch
            {
                $detail = $lanTxt.MissingPermissions -f "Verify Role Assignment count"
                $status = 'Succeeded'
                Log-Info $detail
            }

            $instanceResult = New-Object AzStackHciArcIntegrationTarget
            $instanceResult.Name = 'AzStackHci_ArcIntegration_RoleAssignmentLimit_Check'
            $instanceResult.Title = 'Verify Role Assignment Limit'
            $instanceResult.Severity = 'Critical'
            $instanceResult.Description = "Checking Role Assignment limit in Subscription Id"
            $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
            $instanceResult.TargetResourceID = 'Azure Subscription Id'
            $instanceResult.TargetResourceName = 'Azure Subscription Id'
            $instanceResult.TargetResourceType = 'SubscriptionId'
            $instanceResult.Timestamp = [datetime]::UtcNow
            $instanceResult.HealthCheckSource = $ENV:EnvChkrId
            $AdditionalData = @()
            $AdditionalData += New-Object -TypeName PSObject -Property @{
                Source    = $ENV:COMPUTERNAME
                Resource  = 'Azure Subscription Id'
                Detail    = $detail
                Status    = $status
                TimeStamp = [datetime]::UtcNow
            }
            $instanceResult.AdditionalData = $AdditionalData
            $instanceResult.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $instanceResult
        }
    }
    catch
    {
        throw ("Exception while verifying azure stack hci role assignment count limit : {0}" -f $_.Exception)
    }
}

function Test-ExistingHCIResource {
    [CmdletBinding()]
    param (
        [string]
        $SubscriptionId,
        [string]
        $RegistrationResourceGroupName,
        [string]
        $RegistrationResourceName
    )
    try
    {
        #TODO:check if the cmdlet is there, if it is not there, it means it is a different machine, we will fail the test
        $hciRegCmdlet =  Get-Command Get-AzureStackHCI -Type Cmdlet -ErrorAction Ignore
        if($null -eq $hciRegCmdlet)
        {
            # If Get-AzureStackHCI, is not found, fail validation, indicating, validation can only run on HCI OS
            $detail = $lanTxt.ArcValidationNotSupported
            $status = 'Failed'
            Log-Info $detail
        }
        elseif ($(Get-AzureStackHCI).RegistrationStatus -ne "NotYet")
        {
            # Validation can only be done on un-registred cluster, when run on any other registration state, we will skip the validation
            $detail = $lanTxt.ClusterAlreadyRegistered
            $status = 'Succeeded'
            Log-Info $detail
        }
        elseif (!$(Get-AzContext))
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'Failed'
            Log-Info $detail -Type Warning
        }
        elseif ([string]::IsNullOrEmpty($RegistrationResourceName))
        {
            $detail = $lanTxt.ResourceNameEmpty
            $status = 'Succeeded'
            Log-Info $detail
        }
        else
        {
            $RPAPIVersion = "2022-12-01"
            Log-Info ($lanTxt.VerifyingIfHCIResourceExistsInHCIRG -f $RegistrationResourceName, $SubscriptionId, $RegistrationResourceGroupName)
            $hciClusterResourceId = "/Subscriptions/" + $SubscriptionId + "/resourceGroups/" + $RegistrationResourceGroupName + "/providers/Microsoft.AzureStackHCI/clusters/" + $RegistrationResourceName
            $hciClusterResource = Get-AzResource -ResourceId $hciClusterResourceId -ApiVersion $RPAPIVersion -ErrorAction Ignore

            if ($null -ne $hciClusterResource)
            {
                $detail = $lanTxt.HCIClusterResourceAlreadyExistsError -f $RegistrationResourceName, $RegistrationResourceGroupName
                $status = 'Failed'
                Log-Info $detail -Type Warning
            }
            else
            {
                $detail = $lanTxt.HCIClusterNotFound -f $RegistrationResourceName, $RegistrationResourceGroupName
                $status = 'Succeeded'
                Log-Info $detail
            }
        }
        $instanceResult = New-Object AzStackHciArcIntegrationTarget
        $instanceResult.Name = 'AzStackHci_HCI_ResourceGroup_Check'
        $instanceResult.Title = 'Test HCI Resource Group'
        $instanceResult.Severity = 'Critical'
        $instanceResult.Description = "Checking HCI Resource Group clean"
        $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
        $instanceResult.TargetResourceID = 'HCI ResourceGroup'
        $instanceResult.TargetResourceName = 'HCI ResourceGroup'
        $instanceResult.TargetResourceType = 'ResourceGroup'
        $instanceResult.Timestamp = [datetime]::UtcNow
        $instanceResult.HealthCheckSource = $ENV:EnvChkrId
        $AdditionalData = @()
        $AdditionalData += New-Object -TypeName PSObject -Property @{
            Source    = $ENV:COMPUTERNAME
            Resource  = 'HCI ResourceGroup'
            Detail    = $detail
            Status    = $status
            TimeStamp = [datetime]::UtcNow
        }
        $instanceResult.AdditionalData = $AdditionalData
        $instanceResult.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
        $instanceResult
    }
    catch
    {
        throw ("Error validating HCI Resource Group : {0}" -f $_.Exception)
    }
}

function Normalize-RegionName{
    param(
        [string] $Region
        )
        $regionName = $Region -replace '\s',''
        $regionName = $regionName.ToLower()
        return $regionName
}

function Retry-Command {
    param (
        [parameter(Mandatory=$true)]
        [ValidateNotNullOrEmpty()]
        [scriptblock] $ScriptBlock,
        [int]  $Attempts                   = 8,
        [int]  $MinWaitTimeInSeconds       = 5,
        [int]  $MaxWaitTimeInSeconds       = 60,
        [int]  $BaseBackoffTimeInSeconds   = 2,
        [bool] $RetryIfNullOutput          = $true
        )

    $attempt = 0
    $completed = $false
    $result = $null

    if($MaxWaitTimeInSeconds -lt $MinWaitTimeInSeconds)
    {
        throw "MaxWaitTimeInSeconds($MaxWaitTimeInSeconds) is less than MinWaitTimeInSeconds($MinWaitTimeInSeconds)"
    }

    while (-not $completed) {
        try
        {
            $attempt = $attempt + 1
            $result = Invoke-Command -ScriptBlock $ScriptBlock

            if($RetryIfNullOutput)
            {
                if($result -ne $null)
                {
                    $completed = $true
                }
                else
                {
                    throw "Null result received."
                }
            }
            else
            {
                $completed = $true
            }
        }
        catch
        {
            $exception = $_.Exception

            if([int]$exception.ErrorCode -eq [int][system.net.httpstatuscode]::Forbidden)
            {
                throw
            }
            else
            {
                if ($attempt -ge $Attempts)
                {
                    throw
                }
                else
                {
                    $secondsDelay = $MinWaitTimeInSeconds + [int]([Math]::Pow($BaseBackoffTimeInSeconds,($attempt-1)))

                    if($secondsDelay -gt $MaxWaitTimeInSeconds)
                    {
                        $secondsDelay = $MaxWaitTimeInSeconds
                    }

                    Start-Sleep $secondsDelay
                }
            }
        }
    }

    return $result
}

Export-ModuleMember -Function Test-*
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBD0zs/ZtEckrK7
# L+w84+xqgrgSnPW0sxvypu4y91Y0yaCCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGJjHNmUOxfEZ8jvDvi2ULnX
# IRkRcvYP/OqE+30xRlOfMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAlval2xIlQXoPqBkAYxjiRBKAs1g0I1xNkV8pUtmb2UYW5D8Y5BjNz/iJ
# D/AJCitB3mbkoC4o002TzRQTxGyJZzJJDppEXdqfKANwoK/5xV3nez/OF6n0my3k
# rYiKiwmbBt/SPDkW0mxBMqY9vWz/TfOvlg90vA80THlb2a/MiIXTxZvSUjcLIwRu
# eBBuQc2fofmBKZcQAWwEA/+q2j1Jve/2inH7yB8Lqzfe/jJuagLowT41lVxmLJDE
# 0eA7s/ATL9lLYEdHzMt2v009n402rNi2GAHfm5BhYyqn4Z/NnSIEsGHZHtUa/WDX
# /9nghUUr4SeQ4zN42Z9crlVpWyoJVaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDdTH+mqeM6FC/LpbADsmDLvjbZeNgdvZp9g8tahELFggIGZMmKewN/
# GBMyMDIzMDgwMzA4MjA0My43MjVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAGz/iXOKRsbihwAAQAAAbMwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjIw
# OTIwMjAyMjAzWhcNMjMxMjE0MjAyMjAzWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC
# RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALR8D7rmGICuLLBggrK9je3h
# JSpc9CTwbra/4Kb2eu5DZR6oCgFtCbigMuMcY31QlHr/3kuWhHJ05n4+t377PHon
# dDDbz/dU+q/NfXSKr1pwU2OLylY0sw531VZ1sWAdyD2EQCEzTdLD4KJbC6wmACon
# iJBAqvhDyXxJ0Nuvlk74rdVEvribsDZxzClWEa4v62ENj/HyiCUX3MZGnY/AhDya
# zfpchDWoP6cJgNCSXmHV9XsJgXJ4l+AYAgaqAvN8N+EpN+0TErCgFOfwZV21cg7v
# genOV48gmG/EMf0LvRAeirxPUu+jNB3JSFbW1WU8Z5xsLEoNle35icdET+G3wDNm
# cSXlQYs4t94IWR541+PsUTkq0kmdP4/1O4GD54ZsJ5eUnLaawXOxxT1fgbWb9VRg
# 1Z4aspWpuL5gFwHa8UNMRxsKffor6qrXVVQ1OdJOS1JlevhpZlssSCVDodMc30I3
# fWezny6tNOofpfaPrtwJ0ukXcLD1yT+89u4uQB/rqUK6J7HpkNu0fR5M5xGtOch9
# nyncO9alorxDfiEdb6zeqtCfcbo46u+/rfsslcGSuJFzlwENnU+vQ+JJ6jJRUrB+
# mr51zWUMiWTLDVmhLd66//Da/YBjA0Bi0hcYuO/WctfWk/3x87ALbtqHAbk6i1cJ
# 8a2coieuj+9BASSjuXkBAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU0BpdwlFnUgwY
# izhIIf9eBdyfw40wHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAFqGuzfOsAm4wAJf
# ERmJgWW0tNLLPk6VYj53+hBmUICsqGgj9oXNNatgCq+jHt03EiTzVhxteKWOLoTM
# x39cCcUJgDOQIH+GjuyjYVVdOCa9Fx6lI690/OBZFlz2DDuLpUBuo//v3e4Kns41
# 2mO3A6mDQkndxeJSsdBSbkKqccB7TC/muFOhzg39mfijGICc1kZziJE/6HdKCF8p
# 9+vs1yGUR5uzkIo+68q/n5kNt33hdaQ234VEh0wPSE+dCgpKRqfxgYsBT/5tXa3e
# 8TXyJlVoG9jwXBrKnSQb4+k19jHVB3wVUflnuANJRI9azWwqYFKDbZWkfQ8tpNoF
# fKKFRHbWomcodP1bVn7kKWUCTA8YG2RlTBtvrs3CqY3mADTJUig4ckN/MG6AIr8Q
# +ACmKBEm4OFpOcZMX0cxasopdgxM9aSdBusaJfZ3Itl3vC5C3RE97uURsVB2pvC+
# CnjFtt/PkY71l9UTHzUCO++M4hSGSzkfu+yBhXMGeBZqLXl9cffgYPcnRFjQT97G
# b/bg4ssLIFuNJNNAJub+IvxhomRrtWuB4SN935oMfvG5cEeZ7eyYpBZ4DbkvN44Z
# vER0EHRakL2xb1rrsj7c8I+auEqYztUpDnuq6BxpBIUAlF3UDJ0SMG5xqW/9hLMW
# naJCvIerEWTFm64jthAi0BDMwnCwMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4
# RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAcYtE6JbdHhKlwkJeKoCV1JIkDmGggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOh1WlYwIhgPMjAyMzA4MDMwNjQyMzBaGA8yMDIzMDgwNDA2NDIzMFowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6HVaVgIBADAHAgEAAgIhfDAHAgEAAgIVwzAKAgUA
# 6Har1gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFNPJasblHYtMWpbDWh3
# Ti7S/zUXN3xSGMoyf/tPnY91WzbTWChClrIZMjdCtD960bg3IPdvemfpuGLYFmh3
# ji3o0625aH5vnk28E0Iz2ERW2U70Rf+ZIbgNxIelAVXXghfMw+UN4O2FEdq4szY5
# 5xwJaJ7nDGl2Q4KDrSVr5aAZMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAGz/iXOKRsbihwAAQAAAbMwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgmEQZX0jYc0kKBdJUVQ8A2WNDNtKsa3iThxkPk4qmNSgwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCCGoTPVKhDSB7ZG0zJQZUM2jk/ll1zJGh6KOhn76k+/
# QjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABs/4l
# zikbG4ocAAEAAAGzMCIEIETylqyW4GfyewUmEWdFqjUbqnCfTLToMzXLeQn2MHLg
# MA0GCSqGSIb3DQEBCwUABIICAAoszaPWPCBDjZn7GEvTBfFHx0h9DRI58Ip5Y2p2
# pA8i5u97u9Gq7HkyKLF/Z/hYC1wNtgFLW1asZy5ecn9oSLnu/0BlYnK4dkf5lsSf
# pRfCnSCVIAOrcm3M27PlmlYd5MiH7IG1zpr9P765+cOtDJzDjUSkPSonOCWLZrcR
# DZKIDvvnSUbHyt2D8bSbYQGe+2EGFJwviUnhtM95wT54RvyX0NbvlbEF/OUxUody
# zcpfkGZSn33BTcxkk5EMFdy8gKs3urk9RLhAdkBelET/3QDwE/qsd4v0ZBx/G2Bi
# Zvtm7Tn9fCCUEInjrQtftUIeWgiV4Z53d8HVvScxJ9fO+jsJACCQqY0R+BXJS6bh
# dggloajjgA25YC9yoynZoH8QED+M0bF6BOYMNWUYDvqLiXcPE4LccPYd3Celh/XN
# viMxPBhMuJ/hw05qDl83rZ/Zdh8vgP5p/BYbNzyziXKwHZLNmLxLwtQ6eKYWdaQB
# MfpCqSb2DTOA516aejpy8eHTmvUQN0v7yAUErDEtiIPA5PO2TK4EXNqm3Hvk7Z1o
# /ayKODzwxZECZ8rUqcWV9It0DQdIMPBhW3PnP3s4LDbnEsWUzlVK5tINy9xU3N85
# HRVb907QEPv0yNtEvehSRNPl4i4Kc59xSlEs2W7IgarPxliZ2Jj5aNQdr0v564/e
# 3F89
# SIG # End signature block