Obs/bin/ObsDep/content/Powershell/ObservabilityConfig.psm1
<###################################################
# # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> class ObservabilityConfig { static RegisterObservabilityEventSource([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } $eventSources = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.EventSources.EventSource $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] foreach ($eventSource in $eventSources) { $eventSourceRootName = $eventSource.EventSourceRootName $eventSourceLogName = $eventSource.EventSourceLogName $eventSourceLogSizeInBytes = $eventSource.EventSourceLogSizeInBytes $eventSourcePublisher = $eventSource.EventSourcePublisher Trace-Execution "Registering Observability EventSource $eventSourceLogName with Windows EventLog" try { # Register eventsource on hosts Invoke-Command ` -ComputerName $hostIps ` -Credential $localAdminCredential ` -Authentication Credssp ` -ScriptBlock { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" $manifestDllPath = "$observabilityNugetPath\lib\net472\$Using:eventSourceRootName.dll" $manifestPath = "$observabilityNugetPath\lib\net472\$Using:eventSourceRootName.man" # Grant read only access to manifest files Trace-Execution "Granting read only access to $manifestPath" icacls $manifestPath /grant Everyone:R Trace-Execution "Granting read only access to $manifestDllPath" icacls $manifestDllPath /grant Everyone:R $publisherList = wevtutil ep if ($publisherList.Contains($Using:eventSourcePublisher)) { Trace-Execution "Publisher $Using:eventSourcePublisher already exists. Uninstalling." wevtutil uninstall-manifest $manifestPath /resourceFilePath:"$manifestDllPath" /messageFilePath:"$manifestDllPath" Trace-Execution "Successfully uninstalled publisher $Using:eventSourcePublisher." } # Register the EventSource with Windows Trace-Execution "wevtutil installing manifest $manifestPath with resourceFilePath and messageFilePath $manifestDllPath" wevtutil install-manifest $manifestPath /resourceFilePath:"$manifestDllPath" /messageFilePath:"$manifestDllPath" Trace-Execution "wevtutil setting log size to $Using:eventSourceLogSizeInBytes" wevtutil set-log $Using:eventSourceLogName /MaxSize:"$Using:eventSourceLogSizeInBytes" } } catch { Trace-Execution "Registering Observability EventSource failed with error: $_" throw $_ } Trace-Execution "Registering Observability EventSource $eventSourceLogName with Windows EventLog suceeded." } } static CreateObservabilityVolume([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] $volumeLabel = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.Host.ObservabilityVolumeLabel $volumeSize = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.Host.ObservabilityDriveSizeInBytes $driveAccessPath = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.Host.ObservabilityDriveAccessPath.Path $driveAccessPath = $Global:ExecutionContext.InvokeCommand.ExpandString($driveAccessPath) $PhysicalDriveLetter = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.Host.PhysicalDriveLetter $volumeFileName = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.NC.ObservabilityDriveFileName $volumeLocation = "${PhysicalDriveLetter}:" $volumePath = Join-Path -Path $volumeLocation -ChildPath $volumeFileName Write-ObservabilityVolumeCreationStartTelemetry ` -ComputerNames ($hostIps -join " ") ` -VolumeFilePath $volumePath ` -VolumeAccessPath $driveAccessPath ` -VolumeLabel $volumeLabel ` -VolumeSize $volumeSize $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) # Add Observability Volume to each Host $scriptBlock = { param ( [string] [parameter(Mandatory=$true)] $VolumePath, [string] [parameter(Mandatory=$true)] $AccessPath, [string] [parameter(Mandatory=$true)] $VolumeLocation, [string] [Parameter(Mandatory=$true)] $VolumeLabel, [string] [Parameter(Mandatory=$true)] $VolumeSize ) $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" if (Test-Path -Path $AccessPath) { Write-ObservabilityLog "Folder $AccessPath already present. Skipping Observability volume creation." } else { Add-ObservabilityVolumeWithRetry -Path $VolumePath -AccessPath $AccessPath -VolumeLabel $VolumeLabel -Size $VolumeSize -StaticSize Add-VolumeAccessPath -AccessPath $AccessPath -VolumePath $VolumePath Add-MountVolumeScheduledTask -Path $VolumePath } } $argList = @($volumePath, $driveAccessPath, $volumeLocation, $volumeLabel, $volumeSize) Invoke-Command ` -ComputerName $hostIps ` -ScriptBlock $scriptBlock ` -ArgumentList $argList ` -Credential $localAdminCredential ` -Authentication Credssp Write-ObservabilityLog "Observability Volume Setup Succeeded" } static SetUptimeScheduledTask([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityUptimeHelpers.psm1" $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] Write-InfoLog "Obtaining local admin credential..." $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) Write-InfoLog "Starting Uptime scheduled task Setup" Write-InfoLog "Hosts: $hostNames" $scriptBlock = { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityUptimeHelpers.psm1" $hostName = $env:COMPUTERNAME Write-InfoLog "Starting uptime scheduled task on host $hostName." try { Set-UptimeTaskWithRetry Write-InfoLog "Uptime scheduled task on host $hostName succeeded." } catch { Write-ErrorLog "Uptime scheduled task on host $hostName failed with exception $_ ." throw $_ } } Invoke-Command -ComputerName $hostIps -ScriptBlock $scriptBlock -Credential $localAdminCredential -Authentication Credssp | Out-Null Write-InfoLog "Uptime scheduled task completed." } static SetObservabilityEventTask([CloudEngine.Configurations.EceInterfaceParameters] $Parameters, $eventName, $eventScriptBlock) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name Write-InfoLog "Starting $eventName events task Setup" Write-InfoLog "Hosts: $hostNames" $exceptionMessage = "" $scriptBlock = $eventScriptBlock $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] foreach ($hostIp in $hostIps) { Write-InfoLog "Starting $eventName events task on host $hostIp." $result = Invoke-Command -ComputerName $hostIp -ScriptBlock $scriptBlock -Credential $localAdminCredential -Authentication Credssp if($result -eq $true) { Write-InfoLog "$eventName events task on host $hostIp succeeded." } else { Write-ErrorLog "$eventName events task on host $hostIp failed with exception $result." $exceptionMessage += "${hostIp}: $result`n" } } if($exceptionMessage) { throw $exceptionMessage } } static SetCensusEventScheduledTask([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityCensusHelpers.psm1" $scriptBlock = { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityCensusHelpers.psm1" Set-CensusTaskWithRetry } [ObservabilityConfig]::SetObservabilityEventTask($Parameters, "CensusEvent", $scriptBlock) Write-InfoLog "Census events scheduled task completed." } static SetRegistrationEventOneTimeTask([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityCensusHelpers.psm1" $scriptBlock = { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityCensusHelpers.psm1" Set-RegistrationEventsTaskWithRetry } [ObservabilityConfig]::SetObservabilityEventTask($Parameters, "RegistrationEvents", $scriptBlock) Write-InfoLog "Registration events one-time task completed." } static CreateVolumeFoldersAndPruner([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] $folderCleanupThresholdPercent = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.FolderQuotaCleanupThresholdInPercent $folderFreeSpaceThresholdPercent = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.FolderQuotaFreeSpaceThresholdInPercent $purgeFolderFrequencyInMinutes = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.PurgeFolderFrequencyInMinutes $subFolderConfigFileName = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.Host.ObservabilitySubFolderConfigFileName $driveAccessPath = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.Host.ObservabilityDriveAccessPath.Path $driveAccessPath = $Global:ExecutionContext.InvokeCommand.ExpandString($driveAccessPath) Write-ObservabilityLog "Starting Observability Volume Folder and Pruner Setup" Write-ObservabilityLog "Hosts: $hostNames" Write-ObservabilityLog "Volume folder mount access path: $driveAccessPath" Write-ObservabilityLog "Observability subfolder folder cleanup threshold: $folderCleanupThresholdPercent" Write-ObservabilityLog "Observability subfolder folder free space threshold: $folderFreeSpaceThresholdPercent" Write-ObservabilityLog "Observability volume purge frequency in minutes: $purgeFolderFrequencyInMinutes" $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) # Add Observability Volume to each Host $scriptBlock = { param ( [string] [parameter(Mandatory=$true)] $AccessPath, [string] [Parameter(Mandatory=$true)] $FolderCleanupThresholdPercent, [string] [Parameter(Mandatory=$true)] $FolderFreeSpaceThresholdPercent, [string] [Parameter(Mandatory=$true)] $PurgeFolderFrequencyInMinutes, [string] [Parameter(Mandatory=$true)] $SubFolderConfigFileName ) $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" New-VolumeFoldersAndPrunerWithRetry ` -AccessPath $AccessPath ` -CleanupThresholdPercent $FolderCleanupThresholdPercent ` -FreeSpaceThresholdPercent $FolderFreeSpaceThresholdPercent ` -PurgeFolderFrequencyInMinutes $PurgeFolderFrequencyInMinutes ` -SubFolderConfigFileName $SubFolderConfigFileName } $argList = @( $driveAccessPath, $folderCleanupThresholdPercent, $folderFreeSpaceThresholdPercent, $purgeFolderFrequencyInMinutes, $subFolderConfigFileName ) Invoke-Command ` -ComputerName $hostIps ` -ScriptBlock $scriptBlock ` -ArgumentList $argList ` -Credential $localAdminCredential ` -Authentication Credssp Write-ObservabilityLog "Observability subfolder and pruner Setup Succeeded" } # Set registry key HKLM\Software\Microsoft\AzureStack DeviceType to AzureEdge static SetDeviceTypeRegistryKey([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" Write-ObservabilityLog "SetDeviceTypeRegistryKey start." $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) try { Invoke-Command ` -ComputerName $hostIps ` -Credential $localAdminCredential ` -Authentication Credssp ` -ScriptBlock { Write-Verbose "Setting HKLM\Software\Microsoft\AzureStack DeviceType registry key to AzureEdge." $registryPath = 'HKLM:\SOFTWARE\Microsoft\AzureStack\' if (!(Test-Path -Path $registryPath)) { New-Item -Path $registryPath -Force } New-ItemProperty -Path $registryPath -Name 'DeviceType' -PropertyType 'String' -Value "AzureEdge" -Force Write-Verbose "Finished DeviceType Registry key setup on $($env:COMPUTERNAME)" } Write-ObservabilityLog "Succeeded in setting AzureStack DeviceType Registry key." } catch { Write-ObservabilityErrorLog "[Error] DeviceType registry key set up failed with an error : $_ " throw $_ } } # Set up AzureStack environment to enable Autologger and UTC Telemetry via MA # Reg key set up needs to happend upfornt during host configuration static SetUpUtcExporterFeature([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] Write-ObservabilityLog "Set up AzureStack environment to enable Autologger and UTC Telemetry via MA." $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) try { Invoke-Command ` -ComputerName $hostIps ` -Credential $localAdminCredential ` -Authentication Credssp ` -ScriptBlock { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $utcExporterPath = "$($env:SystemRoot)\System32\UtcExporters" # Create UtcExporters folder in system32 if (-not (Test-Path -Path $utcExporterPath)) { New-Item -Path "$($env:SystemRoot)\System32" -ItemType Directory -Name 'UtcExporters' -Force } $GenevaNameSpace = "AEOprdTely" if(Test-IsCIEnv) { $GenevaNameSpace = "AEOppeTely" } Write-ObservabilityLog "Set up the required regkey to enable utc exporter Feature" New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack' -Name 'AllowExporters' -PropertyType 'DWORD' -Value 1 -Force New-Item -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack\exporters' -Force New-Item -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack\exporters\GenevaExporter' -Force New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack\exporters\GenevaExporter' -Name 'DllPath' -PropertyType 'String' -Value "$($utcExporterPath)\UtcGenevaExporter.dll" -Force New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack\exporters\GenevaExporter' -Name 'GenevaNamespace' -PropertyType 'String' -Value $GenevaNameSpace -Force New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack\TestHooks' -Name 'SkipSignatureMitigation' -PropertyType 'DWORD' -Value 1 -Force # Update UTC Service binary Write-ObservabilityLog "Updating UTC service dll" Stop-Service "diagtrack" -Force Start-Sleep -Seconds 10 Write-ObservabilityLog "Copy UTC Exporter dll to $($utcExporterPath)" Copy-Item -Path "$observabilityNugetPath\lib\net472\UtcGenevaExporter.dll" -Destination $utcExporterPath -Force Start-Service "diagtrack" Write-ObservabilityLog "Finished UTC Exporter setup on $($env:COMPUTERNAME)" } Write-ObservabilityLog "Set up AzureStack environment to enable Autologger and UTC Telemetry via MA succeeded." } catch { Write-ObservabilityErrorLog "[Error] UTC Exporter set up failed with an error : $_ " throw $_ } } # Install VC Runtime on all hosts static InstallVcRuntime([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] Write-ObservabilityLog "Starting installation of X64 VC Redistributable." $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) try { Invoke-Command ` -ComputerName $hostIps ` -Credential $localAdminCredential ` -Authentication Credssp ` -ScriptBlock { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" Write-ObservabilityLog "[Starting] installation of VC Redistributable on host $($env:COMPUTERNAME)" $vcRedistFilePath = "$observabilityNugetPath\content\VS17\VC_redist.x64.exe" if(Test-Path -Path $vcRedistFilePath) { Start-Process -File $vcRedistFilePath -ArgumentList "/install /quiet /norestart" -Wait -NoNewWindow } else { $errMsg = "[ERROR] VC Redistributable [$vcRedistilePath] not found on host $($env:COMPUTERNAME)" Write-ObservabilityErrorLog $errMsg throw $errMsg } Write-ObservabilityLog "[Finished] installation of VC Redistributable on host $($env:COMPUTERNAME)" } } catch { Write-ObservabilityErrorLog "[Failed] installation of VC Redistributable: $_ " throw $_ } Write-ObservabilityLog "Finished installation of X64 VC Redistributable." } static CreateObservabilityVolumeOnNC([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" Write-ObservabilityLog "Starting observability volume setup on NC VMs" $ncVMs = $Parameters.Roles["NC"].PublicConfiguration.Nodes.Node.Name $volumeFileName = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.NC.ObservabilityDriveFileName $volumeLabel = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.NC.ObservabilityVolumeLabel $volumeSize = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.NC.ObservabilityDriveSizeInBytes $driveAccessPath = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.NC.ObservabilityDriveAccessPath.Path $driveAccessPath = $Global:ExecutionContext.InvokeCommand.ExpandString($driveAccessPath) $folderCleanupThresholdPercent = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.FolderQuotaCleanupThresholdInPercent $folderFreeSpaceThresholdPercent = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.FolderQuotaFreeSpaceThresholdInPercent $purgeFolderFrequencyInMinutes = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.PurgeFolderFrequencyInMinutes $subFolderConfigFileName = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.NC.ObservabilitySubFolderConfigFileName $domainUserCredential = [ObservabilityConfig]::GetDomainCredential($Parameters) $scriptBlock = { param ( [string] [parameter(Mandatory=$true)] $VolumePath, [string] [parameter(Mandatory=$true)] $HostComputerName, [string] [parameter(Mandatory=$true)] $AccessPath, [string] [parameter(Mandatory=$true)] $FolderCleanupThresholdPercent, [string] [parameter(Mandatory=$true)] $FolderFreeSpaceThresholdPercent, [string] [Parameter(Mandatory=$true)] $PurgeFolderFrequencyInMinutes, [string] [parameter(Mandatory=$true)] $SubFolderConfigFileName, [PSCredential] [parameter(Mandatory=$true)] $Credential ) $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $remoteVolumePath = "\\$HostComputerName\$VolumePath" $remoteVolumePath = $remoteVolumePath -replace ":", "$" Add-VolumeAccessPath -AccessPath $AccessPath -VolumePath $remoteVolumePath Add-MountVolumeScheduledTask -Path $remoteVolumePath -Credential $Credential New-VolumeFoldersAndPrunerWithRetry ` -AccessPath $AccessPath ` -CleanupThresholdPercent $FolderCleanupThresholdPercent ` -FreeSpaceThresholdPercent $FolderFreeSpaceThresholdPercent ` -PurgeFolderFrequencyInMinutes $PurgeFolderFrequencyInMinutes ` -SubFolderConfigFileName $SubFolderConfigFileName Set-FolderQuotas -AccessPath $AccessPath -SubFolderConfigFileName $SubFolderConfigFileName } if(-not($ncVMs -is [System.Array])) # Only 1 VM exists { $ncVMs = @($ncVMs) } foreach($ncVM in $ncVMs) { $hostComputerName = $env:COMPUTERNAME Write-ObservabilityLog "Starting observability volume onboarding for $ncVM." try { Get-VM $ncVM | Out-Null # Test that VM is accessbile } catch { Write-ObservabilityLog "$ncVM not found on $hostComputerName. No op." continue } $vmHardDrivePath = (Get-VMHardDiskDrive $ncVM).Path if($vmHardDrivePath -is [System.Array]) { $vmHardDrivePath = $vmHardDrivePath[0] } $volumeLocation = Split-Path $vmHardDrivePath -Parent $volumePath = Join-Path -Path $volumeLocation -ChildPath $volumeFileName if(Test-Path $driveAccessPath) { Write-Observability "Folder $driveAccessPath already created. Skipping Observability Volume creation." } else { Write-ObservabilityLog "Adding observability volume at volume path $volumePath" Add-ObservabilityVolumeWithRetry -Path $volumePath -AccessPath $driveAccessPath -VolumeLabel $volumeLabel -Size $volumeSize -StaticSize if((Get-DiskImage $volumePath).Attached) { Dismount-VHD $volumePath } $argList = @( $volumePath, $hostComputerName, $driveAccessPath, $folderCleanupThresholdPercent, $folderFreeSpaceThresholdPercent, $purgeFolderFrequencyInMinutes, $subFolderConfigFileName, $domainUserCredential ) Invoke-Command ` -ComputerName $ncVM ` -ScriptBlock $scriptBlock ` -Credential $domainUserCredential ` -Authentication Credssp ` -ArgumentList $argList Write-ObservabilityLog "Finished observability volume onboarding for $ncVM." } } } static RegisterObservabilityEventSourceOnNC([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $eventSources = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.EventSources.EventSource $ncVMs = $Parameters.Roles["NC"].PublicConfiguration.Nodes.Node.Name $domainUserCredential = [ObservabilityConfig]::GetDomainCredential($Parameters) foreach ($eventSource in $eventSources) { $eventSourceRootName = $eventSource.EventSourceRootName $eventSourceLogName = $eventSource.EventSourceLogName $eventSourceLogSizeInBytes = $eventSource.EventSourceLogSizeInBytes Trace-Execution "Registering Observability EventSource $eventSourceLogName with Windows EventLog" $scriptBlock = { param ( [string] [parameter(Mandatory=$true)] $EventSourceRootName, [string] [parameter(Mandatory=$true)] $EventSourceLogName, [string] [parameter(Mandatory=$true)] $EventSourceLogSizeInBytes ) $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" $manifestDllPath = "$observabilityNugetPath\lib\net472\$EventSourceRootName.dll" $manifestPath = "$observabilityNugetPath\lib\net472\$EventSourceRootName.man" # Grant read only access to manifest files Trace-Execution "Granting read only access to $manifestPath" icacls $manifestPath /grant Everyone:R Trace-Execution "Granting read only access to $manifestDllPath" icacls $manifestDllPath /grant Everyone:R # Register the EventSource with Windows Trace-Execution "wevtutil installing manifest $manifestPath with resourceFilePath and messageFilePath $manifestDllPath" wevtutil install-manifest $manifestPath /resourceFilePath:"$manifestDllPath" /messageFilePath:"$manifestDllPath" Trace-Execution "wevtutil setting log size to $EventSourceLogSizeInBytes" wevtutil set-log $EventSourceLogName /MaxSize:"$EventSourceLogSizeInBytes" } try { # Register eventsource on hosts Invoke-Command ` -ComputerName $ncVMs ` -ScriptBlock $scriptBlock ` -Credential $domainUserCredential ` -Authentication Credssp ` -ArgumentList @($eventSourceRootName, $eventSourceLogName, $eventSourceLogSizeInBytes) } catch { Trace-Execution "Registering Observability EventSource failed with error: $_" throw $_ } Trace-Execution "Registering Observability EventSource $eventSourceLogName with Windows EventLog suceeded." } } static SetFolderQuotas ([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] $subFolderConfigFileName = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.NC.ObservabilitySubFolderConfigFileName $driveAccessPath = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.Volumes.NC.ObservabilityDriveAccessPath.Path $driveAccessPath = $Global:ExecutionContext.InvokeCommand.ExpandString($driveAccessPath) Write-ObservabilityLog "Starting observability volume fsrm quota setup on $hostNames" $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) $scriptBlock = { param ( [string] [parameter(Mandatory=$true)] $AccessPath, [string] [parameter(Mandatory=$true)] $SubFolderConfigFileName ) $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" Set-FolderQuotas -AccessPath $AccessPath -SubFolderConfigFileName $SubFolderConfigFileName } try { Invoke-Command ` -ComputerName $hostIps ` -Credential $localAdminCredential ` -Authentication Credssp ` -ScriptBlock $scriptBlock ` -ArgumentList @($driveAccessPath, $subFolderConfigFileName) } catch { Write-ObservabilityErrorLog "[Failed] setup of FSRM Quotas: $_ " throw $_ } } static [PSCredential] GetLocalCredential([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" Write-ObservabilityLog "Obtaining local admin credential..." $localAdminCredential = $null try { $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration $securityInfo = $cloudRole.PublicInfo.SecurityInfo $localAdmin = $securityInfo.LocalUsers.User | Where-Object Role -eq $Parameters.Configuration.Role.PrivateInfo.Accounts.BuiltInAdminAccountID $localAdminCredential = $Parameters.GetCredential($localAdmin.Credential) } catch { Write-ObservabilityErrorLog "Failed to obtain local admin credentials: $_ " throw $_ } Write-ObservabilityLog "Local admin credential obtained." if ($localAdminCredential.UserName -eq "removed") { Write-ObservabilityLog "The local admin credential obtained has been removed. Using domain credential instead." return [ObservabilityConfig]::GetDomainCredential($Parameters) } return $localAdminCredential } static [PSCredential] GetDomainCredential([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" Write-ObservabilityLog "Obtaining domain user credentials..." $domainUserCredential = $null try { $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration $securityInfo = $cloudRole.PublicInfo.SecurityInfo $physicalMachinesRole = $Parameters.Configuration.Role $domainName = $Parameters.Roles.Domain.PublicConfiguration.PublicInfo.DomainConfiguration.Fqdn $domainUser = $securityInfo.DomainUsers.User | Where-Object Role -EQ $physicalMachinesRole.PrivateInfo.Accounts.DomainUserAccountID $domainUserCredential = $Parameters.GetCredential($domainUser.Credential) # Making sure that the credential is domain qualified, PowerShell Direct require credential to be domain qualified if($($domainUserCredential.GetNetworkCredential().Domain) -eq "") { $domainUserCredential = New-Object -TypeName PSCredential -ArgumentList "$domainName\$($domainUserCredential.UserName)", $($domainUserCredential.Password) } Write-ObservabilityLog "Domain user credentials obtained." } catch { Write-ObservabilityErrorLog "Failed to obtain domain user credentials: $_ " throw $_ } return $domainUserCredential } static InstallBootstrapObservability([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $exceptionMessage = "" $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] try { Write-ObservabilityLog "$env:COMPUTERNAME Bootstrap Observability installation start." $deploymentLaunchType = Get-DeploymentLaunchype if ($deploymentLaunchType -eq "CloudDeployment") { Write-ObservabilityLog "$env:COMPUTERNAME This stamp was launched via CloudDeployment. Skipping Bootstrap Observability installation." return } $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration $cloudId = $cloudRole.PublicInfo.CloudId $arcForServerMsiFilePath = $cloudRole.PublicInfo.DefaultInfraStorageLocations.DefaultLocalShare $proxyUrl = [ObservabilityConfig]::GetProxyUrl($Parameters) $registrationParams = [ObservabilityConfig]::GetRegistrationParameters($Parameters) $scriptBlock = { param ( [string] [parameter(Mandatory=$true)] $AgentMsiPath, [string] [Parameter(Mandatory=$true)] $AccessToken, [string] [Parameter(Mandatory=$true)] $SubscriptionId, [string] [Parameter(Mandatory=$true)] $TenantId, [string] [Parameter(Mandatory=$true)] $AccountId, [string] [Parameter(Mandatory=$true)] $ResourceGroupName, [string] [Parameter(Mandatory=$true)] $CloudId, [string] [Parameter(Mandatory=$true)] $EnvironmentName, [string] [Parameter(Mandatory=$true)] $Region, [string] [Parameter(Mandatory=$true)] $StampId ) $errorMessage = "" $setHostNICIPAddressLogFile = Join-Path -Path $env:systemdrive -ChildPath $LogFileRelativePath Start-Transcript -Append -Path $setHostNICIPAddressLogFile try { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $ResourceName = Get-ArcResourceName Write-ObservabilityLog "$env:COMPUTERNAME Going to install Arc-for-server agent..." Install-ArcForServerAgent ` -AgentMsiPath $AgentMsiPath ` -AccessToken $AccessToken ` -SubscriptionId $SubscriptionId ` -TenantId $TenantId ` -ResourceGroupName $ResourceGroupName ` -EnvironmentName $EnvironmentName ` -Region $Region ` -ResourceName $ResourceName ` -ProxyUrl $using:proxyUrl | Out-Null Write-ObservabilityLog "$env:COMPUTERNAME Going to download Observability Extension..." Install-ArcForServerExtensions ` -AccessToken $AccessToken ` -SubscriptionId $SubscriptionId ` -TenantId $TenantId ` -AccountId $AccountId ` -ResourceGroupName $ResourceGroupName ` -ResourceName $ResourceName ` -EnvironmentName $EnvironmentName ` -Region $Region | Out-Null $hostNameHash = Get-Sha256Hash -ClearString (hostname) $nodeId = "$($StampId)-$hostNameHash" Write-BootstrapNodeIdAndHardwareIdHashTelemetry -BootstrapNodeId $nodeId } catch{ $errorMessage = $PSItem.ToString() Write-ObservabilityErrorLog $errorMessage throw $PSItem.Exception.Message } finally { Write-ArcForServerInstallationStopTelemetry ` -ComputerName $env:COMPUTERNAME ` -Message "Bootstrap Observability installation end" ` -ExceptionDetails $errorMessage } } $argList = @( $arcForServerMsiFilePath, $registrationParams.ArmAccessToken, $registrationParams.SubscriptionId, $registrationParams.TenantId, $registrationParams.AccountId, $registrationParams.ResourceGroupName, $cloudId, $registrationParams.EnvironmentName, $registrationParams.Region, $registrationParams.ResourceName ) Invoke-Command ` -ComputerName $hostIps ` -ScriptBlock $scriptBlock ` -ArgumentList $argList ` -Credential $localAdminCredential ` -Authentication Credssp } catch { $errMsg = "Bootstrap Observability installation failed with $_" $exceptionMessage += $errMsg Write-ObservabilityErrorLog $errMsg throw } Write-ObservabilityLog "$env:COMPUTERNAME Bootstrap Observability installation end." } static InstallRemoteSupportArcExtension([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $exceptionMessage = "" $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] try { Write-ObservabilityLog "$env:COMPUTERNAME Remote Support Arc installation start." $deploymentLaunchType = Get-DeploymentLaunchype if ($deploymentLaunchType -eq "CloudDeployment") { Write-ObservabilityLog "$env:COMPUTERNAME This stamp was launched via CloudDeployment. Skipping RemoteSupport Arc installation." return } $registrationParams = [ObservabilityConfig]::GetRegistrationParameters($Parameters) $scriptBlock = { param ( [string] [Parameter(Mandatory=$true)] $AccessToken, [string] [Parameter(Mandatory=$true)] $SubscriptionId, [string] [Parameter(Mandatory=$true)] $TenantId, [string] [Parameter(Mandatory=$true)] $AccountId, [string] [Parameter(Mandatory=$true)] $ResourceGroupName, [string] [Parameter(Mandatory=$true)] $EnvironmentName, [string] [Parameter(Mandatory=$true)] $Region, [string] [Parameter(Mandatory=$true)] $StampId ) $errorMessage = "" $setHostNICIPAddressLogFile = Join-Path -Path $env:systemdrive -ChildPath $LogFileRelativePath Start-Transcript -Append -Path $setHostNICIPAddressLogFile try { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityConstants.psm1" $ResourceName = Get-ArcResourceName Write-ObservabilityLog "$env:COMPUTERNAME Going to download Remote Support extension..." Install-ArcForServerExtensions ` -AccessToken $AccessToken ` -SubscriptionId $SubscriptionId ` -TenantId $TenantId ` -AccountId $AccountId ` -ResourceGroupName $ResourceGroupName ` -ResourceName $ResourceName ` -EnvironmentName $EnvironmentName ` -Region $Region ` -Type $ObservabilityConfigConstants.RemoteSupportExtensionType | Out-Null # Bring extension out of listener mode if it is StartArcRemoteSupportAgent } catch { $errorMessage = $PSItem.ToString() Write-ObservabilityErrorLog $errorMessage throw $PSItem.Exception.Message } finally { Write-ArcForServerInstallationStopTelemetry ` -ComputerName $env:COMPUTERNAME ` -Message "Remote Support Arc extension installation end" ` -ExceptionDetails $errorMessage } } $argList = @( $registrationParams.ArmAccessToken, $registrationParams.SubscriptionId, $registrationParams.TenantId, $registrationParams.AccountId, $registrationParams.ResourceGroupName, $registrationParams.EnvironmentName, $registrationParams.Region, $registrationParams.ResourceName ) Invoke-Command ` -ComputerName $hostIps ` -ScriptBlock $scriptBlock ` -ArgumentList $argList ` -Credential $localAdminCredential ` -Authentication Credssp } catch { $errMsg = "Remote Support Arc Extension installation failed with $_" $exceptionMessage += $errMsg Write-ObservabilityErrorLog $errMsg throw } Write-ObservabilityLog "$env:COMPUTERNAME Remote Support Arc Extension installation end." } static UninstallBootstrapObservability([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" Write-ObservabilityLog "$env:COMPUTERNAME Bootstrap Observability uninstallation start." $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] $domainUserCredential = [ObservabilityConfig]::GetDomainCredential($Parameters) $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration $arcForServerMsiFilePath = $cloudRole.PublicInfo.DefaultInfraStorageLocations.DefaultLocalShare Write-ObservabilityLog "$env:COMPUTERNAME Arc For Server MSI Path: $arcForServerMsiFilePath" $registrationParams = [ObservabilityConfig]::GetRegistrationParameters($Parameters) $scriptBlock = { param ( [string] [parameter(Mandatory=$true)] $AgentMsiPath, [string] [Parameter(Mandatory=$true)] $AccessToken, [string] [Parameter(Mandatory=$true)] $SubscriptionId, [string] [Parameter(Mandatory=$true)] $AccountId, [string] [Parameter(Mandatory=$true)] $ResourceGroupName, [string] [Parameter(Mandatory=$true)] $CloudId ) $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" # Import MiscConstants to remove GMAScenario reg key $gmaNugetName = "Microsoft.AzureStack.Observability.GenevaMonitoringAgent" $gmaPackageContentPath = Join-Path $(Get-ASArtifactPath -NugetName $gmaNugetName) -ChildPath "content" Import-Module "$gmaPackageContentPath\GMATenantJsonHelper.psm1" -DisableNameChecking $gmaScenarioRegKeyPath = $MiscConstants.GMAScenarioRegKey.Path $gmaScenarioRegKeyName = $MiscConstants.GMAScenarioRegKey.Name if (Test-RegKeyExists -Path $gmaScenarioRegKeyPath -Name $gmaScenarioRegKeyName) { Remove-ItemProperty ` -Path $gmaScenarioRegKeyPath ` -Name $gmaScenarioRegKeyName ` -Force Write-ObservabilityLog "Removed registry key $gmaScenarioRegKeyName at path $gmaScenarioRegKeyPath" } Uninstall-ArcForServerExtensions ` -AccessToken $AccessToken ` -SubscriptionId $SubscriptionId ` -AccountId $AccountId ` -ResourceGroupName $ResourceGroupName ` -CloudId $CloudId $result = Uninstall-ArcForServerAgent ` -AgentMsiPath $AgentMsiPath ` -AccessToken $AccessToken return $result } # Install Arc for server agent on each Host $exceptionMessage = "" foreach($hostIp in $hostIps) { $argList = @($arcForServerMsiFilePath, $registrationParams.ArmAccessToken, $registrationParams.SubscriptionId, $registrationParams.AccountId, $registrationParams.ResourceGroupName, $registrationParams.CloudId) $result = Invoke-Command ` -ComputerName $hostIp ` -ScriptBlock $scriptBlock ` -ArgumentList $argList ` -Credential $domainUserCredential ` -Authentication Credssp if ($result -eq $true) { Write-ObservabilityLog "Arc for server agent setup on host $hostIp succeeded." } else { Write-ObservabilityLog "Arc for server agent setup on host $hostIp failed with exception $result." $exceptionMessage += "${hostIp}: $result`n" } } if($exceptionMessage) { throw $exceptionMessage } Write-ObservabilityLog "$env:COMPUTERNAME Bootstrap Observability uninstallation end." } static SetupArcAgent([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" try { Write-ObservabilityLog "$env:COMPUTERNAME Arc Agent update start." $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration $arcForServerMsiFilePath = $cloudRole.PublicInfo.DefaultInfraStorageLocations.DefaultLocalShare $errorMessage = "" Write-ObservabilityLog "$env:COMPUTERNAME Going to update Arc-for-server agent..." Update-ArcForServerAgent -AgentMsiPath $arcForServerMsiFilePath | Out-Null } catch{ $errorMessage = $PSItem.ToString() Write-ObservabilityErrorLog $errorMessage throw $PSItem.Exception.Message } Write-ObservabilityLog "$env:COMPUTERNAME Arc Agent update end." } static ConnectArcAgent([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $exceptionMessage = "" $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } try { Write-ObservabilityLog "$env:COMPUTERNAME Arc Agent connect start." $proxyUrl = [ObservabilityConfig]::GetProxyUrl($Parameters) $registrationParams = [ObservabilityConfig]::GetRegistrationParameters($Parameters) $scriptBlock = { param ( [string] [Parameter(Mandatory=$true)] $AccessToken, [string] [Parameter(Mandatory=$true)] $SubscriptionId, [string] [Parameter(Mandatory=$true)] $TenantId, [string] [Parameter(Mandatory=$true)] $ResourceGroupName, [string] [Parameter(Mandatory=$true)] $EnvironmentName, [string] [Parameter(Mandatory=$true)] $Region, [string] [Parameter(Mandatory=$true)] $StampId ) $errorMessage = "" try { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $ResourceName = Get-ArcResourceName Write-ObservabilityLog "$env:COMPUTERNAME Going to connect Arc-for-server agent..." Connect-ArcForServerAgent ` -AccessToken $AccessToken ` -SubscriptionId $SubscriptionId ` -TenantId $TenantId ` -ResourceGroupName $ResourceGroupName ` -EnvironmentName $EnvironmentName ` -Region $Region ` -ResourceName $ResourceName ` -ProxyUrl $using:proxyUrl | Out-Null } catch{ $errorMessage = $PSItem.ToString() Write-ObservabilityErrorLog $errorMessage throw $PSItem.Exception.Message } } $argList = @( $registrationParams.ArmAccessToken, $registrationParams.SubscriptionId, $registrationParams.TenantId, $registrationParams.ResourceGroupName, $registrationParams.EnvironmentName, $registrationParams.Region, $registrationParams.ResourceName ) $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) Invoke-Command ` -Credential $localAdminCredential ` -Authentication Credssp ` -ComputerName $hostNames ` -ScriptBlock $scriptBlock ` -ArgumentList $argList } catch { $exceptionMessage += "ArcAgent connect failed with $_" Write-ObservabilityErrorLog $exceptionMessage throw } Write-ObservabilityLog "$env:COMPUTERNAME Arc Agent connect end." } <# .SYNOPSIS Evaluation function to identify what type of GMA configuration action to use. Following are the cases involved during evaluation : case 1 : If the interface is invoked in case of Deployment then run configuration on all nodes. case 2 : If the interface is invoked in case of AddNode or RepairNode then run configuration on only that node. .EXAMPLE [GMATenantJson]::EvaluateGMAConfigurationType($Parameters) .PARAMETER Parameters The ECE role parameters for this interface. #> static [CloudEngine.Actions.ConditionalActionDescription] EvaluateListenerModeConfigurationType([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $ErrorActionPreference = "Stop" $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" # Evalute for ArcA deployment if (Test-IsArcADeployment -Parameters $Parameters) { Write-ObservabilityLog "EvaluateListenerModeConfigurationType: Skip executing SetWatchdogToListenerMode for ArcA deployment" -Verbose return [CloudEngine.Actions.ConditionalActionDescription]::CreateNegative() } ## For classes in PS, we need to use the call stack to get the current executing function. $functionName = $(Get-PSCallStack)[0].FunctionName try { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $cloudRolePath = "ObservabilityConfig" $listenerModeOnAllNodes = "SetListenerModeOnAllNodes" $listenerModeOnOneNode = "SetListenerModeOnOneNode" $onAllNodesAction = [CloudEngine.Actions.ConditionalActionDescription]::CreateWithDefinedAction($cloudRolePath, $listenerModeOnAllNodes) $onOneNodeAction = [CloudEngine.Actions.ConditionalActionDescription]::CreateWithDefinedAction($cloudRolePath, $listenerModeOnOneNode) $nodeName = Get-ExecutionContextNodeName -Parameters $Parameters if($null -ne $nodeName) { # In add node or repair node case, ExecutionContextNodeName should have exactly one value. Trace-Execution "Execution context node was determined. Listener Mode will be set on $nodeName only." return $onOneNodeAction } # In regular deployment case, ExecutionContextNodeName will be null. Trace-Execution "No exceution context node was determined. Listener Mode will set on all the nodes." return $onAllNodesAction } catch { Trace-Error "$functionName :Failed to evaluate ListenerMode configuration type on node $($env:COMPUTERNAME) due to following error : $_" throw } } static StopArcExtensionObservabilityAgent([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $domainUserCredential = [ObservabilityConfig]::GetDomainCredential($Parameters) $hostName = Get-ExecutionContextNodeName -Parameters $Parameters # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIp = $allHosts[$hostName] Invoke-Command ` -ComputerName $hostIp ` -Credential $domainUserCredential ` -Authentication Credssp ` -ScriptBlock { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $ObsAgentServiceName = "AzureStack Observability Agent" $ObsAgentServiceDisplayName = "AzureStack Arc Extension Observability Agent" $stopDelayInSeconds = 10 $service = Get-Service | Where-Object {$_.Name -eq $ObsAgentServiceName -and $_.DisplayName -eq $ObsAgentServiceDisplayName } if($service) { if ($service.Status -ne "Stopped") { Write-ObservabilityLog "Stopping service $ObsAgentServiceName with display name $ObsAgentServiceDisplayName on host $($env:COMPUTERNAME)" $service | Stop-Service Write-ObservabilityLog "Sleeping $stopDelayInSeconds seconds after stopping $ObsAgentServiceName before unregistering." Start-Sleep -Seconds $stopDelayInSeconds } Write-ObservabilityLog "Unregistering service $ObsAgentServiceName." sc.exe delete $ObsAgentServiceName Write-ObservabilityLog "Successfully unregistered service $ObsAgentServiceDisplayName" } else { Write-ObservabilityLog "Service $ObsAgentServiceName not found. Noop." } } } static StopRemSupAgent([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { # Making this no-op since it's going in the same payload as InstallRemoteSupportArcExtension # Will remove the action plan for this in another payload } static SetWatchdogToListenerMode([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $domainUserCredential = [ObservabilityConfig]::GetDomainCredential($Parameters) $hostName = Get-ExecutionContextNodeName -Parameters $Parameters # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIp = $allHosts[$hostName] Invoke-Command ` -ComputerName $hostIp ` -Credential $domainUserCredential ` -Authentication Credssp ` -ScriptBlock { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $registryPath = 'HKLM:\SOFTWARE\Microsoft\AzureStack\Observability' Write-ObservabilityLog "Setting $registryPath WatchdogListenerMode registry key to 1 on $($env:COMPUTERNAME)." if (!(Test-Path -Path $registryPath)) { New-Item -Path $registryPath -Force } New-ItemProperty -Path $registryPath -Name 'WatchdogListenerMode' -PropertyType 'DWord' -Value 1 -Force Write-ObservabilityLog "Finished setting WatchdogListenerMode Registry key to DWord 1 on $($env:COMPUTERNAME)" $timeLimitInSeconds = 600 $retryPeriod = 10 $elapsed = 0 $maHostProcess = Get-Process "MonAgentHost" -ErrorAction SilentlyContinue $maCoreProcess = Get-Process "MonAgentCore" -ErrorAction SilentlyContinue while($maHostProcess -or $maCoreProcess) { if($maHostProcess) { $pids = $maHostProcess.Id | Out-String Write-ObservabilityLog "MonAgentHost Active Process Ids: `n $pids" } if($maCoreProcess) { $pids = $maCoreProcess.Id | Out-String Write-ObservabilityLog "MonAgentCore Active Process Ids: `n $pids" } if($elapsed -gt $timeLimitInSeconds) { $errMsg = "WatchdogListenerMode has failed to stop Monitoring agent processes after $timeLimitInSeconds." Write-ObservabilityErrorLog $errMsg throw $errMsg } Write-ObservabilityLog "Monitoring Agent processes have not yet stopped. Retrying in $retryPeriod seconds." Start-Sleep -Seconds $retryPeriod $elapsed += $retryPeriod $maHostProcess = Get-Process "MonAgentHost" -ErrorAction SilentlyContinue $maCoreProcess = Get-Process "MonAgentCore" -ErrorAction SilentlyContinue } Write-ObservabilityLog "MonitoringAgent has been successfully stopped after Watchdog has been set to listener mode." } } static SetGMATenantJsonRegistryKeys([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" Write-ObservabilityLog "SetGMATenantJsonRegistryKeys start" $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIps = $allHosts[$hostNames] $gmaNugetName = "Microsoft.AzureStack.Observability.GenevaMonitoringAgent" $gmaPackageContentPath = Join-Path $(Get-ASArtifactPath -NugetName $gmaNugetName) -ChildPath "content" Import-Module "$gmaPackageContentPath\GMATenantJsonHelper.psm1" -DisableNameChecking ## GMA cache folder path $gmaCacheFolderName = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.GMACacheFolderName $gmaCacheFolderPath = Join-Path -Path $env:SystemDrive -ChildPath $gmaCacheFolderName ## Determine GcsEnvironment $gcsEnvironment = "Prod" ## default environment ## Check if the reg key created for CI exists or not, if yes then change the GCSEnvironment to point to PPE. if(Test-IsCIEnv) { $gcsEnvironment = "Ppe" } $envInfoFilePath = "$GmaPackageContentPath\EnvironmentInfo.json" $tenantInfoContent = Get-Content $envInfoFilePath -Raw | ConvertFrom-Json $envInfo = $tenantInfoContent.$GcsEnvironment # Settings from EnvironmentInfo.json $gcsEndpoint = $envInfo.EndPoint $gcsAccount = $envInfo.Account $genevaConfigVersion = $envInfo.ConfigVersion # Settings from ECE $assemblyVersion = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.Version $registrationSubscriptionId = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.RegistrationSubscriptionId $registrationResourceGroupName = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.RegistrationResourceGroupName $stampId = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.RegistrationResourceName $gcsRegionName = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.RegistrationRegion $clusterName = $Parameters.Roles["Cluster"].PublicConfiguration.Clusters.Node.Name $cloudId = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.CloudId $deviceArmResourceUri = "/Subscriptions/$registrationSubscriptionId/resourceGroups/$registrationResourceGroupName/providers/Microsoft.AzureStackHCI/clusters/$stampId" $osBuild = Get-OSBuildVersion $registrationArcResourceGroupName = $registrationResourceGroupName $arcResourceGroupName = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.RegistrationArcServerResourceGroupName if (![String]::IsNullOrEmpty($arcResourceGroupName)) { Trace-Execution "Using RegistrationArcServerResourceGroupName $arcResourceGroupName for ArcServer resource in Tenant Json" $registrationArcResourceGroupName = $arcResourceGroupName } $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) Invoke-Command ` -ComputerName $hostIps ` -Credential $localAdminCredential ` -Authentication Credssp ` -ScriptBlock { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $gmaPackageContentPath = Join-Path $(Get-ASArtifactPath -NugetName $Using:gmaNugetName) -ChildPath "content" Import-Module "$gmaPackageContentPath\GMATenantJsonHelper.psm1" -DisableNameChecking # Will unset GMA scenario registry path at bootstrap uninstall Set-GMAScenarioRegistryKeyToBootstrap | Out-Null # For Bootstrap Scenario, nodeid is stampid-sha256(hostname) $hostNameHash = Get-Sha256Hash -ClearString (hostname) $nodeId = "$($Using:stampId)-$hostNameHash" $arcAgentResourceId = Get-ArcResourceId -SubscriptionId $Using:registrationSubscriptionId -ResourceGroupName $Using:registrationArcResourceGroupName -CloudId $Using:cloudId $configTypes = @("Telemetry", "Diagnostics", "Health", "Metrics", "Security") foreach($configType in $configTypes) { $envInfo = $Using:envInfo $gcsNameSpace = $envInfo.Namespaces.$configType if ($configType -eq "Metrics") { $gcsNameSpace = Get-MetricsNamespaceRegionMapping -Region $using:gcsRegionName -MetricsNameSpace $envInfo.Namespaces.$configType $envInfo #Set environment variables required for 3P metrics Set-EnvironmentVariablesForMetrics ` -GcsEnvironment $using:gcsEnvironment ` -EnvInfoFilePath $using:envInfoFilePath ` -AssemblyBuildVersion $Using:assemblyVersion ` -ClusterName $Using:clusterName ` -HciResourceUri $Using:deviceArmResourceUri } # cacheLocalPath will be overwritten by Extension Install script because cache location for bootstrap is not known until install time $cacheLocalPath = Join-Path -Path $Using:gmaCacheFolderPath -ChildPath $($configType + "Cache") Set-TenantConfigRegistryKeys ` -ConfigType $configType ` -Version "1.0" ` -GcsAuthIdType "AuthMSIToken" ` -GcsEnvironment $Using:gcsEndpoint ` -GcsGenevaAccount $Using:gcsAccount ` -GcsNamespace $gcsNameSpace ` -GcsRegion $Using:gcsRegionName ` -GenevaConfigVersion $Using:genevaConfigVersion ` -LocalPath $cacheLocalPath ` -DisableUpdate "true" ` -DisableCustomImds "true" ` -MONITORING_AEO_REGION $Using:gcsRegionName ` -MONITORING_AEO_DEVICE_ARM_RESOURCE_URI $Using:deviceArmResourceUri ` -MONITORING_AEO_STAMPID $Using:stampId ` -MONITORING_AEO_CLUSTER_NAME $Using:clusterName ` -MONITORING_AEO_OSBUILD $Using:osBuild ` -MONITORING_AEO_ASSEMBLYBUILD $Using:assemblyVersion ` -MONITORING_AEO_NODEID $nodeId ` -MONITORING_AEO_NODE_ARC_RESOURCE_URI $arcAgentResourceId ` -MONITORING_AEO_CLUSTER_NODE_NAME "%COMPUTERNAME%" } $hostname = hostname Write-ObservabilityLog "SetGMATenantJsonRegistryKeys on $hostname succeeded." } } static GenerateTelemetryFromCachedFiles([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" Write-ObservabilityLog "$env:COMPUTERNAME Generate Telemetry from Cached files start." $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration $domainCredential = [ObservabilityConfig]::GetDomainCredential($Parameters) $cloudId = $cloudRole.PublicInfo.CloudId # Get host names using execution context $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } $scriptBlock = { param ( [string] [parameter(Mandatory=$true)] $CorrelationId ) $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" $logOrchestratorNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.LogOrchestrator" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $result = Invoke-CachedTelemetryFilesParsing ` -LogOrchestratorNugetPath $logOrchestratorNugetPath ` -CorrelationId $CorrelationId return $result } # Install Arc for server agent on each Host $exceptionMessage = "" foreach($hostName in $hostNames) { $argList = @($cloudId) $result = Invoke-Command ` -ComputerName $hostName ` -ScriptBlock $scriptBlock ` -ArgumentList $argList ` -Credential $domainCredential ` -Authentication Credssp if ($result -eq $true) { Write-ObservabilityLog "Generate Telemetry from Cached files on host $hostName succeeded." } else { Write-ObservabilityLog "Generate Telemetry from Cached files on host $hostName failed with exception $result." $exceptionMessage += "${hostName}: $result`n" } } if($exceptionMessage) { throw $exceptionMessage } Write-ObservabilityLog "$env:COMPUTERNAME Generate Telemetry from Cached files end." } static SyncDiagnosticLevel([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Trace-Execution "Getting parameters for Set-AzStackHCI" -Verbose $computerName = Get-Cluster | Select-Object -expand Name $resourceId = Get-AzureStackHCI | Select-Object -expand AzureResourceUri $streamingData = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.StreamingDataClient Trace-Execution "Streaming Data = $streamingData" -Verbose $episodicDataUpload = $Parameters.Roles["ObservabilityConfig"].PublicConfiguration.PublicInfo.EpisodicDataUpload Trace-Execution "Episodic Data Upload = $episodicDataUpload" -Verbose if ($streamingData) { if ($episodicDataUpload) { $diagnosticLevel = "Enhanced" } else { $diagnosticLevel = "Basic" } } else { $diagnosticLevel = "Off" } Trace-Execution "Diagnostic Level will be set to $diagnosticLevel" -Verbose Trace-Execution "Calling GetRegistrationParameters" -Verbose $registrationParams = [ObservabilityConfig]::GetRegistrationParameters($Parameters) Trace-Execution "Calling Set-AzStackHCI. Parameters = ComputerName $computerName, ResourceId $resourceId, DiagnosticLevel $diagnosticLevel, AccountId $($registrationParams.AccountId)" -Verbose Set-AzStackHCI -ComputerName $computerName ` -ResourceId $resourceId ` -DiagnosticLevel $diagnosticLevel ` -ArmAccessToken $registrationParams.ArmAccessToken ` -AccountId $registrationParams.AccountId ` -Confirm:$false ` -Verbose $retryAttempt = 0 $retrySleepTimeInSeconds = 10 $Retries = 5 $success = $false while(-not($success) -and ($retryAttempt -lt $Retries)) { $retryAttempt = $retryAttempt + 1 Trace-Execution "Attempt $retryAttempt of $Retries" -Verbose try { Trace-Execution "Calling Sync-AzureStackHCI" -Verbose Sync-AzureStackHCI -Verbose Trace-Execution "Calling Get-AzureStackHCI" -Verbose $portalDiagnosticLevel = Get-AzureStackHCI | Select-Object -expand DiagnosticLevel if ($portalDiagnosticLevel -eq $diagnosticLevel) { Trace-Execution "Portal diagnostic level was successfully set to $portalDiagnosticLevel" -Verbose $success = $true } else { throw "The Diagnostic Level does not match. Portal was not set to $diagnosticLevel, instead is $portalDiagnosticLevel" } } catch { if ($retryAttempt -lt $Retries) { $exceptionMessage = $_.Exception.Message Trace-Execution "Failure during syncing diagnostic level: '$exceptionMessage'. Retrying." -Verbose } else { Trace-Error "Syncing Diagnostic Level failed with error: $_" } Start-Sleep -Seconds $retrySleepTimeInSeconds } } Trace-Execution "Syncing Diagnostic Level successful. Set to: $diagnosticLevel" -Verbose } static UpdateGMATenantJsonNodeId([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $hostName = Get-ExecutionContextNodeName -Parameters $Parameters # Get Host IPs for all hosts $allHosts = Get-NetworkMgmtIPv4FromECEForAllHosts -Parameters $Parameters # Filter host IPs for only hosts from execution context. This is to cover ScaleOut scenario $hostIp = $allHosts[$hostName] $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $assemblyBuild = "" try { Write-ObservabilityLog "Getting Assembly Build using GetStampVersion" Import-Module EceClient $ececlient = Create-ECEClusterServiceClient $assemblyBuild = $ececlient.GetStampVersion().GetAwaiter().GetResult() if ($assemblyBuild -eq "99.9999.9.10") { Write-ObservabilityLog "Getting Assembly Build using GetStampVersion returned $assemblyBuild, which is a possibly erroneous override. Using Assembly version in ECE parameters." $assemblyBuild = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.Version } } catch { Write-ObservabilityLog "Getting Assembly Build using GetStampVersion failed. Using Assembly version in ECE parameters" $assemblyBuild = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.Version } Write-ObservabilityLog "Assembly Build value of $assemblyBuild obtained." $localAdminCredential = [ObservabilityConfig]::GetLocalCredential($Parameters) Invoke-Command ` -Credential $localAdminCredential ` -Authentication Credssp ` -ComputerName $hostIp ` -ScriptBlock { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $success = $false $extError = "" # Get NodeId $azureStackHciDetails = Get-AzureStackHCI $StampId = $azureStackHciDetails.AzureResourceName $nodeId = $StampId + "-" + (Get-ClusterNode(hostname)).Id $registryPath = 'HKLM:\SOFTWARE\Microsoft\AzureStack\Observability\TenantJson' $nodeIdKey = "MONITORING_AEO_NODEID" $assemblyBuildKey = "MONITORING_AEO_ASSEMBLYBUILD" Write-ObservabilityLog "$($env:COMPUTERNAME): Setting keys $nodeIdKey to $nodeId and $assemblyBuildKey to $using:assemblyBuild at registry path $registryPath." if (!(Test-Path -Path $registryPath)) { New-Item -Path $registryPath -Force } New-ItemProperty -Path $registryPath -Name $nodeIdKey -PropertyType 'String' -Value $nodeId -Force New-ItemProperty -Path $registryPath -Name $assemblyBuildKey -PropertyType 'String' -Value $using:assemblyBuild -Force Write-ObservabilityLog "Finished setting registry keys $nodeIdKey and $assemblyBuildKey on $($env:COMPUTERNAME)" $paths = (Get-ChildItem "C:\Packages\Plugins\Microsoft.AzureStack.Observability*TelemetryAndDiagnostics*\*\" -ErrorAction SilentlyContinue).FullName foreach ($extRootPath in $paths) { Write-ObservabilityLog "Found Observability TelemetryAndDiagnostics extension at $extRootPath." if($success) { Write-ObservabilityLog "NodeId already updated successfully. Ignoring extension at $extRootPath." } else { try { Import-Module (Join-Path -Path $extRootPath -ChildPath 'scripts\ExtensionHelper.psm1') ` -DisableNameChecking ` -Verbose:$false $logFile = Get-HandlerLogFile $gmaPackageContentPath = Get-GmaPackageContentPath Import-Module (Join-Path -Path "$gmaPackageContentPath" -ChildPath 'GMATenantJsonHelper.psm1') ` -DisableNameChecking ` -Verbose:$false $cacheDirectories = New-CacheDirectories -LogFile $logFile $gmaCacheFolderPath = $cacheDirectories.GMACache $jsonDropLocation = Join-Path -Path $gmaCacheFolderPath -ChildPath "JsonDropLocation" foreach ($configType in $global:MiscConstants.ConfigTypes.Values) { $jsonConfigFileName = "AEO" + $configType + ".json" $tenantJsonFilePath = Join-Path -Path $jsonDropLocation -ChildPath $jsonConfigFileName Write-ObservabilityLog "Creating file $tenantJsonFilePath." Set-TenantConfigJsonFile -ConfigType $configType -FilePath $tenantJsonFilePath -LogFile $logFile Write-ObservabilityLog "Creation of file $tenantJsonFilePath succeeded." } $success = $true } catch { Write-ObservabilityErrorLog "Updating NodeId in tenant jsons failed with error $_" $extError = $_ } } } if (-not $success) { if ($extError) { throw "Updating NodeId in tenant jsons failed with error $extError" } else { $errMsg = "Could not update NodeId in tenant jsons because no TelemetryAndDiagnostics Extension was found at C:\Packages\Plugins." Write-ObservabilityErrorLog $errMsg throw $errMsg } } } } static DeleteObservabilityAgents([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $obsServices = @( "AzureStack Observability Agent", "AzureStack Observability FDA", "AzureStack Observability GenevaMonitoringAgent", "AzureStack Observability RemoteSupportAgent" ) $stopDelayInSeconds = 10 $agentManifestPath = "C:\Agents\AgentManifests" $obsServices | ForEach-Object { $service = Get-Service -Name $_ -ErrorAction SilentlyContinue | Where-Object {$_.DisplayName -notlike "*Arc Extension*"} if ($service) { try { Write-ObservabilityLog "Stopping service $($service.DisplayName)." $service | Stop-Service Write-ObservabilityLog "Successfully stopped service $($service.DisplayName). Sleeping for $stopDelayInSeconds before unregistering service." Start-Sleep -Seconds $stopDelayInSeconds Write-ObservabilityLog "Unregistering service $($service.DisplayName)." sc.exe delete $service.Name Write-ObservabilityLog "Stopping and unregistering of service $($service.DisplayName) succeeded." $manifestPath = "$agentManifestPath\$($service.DisplayName).json" if (Test-Path -Path $manifestPath) { Write-ObservabilityLog "Deleting agent manifest at $manifestPath." Remove-Item $manifestPath -Force Write-ObservabilityLog "Deletion of agent manifest at $manifestPath succeeded." } } catch { Write-ObservabilityErrorLog "Stopping and unregistering of service $($service.DisplayName) failed with error $_" } } } } static SetListenerModeOff([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $registryPath = 'HKLM:\SOFTWARE\Microsoft\AzureStack\Observability' Write-ObservabilityLog "Setting $registryPath WatchdogListenerMode registry key to 0 on $($env:COMPUTERNAME)." if (!(Test-Path -Path $registryPath)) { New-Item -Path $registryPath -Force } New-ItemProperty -Path $registryPath -Name 'WatchdogListenerMode' -PropertyType 'DWord' -Value 0 -Force Write-ObservabilityLog "Finished setting WatchdogListenerMode Registry key to DWord 0 on $($env:COMPUTERNAME)" $timeLimitInSeconds = 600 $retryPeriod = 10 $elapsed = 0 $maCoreProcess = Get-Process "MonAgentCore" -ErrorAction SilentlyContinue while($null -eq $maCoreProcess) { if($elapsed -gt $timeLimitInSeconds) { $errMsg = "Watchdog has failed to start Monitoring agent processes after $timeLimitInSeconds." Write-ObservabilityErrorLog $errMsg throw $errMsg } Write-ObservabilityLog "Monitoring Agent processes have not yet started. Retrying in $retryPeriod seconds." Start-Sleep -Seconds $retryPeriod $elapsed += $retryPeriod $maCoreProcess = Get-Process "MonAgentCore" -ErrorAction SilentlyContinue } Write-ObservabilityLog "MonitoringAgent has been successfully started. Watchdog listener mode has been set to off." } static StartArcExtensionObsAgent([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $success = $false $paths = (Get-ChildItem "C:\Packages\Plugins\Microsoft.AzureStack.Observability*TelemetryAndDiagnostics*\*\" -ErrorAction SilentlyContinue).FullName $extError = "" foreach ($extRootPath in $paths) { Write-ObservabilityLog "Found Observability TelemetryAndDiagnostics extension at $extRootPath." if ($success) { Write-ObservabilityLog "TelemetryAndDiagnostics Arc Extension Observability Agent already started. Ignoring extension at $extRootPath." } else { try { Import-Module (Join-Path -Path $extRootPath -ChildPath 'scripts\ExtensionHelper.psm1') ` -DisableNameChecking ` -Verbose:$false $logFile = Get-HandlerLogFile ## Misc constants is defined here: https://msazure.visualstudio.com/One/_git/ASZ-Observability-MonitoringAgent?path=/src/GenevaMonitoringAgent/DeploymentScripts/GMATenantJsonHelper.psm1 ## Register Obs Agent as Windows service $obsAgent = $global:MiscConstants.ObsServiceDetails.ObsAgent $binaryFilePath = Join-Path -Path $global:ObsArtifactsPaths.ObservabilityAgent ` -ChildPath $obsAgent.BinaryFileName Write-ObservabilityLog "Registering $($obsAgent.DisplayName) service at path $binaryFilePath" Register-ServiceForObservability ` -ServiceName $obsAgent.Name ` -ServiceDisplayName $obsAgent.DisplayName ` -ServiceBinaryFilePath $binaryFilePath ` -LogFile $logFile ## Start Observability Agent. Write-ObservabilityLog "Starting $($obsAgent.DisplayName) service" Start-ServiceForObservability ` -ServiceName $obsAgent.Name ` -LogFile $logFile Write-ObservabilityLog "Observability Agent $($obsAgent.DisplayName) successfully registered and started" $success = $true } catch { Write-ObservabilityErrorLog "Starting TelemetryAndDiagnostics Arc Extension Observability Agent failed with error $_" $extError = $_ } } } if (-not $success) { if ($extError) { throw "Starting TelemetryAndDiagnostics Arc Extension Observability Agent failed with error $extError" } else { $errMsg = "Could not start Arc Extension Observability Agent because no Arc Extension was found at C:\Packages\Plugins." Write-ObservabilityErrorLog $errMsg throw $errMsg } } } static RegenerateGMATenantJsonFiles([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $success = $false $paths = (Get-ChildItem "C:\Packages\Plugins\Microsoft.AzureStack.Observability*TelemetryAndDiagnostics*\*\" -ErrorAction SilentlyContinue).FullName $extError = "" foreach ($extRootPath in $paths) { Write-ObservabilityLog "Found Observability TelemetryAndDiagnostics extension at $extRootPath." if($success) { Write-ObservabilityLog "GMA Tenant Json files already updated successfully. Ignoring extension at $extRootPath." } else { try { Import-Module (Join-Path -Path $extRootPath -ChildPath 'scripts\ExtensionHelper.psm1') ` -DisableNameChecking ` -Verbose:$false $logFile = Get-HandlerLogFile $gmaPackageContentPath = Get-GmaPackageContentPath Import-Module (Join-Path -Path "$gmaPackageContentPath" -ChildPath 'GMATenantJsonHelper.psm1') ` -DisableNameChecking ` -Verbose:$false $cacheDirectories = New-CacheDirectories -LogFile $logFile $gmaCacheFolderPath = $cacheDirectories.GMACache $jsonDropLocation = Join-Path -Path $gmaCacheFolderPath -ChildPath "JsonDropLocation" foreach ($configType in $global:MiscConstants.ConfigTypes.Values) { $jsonConfigFileName = "AEO" + $configType + ".json" $tenantJsonFilePath = Join-Path -Path $jsonDropLocation -ChildPath $jsonConfigFileName Write-ObservabilityLog "Creating file $tenantJsonFilePath." Set-TenantConfigJsonFile -ConfigType $configType -FilePath $tenantJsonFilePath -LogFile $logFile Write-ObservabilityLog "Creation of file $tenantJsonFilePath succeeded." } $success = $true } catch { Write-ObservabilityErrorLog "Regenerating tenant jsons failed with error $_" $extError = $_ } } } if (-not $success) { if ($extError) { throw "Regenerating GMA tenant jsons failed with error $extError" } else { $errMsg = "Could not regenerate GMA tenant jsons because no TelemetryAndDiagnostics Extension was found at C:\Packages\Plugins." Write-ObservabilityErrorLog $errMsg throw $errMsg } } } static RestoreMAWatchdogRegKeyAndService([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $functionName = "RestoreMAWatchdogRegKeyAndService" Write-ObservabilityLog "Starting $functionName." $HCITelemetryRegKey = @{ Path = 'HKLM:\SYSTEM\Software\Microsoft\MAWatchdogService\HCITelemetry' Name = 'AllowTelemetry' PropertyType = 'String' Value = 'True' } $regKey = $(Get-ItemProperty -Path $HCITelemetryRegKey.Path -Name $HCITelemetryRegKey.Name -ErrorAction SilentlyContinue) if($null -ne $regKey) { Write-ObservabilityLog "$functionName : Registry key $($HCITelemetryRegKey.Name) at $($HCITelemetryRegKey.Path) already exists. Noop." } else { Write-ObservabilityLog "$functionName : Registry key $($HCITelemetryRegKey.Name) at $($HCITelemetryRegKey.Path) does not exist. Restoring." $watchdogServiceName = "WatchdogAgent" if (-not (Test-Path -Path $HCITelemetryRegKey.Path)) { New-Item -Path $HCITelemetryRegKey.Path -Force } New-ItemProperty ` -Path $HCITelemetryRegKey.Path ` -Name $HCITelemetryRegKey.Name ` -PropertyType $HCITelemetryRegKey.PropertyType ` -Value $HCITelemetryRegKey.Value ` -Force | Out-Null Write-ObservabilityLog "$functionName : Created registry key $($HCITelemetryRegKey.Name) at $($HCITelemetryRegKey.Path) with value $($HCITelemetryRegKey.Value)." $watchdogAgent = Get-Service $watchdogServiceName -ErrorAction SilentlyContinue if($watchdogAgent) { Write-ObservabilityLog "$functionName : Restarting $watchdogServiceName windows service." $watchdogAgent | Restart-Service -ErrorAction SilentlyContinue } } } static [Hashtable] GetRegistrationParameters([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { Import-Module $PSScriptRoot\Roles\Common\RoleHelpers.psm1 $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" $cloudDeploymentNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Solution.Deploy.CloudDeployment" Import-Module Az.Accounts -Force $hostNames = Get-ExecutionContextNodeName -Parameters $Parameters if($null -eq $hostNames) { $hostNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name } Trace-Execution "Getting registration parameters from ECE role parameters" $nodeNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration $securityInfo = $cloudRole.PublicInfo.SecurityInfo $registrationParams = @{ EnvironmentName = $cloudRole.PublicInfo.RegistrationCloudName SubscriptionId = $cloudRole.PublicInfo.RegistrationSubscriptionId TenantId = $cloudRole.PublicInfo.RegistrationTenantId Region = $cloudRole.PublicInfo.RegistrationRegion ResourceGroupName = $cloudRole.PublicInfo.RegistrationResourceGroupName ResourceName = $cloudRole.PublicInfo.RegistrationResourceName CloudId = $cloudRole.PublicInfo.CloudId EnableAzureArcServer = [System.Convert]::ToBoolean($cloudRole.PublicInfo.EnableAzureArcServer) ComputerName = $nodeNames | Select-Object -First 1 } if (![String]::IsNullOrEmpty($cloudRole.PublicInfo.RegistrationArcServerResourceGroupName)) { Trace-Execution "Using RegistrationArcServerResourceGroupName $($cloudRole.PublicInfo.RegistrationArcServerResourceGroupName) for ArcServer registration" $registrationParams.ResourceGroupName = $cloudRole.PublicInfo.RegistrationArcServerResourceGroupName } $registrationParameterSet = $cloudRole.PublicInfo.RegistrationParameterSet if ($registrationParameterSet -eq "DefaultSet") { Trace-Execution "RegistrationParameterSet $registrationParameterSet, getting access tokens using user token cache" $registrationTokenCacheUser = $securityInfo.AADUsers.User | ? Role -EQ $Parameters.Configuration.Role.PrivateInfo.Accounts.RegistrationTokenCacheID $registrationTokenCacheCred = $Parameters.GetCredential($registrationTokenCacheUser.Credential) $clientId = $cloudRole.PublicInfo.RegistrationClientId Trace-Execution "Using clientId $clientId to get access token" Trace-Execution "Going to use RegistrationHelpers $cloudDeploymentNugetPath\content\Setup\Common\RegistrationHelpers.psm1" Import-Module "$cloudDeploymentNugetPath\content\Setup\Common\RegistrationHelpers.psm1" $armAccessToken = Get-AccessToken -AzureEnvironment $registrationParams.EnvironmentName -TenantId $registrationParams.TenantId -TokenCacheCred $registrationTokenCacheCred -ClientId $clientId Trace-Execution "Access tokens length using token cache is $($armAccessToken.AccessToken.Length)" $registrationParams += @{ AccountId = $registrationTokenCacheCred.UserName ArmAccessToken = $armAccessToken.AccessToken } } else { Trace-Execution "RegistrationParameterSet $registrationParameterSet, getting access tokens using service principal" $registrationSPUser = $securityInfo.AADUsers.User | ? Role -EQ $Parameters.Configuration.Role.PrivateInfo.Accounts.RegistrationSPID $registrationSPCred = $Parameters.GetCredential($registrationSPUser.Credential) Login-AzAccount -Environment $registrationParams.EnvironmentName -Credential $registrationSPCred -Tenant $registrationParams.TenantId -ServicePrincipal $armAccessToken = Get-AzAccessToken -Verbose Trace-Execution "Access token length using service principal is $($armAccessToken.Token.Length)" $registrationParams += @{ AccountId = $registrationSPCred.UserName ArmAccessToken = $armAccessToken.Token } } if($registrationParams.ArmAccessToken.Length -eq 0) { throw "GetRegistrationParameters failed to retrieve AccessToken" } return $registrationParams } static [string] GetProxyUrl([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" Write-ObservabilityLog "Checking if proxy settings exist" $proxySettings = Get-ASProxySettings -Parameters $Parameters $proxyUrl = $proxySettings.HTTP if ($proxyUrl) { if (-not (($proxyUrl -cmatch "http://") -or ($proxyUrl -cmatch "https://"))) { $proxyUrl = "http://$proxyUrl" } } if ($proxyUrl) { Write-ObservabilityLog "Using proxy url $proxyUrl for Arc Agent connection." } return $proxyUrl } <# .SYNOPSIS Evaluation function to determine run SetupObservability or skip it for ArcA deployment ArcA currently does not support Arc4Server, skip Observability feature for ArcA deployment .EXAMPLE [GMATenantJson]::EvaluateSetupObservability($Parameters) .PARAMETER Parameters The ECE role parameters for this interface. #> static [CloudEngine.Actions.ConditionalActionDescription] EvaluateSetupObservability([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $ErrorActionPreference = "Stop" return [ObservabilityConfig]::EvaluateObservabilityAction($Parameters, "SetupObservability") } <# .SYNOPSIS Evaluation function to identify run InstallBootstrapObservability or skip it for ArcA deployment ArcA currently does not support Arc4Server, skip Observability feature for ArcA deployment .EXAMPLE [GMATenantJson]::EvaluateInstallBootstrapObservability($Parameters) .PARAMETER Parameters The ECE role parameters for this interface. #> static [CloudEngine.Actions.ConditionalActionDescription] EvaluateInstallBootstrapObservability([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $ErrorActionPreference = "Stop" return [ObservabilityConfig]::EvaluateObservabilityAction($Parameters, "InstallBootstrapObservability") } <# .SYNOPSIS Evaluation function to identify run PostRegistrationObservabilitySetup or skip it for ArcA deployment ArcA currently does not support Arc4Server, skip Observability feature for ArcA deployment .EXAMPLE [GMATenantJson]::EvaluatePostRegistrationObservabilitySetup($Parameters) .PARAMETER Parameters The ECE role parameters for this interface. #> static [CloudEngine.Actions.ConditionalActionDescription] EvaluatePostRegistrationObservabilitySetup([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $ErrorActionPreference = "Stop" return [ObservabilityConfig]::EvaluateObservabilityAction($Parameters, "PostRegistrationObservabilitySetup") } <# .SYNOPSIS Evaluation function to identify run EvaluateSendTelemetryFromCachedFiles or skip it for ArcA deployment ArcA currently does not support Arc4Server, skip Observability feature for ArcA deployment .EXAMPLE [GMATenantJson]::EvaluateSendTelemetryFromCachedFiles($Parameters) .PARAMETER Parameters The ECE role parameters for this interface. #> static [CloudEngine.Actions.ConditionalActionDescription] EvaluateSendTelemetryFromCachedFiles([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $ErrorActionPreference = "Stop" return [ObservabilityConfig]::EvaluateObservabilityAction($Parameters, "SendTelemetryFromCachedFiles") } static [CloudEngine.Actions.ConditionalActionDescription] EvaluateObservabilityAction([CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [string] $actionName) { $ErrorActionPreference = "Stop" $observabilityNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Observability.ObservabilityDeployment" Import-Module "$observabilityNugetPath\content\Powershell\ObservabilityHelpers.psm1" if (-not (Test-IsArcADeployment -Parameters $Parameters)) { Write-ObservabilityLog "EvaluateObservabilityAction: Execute $actionName" return [CloudEngine.Actions.ConditionalActionDescription]::CreateWithDefinedAction("ObservabilityConfig", $actionName) } Write-ObservabilityLog "EvaluateObservabilityAction: Skip executing $actionName for ArcA deployment" -Verbose return [CloudEngine.Actions.ConditionalActionDescription]::CreateNegative() } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBm10a/KCdcWyF9 # Av2T6ikMUwenISWD2ZCzpUYyeE2nv6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKgYwJLfpWqDTecekmkA73qq # DnoZHiU788inEL5CNzV/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAAJZBgCFTU76SzYhHGdxvatsegBt4PNkjPMzTkSih0IAaU4R+kG583yXk # M5KZOfumnE0Z45KrvB4OsZGY7xJ9uZII5vtV7+SDuKb04s4XDSOG86kyRClxPYDP # gpPs46tp7+rAUo44J31TAc5u81uxRSNijIyA0xZ6TxULAyjyfzDnAog8ByFW5r/5 # FiTd93FmY1YwYQzbCDTuZbqOxf+DtL3DJQDatpLykNwBLVow0slJMCzWzKTjbNY/ # 0ec51JQrtLn2GjMdJra4JhKKtjgg/AIuiadwc2wVWF9lNebqKogzr8wiuPwAjWmT # ND6w+ZhQHKH1rQIJM4ir36Z6EEBFP6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDTvxse1qBiZHLOyvyBL5pKwQPiOnrtL+MfHc9FhinC7QIGZr4WwwBD # GBMyMDI0MDgyMjE5MDcxMC4zNzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6nHPFDAiGA8yMDI0MDgyMjE0NTIw # NFoYDzIwMjQwODIzMTQ1MjA0WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqcc8U # AgEAMAoCAQACAgfDAgH/MAcCAQACAhN5MAoCBQDqcyCUAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAH3jG9mftFRvk50vsr5Uqu4E5UDkKZhlyfphlnBQtTQS # fC6SEmatii8T6U8mue5wGYcvxCQb5nmWNAbLyhWkk4fyYqo+EOu+YTEQAa383dz/ # jWdAaK2uCluXOVGbPp0vQNOO6pHXJctXWLScWiUUHUU+7Hkrqoaaim3dnCFy3tEG # Y/H96oRFalNDDeZz3+X4aSkn+cWb3Bsp10BGAGeowYfbosv3sRLNZ/XhdoOZz8NP # KnZ2efQaAUUBA2ODyr1jUOgx5j8QsjM4mHa2yT7DLER48fqZtvMd+8a0N/HovfLS # GJgJLPk/FEdNQVyorG6VaxTugKDUKL+isEbqULKM/20xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB # 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAsjp0eFV1HXo1WM1nJOoyHUJKY6BpEC3gcUVUxzWNo # ezCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q # FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgjzYrlioDGC5se5OUPA1Grf6p # XZs12uwKTP/ZGhFlCI4wDQYJKoZIhvcNAQELBQAEggIAqiEY8VQWDGD/aELaGS7Q # eq1ULVZbAItwXOIlJ6ZT2kv5WBaeUWsvj1eqxTSH9WGS0dnYOtxNgZjWHuX5QBfg # 4Ia6KCbc7UHQbBlC77AE45KSai5WcaFGWxtdskY37FLYCorcsggTWvprae3Ds0CK # iJw6VhVLvcWrC2jXim6RevOCwJbuaHjDM+MXmzVMpd9uCAlqiSskmmh26QEw9yVO # QTsidKPultkDKgppRs8heZJNihf8MzLHfOSPDn/wtFabgS9Bp7YuByPoGHYWc61s # 7Pe2XdZOm49kw6bZnUWdJga4iKY7pepUsV4PaMCwMtPl2I4/BAQfYRI/KL4/Ibx2 # +nJSF3r+5/cweslaWwH58XZJj84QQEKi8XNaBs1+ZwJOznL8jqZFdaaOnF9Zs5SI # ziLsBFtyNdIU5HHCi4KTNhMH0TX0YtM+lUXTzrGAZrOJt5QaxAl27JOLM77jaS9R # tSd4oQ1bc/JPVR4pV/AigbPORoD/1qVJONXMTMihiOGwaX4oIDdJfgVVI2cu+uSy # oRzU0Pmf7+v+XZpUAd+rhzaTMi4hVed429Mx//mlLz+KngQV/HQBFipBqnW5BA8L # 4FXfTJqG1Ssfc+6P94qpkjYp926vTwqY0kXm/es9zpzkfgy1o99Shh/sBzhR6ZZL # icHh2AjjXqRWKRwKdejBCaw= # SIG # End signature block |