Obs/bin/GMA/Monitoring/Agent/Extensions/MetricsExtension/mdmDataCollection.ps1
<# .SYNOPSIS Powershell script to collect data about Geneva Metrics (AKA MDM, AKA Geneva Hot Path) data publication. .DESCRIPTION This script performs several operations for troubleshooting issues related to MetricsExtension such as: - Collection of metric traffic. - Collectio of information about the environment such as OS, processes running. - Collection of certificates. - Collection of logs. - Test connection to Frontends where we emit the metrics. .EXAMPLE ./mdmDataCollection.ps1 -SkipAdminCheck -MetricCollectionDurationSec 60 -Table2CsvPath "C:/table2csv.exe" .EXAMPLE ./mdmDataCollection.ps1 -SkipCollectionTsfLogs -SkipCollectionCertificates .EXAMPLE ./mdmDataCollection.ps1 -LogicalDisks "C: D:" .EXAMPLE ./mdmDataCollection.ps1 -MetricCollectionSizeMaxMB 100 -MetricCollectionDurationSec 60 -TimeOutSecondsSearchFiles -1 .EXAMPLE ./mdmDataCollection.ps1 -OutputDirectory "C:\dev" #> param ( # If this switch is specified, the output of all commands will be showed in the output. [Parameter(Mandatory=$false)] [switch]$DebugMdmDataCollection = $false, # The arguments passed for the execution of table2csv.exe. # Default value: "-tail 150000" [Parameter(Mandatory=$false)] [string]$Table2CsvParameters = "-tail 150000", # It specifies the time we will be spent collecting the traffic of metrics in seconds. # Default value: 190 [Parameter(Mandatory=$false)] [int]$MetricCollectionDurationSec = 190, # It specifies the maximum size in MB that will be stored from the collection of the metrics. # Default value: 500 [Parameter(Mandatory=$false)] [int]$MetricCollectionSizeMaxMB = 500, # If this switch is specified, the check of admin permissions will be skipped [Parameter(Mandatory=$false)] [switch]$SkipAdminCheck = $false, # It specifies the path for cpprestutil.exe [Parameter(Mandatory=$false)] [string]$CppRestUtilPathParam = $null, # It specifies the path for table2csv.exe [Parameter(Mandatory=$false)] [string]$Table2CsvPathParam = $null, # The script needs to search files in the environment, this operation can be really long if your disk is not indexed. # This parameter allows you to set a TimeOut in the search. If you don't want to have TimeOut, pass the value -1. # Default value: 3600 [Parameter(Mandatory=$false)] [int]$TimeOutSecondsSearchFiles = 3600, # It specifies the disks where we are going to search the files in the script. # Example for only searching in C: and D:, "C: D:". Use a whitespace as separator. [Parameter(Mandatory=$false)] [string]$LogicalDisksParam = $null, # If this switch is specified, the collection of tsf logs will be skipped. [Parameter(Mandatory=$false)] [switch]$SkipCollectionTsfLogs = $false, # If this switch is specified, the collection of certificates will be skipped. [Parameter(Mandatory=$false)] [switch]$SkipCollectionCertificates = $false, # It specifies in which directory the output is going to be stored. [Parameter(Mandatory=$false)] [string]$OutputDirectory = "..", # This is only used for tests purposes, please don't use it [Parameter(Mandatory=$false)] [switch]$ImportFunctions = $false ) $ScriptVersion = "Windows-1.10" $MeFrontendUrls = @( "global.prod.microsoftmetrics.com" "global.metrics.nsatc.net" "azglobal.metrics.nsatc.net" ) $Ports = @( "80" "443" ) $MeStamps = @( "https://global.prod.microsoftmetrics.com" "https://azglobal-red.prod.microsoftmetrics.com" "https://azglobal-black.prod.microsoftmetrics.com" "https://global.metrics.nsatc.net" "https://azglobal-red.azglobal.metrics.nsatc.net" "https://azglobal-black.azglobal.metrics.nsatc.net" "https://global.metrics.azure.microsoft.scloud" "https://global.metrics.azure.eaglex.ic.gov" "https://13.90.249.229" "https://40.77.24.27" "https://[2a01:111:f100:2000::a83e:33d6]" "https://[2603:1030:7::155]" ) $StampPaths = @( "/public/lb-probe" "/public/monitoringAccount/MetricTeamInternalMetrics/acls" ) $ExcludedEnvironmentVariables = @( "_NT_SYMBOL_PATH" ) function Main { Set-UTF8-Encoding Confirm-Admin-Permissions $mdmDataCollectionOutput = Get-MdmDataCollectionOutput $compressedDataOutput = Get-CompressedDataOutput $mdmDataCollectionOutput Show-Starting-Message Get-Logical-Disks $logicalDisks = Get-Content -Path .\LogicalDisks.txt $metricsExtensionPath = Get-File-Version "MetricsExtension.Native.exe" ".\MetricsExtensionProcesses.txt" "MetricsExtensionVersions.txt" $cppRestUtil = Search-CppRestUtil $metricsExtensionPath Test-ME-Stamps $mdmDataCollectionOutput $cppRestUtil Get-Etw-Session-And-IfxMetrics-At-Start Get-OS-And-Processes-Information Get-Local-Time-Information Get-Difference-Time-Server-And-Agent $cppRestUtil Get-Certificates Get-HTTP-Proxy-Configuration Get-Environment-Variables Get-Open-Sockets-And-Owning-Processes Test-Frontend-Urls Get-Application-Event-Logs Get-Raw-And-Aggregated-Metrics $commandLineArguments = Get-Command-Line-Arguments Get-Cached-Config $commandLineArguments Copy-Autopilot-Logs Get-Autopilot-Ini $monAgentHostPath = Get-File-Version "MonAgentHost.exe" ".\MonAgentHostProcesses.txt" "MonAgentHostVersions.txt" Get-Tsf-Logs $logicalDisks $mdmDataCollectionOutput $monAgentHostPath Get-Etw-Session-And-IfxMetrics-At-End Compress-Output $compressedDataOutput $mdmDataCollectionOutput Show-Ending-Message } function Set-UTF8-Encoding { [void](chcp 65001) } function Confirm-Admin-Permissions { if ($SkipAdminCheck) { Write-Warning "Administrative permissions check skipped due to SkipAdminCheck being set." } elseif(-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole( [Security.Principal.WindowsBuiltInRole] "Administrator")) { $errorMessage = "ERROR: This script has to be run with administrative permissions.`n" $errorMessage += "If you believe you have received this message due to an error, you can`n" $errorMessage += "skip this check by passing the command line parameter SkipAdminCheck." Write-Error $errorMessage break } } function Get-MdmDataCollectionOutput { $folderSuffix = [DateTime]::UtcNow.ToString('yyyy_MM_dd_hh_mm_ss') $randomNumber = Get-Random $mdmDataCollectionOutput = "MdmDataCollectionOutput" + $folderSuffix + "_random_" + $randomNumber [void](Remove-Directory-If-It-Exists $mdmDataCollectionOutput) [void](mkdir $mdmDataCollectionOutput) [void](Set-Location $mdmDataCollectionOutput) return $mdmDataCollectionOutput } function Get-CompressedDataOutput([String]$mdmDataCollectionOutput) { $compressedDataOutput = $mdmDataCollectionOutput + ".zip" return $compressedDataOutput } function Remove-Directory-If-It-Exists([String]$directory) { if (Test-Path -Path $directory) { Write-Output "File $directory already exists deleting it before proceeding..." try { Invoke-Command "Remove-Item -LiteralPath $directory -Force -Recurse" } catch { Write-Error "Failed to delete the file ${directory}: $_. Aborting..." } } } function Show-Starting-Message { $date = Get-Date Write-Output "Begin - MDM Data Collection Script - $date" Write-Output "Script version $ScriptVersion" Write-Output "Collecting general information..." Write-Output "MdmDataCollection script version $ScriptVersion" > AboutCollectionScript.txt } function Get-Logical-Disks { Write-Output "Collecting information about logical disks" if (-Not [string]::IsNullOrEmpty($LogicalDisksParam)) { $LogicalDisksParam = $LogicalDisksParam.Replace(" ", "`n") $LogicalDisksParam >> LogicalDisks.txt } else { $logicalDisks = Get-WmiObject -Class Win32_LogicalDisk foreach ($logicalDisk in $logicalDisks) { $logicalDisk.DeviceID >> LogicalDisks.txt } } } function Get-File-Version([String]$processName, [String]$inputFile, [String]$outputFile) { Write-Host "Searching the process: $processName" wmic PROCESS WHERE "(Name='${processName}')" GET ExecutablePath /FORMAT:list | findstr "=" > $inputFile if ([String]::IsNullOrWhiteSpace((Get-content $inputFile))) { Write-Warning "The process $processName is not running" "The process $processName is not running" > $inputFile return } foreach ($process in Get-Content -Path $inputFile) { $executablePath = $process $prefix = "ExecutablePath=" if ($executablePath.StartsWith($prefix)) { $executablePath = $executablePath.Substring($prefix.Length) } Write-Output "$executablePath" >> $outputFile (Get-Item $executablePath).VersionInfo | format-list >> $outputFile } return $executablePath } function Search-CppRestUtil ([String]$metricsExtensionPath) { if ((-Not [string]::IsNullOrEmpty($CppRestUtilPathParam)) -and (Test-Path -Path $CppRestUtilPathParam)) { return $CppRestUtilPathParam } if (Test-Path -Path "..\CppRestUtil\CppRestUtil.exe") { return "..\CppRestUtil\CppRestUtil.exe" } if ($metricsExtensionPath.Contains("MetricsExtension\MetricsExtension.Native.exe")) { # MetricsExtension NuGet setup $possibleLocationCppRestUtil = $metricsExtensionPath.Replace("MetricsExtension\MetricsExtension.Native","CppRestUtil\CppRestUtil") if (Test-Path -Path $possibleLocationCppRestUtil) { return $possibleLocationCppRestUtil } # Monitoring Agent setup $possibleLocationCppRestUtil = $metricsExtensionPath.Replace("MetricsExtension.Native","CppRestUtil") if (Test-Path -Path $possibleLocationCppRestUtil) { return $possibleLocationCppRestUtil } } $warningMessage = "CppRestUtil was not found in the environment. Instead of CppRestUtil, internal Powershell tools will be used." $warningMessage += "Check more information in the following link: https://eng.ms/docs/cloud-ai-platform/azure-edge-platform-aep/aep-health-standards/observability/mdm/geneva-metrics-mdm/docs/tsg/customer-side/actions/winhttp-escalation#powershell-way" Write-Warning $warningMessage return [string]::Empty } function Get-Etw-Session-And-IfxMetrics-At-Start { tasklist /M IfxMetrics.dll /FO CSV > ProcessLoadingIfxMetrics_At_Start.csv logman NativeMetricsExtension_Provider -ets > MetricsExtensionEtwSessionAtStart.txt logman -ets > EtwSessions.txt } function Get-OS-And-Processes-Information { Get-WmiObject -Class Win32_OperatingSystem | Select-Object Caption, SystemDrive, Version > OS.txt Get-WmiObject -Class Win32_Process | Export-Csv -Path "AllProcesses.csv" -NoTypeInformation } function Get-Local-Time-Information { Write-Output "Collecting time from ME client and server" Get-Date > DateTimeLocal.txt Get-TimeZone > TimeZoneInfo.txt } function Get-Difference-Time-Server-And-Agent([String]$cppRestUtil) { if ([string]::IsNullOrEmpty($cppRestUtil)) { Write-Warning "CppRestUtil.exe is not found. MdmDataCollection will not able to check if there is a difference of time between the server and the agent" return } $serverDate = Invoke-Expression "& '$cppRestUtil' https://global.prod.microsoftmetrics.com/public/lb-probe" | findstr /C:"Date" $serverDate > DateTimeServer.txt $serverDate = $serverDate.TrimStart("Date: ") $serverDate = Get-Date -Date "${serverDate}" $serverDateUtc = $serverDate.ToUniversalTime() $localDateUtc = [DateTime]::UtcNow $deltaMinutes = ($localDateUtc - $serverDateUtc).TotalMinutes if (($deltaMinutes -ge 1) -OR ($deltaMinutes -le -5)) { "ERROR: There is a difference of ${deltaMinutes} minutes between ME client time and server time." > TimeDifferenceError.txt Write-Error "ERROR: There is a difference of ${deltaMinutes} minutes between ME client time and server time." } } function Get-Certificates { if ($SkipCollectionCertificates) { Write-Warning "SkipCollectionCertificates has been set, skipping the collection of certificates." } else { certutil -silent -v -gmt -store "My" > Certificates_On_LocalMachine_My.txt certutil -user -v -gmt -silent -store "My" > Certificates_On_User_My.txt } } function Get-HTTP-Proxy-Configuration { netsh winhttp dump > WinHttp_Config.txt } function Get-Environment-Variables { Get-ChildItem env: | Where-Object -Value $ExcludedEnvironmentVariables -NotIn -Property Name > EnvironmentVariables.txt } function Test-ME-Stamps([String]$mdmDataCollectionOutput, [String]$cppRestUtil) { Write-Output "Testing several MetricsExtension global endpoints" foreach ($meStamp in $MeStamps) { foreach ($stampPath in $StampPaths) { Test-Connection-To-URL $cppRestUtil $meStamp$stampPath >> .\CppRestUtilResults.txt } } } function Get-Open-Sockets-And-Owning-Processes { Write-Output "Listing open sockets and owning processes" netstat -abno > ListeningSockets.txt } function Test-Frontend-Urls { foreach ($meFrontendUrl in $MeFrontendUrls) { foreach ($port in $Ports) { $solvedDNS = Resolve-DnsName -Name $meFrontendUrl Write-Output "Running IPv4 against ${meFrontendUrl}:${port}" 1>> GlobalStamp_TCPPing.txt Test-NetConnection $solvedDNS.IP4Address -port ${port} -InformationLevel "Detailed" 1>> GlobalStamp_TCPPing.txt 2>&1 Write-Output "Finished running IPv4 against ${meFrontendUrl}:${port}" 1>> GlobalStamp_TCPPing.txt Write-Output "Running IPv6 against ${meFrontendUrl}:${port}" 1>> GlobalStamp_TCPPing.txt Test-NetConnection $solvedDNS.IP6Address -port ${port} -InformationLevel "Detailed" 1>> GlobalStamp_TCPPing.txt 2>&1 Write-Output "Finished running IPv6 against ${meFrontendUrl}:${port}" 1>> GlobalStamp_TCPPing.txt } } } function Get-Application-Event-Logs { Write-Output "Collecting application event logs for Level Error and EventID 1000 happened within last one hour..." Write-Output "Collecting application event logs for Level Error and EventID 1000 happened within last one hour..." > ApplicationErrorLog.txt wevtutil qe Application /q:"*[System[Level=2 and EventID=1000 and TimeCreated[timediff(@SystemTime) <= 3600000]]]" /f:text /rd:true >> ApplicationErrorLog.txt } function Get-Raw-And-Aggregated-Metrics { Set-MdmInputOutputProviders-File Write-Output "Collecting raw and aggregated metrics, please wait..." Invoke-Command "logman start MdmDataCollection -max ${MetricCollectionSizeMaxMB} -pf mdmInputOutputProviders.txt -o mdmRaw.etl -ets" timeout ${MetricCollectionDurationSec} /nobreak Invoke-Command "logman stop MdmDataCollection -ets" Invoke-Command "Remove-Item mdmInputOutputProviders.txt" logman -ets | findstr /i IfxViewerSession > IfxConsumerSessions.txt foreach ($ifxConsumerSession in Get-Content -Path .\IfxConsumerSessions.txt) { Invoke-Command "logman stop $ifxConsumerSession -ets" } } function Set-MdmInputOutputProviders-File { $content = @( "{edc24920-e004-40f6-a8e1-0e6e48f39d84}" "{2f23a2a9-0de7-4cb4-a778-fbdf5c1e7372}" ) $pathMdmInputOutputProviders = (Get-Item -Path ".\" -Verbose).FullName | Join-Path -ChildPath 'mdmInputOutputProviders.txt' [IO.File]::WriteAllLines($pathMdmInputOutputProviders, $content) } function Search-Files-Job([Object[]]$fileNames, [Object[]]$logicalDisks, [String]$outputFile, [String]$currentPath) { $searchFilesFunc = $(Get-Command Search-Files).Definition $invokeCommandFunc = $(Get-Command Invoke-Command).Definition $scriptBlock = { param($fileNames, $logicalDisks, $outputFile, $currentPath) Set-Location $currentPath Invoke-Expression "function Search-Files {$using:searchFilesFunc}" Invoke-Expression "function Invoke-Command {$using:invokeCommandFunc}" Search-Files -fileNames $fileNames -logicalDisks $logicalDisks -outputFile $outputFile } $job = Start-Job -ArgumentList $fileNames, $logicalDisks, $outputFile, $currentPath -ScriptBlock $scriptBlock $job | Wait-Job -Timeout $TimeOutSecondsSearchFiles if ($job.State -ne "Completed") { Write-Warning "$fileNames were searched but they took more than $TimeOutSecondsSearchFiles seconds, aborting this search..." } } function Search-Files([Object[]]$fileNames, [Object[]]$logicalDisks, [String]$outputFile) { foreach($logicalDisk in $logicalDisks) { foreach($fileName in $fileNames) { try { Write-Output "cmd /c dir /s/b ${logicalDisk}\${fileName}" cmd /c "dir /s/b ${logicalDisk}\${fileName} > lastDir.txt 2>>dirFailures.txt" } catch { "ERROR: cmd /c dir /s/b ${logicalDisk}\${fileName} failed: $_" >> dirFailures.txt Write-Error "ERROR: cmd /c dir /s/b ${logicalDisk}\${fileName} failed: $_" } Invoke-Command "Get-Content .\lastDir.txt" Get-Content .\lastDir.txt >> $outputFile } } } function Get-Command-Line-Arguments { $errorMessage = "CommandLineArguments from MetricsExtension.Native.exe were not found." try { $commandLineArguments = (Get-WmiObject Win32_Process -Filter "Name='MetricsExtension.Native.exe'").CommandLine if (-Not [string]::IsNullOrEmpty($commandLineArguments)) { $commandLineArguments > CommandLineArgumentsME.txt return $commandLineArguments } } catch { $errorMessage += " Exception: $_" Write-Error $errorMessage } $errorMessage > CommandLineArgumentsME.txt return [string]::Empty } function Get-Cached-Config([String]$commandLineArguments) { $dataDirectories = Get-Data-Directories $commandLineArguments $counter = 1 foreach ($dataDirectory in $dataDirectories) { if (Test-Path -Path $dataDirectory) { Invoke-Command "New-Item -ItemType Directory -Path .\MetricsExtensionCachedConfig_$counter" Invoke-Command "Copy-Item -Path '$dataDirectory*' -Destination '.\MetricsExtensionCachedConfig_$counter' -Recurse -Force" $counter++ } } } function Get-Data-Directories([String]$commandLineArguments) { # As there could be several ME processes running at the same time, we will collect the data directories of all of them $dataDirectories = @() # Try to use the -DataDirectory parameter if (-Not [string]::IsNullOrEmpty($commandLineArguments)) { $commandLineArgumentsArray = $commandLineArguments.Split(" ") for ($i = 1; $i -lt $commandLineArgumentsArray.Count; $i++) { $arg = $commandLineArgumentsArray[$i] if ($arg -eq "-DataDirectory") { $i++ $dataDirectory = $commandLineArgumentsArray[$i] $dataDirectory = $dataDirectory.Replace('"', '') if ($dataDirectory[-1] -ne '\') { $dataDirectory += '\' } $dataDirectories += $dataDirectory } } } # Try to get the path from env var MONITORING_DATA_DIR if (Test-Path env:MONITORING_DATA_DIR) { $dataDirectories += $env:MONITORING_DATA_DIR + '\MetricsExtensionData\' } # Try to get the path from env var DiagnosticStore if (Test-Path env:DiagnosticStore) { $dataDirectories += $env:DiagnosticStore + '\MetricsExtensionData\' } # Get the path from TEMP dir $dataDirectories += $env:TEMP + '\MetricsExtensionData\' return $dataDirectories } function Copy-Autopilot-Logs { if (Test-Path -Path D:\Data\logs\local) { Write-Output "Copying autopilot logs..." Invoke-Command "mkdir .\GenevaMetricsExtensionLogs" Invoke-Command "Copy-Item -Path (Get-ChildItem D:\Data\logs\local\GenevaMetricsExtension_*.log) -Destination GenevaMetricsExtensionLogs" Invoke-Command "mkdir .\GenevaMetricsExtensionHostLogs" Invoke-Command "Copy-Item -Path (Get-ChildItem D:\Data\logs\local\GenevaMetricsExtensionHost_*.log) -Destination GenevaMetricsExtensionHostLogs" } else { Write-Warning "No autopilot logs were found. If this machine is not an Autopilot machine, this is not an issue." } } function Get-Autopilot-Ini { if (Test-Path -Path D:\app\autopilot.ini) { Write-Output "Attempting to collect autopilot.ini..." Write-Output "Attempting to collect autopilot.ini..." > CollectAutopilotLogs.txt Invoke-Command "xcopy /C D:\app\autopilot.ini >> CollectAutopilotLogs.txt" } else { Write-Warning "D:\app\autopilot.ini was not found. If this machine is not an Autopilot machine, this is not an issue." } } function Convert-Tsf-Logs-To-Csv([String]$table2csv) { $tsfCounter = 0 foreach ($tsfLog in Get-Content -Path .\TsfLogs.txt) { try { Write-Output "$table2csv $Table2CsvParameters $tsfLog" Write-Output "Waiting for Table2Csv to complete..." Write-Output "${table2csv} $Table2CsvParameters} ${tsfLog}" >> Table2CsvLogs.txt Invoke-Expression "${Table2Csv} ${Table2CsvParameters} '${tsfLog}'" >> Table2CsvLogs.txt } catch { "ERROR: Command {$table2csv $Table2CsvParameters '$tsfLog'} Failed: $_" >> Table2CsvLogs.txt Write-Error "ERROR: Command {$table2csv $Table2CsvParameters '$tsfLog'} Failed: $_" } $tsfCounter++ $csvFullPath = $tsfLog.Replace("tsf","csv") $tsfLogFileName = Split-Path $tsfLog -Leaf $csvLogFileName = $tsfLogFileName.Replace(".tsf", "_${tsfCounter}.csv") try { Write-Output "Copy-Item '${csvFullPath}' ${csvLogFileName}" Invoke-Command "Copy-Item '${csvFullPath}' .\${csvLogFileName} 2>> CsvCopyErrors.txt" } catch { "ERROR: Command {failed to copy ${csvFullPath} to .\${csvLogFileName}}: $_" >> CsvCopyErrors.txt Write-Error "ERROR: Command {failed to copy ${csvFullPath} to .\${csvLogFileName}}: $_" } } } function Get-Etw-Session-And-IfxMetrics-At-End { tasklist /M IfxMetrics.dll /FO CSV > ProcessLoadingIfxMetrics_At_End.csv logman NativeMetricsExtension_Provider -ets > MetricsExtensionEtwSessionAtEnd.txt } function Compress-Output([String]$compressedDataOutput, [String]$mdmDataCollectionOutput) { Write-Output "Compressing MDM Data Collection Output ..." try { Invoke-Command "Compress-Archive -Force -Path .\* -DestinationPath '$OutputDirectory\$compressedDataOutput'" Invoke-Command "Set-Location .." Invoke-Command "Remove-Item -r -Force $mdmDataCollectionOutput" Write-Output "Done -^> MDM Data ready at $OutputDirectory\$compressedDataOutput" } catch { Write-Error "ERROR: MDM Data Collection Output has not been compressed: $_" } } function Show-Ending-Message { $date = Get-Date Write-Output "End - MDM Data Collection Script - $date" } function Invoke-Command([String]$command) { $output = Invoke-Expression $command if ($DebugMdmDataCollection) { Write-Output $output } } function Test-Connection-To-URL([String]$cppRestUtil, [String]$url) { try { if ([String]::IsNullOrEmpty($cppRestUtil)) { [System.Net.ServicePointManager]::ServerCertificateValidationCallback = { $true } Write-Output "(New-Object System.IO.StreamReader ((([System.Net.WebRequest]::Create($url)).GetResponse()).GetResponseStream())).ReadToEnd()" (New-Object System.IO.StreamReader ((([System.Net.WebRequest]::Create($url)).GetResponse()).GetResponseStream())).ReadToEnd() } else { Write-Output "'$cppRestUtil' --json $url" Invoke-Expression "& '$cppRestUtil' --json $url" } } catch { "Request to $url failed." } Write-Output "" } function Search-Table2csv([String]$monAgentHostPath) { if ((-Not [string]::IsNullOrEmpty($Table2CsvPathParam)) -and (Test-Path -Path $Table2CsvPathParam)) { return $Table2CsvPathParam } if (-Not [string]::IsNullOrEmpty($monAgentHostPath) -And $monAgentHostPath.Contains("MonAgentHost.exe")) { $table2CsvPath = $monAgentHostPath.Replace("MonAgentHost.exe","table2csv.exe") if (Test-Path -Path $table2CsvPath) { return $table2CsvPath } } return [string]::Empty } function Get-Tsf-Logs([Object[]]$logicalDisks, [String]$mdmDataCollectionOutput, [String]$monAgentHostPath) { if ($SkipCollectionTsfLogs) { Write-Warning "SkipCollectionTsfLogs has been set, skipping the collection of tsf logs." } else { $fileNames = @( "MaMetricsExtensionEtw.tsf" "MAEventTable.tsf" "LocallyAggregatedMdmMetricsV1.tsf" ) $table2csv = Search-Table2csv $monAgentHostPath if ([string]::IsNullOrEmpty($table2csv)) { $warningMessage = "table2csv.exe was not found. Tsf logs will not be collected." $warningMessage += "Please take in account this scenario is useful only if you are using MonitoringAgent" Write-Warning $warningMessage } else { Search-Files-Job $fileNames $logicalDisks "TsfLogs.txt" "$PSScriptRoot\$mdmDataCollectionOutput" Convert-Tsf-Logs-To-Csv $table2csv } } } if (-Not $ImportFunctions) { Main } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA+SYwK6aSxmkQa # MrnYTFJMM31grDuHpogCjLtajE58raCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIl89rgffZkiVAVH6Ph3t9JW # 4Wc+2aZVEFIhCmgb01ehMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEALYB3usgjkCX6oosGSQyw9dpBLH10DSY644uhOWvf991a7CViy2ozVeJj # MRL0ng3Ui6XGOV8G2GhZMZ+RK+B10yTZKKfLyQJFz0enESn3DokxuHbCopxf90Sx # GmVMjSqQV27dw8L49QTmJclJY5hMA2y0O197tbYkakUxMOq9UwwAokCsTdODWhQ3 # MnxIHc1DBv+MAtO1kBYOtfc+qXxyRczw5sVqKe+G1c+X/GbIFS8lmdYFeUUosEzt # 1yv1kkzmnok2Yf/+KV9BkGIuwglD5H6NxwGvA2uWgPOnVSu0sHS1vBGpMt9YSS1h # scd+9Zc8XsXLV7Xc5urTX0AV1PTYRqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD3z/JhnEXFv7eqzaL01e+x5LrcEIi15UJvb+gUuRhs5AIGZuLxfVHJ # GBMyMDI0MTAwOTAxMTQwOC4yMzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2 # hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN # PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F # DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F # QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP # hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3 # gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm # dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7 # Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS # 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN # 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc # GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI # D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi # LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc # ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE # JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N # 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp # 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4 # nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N # nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO # pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1 # ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB # QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7 # n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6q+0ezAiGA8yMDI0MTAwODEzMzkw # N1oYDzIwMjQxMDA5MTMzOTA3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqr7R7 # AgEAMAoCAQACAhaJAgH/MAcCAQACAhNAMAoCBQDqsQX7AgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAJM3ypcsJn1IdDUS6xRZzA90aMVTN/7gIHmdxOal1yRV # Fk216grXvUWurjgrlPHZhPk4plIW9rK3huV02Hd9CygX2zTnwx5tHuucZiHVDSsc # 8rQcE50cT3f6AR+9glhRJtUZS3ISOaPcC93R32rr5+9IP12R3afqHvoDDL+h3Dcp # ONEyJ+K7tOcSn1ZVMFyWaK82e4s26sIo7TS1gQ5hPcem7iu1QB8/+bxe/XPViZ19 # SjXMJOWj95uXGyDpFbJ/Hq3csiGGqf3t51Jw84K5snSeUJRMNY1a6uiyg0OU7N0T # HWfJtmSxwT/x/jvLnOSYCEzAXIrTYDUe5m3NFyfIKVgxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB # 8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBrn7iEysQBVg4eecEi/hpPQwkxAR19HChvApMzHrGy # OTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7w # wEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgK2qsRcOgyM1Zn2vK2JA2wJLH # MYHTlkMpRq6Vov3LRacwDQYJKoZIhvcNAQELBQAEggIAoDu23RR0receLBuAj7hE # sNxVark3DC49KsjRv+gieidnI8HvJryiACF6Wr8gj5QMqjTnNsFH07LUXFoYKc8M # w8uDtQUQUqWKryRY49YRoyJvMOOPjR2O7qturp2TJR/zwPaiutGL2m3AC5S7dowl # pkSw75DKcY/T58xMt0G+7kgtxBuijVOZEuWRVm+10vJT87Emhg/KBdWhY0Bdpp7d # eIaTlGTrOQHyUzvGcJlVwyyA4FhvBXv5M7+v9owD+EttwHTJmnb2woIgHMNZGuWf # O0ZMw5mGJsbvwKCqT4WRUY62H4yPhakaydcy5+L+xAFJzKMmEcCIHSshKd1H4ndg # 9G0nm4+CDvMGw7plruRWgTjTdxs21Cy/DDFUNS7DabwVkAk73S/gOzb+fz6WGkU/ # 9Mw3nPnha+8VbWNr/sXeGMzHC2szc954CAbTTbBxQG01TGgFvmfF7CvW2RuUgozA # jxHYyg204xY7FvbKTBssiOb8h3NJu5DkAo39Y5RaafUfGLjN9kcgKe7dvFuSigiG # 7fMUKbG/zJguDynBu3bJViQZyk2sQmUmw3eZnsQ4O34tvqbPHhqeXJIKUpcYFGEj # ERRP6ht6ZiaXy/FC8rO69FKhVyhHjc+7paj57iWiV+qNO4je1sP95TEVoP9dA4zG # T3hchTeQZ93CRWzofYYHK3c= # SIG # End signature block |