PureStorage.CBS.AVS.Monitor.ps1

$SCHEMA_VERSION = "1.1.0"
function Update-ResourceGroupTags {
    Param(
        [Parameter(Mandatory=$true)]
        [String]$MonitorResourceGroup,

        [Parameter(Mandatory=$true)]
        [ValidateSet("host", "capacity")]
        [String]$MonitorType,

        [Parameter(Mandatory=$true)]
        [bool] $IsFreshDeployment
    )

    # Add tag to resource group
    $ResourceGroup = Get-AzResourceGroup $MonitorResourceGroup -ErrorAction ignore
    if (-not $ResourceGroup) {
        throw "Resource group $MonitorResourceGroup does not exist"
    }

    $Tags = $ResourceGroup.Tags
    if ($MonitorType -eq "host") {
        $Tags["PureStorage.CBS.AVS.HostMonitor"] = "True"
    }
    if ($MonitorType -eq "capacity") {
        if (-not $IsFreshDeployment) {
            # For backward compatibility, set the HostMonitor tag to true if we are adding a deployment to existing HostMonitor deployment
            if (-not $Tags["PureStorage.CBS.AVS.CapacityMonitor"] ){
                # If CapacityMonitor tag was already set, then compatability check was done in the past
                $Tags["PureStorage.CBS.AVS.HostMonitor"] = "True"
            }
        }
        $Tags["PureStorage.CBS.AVS.CapacityMonitor"] = "True"
    }
    $Tags['PureStorage.CBS.AVS'] = $ProductVersion
    $Tags["PureStorage.CBS.AVS.SCHEMA_VERSION"] = $SCHEMA_VERSION
    Set-AzResourceGroup -Name $MonitorResourceGroup -Tag $Tags
}

function Deploy-MonitoringResource {
    param (
      [Parameter(Mandatory=$true)]
          [String]$MonitorResourceGroup,

          [Parameter(Mandatory=$true)]
          [String]$MonitorResourceGroupRegion,

          [Parameter(Mandatory=$false)]
          [String]$AVSCloudName,

          [Parameter(Mandatory=$false)]
          [String]$AVSResourceGroup,

          [Parameter(Mandatory=$true)]
          [String]$VNetName,

          [Parameter(Mandatory=$true)]
          [String]$VNetResourceGroup,

          [Parameter(ParameterSetName='NewSubnet', Mandatory=$true)]
          [String]$VNetSubnetAddress,

          [Parameter(ParameterSetName='ExistingSubnet', Mandatory=$true)]
          [Parameter(ParameterSetName='NewSubnet', Mandatory=$false)]
          [String]$VNetSubnetName,

          [Parameter(Mandatory=$false)]
          [int]$MonitorIntervalInMinute,

          [Parameter(Mandatory=$false)]
          [ValidateRange(1, 100)]
          [int]$DefaultUtilizationThreshold=$DEFAULT_UTILIZATION_THRESHOLD,

          [Parameter(Mandatory=$true)]
          [ValidateSet("host", "capacity")]
          [string]$MonitorType,

          [Parameter(Mandatory=$false)]
          [int]$DefaultRunCommandTimeoutInMinute=$DEFAULT_RUNCOMMAND_TIMEOUT_IN_MINUTE
    )

    $ProductVersion = (Get-Module "PureStorage.CBS.AVS").Version.ToString()
    $ResourceGroup = Get-AzResourceGroup $MonitorResourceGroup -ErrorAction ignore
    if (-not $ResourceGroup) {
        $IsFreshDeployment = $true
        Write-Host "Resource group $MonitorResourceGroup does not exist. Creating the resource group..."
        New-AzResourceGroup $MonitorResourceGroup -Location $MonitorResourceGroupRegion -Tag @{'PureStorage.CBS.AVS' = $ProductVersion } | Out-Null
    }
    else {
        if ($ResourceGroup.Tags["PureStorage.CBS.AVS"]) {
            $IsFreshDeployment = $false
        }

        if ($ResourceGroup.location -ne $MonitorResourceGroupRegion) {
            throw "The resource group $MonitorResourceGroup exists but its region $($ResourceGroup.location) does not match provided region $MonitorResourceGroupRegion"
        }

        # If the resource group exists and it's empty, we'll use the resource group even though there is no tag
        $Resources = Get-AzResource -ResourceGroupName $MonitorResourceGroup
        if (($Resources.Count -ne 0) -and (-not $ResourceGroup.Tags["PureStorage.CBS.AVS"])) {
            throw "The resource group $MonitorResourceGroup exists but not used by Pure Storage AVS monitor. Please select another name for Pure Storage monitor"
        }
        Update-ResourceGroupTags -MonitorResourceGroup $MonitorResourceGroup -MonitorType $MonitorType -IsFreshDeployment $IsFreshDeployment
    }

    $DeploymentId = (New-Guid).ToString()
    $DeploymentParams = @{        
        "VNetName" = $VNetName;
        "VNetResourceGroupName" = $VNetResourceGroup;
        "DeploymentId" = $DeploymentId
    }

    if ($MonitorType -eq "capacity") {
        $DeploymentTemplatePath = Join-Path -Path $PSScriptRoot -ChildPath 'templates/BaseMonitor' -AdditionalChildPath 'Main.bicep'
        $DeploymentParams["DeploymentType"] = "CapacityMonitor"
        $DeploymentParams["DefaultUtilizationThreshold"] = $DefaultUtilizationThreshold
        $DeploymentParams["capacityMonitorIntervalInMinute"] = $MonitorIntervalInMinute
    }

    if ($MonitorType -eq "host") {
        $DeploymentParams["AVSCloudName"] = $AVSCloudName
        $DeploymentParams["AVSResourceGroup"] = $AVSResourceGroup
        $DeploymentTemplatePath = Join-Path -Path $PSScriptRoot -ChildPath 'templates/BaseMonitor' -AdditionalChildPath 'Main.bicep'
        $DeploymentParams["DeploymentType"] = "HostMonitor"
        $DeploymentParams["MonitorIntervalInMinute"] = $MonitorIntervalInMinute
        $DeploymentParams["DefaultRunCommandTimeoutInMinute"] = $DefaultRunCommandTimeoutInMinute
    }

    if ($VNetSubnetAddress) {
        $DeploymentParams["SubnetAddressRange"] = $VNetSubnetAddress
    }

    if ($VNetSubnetName) {
        $DeploymentParams["SubnetName"] = $VNetSubnetName
    }

    Write-Host "Deploying monitoring infrastructure to Azure..."
    New-AzResourceGroupDeployment -Name "PCBSMonitorDeployment_$DeploymentId" -ResourceGroupName $MonitorResourceGroup `
      -TemplateFile $DeploymentTemplatePath  -TemplateParameterObject $DeploymentParams
  }

  function Add-MonitorArray {
    param (
      [Parameter(Mandatory=$true)]
      [String]$MonitorResourceGroup,

      [Parameter(Mandatory=$true)]
      [String]$PureCloudBlockStoreEndpoint,

      [Parameter(Mandatory=$true)]
      [pscredential]$PureCloudBlockStoreCredential,

      [Parameter(Mandatory=$false)]
      [int] $UtilizationThreshold,

      [Parameter(Mandatory=$true)]
      [ValidateSet("host", "capacity")]
      [String]$MonitorType,

      [Parameter(Mandatory=$false)]
      [Switch]$Force
    )

    $ResourceGroup = Get-AzResourceGroup -Name $MonitorResourceGroup

    if (-not $ResourceGroup) {
        throw "Resource group $MonitorResourceGroup does not exist"
    }

    if (-not $ResourceGroup.Tags["PureStorage.CBS.AVS"]) {
        throw "Resouce group $MonitorResourceGroup specified does not host Pure Storage monitor"
    }

    $PureCloudBlockStoreEndpointOrigin = $PureCloudBlockStoreEndpoint
    Write-Host "Adding Pure Cloud Block Store $PureCloudBlockStoreEndpointOrigin to monitor resource group $MonitorResourceGroup..."

    $UserPrincipalName = (Get-AzContext).Account.Id
    $KeyVault = Get-AzKeyVault -ResourceGroupName $MonitorResourceGroup

    Set-AzKeyVaultAccessPolicy -VaultName $KeyVault.VaultName  -UserPrincipalName $UserPrincipalName -PermissionsToSecrets set,delete,get,purge,list

    if ($Force) {
        Write-Warning "Warning skipping check for $PureCloudBlockStoreEndpoint connectivity."
    }
    else {
        # Make sure the credential works before adding to the monitor
        $Array = Connect-Pfa2array -Endpoint $PureCloudBlockStoreEndpoint -Credential $PureCloudBlockStoreCredential  -IgnoreCertificateError -ErrorAction Ignore
        if (-not $Array) {
            $msg = "Failed to connect to the Pure Cloud Block Store. Please check the endpoint and credential of the Pure Cloud Block Store."
            throw $msg
        }
    }

    if ($PureCloudBlockStoreEndpoint -match "^\d+.\d+.\d+.\d+$") {
        $PureCloudBlockStoreEndpoint = $PureCloudBlockStoreEndpoint.Replace(".", "-")
    }

    $data_prefix = ""
    if ($MonitorType -eq "capacity") {
        $data_prefix = "capacity-"
    }
    $Secret = Get-AzKeyVaultSecret -VaultName $KeyVault.VaultName | where-object {$_.Name -eq "$($PureCloudBlockStoreEndpoint)-$($KeyVault.VaultName)-${data_prefix}username"}
    if ($Secret) {
        Write-Host "Overriding the existing credential for Pure Cloud Block Store $PureCloudBlockStoreEndpointOrigin..."
    }

    Set-AzKeyVaultSecret -VaultName $KeyVault.VaultName -Name "$($PureCloudBlockStoreEndpoint)-$($KeyVault.VaultName)-${data_prefix}username" -SecretValue (ConvertTo-SecureString -String $PureCloudBlockStoreCredential.UserName -AsPlainText -Force)
    Set-AzKeyVaultSecret -VaultName $KeyVault.VaultName -Name "$($PureCloudBlockStoreEndpoint)-$($KeyVault.VaultName)-${data_prefix}password" -SecretValue $PureCloudBlockStoreCredential.Password

    if ($MonitorType -eq "capacity") {

      if ($UtilizationThreshold) {
        Set-AzKeyVaultSecret -VaultName $KeyVault.VaultName -Name "$($PureCloudBlockStoreEndpoint)-$($KeyVault.VaultName)-${data_prefix}threshold" -SecretValue (ConvertTo-SecureString -String $UtilizationThreshold -AsPlainText -Force)
      }
    }

    Write-Host "The Pure Cloud Block Store $PureCloudBlockStoreEndpointOrigin is successfully added to monitor resource group $MonitorResourceGroup."
  }

function Remove-FunctionFromFunctionApp {
    Param(

        [Parameter(Mandatory = $true)]
        [String] $ResourceGroupName,

        [Parameter(Mandatory = $true)]
        [String]$FunctionName,

        [Parameter(Mandatory = $true)]
        [String]$FunctionAppName
    )

    $Context = Get-AzContext
    $SubscriptionId = $Context.Subscription.Id
    Write-Host "Removing function $FunctionName from FunctinApp $FunctionAppName..."
    $uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Web/sites/$FunctionAppName/functions/$($FunctionName)?api-version=2016-08-01"
    Invoke-AzRest -Method DELETE -Path $uri
}

function Get-FunctionFromFunctionApp {
    Param(

        [Parameter(Mandatory = $true)]
        [String] $ResourceGroupName,

        [Parameter(Mandatory = $true)]
        [String]$FunctionName,

        [Parameter(Mandatory = $true)]
        [String]$FunctionAppName
    )

    $Context = Get-AzContext
    $SubscriptionId = $Context.Subscription.Id
    $uri = "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Web/sites/$FunctionAppName/functions/$($FunctionName)?api-version=2016-08-01"
    Invoke-AzRest -Method Get -Path $uri
}

function Test-MonitorFunctionExistence {
    Param(
        [Parameter(Mandatory = $true)]
        [String]$ResourceGroupName,

        [Parameter(Mandatory = $true)]
        [ValidateSet("host", "capacity")]
        [String]$MonitorType
    )

    $FunctionApp = Get-AzFunctionApp -ResourceGroupName $ResourceGroupName -ErrorAction Ignore
    if (-not $FunctionApp) {
        throw "Function App does not exist in the resource group $ResourceGroupName. No valid monitor deployment found. Try to deploy the monitor again"
    }
    if ($MonitorType -eq "host") {
        $FunctionName = "BuildClusterTrigger"
        $ErrorMessage = "AVS host monitor does not exist in the monitor resource group $ResourceGroupName"
    } elseif ($MonitorType -eq "capacity") {
        $FunctionName = "CapacityMonitorTrigger"
        $ErrorMessage = "Capacity monitor does not exist in the monitor resource group $ResourceGroupName"
    }
    $FunctionAppGetResponse = Get-FunctionFromFunctionApp -ResourceGroupName $ResourceGroupName -FunctionName $FunctionName -FunctionAppName $FunctionApp.Name
    if ($FunctionAppGetResponse.StatusCode -ne 200) {
        throw $ErrorMessage
    }
}

  function Remove-Monitor {
    Param(
        [Parameter(Mandatory = $true)]
        [String]$MonitorResourceGroup,

        [Parameter(Mandatory = $true)]
        [ValidateSet("host", "capacity")]
        [String]$MonitorType,

        [Parameter(Mandatory = $false)]
        [Switch]$RemoveSubnet
    )

    $ResourceGroup = Get-AzResourceGroup $MonitorResourceGroup -ErrorAction ignore

    if (-not $ResourceGroup) {
        throw "Pure Storage monitor $MonitorResourceGroup does not exist"
    }

    if ([string]::IsNullOrEmpty($ResourceGroup.Tags["PureStorage.CBS.AVS"])) {
        throw "The resource group provided is not Pure Storage monitor resource group. Only Pure Storage monitor resource group can be removed by this command"
    }

    # smartDetector is auto configured without tag. Ignore this component
    $NonMonitorResources = Get-AzResource -ResourceGroupName $MonitorResourceGroup | Where-Object { [string]::IsNullOrEmpty($_.tags["AVSMonitorResourceGroupName"]) -and $_.ResourceType -ne "microsoft.alertsmanagement/smartDetectorAlertRules"}
    if ($NonMonitorResources.Count -ge 1) {
        throw "Non Pure Storage monitor resource $($MonitorResources.Name) detected. Please manually remove the resource before removing the whole monitor"
    }


    $MonitorFuncApp = Get-AzFunctionApp -ResourceGroupName $MonitorResourceGroup
    $MonitorKeyVault = Get-AzKeyVault -ResourceGroupName $MonitorResourceGroup

    # Vnet name here is constructed as {vNetResouceGUI}-{SubnetName}
    # eg. fece391b-8f4e-4e05-a203-e5961cdd9fd1_subnet-avsfuncappsbqzuuqxofe2q
    $vNetResourceGUID = $MonitorFuncApp.SiteConfig.VnetName.Split("_")[0]
    $MonitorSubnetName = $MonitorFuncApp.SiteConfig.VnetName.Split("_")[1]
    $MonitorVNet = Get-AzVirtualNetwork | Where-Object {$_.ResourceGuid -eq $vNetResourceGUID}

    # Check if we need to do partial removal
    $IsPartial = $false
    if ($MonitorType -eq "host") {
        if ($ResourceGroup.Tags["PureStorage.CBS.AVS.CapacityMonitor"]) {
            $IsPartial = $true

            if ($RemoveSubnet) {
                throw "Cannot remove subnet when the monitor resource group $MonitorResourceGroup is hosting capacity monitor. Please remove the capacity monitor first"
            }
            Write-Warning "The monitor resource group $MonitorResourceGroup is hosting capacity monitor. Removing only the host monitor resources"
            Remove-FunctionFromFunctionApp -ResourceGroupName $MonitorResourceGroup -FunctionName "BuildClusterTrigger" -FunctionAppName $MonitorFuncApp.Name
            $Tags = $ResourceGroup.Tags
            $Tags.Remove("PureStorage.CBS.AVS.HostMonitor")
            Set-AzResourceGroup -Name $MonitorResourceGroup -Tag $Tags
        }
    }

    if ($MonitorType -eq "capacity") {
        if ($ResourceGroup.Tags["PureStorage.CBS.AVS.HostMonitor"]) {
            $IsPartial = $true

            if ($RemoveSubnet) {
                throw "Cannot remove subnet when the monitor resource group $MonitorResourceGroup is hosting host monitor. Please remove the host monitor first"
            }
            Write-Warning "The monitor resource group $MonitorResourceGroup is hosting host monitor. Removing only the capacity monitor resources"
            Remove-FunctionFromFunctionApp -ResourceGroupName $MonitorResourceGroup -FunctionName "CapacityMonitorTrigger" -FunctionAppName $MonitorFuncApp.Name
            $Tags = $ResourceGroup.Tags
            $Tags.Remove("PureStorage.CBS.AVS.CapacityMonitor")
            Set-AzResourceGroup -Name $MonitorResourceGroup -Tag $Tags
        }
    }

    if (-not $IsPartial) {
        Write-Host "Removing resource group $MonitorResourceGroup..."
        Remove-AzResourceGroup $MonitorResourceGroup -Force | Out-Null

        # Remove subnet
        if ($RemoveSubnet) {
            Write-Host "Removing subnet $MonitorSubnetName from vNet $($MonitorVNet.Name)..."
            Remove-AzVirtualNetworkSubnetConfig -Name $MonitorSubnetName -VirtualNetwork $MonitorVNet | Set-AzVirtualNetwork | Out-Null
        }

        # Purge key vault
        Write-Host "Purging key vault $($MonitorKeyVault.VaultName)..."
        Remove-AzKeyVault -Name $MonitorKeyVault.VaultName -InRemovedState -Force -Location $ResourceGroup.Location | Out-Null
    }
  }

  function Remove-MonitorArray {
    Param (
      [Parameter(Mandatory=$true)]
      [String]$MonitorResourceGroup,

      [Parameter(Mandatory=$true)]
      [String]$PureCloudBlockStoreEndpoint,

      [Parameter(Mandatory=$true)]
      [ValidateSet("host", "capacity")]
      [String]$MonitorType
    )
    $ResourceGroup = Get-AzResourceGroup -Name $MonitorResourceGroup

    if (-not $ResourceGroup) {
        throw "Resource group $MonitorResourceGroup does not exist"
    }

    if (-not $ResourceGroup.Tags["PureStorage.CBS.AVS"]) {
        throw "Resouce group $MonitorResourceGroup specified does not host Pure Storage CBS AVS monitor"
    }

    $PureCloudBlockStoreEndpointOrigin = $PureCloudBlockStoreEndpoint
    $KeyVault = Get-AzKeyVault -ResourceGroupName $MonitorResourceGroup
    Write-Host "Removing Pure Cloud Block Store $PureCloudBlockStoreEndpointOrigin from monitor resource group $MonitorResourceGroup..."

    $UserPrincipalName = (Get-AzContext).Account.Id
    Set-AzKeyVaultAccessPolicy -VaultName $KeyVault.VaultName  -UserPrincipalName $UserPrincipalName -PermissionsToSecrets set,delete,get,purge,list

    if ($PureCloudBlockStoreEndpoint -match "^\d+.\d+.\d+.\d+$") {
        $PureCloudBlockStoreEndpoint = $PureCloudBlockStoreEndpoint.Replace(".", "-")
    }

    $data_prefix = ""
    if ($MonitorType -eq "capacity") {
        $data_prefix = "capacity-"
    }
    $Secret = Get-AzKeyVaultSecret -VaultName $KeyVault.VaultName | where-object {$_.Name -eq "$($PureCloudBlockStoreEndpoint)-$($KeyVault.VaultName)-${data_prefix}username"}
    if (-not $Secret) {
        throw "Pure Cloud Block Store $PureCloudBlockStoreEndpointOrigin does not exist in the monitor resource group $MonitorResourceGroup"
    }

    Remove-AzKeyVaultSecret -VaultName $KeyVault.VaultName -Name "$($PureCloudBlockStoreEndpoint)-$($KeyVault.VaultName)-${data_prefix}username" -Force
    Remove-AzKeyVaultSecret -VaultName $KeyVault.VaultName -Name "$($PureCloudBlockStoreEndpoint)-$($KeyVault.VaultName)-${data_prefix}password" -Force

    # Purge secret
    Purge-AzureSecretWithRetry -KeyVaultName $KeyVault.VaultName -SecretName "$($PureCloudBlockStoreEndpoint)-$($KeyVault.VaultName)-${data_prefix}username"
    Purge-AzureSecretWithRetry -KeyVaultName $KeyVault.VaultName -SecretName "$($PureCloudBlockStoreEndpoint)-$($KeyVault.VaultName)-${data_prefix}password"


    Write-Host "The Pure Cloud Block Store $PureCloudBlockStoreEndpointOrigin is successfully removed."
  }

  function Get-Monitor {
    param (
        [Parameter(Mandatory=$true)]
        [String]$MonitorResourceGroup,
        [Parameter(Mandatory=$true)]
        [ValidateSet("host", "capacity")]
        [String]$MonitorType
      )

    $ResourceGroup = Get-AzResourceGroup -Name $MonitorResourceGroup

    if (-not $ResourceGroup) {
        throw "Resource group $MonitorResourceGroup does not exist"
    }

    if (-not $ResourceGroup.Tags["PureStorage.CBS.AVS"]) {
        throw "Resouce group $MonitorResourceGroup specified does not host Pure Storage CBS AVS monitor"
    }

    Test-MonitorFunctionExistence -ResourceGroupName $MonitorResourceGroup -MonitorType $MonitorType

    # Get global utilization threshold
    if ($MonitorType -eq "capacity") {
        $DefaultUtilizationThreshold = Get-MonitorEnvironmentConfig -ResourceGroupName $MonitorResourceGroup -ConfigName "DEFAULT_UTILIZATION_THRESHOLD"
    }

    if ($MonitorType -eq "host") {
        $DefaultRunCommandTimeoutInMinute = Get-MonitorEnvironmentConfig -ResourceGroupName $MonitorResourceGroup -ConfigName "DEFAULT_RUNCOMMAND_TIMEOUT_IN_MINUTE"
    }

    $KeyVault = Get-AzKeyVault -ResourceGroupName $MonitorResourceGroup -ErrorAction Ignore
    if (-not $KeyVault) {
        throw "Key Vault does not exist in the monitor resource group $MonitorResourceGroup. No valid monitor deployment found. Try to deploy the monitor again"
    }

    # List CBS arras and their corresponding utilization threshold
    $UserPrincipalName = (Get-AzContext).Account.Id
    $KeyVault = Get-AzKeyVault -ResourceGroupName $MonitorResourceGroup
    Set-AzKeyVaultAccessPolicy -VaultName $KeyVault.VaultName  -UserPrincipalName $UserPrincipalName -PermissionsToSecrets set,delete,get,purge,list

    if ($MonitorType -eq "capacity") {
        $SecretSplitter = "-$($KeyVault.VaultName)-capacity-username"
    } elseif ($MonitorType -eq "host"){
        $SecretSplitter = "-$($KeyVault.VaultName)-username"
    }
    $Secrets = Get-AzKeyVaultSecret -VaultName $KeyVault.VaultName | where-object {$_.Name -like "*$($SecretSplitter)"}
    $MonitorArrays = @()
    foreach ($Secret in $Secrets) {
        $ArrayName = ($Secret.name -Split $SecretSplitter)[0]
        if ($MonitorType -eq "capacity") {
            $EncodedThreshold = Get-AzKeyVaultSecret -VaultName $KeyVault.VaultName -Name "$($ArrayName)-$($KeyVault.VaultName)-capacity-threshold"
            if ($EncodedThreshold) {
                $Threshold = [int] (ConvertFrom-SecureString -SecureString $EncodedThreshold.SecretValue -AsPlainText)
            }
            else {
                $Threshold = $null
            }
        }

        # If the string matches the format like "172-168-1-0", the array ip addressed was processed because secret name does not allow "."
        if ($ArrayName -match "^\d+-\d+-\d+-\d+$") {
            $ArrayName = $ArrayName.Replace("-", ".")
        }

        $MonitorArrays += @{ArrayName = $ArrayName; Threshold=$Threshold}
    }

    $MonitorFuncApp = Get-AzFunctionApp -ResourceGroupName $MonitorResourceGroup

    # Vnet name here is constructed as {vNetResouceGUI}-{SubnetName}
    # eg. fece391b-8f4e-4e05-a203-e5961cdd9fd1_subnet-avsfuncappsbqzuuqxofe2q
    $vNetResourceGUID = $MonitorFuncApp.SiteConfig.VnetName.Split("_")[0]
    $MonitorSubnetName = $MonitorFuncApp.SiteConfig.VnetName.Split("_")[1]

    $MonitorVNet = Get-AzVirtualNetwork | Where-Object {$_.ResourceGuid -eq $vNetResourceGUID}
    $MonitorSubnet = Get-AzVirtualNetworkSubnetConfig -Name $MonitorSubnetName -VirtualNetwork $MonitorVNet

    if ($MonitorType -eq "capacity") {
        $result = [PSCustomObject]@{
            DefaultUtilizationThreshold   = $DefaultUtilizationThreshold
            MonitorArrays                 = $MonitorArrays
            MonitorResourceGroupName      = $ResourceGroup.ResourceGroupName
            MonitorRegion                 = $ResourceGroup.location
            MonitorVnetName               = $MonitorVNet.Name
            MonitorVnetResourceGroupName  = $MonitorVNet.ResourceGroupName
            MonitorVnetRegion             = $MonitorVNet.Location
            MonitorVnetProvisioningState  = $MonitorVNet.ProvisioningState
            MonitorSubnetName             = $MonitorSubnet.Name
            MonitorSubnetAddressPrefix    = $MonitorSubnet.AddressPrefix
        }
    } elseif ($MonitorType -eq "host") {
        $result = [PSCustomObject]@{
            MonitorArrays                 = $MonitorArrays
            MonitorResourceGroupName      = $ResourceGroup.ResourceGroupName
            MonitorRegion                 = $ResourceGroup.location
            MonitorVnetName               = $MonitorVNet.Name
            MonitorVnetResourceGroupName  = $MonitorVNet.ResourceGroupName
            MonitorVnetRegion             = $MonitorVNet.Location
            MonitorVnetProvisioningState  = $MonitorVNet.ProvisioningState
            MonitorSubnetName             = $MonitorSubnet.Name
            MonitorSubnetAddressPrefix    = $MonitorSubnet.AddressPrefix
            DefaultRunCommandTimeoutInMinute = $DefaultRunCommandTimeoutInMinute
        }
    }
    
    return $result
  }

  function Get-MonitorEnvironmentConfig {
    [CmdletBinding()]
    Param (
      [Parameter(Mandatory = $true)]
      $ResourceGroupName,
      [Parameter(Mandatory = $true)]
      [ValidateSet("DEFAULT_UTILIZATION_THRESHOLD", "DEFAULT_RUNCOMMAND_TIMEOUT_IN_MINUTE")]
      $ConfigName
    )
  
    $AzFunctionApp = Get-AzFunctionApp -ResourceGroupName $ResourceGroupName
    if (-not $AzFunctionApp) {
      throw "Azure function does not exist in the resource group $ResourceGroupName"
    }
    $AppSettings = Get-AzFunctionAppSetting -ResourceGroupName $ResourceGroupName -Name $AzFunctionApp.Name

    $ConfigValue = if ($ConfigName -eq "DEFAULT_UTILIZATION_THRESHOLD") {
      $DEFAULT_UTILIZATION_THRESHOLD
    } elseif ($ConfigName -eq "DEFAULT_RUNCOMMAND_TIMEOUT_IN_MINUTE") {
      $DEFAULT_RUNCOMMAND_TIMEOUT_IN_MINUTE
    }

    if ($AppSettings[$ConfigName]) {
      $ConfigValue = [int]$AppSettings[$ConfigName]
    }
    return $ConfigValue
  }
# SIG # Begin signature block
# MIIugwYJKoZIhvcNAQcCoIIudDCCLnACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB6V/pH/Ims6nFF
# oijU4hXHRdch5O4EhyHoGPfSopVn9qCCE2gwggVyMIIDWqADAgECAhB2U/6sdUZI
# k/Xl10pIOk74MA0GCSqGSIb3DQEBDAUAMFMxCzAJBgNVBAYTAkJFMRkwFwYDVQQK
# ExBHbG9iYWxTaWduIG52LXNhMSkwJwYDVQQDEyBHbG9iYWxTaWduIENvZGUgU2ln
# bmluZyBSb290IFI0NTAeFw0yMDAzMTgwMDAwMDBaFw00NTAzMTgwMDAwMDBaMFMx
# CzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMSkwJwYDVQQD
# EyBHbG9iYWxTaWduIENvZGUgU2lnbmluZyBSb290IFI0NTCCAiIwDQYJKoZIhvcN
# AQEBBQADggIPADCCAgoCggIBALYtxTDdeuirkD0DcrA6S5kWYbLl/6VnHTcc5X7s
# k4OqhPWjQ5uYRYq4Y1ddmwCIBCXp+GiSS4LYS8lKA/Oof2qPimEnvaFE0P31PyLC
# o0+RjbMFsiiCkV37WYgFC5cGwpj4LKczJO5QOkHM8KCwex1N0qhYOJbp3/kbkbuL
# ECzSx0Mdogl0oYCve+YzCgxZa4689Ktal3t/rlX7hPCA/oRM1+K6vcR1oW+9YRB0
# RLKYB+J0q/9o3GwmPukf5eAEh60w0wyNA3xVuBZwXCR4ICXrZ2eIq7pONJhrcBHe
# OMrUvqHAnOHfHgIB2DvhZ0OEts/8dLcvhKO/ugk3PWdssUVcGWGrQYP1rB3rdw1G
# R3POv72Vle2dK4gQ/vpY6KdX4bPPqFrpByWbEsSegHI9k9yMlN87ROYmgPzSwwPw
# jAzSRdYu54+YnuYE7kJuZ35CFnFi5wT5YMZkobacgSFOK8ZtaJSGxpl0c2cxepHy
# 1Ix5bnymu35Gb03FhRIrz5oiRAiohTfOB2FXBhcSJMDEMXOhmDVXR34QOkXZLaRR
# kJipoAc3xGUaqhxrFnf3p5fsPxkwmW8x++pAsufSxPrJ0PBQdnRZ+o1tFzK++Ol+
# A/Tnh3Wa1EqRLIUDEwIrQoDyiWo2z8hMoM6e+MuNrRan097VmxinxpI68YJj8S4O
# JGTfAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0G
# A1UdDgQWBBQfAL9GgAr8eDm3pbRD2VZQu86WOzANBgkqhkiG9w0BAQwFAAOCAgEA
# Xiu6dJc0RF92SChAhJPuAW7pobPWgCXme+S8CZE9D/x2rdfUMCC7j2DQkdYc8pzv
# eBorlDICwSSWUlIC0PPR/PKbOW6Z4R+OQ0F9mh5byV2ahPwm5ofzdHImraQb2T07
# alKgPAkeLx57szO0Rcf3rLGvk2Ctdq64shV464Nq6//bRqsk5e4C+pAfWcAvXda3
# XaRcELdyU/hBTsz6eBolSsr+hWJDYcO0N6qB0vTWOg+9jVl+MEfeK2vnIVAzX9Rn
# m9S4Z588J5kD/4VDjnMSyiDN6GHVsWbcF9Y5bQ/bzyM3oYKJThxrP9agzaoHnT5C
# JqrXDO76R78aUn7RdYHTyYpiF21PiKAhoCY+r23ZYjAf6Zgorm6N1Y5McmaTgI0q
# 41XHYGeQQlZcIlEPs9xOOe5N3dkdeBBUO27Ql28DtR6yI3PGErKaZND8lYUkqP/f
# obDckUCu3wkzq7ndkrfxzJF0O2nrZ5cbkL/nx6BvcbtXv7ePWu16QGoWzYCELS/h
# AtQklEOzFfwMKxv9cW/8y7x1Fzpeg9LJsy8b1ZyNf1T+fn7kVqOHp53hWVKUQY9t
# W76GlZr/GnbdQNJRSnC0HzNjI3c/7CceWeQIh+00gkoPP/6gHcH1Z3NFhnj0qinp
# J4fGGdvGExTDOUmHTaCX4GUT9Z13Vunas1jHOvLAzYIwggbmMIIEzqADAgECAhB3
# vQ4DobcI+FSrBnIQ2QRHMA0GCSqGSIb3DQEBCwUAMFMxCzAJBgNVBAYTAkJFMRkw
# FwYDVQQKExBHbG9iYWxTaWduIG52LXNhMSkwJwYDVQQDEyBHbG9iYWxTaWduIENv
# ZGUgU2lnbmluZyBSb290IFI0NTAeFw0yMDA3MjgwMDAwMDBaFw0zMDA3MjgwMDAw
# MDBaMFkxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMS8w
# LQYDVQQDEyZHbG9iYWxTaWduIEdDQyBSNDUgQ29kZVNpZ25pbmcgQ0EgMjAyMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANZCTfnjT8Yj9GwdgaYw90g9
# z9DljeUgIpYHRDVdBs8PHXBg5iZU+lMjYAKoXwIC947Jbj2peAW9jvVPGSSZfM8R
# Fpsfe2vSo3toZXer2LEsP9NyBjJcW6xQZywlTVYGNvzBYkx9fYYWlZpdVLpQ0LB/
# okQZ6dZubD4Twp8R1F80W1FoMWMK+FvQ3rpZXzGviWg4QD4I6FNnTmO2IY7v3Y2F
# QVWeHLw33JWgxHGnHxulSW4KIFl+iaNYFZcAJWnf3sJqUGVOU/troZ8YHooOX1Re
# veBbz/IMBNLeCKEQJvey83ouwo6WwT/Opdr0WSiMN2WhMZYLjqR2dxVJhGaCJedD
# CndSsZlRQv+hst2c0twY2cGGqUAdQZdihryo/6LHYxcG/WZ6NpQBIIl4H5D0e6lS
# TmpPVAYqgK+ex1BC+mUK4wH0sW6sDqjjgRmoOMieAyiGpHSnR5V+cloqexVqHMRp
# 5rC+QBmZy9J9VU4inBDgoVvDsy56i8Te8UsfjCh5MEV/bBO2PSz/LUqKKuwoDy3K
# 1JyYikptWjYsL9+6y+JBSgh3GIitNWGUEvOkcuvuNp6nUSeRPPeiGsz8h+WX4VGH
# aekizIPAtw9FbAfhQ0/UjErOz2OxtaQQevkNDCiwazT+IWgnb+z4+iaEW3VCzYkm
# eVmda6tjcWKQJQ0IIPH/AgMBAAGjggGuMIIBqjAOBgNVHQ8BAf8EBAMCAYYwEwYD
# VR0lBAwwCgYIKwYBBQUHAwMwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU
# 2rONwCSQo2t30wygWd0hZ2R2C3gwHwYDVR0jBBgwFoAUHwC/RoAK/Hg5t6W0Q9lW
# ULvOljswgZMGCCsGAQUFBwEBBIGGMIGDMDkGCCsGAQUFBzABhi1odHRwOi8vb2Nz
# cC5nbG9iYWxzaWduLmNvbS9jb2Rlc2lnbmluZ3Jvb3RyNDUwRgYIKwYBBQUHMAKG
# Omh0dHA6Ly9zZWN1cmUuZ2xvYmFsc2lnbi5jb20vY2FjZXJ0L2NvZGVzaWduaW5n
# cm9vdHI0NS5jcnQwQQYDVR0fBDowODA2oDSgMoYwaHR0cDovL2NybC5nbG9iYWxz
# aWduLmNvbS9jb2Rlc2lnbmluZ3Jvb3RyNDUuY3JsMFYGA1UdIARPME0wQQYJKwYB
# BAGgMgEyMDQwMgYIKwYBBQUHAgEWJmh0dHBzOi8vd3d3Lmdsb2JhbHNpZ24uY29t
# L3JlcG9zaXRvcnkvMAgGBmeBDAEEATANBgkqhkiG9w0BAQsFAAOCAgEACIhyJsav
# +qxfBsCqjJDa0LLAopf/bhMyFlT9PvQwEZ+PmPmbUt3yohbu2XiVppp8YbgEtfjr
# y/RhETP2ZSW3EUKL2Glux/+VtIFDqX6uv4LWTcwRo4NxahBeGQWn52x/VvSoXMNO
# Ca1Za7j5fqUuuPzeDsKg+7AE1BMbxyepuaotMTvPRkyd60zsvC6c8YejfzhpX0FA
# Z/ZTfepB7449+6nUEThG3zzr9s0ivRPN8OHm5TOgvjzkeNUbzCDyMHOwIhz2hNab
# XAAC4ShSS/8SS0Dq7rAaBgaehObn8NuERvtz2StCtslXNMcWwKbrIbmqDvf+28rr
# vBfLuGfr4z5P26mUhmRVyQkKwNkEcUoRS1pkw7x4eK1MRyZlB5nVzTZgoTNTs/Z7
# KtWJQDxxpav4mVn945uSS90FvQsMeAYrz1PYvRKaWyeGhT+RvuB4gHNU36cdZytq
# tq5NiYAkCFJwUPMB/0SuL5rg4UkI4eFb1zjRngqKnZQnm8qjudviNmrjb7lYYuA2
# eDYB+sGniXomU6Ncu9Ky64rLYwgv/h7zViniNZvY/+mlvW1LWSyJLC9Su7UpkNpD
# R7xy3bzZv4DB3LCrtEsdWDY3ZOub4YUXmimi/eYI0pL/oPh84emn0TCOXyZQK8ei
# 4pd3iu/YTT4m65lAYPM8Zwy2CHIpNVOBNNwwggcEMIIE7KADAgECAgxcuW61kTkv
# +4t8zgQwDQYJKoZIhvcNAQELBQAwWTELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEds
# b2JhbFNpZ24gbnYtc2ExLzAtBgNVBAMTJkdsb2JhbFNpZ24gR0NDIFI0NSBDb2Rl
# U2lnbmluZyBDQSAyMDIwMB4XDTI0MDMxMTE0MDQxMloXDTI3MDMxMjE0MDQxMlow
# cjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFDASBgNVBAcTC1Nh
# bnRhIENsYXJhMRswGQYDVQQKExJQdXJlIFN0b3JhZ2UsIEluYy4xGzAZBgNVBAMT
# ElB1cmUgU3RvcmFnZSwgSW5jLjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAMCQrioSn48IvHpTg5dofsUYj/pNTDidwjYUrcxVu78NoyhSweG8FhcxDi/S
# I40+8Fccl3D5ZoqpjkFnGhzSwmpxU3J4AP7+fdTZht9eWD1I5qKY07esYwdPDV4y
# g+csPfdGPqI2XjRfT5UC3YkXQeUrX8KQZldD4KqvgxzpYcuBwsgHbTb/eArpi68Y
# gFR2jgZGyZigfy8RuJMrL1thcBOe/VWjUyK21wVT8cuunBYFaStLHhsRBRMDcZBD
# uTSGC4evE6oaCqlQbdMl9YFJ64mDQsKlCxrr7rmLVtcVzKGwmjp4b2xRwE+RmTh6
# JtrUL9Wx/3a3UzgAnDNimfwp85zoL48kyLtHqQ3FI8tVKGm+aBOgBZfmURoy7fbp
# 4zKhGgqFbpOmILO16i4f999YsEEJQgIF3CtyH1R60/ZZWlDmoeeEgjAGrnd14muU
# 5Hk3Cksr43uPUAg+fV78Y0fDV85ibm42ZwwPuz6MI4HhYNUlGzRwIQ31vjaGuAMW
# HNqFKkcO0JuIeHQ/gFKPnYIxnGC9H9R4Kw/uMezqtnYJwGU2epB/ABl/w7U4NgU2
# ZOxWB5BFy4frZ3f+hNgbjFUjMaXnVFotOJxXntzjdSl4znw8DaKiC5ooChteZMIT
# G9p078p/TUsOJQbUtFADSY1hsfCfB7t+gJSNt5peS9GOZIMVAgMBAAGjggGxMIIB
# rTAOBgNVHQ8BAf8EBAMCB4AwgZsGCCsGAQUFBwEBBIGOMIGLMEoGCCsGAQUFBzAC
# hj5odHRwOi8vc2VjdXJlLmdsb2JhbHNpZ24uY29tL2NhY2VydC9nc2djY3I0NWNv
# ZGVzaWduY2EyMDIwLmNydDA9BggrBgEFBQcwAYYxaHR0cDovL29jc3AuZ2xvYmFs
# c2lnbi5jb20vZ3NnY2NyNDVjb2Rlc2lnbmNhMjAyMDBWBgNVHSAETzBNMEEGCSsG
# AQQBoDIBMjA0MDIGCCsGAQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNv
# bS9yZXBvc2l0b3J5LzAIBgZngQwBBAEwCQYDVR0TBAIwADBFBgNVHR8EPjA8MDqg
# OKA2hjRodHRwOi8vY3JsLmdsb2JhbHNpZ24uY29tL2dzZ2NjcjQ1Y29kZXNpZ25j
# YTIwMjAuY3JsMBMGA1UdJQQMMAoGCCsGAQUFBwMDMB8GA1UdIwQYMBaAFNqzjcAk
# kKNrd9MMoFndIWdkdgt4MB0GA1UdDgQWBBSzJ9KiDCa3UBiAajy+Iioj5kQjzDAN
# BgkqhkiG9w0BAQsFAAOCAgEAHsFQixeQEcoHurq9NWSUt4S39Q+UGP6crmVq3Wwy
# 9g23YbdWg+SgMxoLUqdoDfA4k4B6Dyoo0jEQzn2kxnsnT9lNHKrcZHH88dv0hjfi
# H2qAiQWazPjS3LhK2J6nhpyipJPpyRaSQG4x4aG0NB2D4WUfUz9CGAYsERJGww/w
# kTaaxMipttKDTaI1C49u1igDfRzIO+Q8vuyyBFLiYTno/df97xtjNC+KxxFhDhl/
# 4tawK6kwxaVzCMAfj48I67Wbo4DMH6pM1s19as7c3qp92i3MylGKsB6+u+o7UkbS
# dLNkS4ALI33CJOUc+GoK3Nt5IXXCFJTQFHBXkBdAur3gmlXEm8vlNG/1Sbxr0H7T
# 1e7ABGH/48o/+PeMLuCc72EeK5dJ4cX9NEQ3QnTsZHwGnYzjEOvOvP0s1c7yNsDb
# cUHoIqQvb5xS5aqMU5G+8sdPQ1nwpPf7gGaEEbAVW4w51Pam42qeN9HIPa+ZinXn
# sN02Kk1Qw0QwUqzaQy9W/gIquI0KOjw0LmoW9M/8S0lrjpEq2eEeUw9WQLhhUEIi
# rFxGPtjqiCLiiS9CZ+kf2vWLJKUspkYv+OHT3q805Zg1dJsBFAzEYUFLb1mhmigD
# EO9bsMorjECIL2ijE5zHtbGkalrrsPWu8tiDT/B7P9GSYzKfOOy4PoOIfWSK0Ixl
# S7IxghpxMIIabQIBATBpMFkxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxT
# aWduIG52LXNhMS8wLQYDVQQDEyZHbG9iYWxTaWduIEdDQyBSNDUgQ29kZVNpZ25p
# bmcgQ0EgMjAyMAIMXLlutZE5L/uLfM4EMA0GCWCGSAFlAwQCAQUAoIGcMBkGCSqG
# SIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3
# AgEVMC8GCSqGSIb3DQEJBDEiBCAM6Qnd647bFRcV8pzFLxSDMoNi1ixc+cJxuPAj
# pc01nzAwBgorBgEEAYI3AgEMMSIwIKACgAChGoAYaHR0cHM6Ly9wdXJlc3RvcmFn
# ZS5jb20gMA0GCSqGSIb3DQEBAQUABIICAEEmNsNlDJ44lJX01rxKOM8PvyN0NPuF
# rjCjsO6V+fPEFZGsSj4XC6Ql+awSSt9r9eBZEfA60ujMlRz3sufrVOAvFOdNLgj+
# wnlqvgci4WJ2JxD87JGw2ZlKrmi5v+bj2IatQuqbFzsUZQsq5/68SyZEscpvZzpN
# mteYSDERi1XnAh9MEPE/ZvBVN8j6O/iAGIVKF7lIkcOPyKb6UZzKfbK1SuH+PX49
# ws6E/4j1oA3jjRpmEVX+uvdFiK1Ag3sMsJP7Akb5aZXqUvKsKeOq59KSDFO36FlK
# ssbxHxbDn6loWcZVXq3z/jDd6UK1oXGylRk21dnaF4n5jgGaDs0BRGtc0wqlaLe0
# uETxu3QhM9SamXq7+ZW+DvjDjyvO0UhPXVaQqEAafM/8+7Jrrhjp6vP9mNBiXQ6t
# 7Br/LF0I1gPYkzJb0ieid+/8bDp7f3q6rmxmlrE9P0/tcPZTV4+D2vy1wx1O7PwN
# ey7VIbQMiR+csgCT9sMCasf3tmlB5fZ3dsJ9mM7hbn/2p4qbgD+afpR68Q6aHuBF
# qr2BMC/T1LRVqqiVDew8eriZGQ7GmrmZRvg00GgStZ0N0+mScVyeR7kbiBO/cM5f
# gpsB7twfYzdsdKsI+WAX/quaTeJ8KKdL15ZAUYAZ8V9UT4IHulfzx96Z6gFvmoR+
# MBjGHTJn+Us2oYIXOjCCFzYGCisGAQQBgjcDAwExghcmMIIXIgYJKoZIhvcNAQcC
# oIIXEzCCFw8CAQMxDzANBglghkgBZQMEAgEFADB4BgsqhkiG9w0BCRABBKBpBGcw
# ZQIBAQYJYIZIAYb9bAcBMDEwDQYJYIZIAWUDBAIBBQAEIGIJ1ifC3Q42sYN+XyGp
# TDypSljqcTyEnPV+kxveYFkdAhEA8GE+KTwwKfRqxZoxa2xwNxgPMjAyNDEyMTIy
# MTE5NTdaoIITAzCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZI
# hvcNAQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMu
# MTswOQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRp
# bWVTdGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIx
# CzAJBgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNl
# cnQgVGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQC+anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+ut
# MeV5bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa
# /UKvNminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z
# 6VFZj75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6
# +NfQrxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYp
# AztJpVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6
# viEk3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9d
# I8ZhqcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoG
# JXaeBQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRF
# wLtsVAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2P
# zP0nVepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcw
# DgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYB
# BQUHAwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQY
# MBaAFLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe
# 7k+SH3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3JsMIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3Au
# ZGlnaWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2Vy
# dC5jb20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5n
# Q0EuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd
# 0ShPz9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4Jl
# KwyjUkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yF
# q6laICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlH
# lFFv/M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM
# 6nyw23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8Z
# Zfx4zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+Lm
# mRTkTXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOF
# kM2LlTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nM
# pFu3mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/
# l4Gxftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhV
# Aku7aRZOwqw6pDCCBq4wggSWoAMCAQICEAc2N7ckVHzYR6z9KGYqXlswDQYJKoZI
# hvcNAQELBQAwYjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZ
# MBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1
# c3RlZCBSb290IEc0MB4XDTIyMDMyMzAwMDAwMFoXDTM3MDMyMjIzNTk1OVowYzEL
# MAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTswOQYDVQQDEzJE
# aWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVTdGFtcGluZyBD
# QTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMaGNQZJs8E9cklRVccl
# A8TykTepl1Gh1tKD0Z5Mom2gsMyD+Vr2EaFEFUJfpIjzaPp985yJC3+dH54PMx9Q
# Ewsmc5Zt+FeoAn39Q7SE2hHxc7Gz7iuAhIoiGN/r2j3EF3+rGSs+QtxnjupRPfDW
# VtTnKC3r07G1decfBmWNlCnT2exp39mQh0YAe9tEQYncfGpXevA3eZ9drMvohGS0
# UvJ2R/dhgxndX7RUCyFobjchu0CsX7LeSn3O9TkSZ+8OpWNs5KbFHc02DVzV5huo
# wWR0QKfAcsW6Th+xtVhNef7Xj3OTrCw54qVI1vCwMROpVymWJy71h6aPTnYVVSZw
# mCZ/oBpHIEPjQ2OAe3VuJyWQmDo4EbP29p7mO1vsgd4iFNmCKseSv6De4z6ic/rn
# H1pslPJSlRErWHRAKKtzQ87fSqEcazjFKfPKqpZzQmiftkaznTqj1QPgv/CiPMpC
# 3BhIfxQ0z9JMq++bPf4OuGQq+nUoJEHtQr8FnGZJUlD0UfM2SU2LINIsVzV5K6jz
# RWC8I41Y99xh3pP+OcD5sjClTNfpmEpYPtMDiP6zj9NeS3YSUZPJjAw7W4oiqMEm
# CPkUEBIDfV8ju2TjY+Cm4T72wnSyPx4JduyrXUZ14mCjWAkBKAAOhFTuzuldyF4w
# Er1GnrXTdrnSDmuZDNIztM2xAgMBAAGjggFdMIIBWTASBgNVHRMBAf8ECDAGAQH/
# AgEAMB0GA1UdDgQWBBS6FtltTYUvcyl2mi91jGogj57IbzAfBgNVHSMEGDAWgBTs
# 1+OC0nFdZEzfLmc/57qYrhwPTzAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYI
# KwYBBQUHAwgwdwYIKwYBBQUHAQEEazBpMCQGCCsGAQUFBzABhhhodHRwOi8vb2Nz
# cC5kaWdpY2VydC5jb20wQQYIKwYBBQUHMAKGNWh0dHA6Ly9jYWNlcnRzLmRpZ2lj
# ZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRSb290RzQuY3J0MEMGA1UdHwQ8MDowOKA2
# oDSGMmh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRSb290
# RzQuY3JsMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwHATANBgkqhkiG
# 9w0BAQsFAAOCAgEAfVmOwJO2b5ipRCIBfmbW2CFC4bAYLhBNE88wU86/GPvHUF3i
# Syn7cIoNqilp/GnBzx0H6T5gyNgL5Vxb122H+oQgJTQxZ822EpZvxFBMYh0MCIKo
# Fr2pVs8Vc40BIiXOlWk/R3f7cnQU1/+rT4osequFzUNf7WC2qk+RZp4snuCKrOX9
# jLxkJodskr2dfNBwCnzvqLx1T7pa96kQsl3p/yhUifDVinF2ZdrM8HKjI/rAJ4JE
# rpknG6skHibBt94q6/aesXmZgaNWhqsKRcnfxI2g55j7+6adcq/Ex8HBanHZxhOA
# CcS2n82HhyS7T6NJuXdmkfFynOlLAlKnN36TU6w7HQhJD5TNOXrd/yVjmScsPT9r
# p/Fmw0HNT7ZAmyEhQNC3EyTN3B14OuSereU0cZLXJmvkOHOrpgFPvT87eK1MrfvE
# lXvtCl8zOYdBeHo46Zzh3SP9HSjTx/no8Zhf+yvYfvJGnXUsHicsJttvFXseGYs2
# uJPU5vIXmVnKcPA3v5gA3yAWTyf7YGcWoWa63VXAOimGsJigK+2VQbc61RWYMbRi
# CQ8KvYHZE/6/pNHzV9m8BPqC3jLfBInwAM1dwvnQI38AC+R2AibZ8GV2QqYphwlH
# K+Z/GqSFD/yYlvZVVCsfgPrA8g4r5db7qS9EFUrnEw4d2zc4GqEr9u3WfPwwggWN
# MIIEdaADAgECAhAOmxiO+dAt5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJ
# BgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5k
# aWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBD
# QTAeFw0yMjA4MDEwMDAwMDBaFw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVT
# MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j
# b20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZI
# hvcNAQEBBQADggIPADCCAgoCggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK
# 2FnC4SmnPVirdprNrnsbhA3EMB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/G
# nhWlfr6fqVcWWVVyr2iTcMKyunWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJ
# IB1jKS3O7F5OyJP4IWGbNOsFxl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4M
# K7dPpzDZVu7Ke13jrclPXuU15zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN
# 2NQ3pC4FfYj1gj4QkXCrVYJBMtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I
# 11pJpMLmqaBn3aQnvKFPObURWBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KIS
# G2aadMreSx7nDmOu5tTvkpI6nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9
# HJXDj/chsrIRt7t/8tWMcCxBYKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4
# pncB4Q+UDCEdslQpJYls5Q5SUUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpy
# FiIJ33xMdT9j7CFfxCBRa2+xq4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS31
# 2amyHeUbAgMBAAGjggE6MIIBNjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs
# 1+OC0nFdZEzfLmc/57qYrhwPTzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd
# 823IDzAOBgNVHQ8BAf8EBAMCAYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzAB
# hhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9j
# YWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQw
# RQYDVR0fBD4wPDA6oDigNoY0aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lD
# ZXJ0QXNzdXJlZElEUm9vdENBLmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZI
# hvcNAQEMBQADggEBAHCgv0NcVec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4
# hxppVCLtpIh3bb0aFPQTSnovLbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3
# rDB6mouyXtTP0UNEm0Mh65ZyoUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs
# 9wPHh6jSTEAZNUZqaVSwuKFWjuyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K
# 2yCNNWAcAgPLILCsWKAOQGPFmCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0n
# ftg62fC2h5b9W9FcrBjDTZ9ztwGpn1eqXijiuZQxggN2MIIDcgIBATB3MGMxCzAJ
# BgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGln
# aUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0EC
# EAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCggdEwGgYJKoZIhvcNAQkD
# MQ0GCyqGSIb3DQEJEAEEMBwGCSqGSIb3DQEJBTEPFw0yNDEyMTIyMTE5NTdaMCsG
# CyqGSIb3DQEJEAIMMRwwGjAYMBYEFNvThe5i29I+e+T2cUhQhyTVhltFMC8GCSqG
# SIb3DQEJBDEiBCCDwiVrDA3+NjuPUKpSzGc9eUqd5Nh8/k+SA01ZqbeCRjA3Bgsq
# hkiG9w0BCRACLzEoMCYwJDAiBCB2dp+o8mMvH0MLOiMwrtZWdf7Xc9sF1mW5BZOY
# Q4+a2zANBgkqhkiG9w0BAQEFAASCAgBTETVuBYUzyQS/iLiuwCtJ/OaRGnt1gTIQ
# 4DmW0NvzlZpOyoqil5Sp97xgC+pkdIxqwbLL+UBnP3zpjedeh/ZPzVQwL6/xhNBb
# O5hLGUtrevnrxTWlaOfmBhreFzZR4SIWl99NWrTQeuUwlFuktpru391WodFmp/pv
# nuUcuS+k+v0wo8BsMmQXYWsYS2ExyGufLpkJjkC/vXiyudckFr06aYrLoWF8+7Bk
# BaywF6ibBkwOHiBtycoUy1E2eRjDQXHZrcgVEqbbzyLlAz78mw52yZFHEcEMaWZZ
# 0K3edgCuhiiLc9XdXaUOgoWuPcEG7fo3gaOm2D5Bbc4Vw5amZilK6yHfB+bS+I2t
# uMRiTdATsQ5D/XR2fctLUSFZzBTpTNwnb2icp1I9nUmnxQznVUmfLViU64uuT+FW
# vCYr6jrdP8TZTS0gQ3DVUmiL407Yj9jyZdcRY2RNoJLEmi3bJxrimwNmwWTmPVmk
# +R8az601GP1ytqtyKZndK+TaS0Msk3fHzzNmC6AUgH6bwjKNYpySIYDpStcS/R8d
# gIyWCrrxQQFuXvCRVWpATV4utdmlB2PfAgcaLgK1ed4guftCSar7GdAjuN9UWaKW
# 97h9F0a7G2iSOYbSnPhD6G1u8h6owDtPItGvudmHZdTqfEOLh6QpucBSRqxC7zM+
# d08VYtQAoA==
# SIG # End signature block