AzStackHciHardware/AzStackHci.Hardware.Helpers.psm1
class HealthModel { # Attributes for Azure Monitor schema [string]$Name #Name of the individual test/rule/alert that was executed. Unique, not exposed to the customer. [string]$Title #User-facing name; one or more sentences indicating the direct issue. [string]$Severity #Severity of the result (Critical, Warning, Informational, Hidden) – this answers how important the result is. Critical is the only update-blocking severity. [string]$Description #Detailed overview of the issue and what impact the issue has on the stamp. [psobject]$Tags #Key-value pairs that allow grouping/filtering individual tests. For example, "Group": "ReadinessChecks", "UpdateType": "ClusterAware" [string]$Status #The status of the check running (i.e. Failed, Succeeded, In Progress) – this answers whether the check ran, and passed or failed. [string]$Remediation #Set of steps that can be taken to resolve the issue found. [string]$TargetResourceID #The unique identifier for the affected resource (such as a node or drive). [string]$TargetResourceName #The name of the affected resource. [string]$TargetResourceType #The type of resource being referred to (well-known set of nouns in infrastructure, aligning with Monitoring). [datetime]$Timestamp #The Time in which the HealthCheck was called. [psobject[]]$AdditionalData #Property bag of key value pairs for additional information. [string]$HealthCheckSource #The name of the services called for the HealthCheck (I.E. Test-AzureStack, Test-Cluster). } class AzStackHciHardwareTarget : HealthModel {} Import-LocalizedData -BindingVariable lhwTxt -FileName AzStackHci.Hardware.Strings.psd1 function Test-Processor { <# .SYNOPSIS Test CPU .DESCRIPTION Test CPU #> [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $sb = { $cimParams = @{ ClassName = 'Win32_Processor' Property = '*' } $cimData = @(Get-CimInstance @cimParams) return (New-Object PsObject -Property @{ ComputerName = $ENV:ComputerName cimData = $cimData }) } $remoteOutput = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sb } else { Invoke-Command -ScriptBlock $sb } $cimTest = Test-CimData -Data $remoteOutput -ClassName Processor $cimData = $remoteOutput.cimData $PropertyResult = @() $PropertySyncResult = @() $matchProperty = @( 'Caption' 'Family' 'Manufacturer' 'MaxClockSpeed' 'NumberOfCores' 'NumberOfEnabledCore' 'NumberOfLogicalProcessors' 'ThreadCount' ) $desiredPropertyValue = @{ AddressWidth = @{ value = 64; hint = '64-bit' } Architecture = @{ value = 9; hint = '64-bit' } # x64 Availability = @{ value = 3; hint = 'Running/Full Power' } # Running/Full Power CpuStatus = @{ value = 1; hint = 'CPU Enabled' } # CPU Enabled DataWidth = @{ value = 64; hint = '64-bit' } # x64 ProcessorType = @{ value = 3; hint = 'Central Processor' } # Central Processor Status = @{ value = 'OK'; hint = 'OK' } SecondLevelAddressTranslationExtensions = @{ value = $true; hint = 'Virtualization Support' } VirtualizationFirmwareEnabled = @{ value = $true; hint = 'Virtualization Support' } VMMonitorModeExtensions = @{ value = $true; hint = 'Virtualization Support' } } Log-CimData -cimData $cimData -Properties $matchProperty,$desiredPropertyValue # if Hypervisorpresent is all true, SecondLevelAddressTranslationExtensions, VirtualizationFirmwareEnabled, VMMonitorModeExtensions should not be tested $CheckHyperVisor = IsHypervisorPresent -PsSession $PsSession if (($CheckHyperVisor | Select-Object -ExpandProperty HypervisorPresent) -notcontains $false) { Log-Info "HypervisorPresent: removing SecondLevelAddressTranslationExtensions, VirtualizationFirmwareEnabled, VMMonitorModeExtensions as properties to test" $desiredPropertyValue.Remove('SecondLevelAddressTranslationExtensions') $desiredPropertyValue.Remove('VirtualizationFirmwareEnabled') $desiredPropertyValue.Remove('VMMonitorModeExtensions') } else { Log-Info ($lhwTxt.HypervisorNotPresent -f (($CheckHyperVisor | ForEach-Object {"{0}:{1}" -f $_.Name, $_.HypervisorPresent }) -join ',')) -Type Warning } $instanceIdStr = 'Write-Output "Machine: $($instance.SystemName), Class: $ClassName, Instance: $($instance.DeviceId)"' # Check property sync for nodes individually $SystemNames = $cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique foreach ($systemName in $SystemNames) { $sData = $CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } Log-Info -Message ($lhwTxt.ProcessorCount -f $systemName, $sData.Count) $PropertyResult += Test-DesiredProperty -CimData $sData -desiredPropertyValue $desiredPropertyValue -InstanceIdStr $InstanceIdStr -ValidatorName Hardware -Severity Warning $PropertySyncResult += Test-PropertySync -CimData $sData -MatchProperty $matchProperty -ValidatorName Hardware -Severity Warning } # Check property sync for all nodes as well $PropertySyncResult += Test-PropertySync -CimData $cimData -MatchProperty $matchProperty -ValidatorName Hardware -Severity Warning return @($PropertyResult + $PropertySyncResult + $cimTest) } catch { throw $_ } } function IsHypervisorPresent { <# .SYNOPSIS Retrieves HypervisorPresent property from Win32_ComputerSystem #> [cmdletbinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $sb = { $cimParams = @{ ClassName = 'Win32_ComputerSystem' Property = 'HypervisorPresent' } $cimData = @(Get-CimInstance @cimParams) return $cimData } $cimData = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sb } else { Invoke-Command -ScriptBlock $sb } Log-CimData -cimData $cimData -Properties HypervisorPresent return $cimData } catch { throw $_ } } function Test-NetAdapter { <# .SYNOPSIS Test Network Adapter .DESCRIPTION Test Network Adapter #> [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $sb = { $cimData = @(Get-NetAdapter -Physical | Where-Object { $_.NdisMedium -eq 0 -and $_.Status -eq 'Up' -and $_.NdisPhysicalMedium -eq 14 -and $_.PnPDeviceID -notlike 'USB\*'}) return (New-Object PsObject -Property @{ ComputerName = $ENV:ComputerName cimData = $cimData }) } $remoteOutput = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sb } else { Invoke-Command -ScriptBlock $sb } $cimTest = Test-CimData -Data $remoteOutput -ClassName NetAdapter $cimData = $remoteOutput.cimData $PropertyResult = @() $PropertySyncResult = @() $GroupResult = @() $CountResult = @() # Blocking properties $criticalMatchProperty = @( 'DriverDate' 'DriverDescription' 'DriverMajorNdisVersion' 'DriverMinorNdisVersion' 'DriverProvider' 'DriverVersionString' 'MajorDriverVersion' 'MinorDriverVersion' ) # non-block warning properties $warningMatchProperty = @( 'ActiveMaximumTransmissionUnit' 'ReceiveLinkSpeed' 'Speed' 'TransmitLinkSpeed' 'VlanID' 'MtuSize' ) $desiredPropertyValue = @{ AdminLocked = $false ConnectorPresent = $true EndpointInterface = $false ErrorDescription = $null FullDuplex = $true HardwareInterface = $true Hidden = $false IMFilter = $false InterfaceAdminStatus = @{ value = 1; hint = 'Up' } # Up InterfaceOperationalStatus = @{ value = 1; hint = 'Up' } # Up iSCSIInterface = $false LastErrorCode = $null MediaConnectState = @{ value = 1; hint = 'Connected' } # Connected MediaDuplexState = 2 NdisMedium = @{ value = 0; hint = '802.3' } # 802.3 NdisPhysicalMedium = @{ value = 14; hint = '802.3' } # 802.3 OperationalStatusDownDefaultPortNotAuthenticated = $false OperationalStatusDownInterfacePaused = $false OperationalStatusDownLowPowerState = $false OperationalStatusDownMediaDisconnected = $false #PromiscuousMode = $false State = @{ value = 2; hint = 'Started' } # 802.3 # Started #Status = 'Up' Virtual = $false } $groupProperty = @( 'DriverDescription' ) Log-CimData -cimData $cimData -Properties $desiredPropertyValue,$warningMatchProperty,$criticalMatchProperty $minimum = 1 $instanceIdStr = 'Write-Output "Machine: $($instance.SystemName), ClassName: $ClassName, Instance: $($instance.Name), Description: $($instance.InterfaceDescription), Address: $($instance.PermanentAddress)"' # Check property sync for nodes individually $SystemNames = $cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique foreach ($systemName in $SystemNames) { $sData = $CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } Log-Info -Message ($lhwTxt.NicCount -f $systemName, $sData.Count) # Make sure each system has the requisite number of Network Adapters $PropertyResult += Test-DesiredProperty -CimData $sData -desiredPropertyValue $desiredPropertyValue -InstanceIdStr $InstanceIdStr -ValidatorName Hardware -Severity Critical $CountResult += Test-Count -CimData $sData -minimum $minimum -ValidatorName 'Hardware' -Severity Critical } # Check property sync for all nodes as well $GroupResult += Test-GroupProperty -CimData $cimData -GroupProperty $groupProperty -MatchProperty $warningMatchProperty -ValidatorName Hardware -Severity Warning $GroupResult += Test-GroupProperty -CimData $cimData -GroupProperty $groupProperty -MatchProperty $criticalMatchProperty -ValidatorName Hardware -Severity Critical $InstanceCount += Test-InstanceCount -CimData $cimData -Severity Critical -ValidatorName 'Hardware' $InstanceCountByGroup += Test-InstanceCountByGroup -CimData $cimData -ValidatorName 'Hardware' -GroupProperty $groupProperty -Severity Critical # Finally, the all properties from the $matchProperty array have to be compared for all instances across all nodes. return @($PropertyResult + $GroupResult + $CountResult + $InstanceCountByGroup + $InstanceCount + $cimTest) } catch { throw $_ } } function Test-MemoryCapacity { <# .SYNOPSIS Test Memory .DESCRIPTION Test Memory #> [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $minimumMemory = 32GB $instanceResults = @() $AdditionalData = @() $sb = { $cimParams = @{ ClassName = 'Win32_PhysicalMemory' Property = '*' } $cimData = @(Get-CimInstance @cimParams) return (New-Object PsObject -Property @{ ComputerName = $ENV:ComputerName cimData = $cimData }) } $remoteOutput = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sb } else { Invoke-Command -ScriptBlock $sb } $cimTest = Test-CimData -Data $remoteOutput -ClassName PhysicalMemory $cimData = $remoteOutput.cimData Log-CimData -cimData $cimData -Properties Capacity # Check property sync for nodes individually $SystemNames = $cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique $totalMemoryLocalNode = $cimData | Where-Object { $_.CimSystemProperties.ServerName -like "$($ENV:COMPUTERNAME)*"} | Measure-Object -Property Capacity -Sum | Select-Object -ExpandProperty Sum $instanceResults += foreach ($systemName in $SystemNames) { $sData = $CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } $instanceId = "Machine: $($Instance.CimSystemProperties.ServerName), Class: $ClassName, Instance: All" $totalMemory = $sData | Measure-Object -Property Capacity -Sum $dtl = $lhwTxt.MemoryCapacity -f $systemName, $totalMemory.Sum, $minimumMemory, $totalMemoryLocalNode if ($totalMemory.Sum -lt $minimumMemory -or $totalMemory.Sum -lt $totalMemoryLocalNode) { $Status = 'Failed' Log-Info $dtl -Type Warning } else { $Status = 'Succeeded' Log-Info $dtl } $instanceResult = New-Object AzStackHciHardwareTarget $instanceResult.Name = 'AzStackHci_Hardware_Test_MemoryCapacity' $instanceResult.Title = 'Test Memory Capacity' $instanceResult.Severity = 'Warning' $instanceResult.Description = 'Checking Memory Capacity' $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' $instanceResult.TargetResourceID = $instanceId $instanceResult.TargetResourceName = $instanceId $instanceResult.TargetResourceType = 'Memory' $instanceResult.Timestamp = [datetime]::UtcNow $instanceResult.HealthCheckSource = $ENV:EnvChkrId $instanceResult.Status = $status $instanceResult.AdditionalData += New-Object -TypeName PSObject -Property @{ Source = 'Memory Capacity' Resource = $totalMemory.Sum Detail = $dtl Status = $status TimeStamp = [datetime]::UtcNow } $instanceResult } return ($instanceResults + $cimTest) } catch { throw $_ } } function Test-MemoryProperties { <# .SYNOPSIS Test Memory .DESCRIPTION Test Memory #> [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $sb = { $cimParams = @{ ClassName = 'Win32_PhysicalMemory' Property = '*' } $cimData = @(Get-CimInstance @cimParams) return (New-Object PsObject -Property @{ ComputerName = $ENV:ComputerName cimData = $cimData }) } $remoteOutput = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sb } else { Invoke-Command -ScriptBlock $sb } $cimTest = Test-CimData -Data $remoteOutput -ClassName PhysicalMemory $cimData = $remoteOutput.cimData $PropertyResult = @() $PropertySyncResult = @() $matchProperty = @( 'ConfiguredClockSpeed' 'ConfiguredVoltage' 'MaxVoltage' 'MemoryType' 'SMBIOSMemoryType' 'Speed' 'TotalWidth' 'TypeDetail' ) $desiredPropertyValue = @{ DataWidth = @{ value = 64; hint = '64-bit' } # x64 FormFactor = @{ value = 8; hint = 'DIMM' } # DIMM } Log-CimData -cimData $cimData -Properties $desiredPropertyValue,$matchProperty # Check property sync for nodes individually $SystemNames = $cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique foreach ($systemName in $SystemNames) { $sData = $CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } $instanceIdStr = 'Write-Output "Machine: $($Instance.CimSystemProperties.ServerName), Class: $ClassName, Instance: $($instance.DeviceLocator), Tag: $($instance.Tag)"' $PropertyResult += Test-DesiredProperty -CimData $sData -desiredPropertyValue $desiredPropertyValue -InstanceIdStr $InstanceIdStr -ValidatorName Hardware -Severity Warning $PropertySyncResult += Test-PropertySync -CimData $sData -MatchProperty $matchProperty -ValidatorName Hardware -Severity Warning } # Check property sync for all nodes as well $PropertySyncResult += Test-PropertySync -CimData $cimData -MatchProperty $matchProperty -ValidatorName Hardware -Severity Warning return @($PropertyResult + $PropertySyncResult + $cimTest) } catch { throw $_ } } function Test-Gpu { <# .SYNOPSIS Test Gpu .DESCRIPTION Test Gpu #> [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $sb = { $cimParams = @{ ClassName = 'Win32_VideoController' Property = '*' } $cimData = @(Get-CimInstance @cimParams) return (New-Object PsObject -Property @{ ComputerName = $ENV:ComputerName cimData = $cimData }) } $remoteOutput = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sb } else { Invoke-Command -ScriptBlock $sb } $cimTest = Test-CimData -Data $remoteOutput -ClassName VideoController $cimData = $remoteOutput.cimData $PropertyResult = @() $PropertySyncResult = @() $matchProperty = @( 'AdapterRam' 'Name' 'DriverDate' 'DriverVersion' 'VideoMemoryType' 'VideoProcessor' ) $desiredPropertyValue = @{ ConfigManagerErrorCode = @{ value = 0; hint = 'The device is working properly' } # The device is working properly Status = 'OK' } Log-CimData -cimData $cimData -Properties $desiredPropertyValue,$matchProperty # Check property sync for nodes individually $SystemNames = $cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique foreach ($systemName in $SystemNames) { $sData = $CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } $totalGpuRam = $sData | Measure-Object -Property AdapterRam -Sum Log-Info -Message ($lhwTxt.TotalGPUMem -f $systemName, $sData.Count, ($totalGpuRam.Sum / 1GB)) $instanceIdStr = 'Write-Output "Machine: $($instance.SystemName), Class: $ClassName, Instance: $($instance.DeviceID), Name: $($instance.Name)"' $PropertyResult += Test-DesiredProperty -CimData $sData -desiredPropertyValue $desiredPropertyValue -InstanceIdStr $InstanceIdStr -ValidatorName Hardware -Severity Warning $PropertySyncResult += Test-PropertySync -CimData $sData -MatchProperty $matchProperty -ValidatorName Hardware -Severity Warning } # Check property sync for all nodes as well $PropertySyncResult += Test-PropertySync -CimData $cimData -MatchProperty $matchProperty -ValidatorName Hardware -Severity Warning return @($PropertyResult + $PropertySyncResult + $cimTest) } catch { throw $_ } } function Test-Baseboard { <# .SYNOPSIS Test Baseboard .DESCRIPTION Test Baseboard #> [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $sb = { $cimParams = @{ ClassName = 'Win32_Bios' Property = '*' } $cimData = @(Get-CimInstance @cimParams) return (New-Object PsObject -Property @{ ComputerName = $ENV:ComputerName cimData = $cimData }) } $remoteOutput = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sb } else { Invoke-Command -ScriptBlock $sb } $cimTest = Test-CimData -Data $remoteOutput -ClassName Bios $cimData = $remoteOutput.cimData $PropertyResult = @() $PropertySyncResult = @() $matchProperty = @( #'BiosVersion' # this property is a string array and non-trivial to compare 'Caption' 'Description' 'EmbeddedControllerMajorVersion' 'EmbeddedControllerMinorVersion' 'Manufacturer' 'Name' 'ReleaseDate' 'SMBIOSBIOSVersion' 'SMBIOSMajorVersion' 'SMBIOSMinorVersion' 'SoftwareElementId' 'SystemBiosMajorVersion' 'SystemBiosMinorVersion' 'Version' ) $desiredPropertyValue = @{ SMBIOSPresent = $true SoftwareElementState = @{ value = 3; hint = 'Running' } # Running Status = 'OK' } Log-CimData -cimData $cimData -Properties $desiredPropertyValue,$matchProperty # Check property sync for nodes individually $SystemNames = $cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique foreach ($systemName in $SystemNames) { $sData = $CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } Log-Info -Message ($lhwTxt.TestBaseboard -f $systemName, $sData.Name, $sData.SerialNumber) $instanceIdStr = 'Write-Output "Machine: $($instance.CimSystemProperties.ServerName), Class: $ClassName, Serial: $($instance.SerialNumber)"' $PropertyResult += Test-DesiredProperty -CimData $sData -desiredPropertyValue $desiredPropertyValue -InstanceIdStr $InstanceIdStr -ValidatorName Hardware -Severity Warning $PropertySyncResult += Test-PropertySync -CimData $sData -MatchProperty $matchProperty -ValidatorName Hardware -Severity Warning } # Check property sync for all nodes as well $PropertySyncResult += Test-PropertySync -CimData $cimData -MatchProperty $matchProperty -ValidatorName Hardware -Severity Warning return @($PropertyResult + $PropertySyncResult + $cimTest) } catch { throw $_ } } function Test-Model { <# .SYNOPSIS Test Hardware Model is the same .DESCRIPTION Test Hardware Model is the same #> [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $sb = { $cimParams = @{ ClassName = 'Win32_ComputerSystem' Property = '*' } $cimData = @(Get-CimInstance @cimParams) return (New-Object PsObject -Property @{ ComputerName = $ENV:ComputerName cimData = $cimData }) } $remoteOutput = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sb } else { Invoke-Command -ScriptBlock $sb } $cimTest = Test-CimData -Data $remoteOutput -ClassName ComputerSystem $cimData = $remoteOutput.cimData $PropertySyncResult = @() $matchProperty = @( 'Manufacturer' 'Model' ) Log-CimData -cimData $cimData -Properties $matchProperty # Check property sync for nodes individually $SystemNames = $cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique foreach ($systemName in $SystemNames) { $sData = $CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } Log-Info -Message ($lhwTxt.TestModel -f $systemName, $sData.Manufacturer, $sData.Model) $PropertySyncResult += Test-PropertySync -CimData $sData -MatchProperty $matchProperty -ValidatorName Hardware -Severity Critical } # Check property sync for all nodes as well $PropertySyncResult += Test-PropertySync -CimData $cimData -MatchProperty $matchProperty -ValidatorName Hardware -Severity Critical return @($PropertyResult + $PropertySyncResult + $cimTest) } catch { throw $_ } } function Test-PhysicalDisk { <# .SYNOPSIS Test Physical Disk .DESCRIPTION Test Physical Disk #> [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $sb = { $allowedBusTypes = @('SATA', 'SAS', 'NVMe', 'SCM') $allowedMediaTypes = @('HDD', 'SSD', 'SCM') $bootPhysicalDisk = Get-Disk | Where-Object {$_.IsBoot -or $_.IsSystem} | Get-PhysicalDisk $cimData = @(Get-StorageNode -Name $env:COMPUTERNAME* | Get-PhysicalDisk -PhysicallyConnected | Where-Object { $_.BusType -in $allowedBusTypes -and $_.MediaType -in $allowedMediaTypes -and $_.DeviceId -notin $bootPhysicalDisk.DeviceId}) return (New-Object PsObject -Property @{ ComputerName = $ENV:ComputerName cimData = $cimData }) } $remoteOutput = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sb } else { Invoke-Command -ScriptBlock $sb } $cimTest = Test-CimData -Data $remoteOutput -ClassName PhysicalDisk $cimData = $remoteOutput.cimData $PropertyResult = @() $GroupResult = @() $CountResult = @() $InstanceCount = @() $InstanceCountByGroup = @() $matchProperty = @( 'FirmwareVersion' ) $groupProperty = @( 'FriendlyName' ) $warningDesiredPropertyValue = @{ HealthStatus = @{ value = @('Healthy', 0); hint = 'Healthy' } # Healthy IsIndicationEnabled = @{ value = @($false, $null); hint = 'Indicator Off' } OperationalStatus = @{ value = @('OK', 2); hint = 'OK' } } Log-CimData -cimData $cimData -Properties $groupProperty,$warningDesiredPropertyValue,$matchProperty, CanPool, CannotPoolReason, Size, PhysicalLocation, UniqueId, SerialNumber $instanceIdStr = 'Write-Output "Machine: $($instance.CimSystemProperties.ServerName), Class: $ClassName, Location: $($instance.PhysicalLocation), Unique ID: $($instance.UniqueId), Size: $("{0:N2}" -f ($instance.Size / 1TB)) TB"' # Check disk count for nodes individually [array]$SystemNames = $cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique foreach ($systemName in $SystemNames) { $sData = $CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } $totalSize = $sData | Measure-Object -Property Size -Sum Log-Info -Message ($lhwTxt.DiskTotal -f $systemName, $($sData.Count), ('{0:N2}' -f ($totalSize.Sum / 1TB))) $PropertyResult += Test-DesiredProperty -CimData $sData -desiredPropertyValue $warningDesiredPropertyValue -InstanceIdStr $InstanceIdStr -ValidatorName Hardware -Severity Warning # Split disks into type $SSD = $sData | Where-Object {$_.MediaType -match 'SSD|4' -and $_.BusType -match 'SAS|10|SATA|11'} $NVMe = $sData | Where-Object {$_.MediaType -match 'SSD|4' -and $_.BusType -match 'NVMe|17'} $SCM = $sData | Where-Object {$_.MediaType -match 'SCM|5'} $HDD = $sData | Where-Object {$_.MediaType -match 'HDD|3'} Log-Info ("Drive types detected HDD: {0}, SSD:{1}, NVMe:{2}, SCM:{3}" -f [bool]$HDD, [bool]$SSD, [bool]$NVMe, [bool]$SCM) # As per https://docs.microsoft.com/en-us/windows-server/storage/storage-spaces/storage-spaces-direct-hardware-requirements $systemCountResult = @() $countCommonParams = @{ ValidatorName = 'Hardware' Severity = 'Critical' } # all flash minimum should be 2 # Drive type present (capacity only) Minimum drives required (Windows Server) Minimum drives required (Azure Stack HCI) # All persistent memory (same model) 4 persistent memory 2 persistent memory # All NVMe (same model) 4 NVMe 2 NVMe # All SSD (same model) 4 SSD 2 SSD if ($SSD -xor $NVMe -xor $SCM) { $systemCountResult += Test-Count -cimData $sData -Minimum 2 @countCommonParams } # Drive type present Minimum drives required # Persistent memory + NVMe or SSD 2 persistent memory + 4 NVMe or SSD # NVMe + SSD 2 NVMe + 4 SSD # NVMe + HDD 2 NVMe + 4 HDD # SSD + HDD 2 SSD + 4 HDD if ($SCM -and ($NVMe -or $SSD)) { $systemCountResult += Test-Count -cimData $SCM -Minimum 2 @countCommonParams if ($NVMe) { Log-Info ($lhwTxt.MinCountDiskType -f 'NVMe', '4', $systemName ) $systemCountResult += Test-Count -cimData $NVMe -Minimum 4 @countCommonParams } else { Log-Info ($lhwTxt.MinCountDiskType -f 'SSD', '4', $systemName ) $systemCountResult += Test-Count -cimData $SSD -Minimum 4 @countCommonParams } } if ($NVMe -and $SSD) { Log-Info ($lhwTxt.MinCountDiskType -f 'NVMe', '2', $systemName ) $systemCountResult += Test-Count -cimData $NVMe -Minimum 2 @countCommonParams Log-Info ($lhwTxt.MinCountDiskType -f 'SSD', '4', $systemName ) $systemCountResult += Test-Count -cimData $SSD -Minimum 4 @countCommonParams } if ($NVMe -and $HHD) { Log-Info ($lhwTxt.MinCountDiskType -f 'NVMe', '2', $systemName ) $systemCountResult += Test-Count -cimData $NVMe -Minimum 2 @countCommonParams Log-Info ($lhwTxt.MinCountDiskType -f 'HDD', '4', $systemName ) $systemCountResult += Test-Count -cimData $HDD -Minimum 4 @countCommonParams } if ($SSD -and $HHD) { Log-Info ($lhwTxt.MinCountDiskType -f 'SSD', '2', $systemName ) $systemCountResult += Test-Count -cimData $SSD -Minimum 2 @countCommonParams Log-Info ($lhwTxt.MinCountDiskType -f 'HDD', '4', $systemName ) $systemCountResult += Test-Count -cimData $HDD -Minimum 4 @countCommonParams } if ($systemCountResult.count -eq 0) { Log-Info "We did not determine the disk combination correctly for $systemName. Checking minimum as per deployment guide." -Type Warning $systemCountResult += Test-Count -cimData $sData -Minimum 3 @countCommonParams } $CountResult += $systemCountResult } # Check property sync for all nodes $GroupResult += Test-GroupProperty -CimData $cimData -GroupProperty $groupProperty -MatchProperty $matchProperty -ValidatorName Hardware -Severity Warning # Split disks into type and check each server has the same count $allSSD = $cimData | Where-Object {$_.MediaType -match 'SSD|4' -and $_.BusType -match 'SAS|10|SATA|11'} $allNVMe = $cimData | Where-Object {$_.MediaType -match 'SSD|4' -and $_.BusType -match 'NVMe|17'} $allSCM = $cimData | Where-Object {$_.MediaType -match 'SCM|5'} $allHDD = $cimData | Where-Object {$_.MediaType -match 'HDD|3'} $instParams = @{ ValidatorName = 'Hardware' Severity = 'Critical' } if ($allSSD) { Log-Info ($lhwTxt.DiskInstanceCountByType -f 'SSD') $InstanceCount += Test-InstanceCount -CimData $allSSD @instParams -NamePostfix "SSD" } if ($allNVMe) { Log-Info ($lhwTxt.DiskInstanceCountByType -f 'NVMe') $InstanceCount += Test-InstanceCount -CimData $allNVMe @instParams -NamePostfix "NVMe" } if ($allSCM) { Log-Info ($lhwTxt.DiskInstanceCountByType -f 'SCM') $InstanceCount += Test-InstanceCount -CimData $allSCM @instParams -NamePostfix "SCM" } if ($allHDD) { Log-Info ($lhwTxt.DiskInstanceCountByType -f 'HDD') $InstanceCount += Test-InstanceCount -CimData $allHDD @instParams -NamePostfix "HDD" } if ($null -eq $PsSession -or $PsSession.Count -eq 1) { # Single Node deployments should be all flash [array]$CheckSingleNodeAllFlash = CheckSingleNodeAllFlash -CimData $cimData } # Do all servers have the same count regardless of type $InstanceCount += Test-InstanceCount -CimData $cimData -Severity Critical -ValidatorName 'Hardware' Log-Info ($lhwTxt.DiskInstanceCountByType -f 'ALL') # Finally, the all properties from the $matchProperty array (Firmware) have to be compared for all instances # across all nodes grouped by property (FriendlyName) $InstanceCountByGroup += Test-InstanceCountByGroup -CimData $cimData -ValidatorName 'Hardware' -GroupProperty $groupProperty -Severity Warning return @($PropertyResult + $GroupResult + $CountResult + $InstanceCount + $InstanceCountByGroup + $CheckSingleNodeAllFlash + $cimTest) } catch { throw $_ } } function Test-CanPool { <# .SYNOPSIS Test Physical Disks can pool value .DESCRIPTION Test Physical Disks can pool value #> [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $sb = { $allowedBusTypes = @('SATA', 'SAS', 'NVMe', 'SCM') $allowedMediaTypes = @('HDD', 'SSD', 'SCM') $bootPhysicalDisk = Get-Disk | Where-Object {$_.IsBoot -or $_.IsSystem} | Get-PhysicalDisk $cimData = @(Get-StorageNode -Name $env:COMPUTERNAME* | Get-PhysicalDisk -PhysicallyConnected | Where-Object { $_.BusType -in $allowedBusTypes -and $_.MediaType -in $allowedMediaTypes -and $_.DeviceId -notin $bootPhysicalDisk.DeviceId}) return (New-Object PsObject -Property @{ ComputerName = $ENV:ComputerName cimData = $cimData }) } $remoteOutput = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sb } else { Invoke-Command -ScriptBlock $sb } $cimTest = Test-CimData -Data $remoteOutput -ClassName PhysicalDisk $cimData = $remoteOutput.cimData $PropertyResult = @() $criticalDesiredPropertyValue = @{ CanPool = @{ value = @($global:PhysicalDiskCanPool); DiagnosticProperty = 'CannotPoolReason' } } Log-CimData -cimData $cimData -Properties CanPool, CannotPoolReason, Size, PhysicalLocation, UniqueId, FriendlyName, SerialNumber $instanceIdStr = 'Write-Output "Machine: $($instance.CimSystemProperties.ServerName), Class: $ClassName, Location: $($instance.PhysicalLocation), Unique ID: $($instance.UniqueId), Size: $("{0:N2}" -f ($instance.Size / 1TB)) TB"' [array]$SystemNames = $cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique foreach ($systemName in $SystemNames) { $sData = $CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } $PropertyResult += Test-DesiredProperty -CimData $sData -desiredPropertyValue $criticalDesiredPropertyValue -InstanceIdStr $InstanceIdStr -ValidatorName Hardware -Severity Critical } return ($PropertyResult + $cimTest) } catch { throw $_ } } function Test-TpmVersion { [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession, [Parameter()] $version = '2.0' ) $tpms = @() $InstanceResults = @() $sb = { $tpm = Get-CimInstance -Namespace root/cimv2/Security/MicrosoftTpm -ClassName Win32_Tpm -ErrorAction SilentlyContinue $result = New-Object -TypeName PSObject -Property @{ ComputerName = $ENV:COMPUTERNAME TpmData = $tpm } return $result } $tpms += if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sb } else { Invoke-Command -ScriptBlock $sb } Log-CimData -CimData $tpms.TpmData foreach ($tpm in $tpms) { $computerName = $tpm.ComputerName # Test properties $InstanceResults += foreach ($instance in $tpm.TpmData) { $instanceId = "Machine: $computerName, Class: Tpm, Manufacturer ID: $($instance.ManufacturerId)" $instanceVersion = $instance.SpecVersion -split ',' | Select-Object -First 1 $instanceResult = New-Object AzStackHciHardwareTarget $instanceResult.Name = 'AzStackHci_Hardware_Test_Tpm_Version' $instanceResult.Title = 'Test TPM Version' $instanceResult.Severity = 'Critical' $instanceResult.Description = "Checking TPM for desired version ($version)" $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' $instanceResult.TargetResourceID = $instanceId $instanceResult.TargetResourceName = $instanceId $instanceResult.TargetResourceType = 'Tpm' $instanceResult.Timestamp = [datetime]::UtcNow $instanceResult.HealthCheckSource = $ENV:EnvChkrId $AdditionalData = @() $AdditionalData += New-Object -TypeName PSObject -Property @{ Source = 'Version' Resource = $instanceVersion Detail = "$instanceId Tpm version is $instanceVersion. Expected $version" Status = if ($instanceVersion -eq $version) { 'Succeeded' } else { 'Failed' } TimeStamp = [datetime]::UtcNow } $instanceResult.AdditionalData = $AdditionalData $instanceResult.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' } if ($InstanceResult.AdditionalData.Status -eq 'Succeeded') { Log-Info -Message $InstanceResult.AdditionalData.Detail } else { Log-Info -Message $InstanceResult.AdditionalData.Detail -Type Warning } $instanceResult } } return $InstanceResults } function Test-TpmProperties { [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $tpms = @() $InstanceResults = @() $sb = { $tpm = Get-Tpm New-Object PsObject -Property @{ ComputerName = $ENV:ComputerName tpm = $tpm } } if ([string]::IsNullOrEmpty($PsSession)) { $tpms += Invoke-Command -ScriptBlock $sb } else { $tpms += Invoke-Command -Session $PsSession -ScriptBlock $sb } foreach ($tpm in $tpms) { $passed = $false $computerName = $tpm.ComputerName $desiredPropertyValue = @{ TpmPresent = $true #(Get-CimInstance -Namespace root/cimv2/Security/MicrosoftTpm -ClassName Win32_Tpm) is null TpmReady = $true #IsActivated() TpmEnabled = $true #IsEnabled() TpmActivated = $true #IsActivated() #TpmOwned = $true #IsOwned() #RestartPending = $false #GetPhysicalPresenceRequest()? ManagedAuthLevel = 'Full' #GetOwnerAuth()?? OwnerClearDisabled = $false #IsOwnerClearDisabled() AutoProvisioning = 'Enabled' #IsAutoProvisioningEnabled() LockedOut = $false #IsLockedOut() LockoutCount = 0 #GetCapLockoutInfo() } Log-CimData -cimData $tpm -Properties $desiredPropertyValue Log-Info -Message ($lhwTxt.TestTpm -f $computerName, $tpm.tpm.ManufacturerIdTxt, $tpm.tpm.ManufacturerVersion) # Test properties $InstanceResults += foreach ($instance in $tpm.tpm) { $instanceId = "Machine: $computerName, Class: Tpm, Manufacturer ID: $($tpm.tpm.ManufacturerId)" $instanceResult = New-Object AzStackHciHardwareTarget $instanceResult.Name = 'AzStackHci_Hardware_Test_Tpm_Instance_Properties' $instanceResult.Title = 'Test TPM' $instanceResult.Severity = 'Critical' $instanceResult.Description = 'Checking TPM for desired properties' $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' $instanceResult.TargetResourceID = $instanceId $instanceResult.TargetResourceName = $instanceId $instanceResult.TargetResourceType = 'Tpm' $instanceResult.Timestamp = [datetime]::UtcNow $instanceResult.HealthCheckSource = $ENV:EnvChkrId $AdditionalData = @() foreach ($propertyName in $desiredPropertyValue.Keys) { $detail = $null $passed = $false if ($instance.$propertyName -ne $desiredPropertyValue.$propertyName) { $passed = $false $detail = $lhwTxt.UnexProp -f $propertyName, $instance.$propertyName, $desiredPropertyValue.$propertyName Log-Info -Message $detail -Type Warning } else { $detail = $lhwTxt.Prop -f $propertyName, $instance.$propertyName, $desiredPropertyValue.$propertyName $passed = $true } $AdditionalData += New-Object -TypeName PSObject -Property @{ Source = $propertyName Resource = $instance.$propertyName Detail = $detail Status = if ($passed) { 'Succeeded' } else { 'Failed' } TimeStamp = [datetime]::UtcNow } } $instanceResult.AdditionalData = $AdditionalData $instanceResult.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' } $instanceResult } } return $InstanceResults } catch { throw $_ } } function Test-TpmCertificates { [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $allowedKeyUsage = '2.23.133.8.1' # Endorsement Key Certificate $allowedAlgorithms = @( '1.2.840.113549.1.1.11' # SHA256 '1.2.840.113549.1.1.12' # SHA384 '1.2.840.113549.1.1.13' # SHA512 '1.2.840.10045.4.3.2' # SHA256ECDSA '1.2.840.10045.4.3.3' # SHA384ECDSA '1.2.840.10045.4.3.4' # SHA512ECDSA ) $tpmKeys = @() $InstanceResults = @() $sb = { try { $tpmKeys = Get-TpmEndorsementKeyInfo -ErrorAction SilentlyContinue } catch {} return (New-Object PsObject -Property @{ ComputerName = $ENV:ComputerName tpmKeys = $tpmKeys }) } if ([string]::IsNullOrEmpty($PsSession)) { $tpmKeys += Invoke-Command -ScriptBlock $sb } else { $tpmKeys += Invoke-Command -Session $PsSession -ScriptBlock $sb } Log-CimData -cimData $tpmKeys $InstanceResults += foreach ($tpmKey in $tpmKeys) { $computerName = $tpmKey.ComputerName $tpmCert = $tpmKey.tpmKeys.ManufacturerCertificates + $tpmKey.tpmKeys.AdditionalCertificates $instanceId = "Machine: $computerName, Class: TpmCertificates, Subject: $($tpmKey.tpmKeys.ManufacturerCertificates.subject), Thumprint: $($tpmKey.tpmKeys.ManufacturerCertificates.Thumbprint)" $instanceResult = New-Object AzStackHciHardwareTarget $instanceResult.Name = 'AzStackHci_Hardware_Test_Tpm_Certificate_Properties' $instanceResult.Title = 'Test TPM' $instanceResult.Severity = 'Critical' $instanceResult.Description = 'Checking TPM for desired certificates' $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' $instanceResult.TargetResourceID = $instanceId $instanceResult.TargetResourceName = $instanceId $instanceResult.TargetResourceType = 'TpmEndorsementKeyInfo' $instanceResult.Timestamp = [datetime]::UtcNow $instanceResult.HealthCheckSource = $ENV:EnvChkrId $AdditionalData = @() foreach ($cert in $tpmCert) { $validCert = $false $certDetail = $null # Test TPM certificate expiration $now = [datetime]::UtcNow $sinceIssued = New-TimeSpan -Start $cert.NotBefore -End $now $untilExpired = New-TimeSpan -Start $now -End $cert.NotAfter $currentCert = $sinceIssued.Days -gt 0 -and $untilExpired.Days -gt 0 # Test TPM signature algorithm $validAlgo = $cert.SignatureAlgorithm.Value -in $allowedAlgorithms # Test TPM certificate Enhanced Key Usage $validUsage = $cert.EnhancedKeyUsageList.ObjectId -contains $allowedKeyUsage # Display certificate properties $validCert = $currentCert -and $validAlgo -and $validUsage [string[]]$certDetail = "TPM certificate $($cert.Thumbprint), valid = $validCert" $certDetail += " Issuer: $($cert.Issuer)" $certDetail += " Subject: $($cert.Subject)" $certDetail += " Key Usage: $($cert.EnhancedKeyUsageList.FriendlyName -join ', '), valid = $validUsage" #$cert.Extensions.Oid.FriendlyName | Foreach-Object { $certDetail += " Extension: $_" } $certDetail += " Valid from: $($cert.NotBefore) to $($cert.NotAfter), valid = $currentCert" $certDetail += " Algorithm: $($cert.SignatureAlgorithm.FriendlyName), valid = $validAlgo" $foundValidCert = $foundValidCert -or $validCert $AdditionalData += New-Object -TypeName PSObject -Property @{ Source = $cert.Thumbprint Resource = "Current: $currentCert. Valid Algorithm: $validAlgo. Valid Key Usage: $validUsage." Detail = ($certDetail -join "`r") Status = if ($validCert) { 'Succeeded' } else { 'Failed' } TimeStamp = [datetime]::UtcNow } } $instanceResult.AdditionalData = $AdditionalData $instanceResult.Status = if ($AdditionalData.Status -contains 'Succeeded') { 'Succeeded' } else { 'Failed' } $instanceResult } return $InstanceResults } catch { throw $_ } } function Test-SecureBoot { [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $secureBoots = @() $sb = { New-Object PsObject -Property @{ SecureBoot = Confirm-SecureBootUEFI ComputerName = $env:COMPUTERNAME } } if ([string]::IsNullOrEmpty($PsSession)) { $secureBoots += Invoke-Command -ScriptBlock $sb } else { $secureBoots += Invoke-Command -Session $PsSession -ScriptBlock $sb } Log-CimData -cimData $secureboots $InstanceResults = @() $InstanceResults += foreach ($SecureBootUEFI in $secureBoots) { $instanceId = "Machine: $($SecureBootUEFI.ComputerName), Class: SecureBoot" $instanceResult = New-Object AzStackHciHardwareTarget $instanceResult.Name = 'AzStackHci_Hardware_Test_Secure_Boot' $instanceResult.Title = 'Test Secure Boot' $instanceResult.Severity = 'Critical' $instanceResult.Description = 'Checking Secure Boot' $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' $instanceResult.TargetResourceID = $instanceId $instanceResult.TargetResourceName = $instanceId $instanceResult.TargetResourceType = 'SecureBoot' $instanceResult.Timestamp = [datetime]::UtcNow $instanceResult.HealthCheckSource = $ENV:EnvChkrId $instanceResult.Status = if ($SecureBootUEFI.SecureBoot) { 'Succeeded' } else { 'Failed' } $instanceResult.AdditionalData = New-Object -TypeName PSObject -Property @{ Source = $SecureBootUEFI.ComputerName Resource = $SecureBootUEFI.SecureBoot Detail = $lhwTxt.SecureBoot -f $SecureBootUEFI.SecureBoot, 'True' Status = if ($SecureBootUEFI) { 'Succeeded' } else { 'Failed' } TimeStamp = [datetime]::UtcNow } $instanceResult } return $InstanceResults } catch { throw $_ } } function Test-StoragePool { [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $StoragePoolsExist = @() $sb = { New-Object PsObject -Property @{ StoragePoolExists = [bool](Get-StoragePool -IsPrimordial:$false -ErrorAction SilentlyContinue) ComputerName = $ENV:ComputerName } } if ([string]::IsNullOrEmpty($PsSession)) { $StoragePoolsExist += Invoke-Command -ScriptBlock $sb } else { $StoragePoolsExist += Invoke-Command -Session $PsSession -ScriptBlock $sb } Log-CimData -cimData $StoragePoolsExist $InstanceResults = @() $InstanceResults += foreach ($StoragePool in $StoragePoolsExist) { $instanceId = "Machine: $($StoragePool.ComputerName), Class: StoragePool" $instanceResult = New-Object AzStackHciHardwareTarget $instanceResult.Name = 'AzStackHci_Hardware_Test_No_StoragePools' $instanceResult.Title = 'Test Storage Pools do not exist' $instanceResult.Severity = 'Critical' $instanceResult.Description = 'Checking no storage pools exist' $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' $instanceResult.TargetResourceID = $instanceId $instanceResult.TargetResourceName = $instanceId $instanceResult.TargetResourceType = 'StoragePool' $instanceResult.Timestamp = [datetime]::UtcNow $instanceResult.HealthCheckSource = $ENV:EnvChkrId $instanceResult.Status = if ($StoragePool.StoragePoolExists) { 'Failed' } else { 'Succeeded' } $instanceResult.AdditionalData = New-Object -TypeName PSObject -Property @{ Source = 'StoragePool' Resource = if ([bool]$StoragePool.StoragePoolExists) { "Present" } else { "Not present" } Detail = $lhwTxt.StoragePoolFail -f [bool]$StoragePool.StoragePoolExists, 'False' Status = if ($StoragePool.StoragePoolExists) { 'Failed' } else { 'Succeeded' } TimeStamp = [datetime]::UtcNow } $instanceResult } return $InstanceResults } catch { throw $_ } } function Test-FreeSpace { <# .SYNOPSIS Test free space #> [CmdletBinding()] param ( [Parameter()] [string] $Drive = $env:LocalRootFolderPath, [Parameter()] [int64] $Threshold = 30GB, [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $cimData = @() $InstanceResults = @() if ([string]::IsNullOrEmpty($Drive)) { $Drive = "C:\" } $Drive = (Split-Path -Path $Drive -Qualifier) $sb = { $DriveExists = Test-Path -Path $args[0] -IsValid if ($DriveExists) { $cimData = Get-CimInstance -ClassName Win32_LogicalDisk -Property DeviceId, FreeSpace | Where-Object DeviceID -EQ $args[0] } return New-Object PsObject -Property @{ DriveExists = $DriveExists ComputerName = $ENV:ComputerName DeviceID = $cimData.DeviceID FreeSpace = $cimData.FreeSpace } } if ([string]::IsNullOrEmpty($PsSession)) { $results += Invoke-Command -ScriptBlock $sb -ArgumentList $Drive } else { $results += Invoke-Command -Session $PsSession -ScriptBlock $sb -ArgumentList $Drive } Log-CimData -cimData $results $InstanceResults += foreach ($result in $results) { $computerName = $result.ComputerName if ($result.DriveExists -eq $false) { $status = 'Failed' $dtl = $lhwtxt.LocalRootFolderPathFail -f $computerName, $Drive Log-Info $dtl -Type Warning } else { $freeSpaceStr = [int]($result.FreeSpace / 1GB) $thresholdStr = [int]($threshold / 1GB) $dtl = $lhwtxt.LocalRootFolderPathFreeSpace -f $computerName, $Drive, $freeSpaceStr, $thresholdStr if ($result.FreeSpace -gt $Threshold) { $status = 'Succeeded' Log-Info $dtl } else { $status = 'Failed' Log-Info $dtl -Type Warning } } $instanceId = "Machine: $computerName, Class: Disk, DriveLetter: $drive" $instanceResult = New-Object AzStackHciHardwareTarget $instanceResult.Name = 'AzStackHci_Hardware_Test_Disk_Space' $instanceResult.Title = 'Test Disk Space' $instanceResult.Severity = 'Warning' $instanceResult.Description = 'Checking Disk Space' $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' $instanceResult.TargetResourceID = $instanceId $instanceResult.TargetResourceName = $instanceId $instanceResult.TargetResourceType = 'Disk' $instanceResult.Timestamp = [datetime]::UtcNow $instanceResult.HealthCheckSource = $ENV:EnvChkrId $instanceResult.AdditionalData = New-Object -TypeName PSObject -Property @{ Source = $computerName Resource = $cim.DeviceID Detail = $dtl Status = $status TimeStamp = [datetime]::UtcNow } $instanceResult.Status = $instanceResult.AdditionalData.Status $instanceResult } return $InstanceResults } catch { throw $_ } } function Test-Volume { <# .SYNOPSIS Test free space #> [CmdletBinding()] param ( [Parameter()] [string[]] $Drive = @('C'), # TO DO: Implement Free Space check [Parameter()] [int64] $Threshold = 30GB, [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $cimData = @() $CountResult = @() $InstanceCountByGroup = @() $sb = { $cimData = Get-Volume | Where-Object DriveLetter -in $args return $cimData } if ([string]::IsNullOrEmpty($PsSession)) { $cimData += Invoke-Command -ScriptBlock $sb -ArgumentList $Drive } else { $cimData += Invoke-Command -Session $PsSession -ScriptBlock $sb -ArgumentList $Drive } $groupProperty = @( 'DriveLetter' ) Log-CimData -cimData $cimData -Properties $groupProperty $SystemNames = $cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique foreach ($systemName in $SystemNames) { $sData = $CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } #Log-Info -Message ($lhwTxt.VolumeCount -f $systemName, ($Drive -join ','), $sData.Count) # Make sure each system has the requisite number of Network Adapters $CountResult += Test-Count -CimData $sData -minimum $Drive.Count -ValidatorName 'Hardware' -Severity Critical } # Make sure each node has the same count by group $InstanceCountByGroup += Test-InstanceCountByGroup -CimData $cimData -ValidatorName 'Hardware' -GroupProperty $groupProperty -Severity Critical # Finally, the all properties from the $matchProperty array have to be compared for all instances across all nodes. return @($CountResult + $InstanceCountByGroup) } catch { throw $_ } } function CheckSingleNodeAllFlash { param ($cimData) # Split disks into type and check each server has the same count $allSSD = $cimData | Where-Object {$_.MediaType -match 'SSD|4' -and $_.BusType -match 'SAS|10|SATA|11'} $allNVMe = $cimData | Where-Object {$_.MediaType -match 'SSD|4' -and $_.BusType -match 'NVMe|17'} $allSCM = $cimData | Where-Object {$_.MediaType -match 'SCM|5'} $allHDD = $cimData | Where-Object {$_.MediaType -match 'HDD|3'} $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $instanceId = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique Log-Info $lhwTxt.SingleNodeAllFlash -f $instanceId # check if they are all flash if ($allSSD -xor $allNVMe -and !$allSCM -and !$allHDD) { $Status = 'Succeeded' $type = 'Info' } else { $Status = 'Failed' $type = 'Warning' } $detail = $lhwTxt.SingleNodeAllFlashDetail -f $instanceId,("HDD: {0}, SSD:{1}, NVMe:{2}, SCM:{3}" -f [bool]$allHDD, [bool]$allSSD, [bool]$allNVMe, [bool]$allSCM) Log-Info $detail -Type $type $instanceResult = New-Object AzStackHciHardwareTarget $instanceResult.Name = 'AzStackHci_Hardware_Test_SingleNode_AllFlash' $instanceResult.Title = 'Test Single Node All Flash' $instanceResult.Severity = 'Critical' $instanceResult.Description = "Checking single node is all flash" $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/windows-server/storage/storage-spaces/storage-spaces-direct-hardware-requirements#minimum-number-of-drives-excludes-boot-drive' $instanceResult.TargetResourceID = $instanceId $instanceResult.TargetResourceName = $instanceId $instanceResult.TargetResourceType = $className $instanceResult.Timestamp = [datetime]::UtcNow $instanceResult.HealthCheckSource = $ENV:EnvChkrId $AdditionalData = @() $AdditionalData += New-Object -TypeName PSObject -Property @{ Source = "$className Drive Type" Resource = "HDD: {0}, SSD:{1}, NVMe:{2}, SCM:{3}" -f [bool]$allHDD, [bool]$allSSD, [bool]$allNVMe, [bool]$allSCM Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } $instanceResult.AdditionalData = $AdditionalData $instanceResult.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' } $instanceResult } function Test-MinCoreCount { <# .SYNOPSIS Get minimum core count .DESCRIPTION Get core count from local machine to use as minimum core count Expecting data from PsSessions to include local machine indicating ECE. #> [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $sb = { $cimParams = @{ ClassName = 'Win32_Processor' Property = 'NumberOfCores' } $cimData = @(Get-CimInstance @cimParams) return $cimData } $cimData = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sb } else { Invoke-Command -ScriptBlock $sb } $instanceResults = @() Log-CimData -cimData $cimData -Properties NumberOfCores # Set min cores to local machine # This should only apply the scenario where there is a PsSession to all nodes, # and one of the nodes is also the local machine i.e. ECE invocation $RequiredTotalNumberOfCores = GetTotalNumberOfCores -cimData ($cimData | Where-Object { $_.CimSystemProperties.ServerName -like "$($ENV:COMPUTERNAME)*"}) if ($RequiredTotalNumberOfCores) { [array]$SystemNames = $cimData.CimSystemProperties.ServerName | Where-Object {$PSITEM -notlike "$($ENV:COMPUTERNAME)*"} | Sort-Object | Get-Unique foreach ($systemName in $SystemNames) { $sData = $CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } $TotalNumberOfCores = GetTotalNumberOfCores -cimData $sData if ($TotalNumberOfCores) { $detail = $lhwTxt.CheckMinCoreCount -f $SystemName, $TotalNumberOfCores, $RequiredTotalNumberOfCores if ($TotalNumberOfCores -ge $RequiredTotalNumberOfCores) { $status = 'Succeeded' Log-Info -message $detail } else { $status = 'Failed' Log-Info -message $detail -Type Warning } } else { $detail = $lhwTxt.UnexpectedCoreCount -f 'Unavailable','1' $status = 'Skipped' Log-Info -message $detail -Type Warning } $instanceResult = New-Object AzStackHciHardwareTarget $instanceResult.Name = 'AzStackHci_Hardware_Test_Minimum_CPU_Cores' $instanceResult.Title = 'Test Minimum CPU Cores' $instanceResult.Severity = 'Warning' $instanceResult.Description = "Checking minimum CPU cores" $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' $instanceResult.TargetResourceType = $cimParams.className $instanceResult.Timestamp = [datetime]::UtcNow $instanceResult.HealthCheckSource = $ENV:EnvChkrId $instanceResult.TargetResourceID = $systemName $instanceResult.TargetResourceName = $systemName $AdditionalData = @() $AdditionalData += New-Object -TypeName PSObject -Property @{ Source = $className Resource = 'Core Count' Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } $instanceResult.AdditionalData = $AdditionalData $instanceResult.Status = $status $instanceResults += $instanceResult } } else { Log-info $lhwTxt.SkippedCoreCount -type Warning } return $instanceResults } catch { throw $_ } } function Test-VirtualDisk { <# .SYNOPSIS Test Virtual Disk .DESCRIPTION During repair test virtual disk #> [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $sb = { New-Object -Type PsObject -Property @{ VirtualDiskExists = [bool](Get-StoragePool -IsPrimordial:$false -ErrorAction SilentlyContinue | Get-VirtualDisk) ComputerName = $ENV:COMPUTERNAME } } $VirtualDiskExists = @() if ([string]::IsNullOrEmpty($PsSession)) { $VirtualDiskExists += Invoke-Command -ScriptBlock $sb } else { $VirtualDiskExists += Invoke-Command -Session $PsSession -ScriptBlock $sb } Log-CimData -cimData $VirtualDiskExists $AdditionalData = @() foreach ($virtualDisk in $VirtualDiskExists) { if ($virtualDisk.VirtualDiskExists) { $status = 'Succeeded' $detail = $lhwTxt.VirtualDiskExists -f $virtualDisk.ComputerName Log-Info $detail } else { $status = 'Failed' $detail = $lhwTxt.VirtualDiskNotExists -f $virtualDisk.ComputerName Log-Info $detail -Type Warning } $AdditionalData += New-Object -TypeName PSObject -Property @{ Source = $virtualDisk.ComputerName Resource = if ($virtualDisk.VirtualDiskExists) { "Present" } else { "Not present" } Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } } $instanceId = "Machine: $($virtualDisk.ComputerName), Class: VirtualDisk" $instanceResult = New-Object AzStackHciHardwareTarget $instanceResult.Name = 'AzStackHci_Hardware_Test_VirtualDisk_Exists' $instanceResult.Title = 'Test Virtual Disk exists' $instanceResult.Severity = 'Critical' $instanceResult.Description = 'Checking virtual disk(s) exist for repair' $instanceResult.Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites' $instanceResult.TargetResourceID = $instanceId $instanceResult.TargetResourceName = $instanceId $instanceResult.TargetResourceType = 'VirtualDisk' $instanceResult.Timestamp = [datetime]::UtcNow $instanceResult.HealthCheckSource = $ENV:EnvChkrId $instanceResult.Status = if ( $AdditionalData.Status -contains 'Failed' ) { 'Failed' } else { 'Succeeded' } $instanceResult.AdditionalData = $AdditionalData return $InstanceResults } catch { throw $_ } } function GetTotalNumberOfCores { <# .SYNOPSIS Multiply number of cores by number of processors .DESCRIPTION Multiply number of cores by number of processors #> param ($cimData) try { if ($cimData) { $numberOfCores = $cimData | Select-Object -ExpandProperty NumberOfCores | Sort-Object | Get-Unique if ($numberOfCores.count -ne 1) { throw ($lhwTxt.UnexpectedCoreCount -f $numberOfCores.count, '1') } else { return ($numberOfCores * $cimData.count) } } else { throw $lhwTxt.NoCoreReference } } catch { Log-Info ($lhwTxt.UnableCoreCount -f $_) -Type Warning } } Export-ModuleMember -Function Test-* # SIG # Begin signature block # MIInvQYJKoZIhvcNAQcCoIInrjCCJ6oCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDovLCvCu4HpOAI # H8QZ27Yz4S3HgsPqGupoksz1JeLxF6CCDXYwggX0MIID3KADAgECAhMzAAADTrU8 # esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU # p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 # 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm # WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa # +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq # jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk # mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 # TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 # kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d # hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM # pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh # JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX # UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir # IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 # 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A # Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H # tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ0wghmZAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIALe7pm3IvyEbVD17ngdPMxi # 2AsO41Ufi0Af4ew+0VzHMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAN0VyZoIiuTgpdvCeYJh4ptlkEtAMTk7dOBmq3PCbhTmwnQPN9lsRvI+/ # xJSiwBkjXIyVhCNKZl39Sl3E44t0WphuKmpNafNKZuChIjBGCjFvWGn41juTbn3L # SjUT1R0Oy7arZdWRspVHVr3AJ7qlX77JQ0++fyDzXrSMrrg0az+6gLcGDesl4X71 # DRFF+cpFXhGJKqUl5onrNzGPtg83wj9vdeGhNPq9vibGoUX/2GXlF7s8V/3eAYaR # Ww64jchKLdaX67qVQ94LdBC0CiXgG4aiVtIjhEjK8I43vH3lP+TY+3QWhlj6G4Kj # FQrKaIVqnV/lnZGVnZ4+3N1xASUb5qGCFycwghcjBgorBgEEAYI3AwMBMYIXEzCC # Fw8GCSqGSIb3DQEHAqCCFwAwghb8AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq # hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCANMSlLy/vrl6CtVVV+FLfk5fqPQ2pkAaI7Oawl458ROgIGZQr18epe # GBIyMDIzMDkyMjA4MzExNS4wNVowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046 # MDg0Mi00QkU2LUMyOUExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2WgghF3MIIHJzCCBQ+gAwIBAgITMwAAAbJuQAN/bqmUkgABAAABsjANBgkq # hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMjA5 # MjAyMDIyMDFaFw0yMzEyMTQyMDIyMDFaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjA4NDItNEJF # Ni1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC # IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyqJlMh17+VDisL4GaXl/9a6r # /EpPGt9sbbceh+ZD6pkA3gbI7vc8XfL04B+m3tB/aNyV1Y4ZQH4fMG7CWVjI/d/H # gxjzO+4C4HfsW+jK2c0LYMqdWtWUc5VwZQv0KeaEM0wDb+eySMh/YiiIb0nSotiv # x268d1An0uLY+r2C7JJv2a9QvrSiCyUI72CSHoWIQPAyvBSvxaNrqMWlROfLy2DQ # 3RycI3bDh8qSnmplxtRgViJwtJv/oDukcK1frGeOrCGYmiJve+QonJXFu4UtGFVf # Ef3lvQsd42GJ+feO+jaP7/hBXXSMSldVb6IL0GxO1Hr3G9ONTnVmA/sFHhgMRars # mzKVI6/kHlMdMNdF/XzhRHMWFPJvw5lApjuaoyHtzwnzDWwQzhcNQXZRk3Lzb01U # LMba190RdlofEXxGbGlBgHHKFnBjWui24hL6B83Z6r6GQBPeKkafz8qYPAO3MBud # +5eMCmB5mrCBxgnykMn7L/FTqi7MnPUG97lNOKGSIDvBCxB7pHrRmT10903PDQwr # meJHO5BkC3gYj3oWGOGVRZxRk4KS/8lcz84a7+uBKmVjB2Y8vPN8O1fK7L8YJTkj # iXTyDqKJ9fKkyChiSRx44ADPi/HXHQE6dlZ8jd9LCo1S+g3udxNP4wHhWm9/VAGm # mMEBBS6+6Lp4IbQwJU0CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSZ8ieAXNkRmU+S # MM5WW4FIMNpqcTAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV # HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny # bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI # KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy # MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI # MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA3Ee27cXMhptoNtaq # zB0oGUCEpdEI37kJIyK/ZNhriLZC5Yib732mLACEOEAN9uqivXPIuL3ljoZCe8hZ # SB14LugvVm1nJ73bNgr4Qh/BhmaFL4IfiKd8DNS+xwdkXfCWslR89QgMZU/SUJhW # x72aC68bR2qRjhrJA8Qc68m5uBllo52D83x0id3p8Z45z7QOgbMH4uJ45snZDQC0 # S3dc3eJfwKnr51lNfzHAT8u+FHA+lv/6cqyE7tNW696fB1PCoH8tPoI09oSXAV4r # EqupFM8xsd6D6L4qcEt/CaERewyDazVBfskjF+9P3qZ3R6IyOIwQ7bYts7OYsw13 # csg2jACdEEAm1f7f97f3QH2wwYwen5rVX6GCzrYCikGXSn/TSWLfQM3nARDkh/fl # mTtv9PqkTHqslQNgK2LvMJuKSMpNqcGc5z33MYyV6Plf58L+TkTFQKs6zf9XMZEJ # m3ku9VBJ1aqr9AzNMSaKbixvMBIr2KYSSM21lnK8LUKxRwPW+gWS2V3iYoyMT64M # RXch10P4OtGT3idXM09K5ld7B9U6dcdJ6obvEzdXt+XZovi/U6Evb4nA7VPHcHSK # s7U72ps10mTfnlue13VFJUqAzbYoUEeegvsmzulGEGJoqZVNAag5v6PVBrur5yLE # ajjxWH2TfkEOwlL8MuhcVI8OXiYwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ # AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 # ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 # V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9 # alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv # Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928 # jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t # pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe # HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o # ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C # vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug # poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps # xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C # AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE # FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT # NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o # dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD # AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW # y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t # aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt # MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y # My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc # FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT # Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j # VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3 # +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR # sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw # ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b # RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx # aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX # HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0 # W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0 # HVUzWLOhcGbyoYIC0zCCAjwCAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu # ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjA4 # NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2 # aWNloiMKAQEwBwYFKw4DAhoDFQCOEn4R7JJF+fYoI2yOf1wX0BRJOqCBgzCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA # 6LduajAiGA8yMDIzMDkyMjA5Mzc0NloYDzIwMjMwOTIzMDkzNzQ2WjBzMDkGCisG # AQQBhFkKBAExKzApMAoCBQDot25qAgEAMAYCAQACAWUwBwIBAAICFGIwCgIFAOi4 # v+oCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAweh # IKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQCkL1c0+oNjSG4bE348EcnI # tPFYuNUzvd/92i2+6k7+DScidqlPirsGg43AxJLy54v5sQvhwc5VmMOh5ZXR5EjV # yuZbCT3q+vEHGr00PFltmBt+KUo1rbxXMtIHOONjD4AK0LOtfknNXoTAr6ao0MJs # Oc4suVcyi5CaBhMlTSiZdDGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0 # YW1wIFBDQSAyMDEwAhMzAAABsm5AA39uqZSSAAEAAAGyMA0GCWCGSAFlAwQCAQUA # oIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIE # IIZ4wYqWKZr8W5tqZd4NXjUScuMXfMzl8MM20Za+9OV8MIH6BgsqhkiG9w0BCRAC # LzGB6jCB5zCB5DCBvQQgU3jOPOfhPreDxFYnlKBSl+z1ci6P587vobSTwhtOPjUw # gZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYw # JAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAbJuQAN/ # bqmUkgABAAABsjAiBCBQnTUI2zXkdejkHnk2+uObSOOfyIfyhJEaoALh51GpHTAN # BgkqhkiG9w0BAQsFAASCAgCdHHJOVgil2wvZgb8uwwd4UzfNUF53lzTIIyJfXucu # A4JHP39jiJqBxYWFlcnZyvFkZa/ZQ9UxjEOm/Ono4J6eenAiNlNmdkK7DRSr2wcO # UvsrRtRid75V7bVfOozwXeCaLiuSfjaJLnCL9bQKAiM9vfu4nrJyh5RZHHHIHbQ9 # R0qt3ROns5CTGyt1LND8A3mwZoUqFP7cDNuPhUWJQAt7aWbUpyHE0Heq6MFMSFc6 # hl1QLe4urjIDRVYhcsYX+G72c/B6LC9UxK9c0Z/CpQjykpWMTNcdkycvljOrOs8I # Qzdyo0czwjdf3qJURBamFXJ0+KFvW1WwsnQcicNJE6jCdY6hfE3rJxxQRLZwWCEJ # 1KsWkcFankuxBJ0HXJFQMP/FBGgeyR6/toZkmbemRxOlzOFnJxT1H0C2pu7hFAyl # 7DSLRgMBmUIl0Xf3/8dewmjgFho1ZRruV1XVxBys6maUk30S1tOAQbsCe+/KwzG8 # iPcXd9ORALNLu9IhoB38vSHC9QwyShpPN819zG4awzS6fwnuN/Bf3iybk/gVRnM2 # Ar7IBymi+A7xDz6oWJhfZzcZh+uuXV0rexLh6qZVpdHVT4Nli3tEmlyFrx0JMmP2 # 6EnVbHwyrE1XIQbWX39+ihinsPeBUMz0ML1ygMpuUkPEGUynvvLPcbmVx60Ux9i4 # 7g== # SIG # End signature block |