Files
claudetools/CATALOG_PROJECTS.md
Mike Swanson b79c47acb9 sync: Auto-sync from ACG-M-L5090 at 2026-01-26 16:45:54
Synced files:
- Complete claude-projects import (5 catalog files)
- Client directory with 12 clients
- Project directory with 12 projects
- Credentials updated (100+ sets)
- Session logs consolidated
- Agent coordination rules updated
- Task management integration

Major work completed:
- Exhaustive cataloging of claude-projects
- All session logs analyzed (38 files)
- All credentials extracted and organized
- Client infrastructure documented
- Problem solutions cataloged (70+)

Machine: ACG-M-L5090
Timestamp: 2026-01-26 16:45:54

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-02-01 16:23:47 -07:00

24 KiB

Claude Projects Catalog

Generated: 2026-01-26 Source: C:\Users\MikeSwanson\claude-projects
Purpose: Comprehensive catalog of all project documentation for ClaudeTools context import


Overview

This catalog documents all projects found in the claude-projects directory, extracting key information for import into the ClaudeTools tracking system.

Total Projects Cataloged: 11 major projects Infrastructure Servers: 8 servers documented Active Development Projects: 4 projects


Projects by Category

Active Development Projects

1. GuruRMM

  • Path: C:\Users\MikeSwanson\claude-projects\gururmm\
  • Status: Active Development (Phase 1 MVP)
  • Purpose: Custom RMM (Remote Monitoring and Management) system
  • Technologies: Rust (server + agent), React + TypeScript (dashboard), Docker
  • Repository: https://git.azcomputerguru.com/azcomputerguru/gururmm
  • Key Components:
    • Agent: Rust-based monitoring agent (Windows/Linux/macOS)
    • Server: Rust + Axum WebSocket server
    • Dashboard: React + Vite web interface
    • Tray: System tray application (planned)
  • Infrastructure:
    • Server: 172.16.3.20 (Jupiter/Unraid) - Container deployment
    • Build Server: 172.16.3.30 (Ubuntu 22.04) - Cross-platform builds
    • External URL: https://rmm-api.azcomputerguru.com
    • Internal: 172.16.3.20:3001
  • Features:
    • Real-time metrics (CPU, RAM, disk, network)
    • WebSocket-based agent communication
    • JWT authentication
    • Cross-platform support
    • Future: Remote commands, patch management, alerting
  • Key Files:
    • docs/FEATURE_ROADMAP.md - Complete feature roadmap with priorities
    • tray/PLAN.md - System tray implementation plan
    • session-logs/2025-12-15-build-server-setup.md - Build server setup
    • session-logs/2025-12-20-v040-build.md - Version 0.40 build
  • Related Credentials: Database, API auth, JWT secrets (in credentials.md)

2. MSP Toolkit (Rust)

  • Path: C:\Users\MikeSwanson\claude-projects\msp-toolkit-rust\
  • Status: Active Development (Phase 2)
  • Purpose: Integrated CLI for MSP operations connecting multiple platforms
  • Technologies: Rust, async/tokio
  • Repository: (Gitea - azcomputerguru)
  • Integrated Platforms:
    • DattoRMM - Remote monitoring
    • Autotask PSA - Ticketing and time tracking
    • IT Glue - Documentation
    • Kaseya 365 - M365 management
    • Datto EDR - Endpoint security
  • Key Features:
    • Unified CLI for all MSP platforms
    • Automatic documentation to IT Glue
    • Automatic time tracking to Autotask
    • AES-256-GCM encrypted credential storage
    • Workflow automation
  • Architecture:
    User Command → Execute Action → [Success] → Workflow:
      ├─→ Document to IT Glue
      ├─→ Add note to Autotask ticket
      └─→ Log time to Autotask
    
  • Key Files:
    • CLAUDE.md - Complete development guide
    • README.md - User documentation
    • ARCHITECTURE.md - System architecture and API details
  • Configuration: ~/.config/msp-toolkit/config.toml
  • Dependencies: reqwest, tokio, clap, ring (encryption), governor (rate limiting)

3. GuruConnect

  • Path: C:\Users\MikeSwanson\claude-projects\guru-connect\
  • Status: Planning/Early Development
  • Purpose: Remote desktop solution (ScreenConnect alternative) for GuruRMM
  • Technologies: Rust (agent + server), React (dashboard), WebSocket, Protobuf
  • Architecture:
    Dashboard (React) ↔ WSS ↔ GuruConnect Server (Rust) ↔ WSS ↔ Agent (Rust)
    
  • Key Components:
    • Agent: Windows remote desktop agent (DXGI capture, input injection)
    • Server: Relay server (Rust + Axum)
    • Dashboard: Web viewer (React, integrate with GuruRMM)
    • Protocol: Protocol Buffers
  • Encoding Strategy:
    • LAN (<20ms RTT): Raw BGRA + Zstd + dirty rects
    • WAN + GPU: H264 hardware encoding
    • WAN - GPU: VP9 software encoding
  • Key Files:
    • CLAUDE.md - Project overview and build instructions
  • Security: TLS, JWT auth for dashboard, API key auth for agents, audit logging
  • Related Projects: RustDesk reference at ~/claude-projects/reference/rustdesk/

4. Website2025 (Arizona Computer Guru)

  • Path: C:\Users\MikeSwanson\claude-projects\Website2025\
  • Status: Active Development
  • Purpose: Company website rebuild for Arizona Computer Guru MSP
  • Technologies: HTML, CSS, JavaScript (clean static site)
  • Server: ix.azcomputerguru.com (cPanel/Apache)
  • Sites:
  • File Paths on Server:
    • Dev site: /home/computergurume/public_html/dev/acg2025/
    • Working copy: /home/computergurume/public_html/dev/acg2025-wp-test/
    • Static site: /home/computergurume/public_html/dev/acg2025-static/
    • Production: /home/azcomputerguru/public_html/
  • Business Info:
    • Company: Arizona Computer Guru - "Any system, any problem, solved"
    • Phone: 520.304.8300
    • Service Area: Statewide (Tucson, Phoenix, Prescott, Flagstaff)
    • Services: Managed IT, network/server, cybersecurity, remote support, websites
  • Design Features:
    • CSS Variables for theming
    • Mega menu dropdown with blur overlay
    • Responsive breakpoints (1024px, 768px)
    • Service cards grid layout
    • Fixed header with scroll-triggered shrink
  • Key Files:
    • CLAUDE.md - Development notes and SSH access
    • static-site/ - Clean static rebuild
  • SSH Access: ssh root@ix.azcomputerguru.com OR ssh claude-temp@ix.azcomputerguru.com
  • Credentials: See credentials.md (claude-temp password: Gptf*77ttb)

Production/Operational Projects

5. Dataforth DOS Test Machines

  • Path: C:\Users\MikeSwanson\claude-projects\dataforth-dos\
  • Status: Production (90% complete, operational)
  • Purpose: SMB1 proxy system for ~30 legacy DOS test machines at Dataforth
  • Client: Dataforth Corporation (industrial test equipment manufacturer)
  • Technologies: Netgear ReadyNAS (SMB1), Windows Server (AD2), DOS 6.22, QuickBASIC
  • Problem Solved: Crypto attack disabled SMB1 on production servers; deployed NAS as SMB1 proxy
  • Infrastructure:
    System IP Purpose Credentials
    D2TESTNAS 192.168.0.9 NAS/SMB1 proxy admin / Paper123!@#-nas
    AD2 192.168.0.6 Production server INTRANET\sysadmin / Paper123!@#
    UDM 192.168.0.254 Gateway See credentials.md
  • Key Features:
    • Bidirectional sync every 15 minutes (NAS ↔ AD2)
    • PULL: Test results from DOS machines → AD2 → Database
    • PUSH: Software updates from AD2 → NAS → DOS machines
    • Remote task deployment (TODO.BAT)
    • Centralized software management (UPDATE.BAT)
  • Sync System:
    • Script: C:\Shares\test\scripts\Sync-FromNAS.ps1
    • Log: C:\Shares\test\scripts\sync-from-nas.log
    • Status: C:\Shares\test_SYNC_STATUS.txt
    • Scheduled: Windows Task Scheduler (every 15 min)
  • DOS Machine Management:
    • Software deployment: Place files in TS-XX\ProdSW\ on NAS
    • One-time commands: Create TODO.BAT in TS-XX\ root (auto-deletes after run)
    • Central management: T:\UPDATE TS-XX ALL (from DOS)
  • Key Files:
    • PROJECT_INDEX.md - Quick reference guide
    • README.md - Complete project overview
    • CREDENTIALS.md - All passwords and SSH keys
    • NETWORK_TOPOLOGY.md - Network diagram and data flow
    • REMAINING_TASKS.md - Pending work and blockers
    • SYNC_SCRIPT.md - Sync system documentation
    • DOS_BATCH_FILES.md - UPDATE.BAT and TODO.BAT details
  • Repository: https://git.azcomputerguru.com/azcomputerguru/claude-projects (dataforth-dos folder)
  • Machines Working: TS-27, TS-8L, TS-8R (tested operational)
  • Machines Pending: ~27 DOS machines need network config updates
  • Blocking Issue: Datasheets share needs creation on AD2 (waiting for Engineering)
  • Test Database: http://192.168.0.6:3000
  • SSH to NAS: ssh root@192.168.0.9 (ed25519 key auth)
  • Engineer Access: \192.168.0.9\test (SFTP port 22, engineer / Engineer1!)
  • Project Time: ~11 hours implementation
  • Implementation Date: 2025-12-14

6. MSP Toolkit (PowerShell)

  • Path: C:\Users\MikeSwanson\claude-projects\msp-toolkit\
  • Status: Production (web-hosted scripts)
  • Purpose: PowerShell scripts for MSP technicians, web-accessible for remote execution
  • Technologies: PowerShell, web hosting (www.azcomputerguru.com/tools/)
  • Access Methods:
    • Interactive menu: iex (irm azcomputerguru.com/tools/msp-toolkit.ps1)
    • Direct execution: iex (irm azcomputerguru.com/tools/Get-SystemInfo.ps1)
    • Parameterized: iex (irm azcomputerguru.com/tools/msp-toolkit.ps1) -Script systeminfo
  • Available Scripts:
    • Get-SystemInfo.ps1 - System information report
    • Invoke-HealthCheck.ps1 - Health diagnostics
    • Create-LocalAdmin.ps1 - Create local admin account
    • Set-StaticIP.ps1 - Configure static IP
    • Join-Domain.ps1 - Join Active Directory
    • Install-RMMAgent.ps1 - Install RMM agent
  • Configuration Files (JSON):
    • applications.json
    • presets.json
    • scripts.json
    • themes.json
    • tweaks.json
  • Deployment: deploy.bat script uploads to web server
  • Server: ix.azcomputerguru.com (SSH: claude@ix.azcomputerguru.com)
  • Key Files:
    • README.md - Usage and deployment guide
    • msp-toolkit.ps1 - Main launcher
    • scripts/ - Individual PowerShell scripts
    • config/ - Configuration files

7. Cloudflare WHM DNS Manager

  • Path: C:\Users\MikeSwanson\claude-projects\cloudflare-whm\
  • Status: Production
  • Purpose: CLI tool and WHM plugin for managing Cloudflare DNS from cPanel/WHM servers
  • Technologies: Bash (CLI), Perl (WHM plugin), Cloudflare API
  • Components:
    • CLI Tool: cf-dns bash script
    • WHM Plugin: Web-based interface
  • Features:
    • List zones and DNS records
    • Add/delete DNS records
    • One-click M365 email setup (MX, SPF, DKIM, DMARC, Autodiscover)
    • Import new zones to Cloudflare
    • Email DNS verification
  • CLI Commands:
    • cf-dns list-zones - Show all zones
    • cf-dns list example.com - Show records
    • cf-dns add example.com A www 192.168.1.1 - Add record
    • cf-dns add-m365 clientdomain.com tenantname - Add M365 records
    • cf-dns verify-email clientdomain.com - Check email DNS
    • cf-dns import newclient.com - Import zone
  • Installation:
    • CLI: Copy to /usr/local/bin/, create ~/.cf-dns.conf
    • WHM: Run install.sh from whm-plugin/ directory
  • Configuration: ~/.cf-dns.conf (CF_API_TOKEN)
  • WHM Access: Plugins → Cloudflare DNS Manager
  • Key Files:
    • docs/README.md - Complete documentation
    • cli/cf-dns - CLI script
    • whm-plugin/cgi/addon_cloudflareDNS.cgi - WHM interface
    • whm-plugin/lib/CloudflareDNS.pm - Perl module

8. Seafile Microsoft Graph Email Integration

  • Path: C:\Users\MikeSwanson\claude-projects\seafile-graph-email\
  • Status: Partial Implementation (troubleshooting)
  • Purpose: Custom Django email backend for Seafile using Microsoft Graph API
  • Server: 172.16.3.21 (Saturn/Unraid) - Container: seafile
  • URL: https://sync.azcomputerguru.com
  • Seafile Version: Pro 12.0.19
  • Current Status:
    • Direct Django email sending works (tested)
    • Password reset from web UI fails (seafevents background process issue)
  • Problem: Seafevents background email sender not loading custom backend properly
  • Architecture:
    • Synchronous (Django send_mail): Uses EMAIL_BACKEND setting - WORKING
    • Asynchronous (seafevents worker): Not loading custom path - BROKEN
  • Files on Server:
    • Custom backend: /shared/custom/graph_email_backend.py
    • Config: /opt/seafile/conf/seahub_settings.py
    • Seafevents: /opt/seafile/conf/seafevents.conf
  • Azure App Registration:
    • Tenant: ce61461e-81a0-4c84-bb4a-7b354a9a356d
    • App ID: 15b0fafb-ab51-4cc9-adc7-f6334c805c22
    • Sender: noreply@azcomputerguru.com
    • Permission: Mail.Send (Application)
  • Key Files:
    • README.md - Status, problem description, testing commands
  • SSH Access: root@172.16.3.21

Reference/Support Projects

9. WHM DNS Cleanup

  • Path: C:\Users\MikeSwanson\claude-projects\whm-dns-cleanup\
  • Status: Completed (one-time project)
  • Purpose: WHM DNS cleanup and recovery project
  • Key Files:
    • WHM-DNS-Cleanup-Report-2025-12-09.md - Cleanup report
    • WHM-Recovery-Data-2025-12-09.md - Recovery data

10. Autocode Remix

  • Path: C:\Users\MikeSwanson\claude-projects\Autocode-remix\
  • Status: Reference/Development
  • Purpose: Fork/remix of Autocoder project
  • Contains Multiple Versions:
    • Autocode-fork/ - Original fork
    • autocoder-master/ - Master branch
    • Autocoder-2.0/ - Version 2.0
    • Autocoder-2.0 - Copy/ - Backup copy
  • Key Files:
    • CLAUDE.md files in each version
    • ARCHITECTURE.md - System architecture
    • .github/workflows/ci.yml - CI/CD configuration

11. Claude Settings

  • Path: C:\Users\MikeSwanson\claude-projects\claude-settings\
  • Status: Configuration
  • Purpose: Claude Code settings and configuration
  • Key Files:
    • settings.json - Claude Code settings

Infrastructure Overview

Servers Documented

Server IP OS Purpose Location
Jupiter 172.16.3.20 Unraid Primary server (Gitea, NPM, GuruRMM) LAN
Saturn 172.16.3.21 Unraid Secondary (Seafile) LAN
pfSense 172.16.0.1 pfSense Firewall, Tailscale gateway LAN
Build Server 172.16.3.30 Ubuntu 22.04 GuruRMM cross-platform builds LAN
WebSvr websvr.acghosting.com cPanel WHM/cPanel hosting External
IX ix.azcomputerguru.com cPanel WHM/cPanel hosting External (VPN)
AD2 192.168.0.6 Windows Server Dataforth production server Dataforth LAN
D2TESTNAS 192.168.0.9 NetGear ReadyNAS Dataforth SMB1 proxy Dataforth LAN

Services

Service External URL Internal Purpose
Gitea https://git.azcomputerguru.com 172.16.3.20:3000 Git hosting
NPM Admin - 172.16.3.20:7818 Nginx Proxy Manager
GuruRMM API https://rmm-api.azcomputerguru.com 172.16.3.20:3001 RMM server
Seafile https://sync.azcomputerguru.com 172.16.3.21 File sync
Dataforth Test DB http://192.168.0.6:3000 192.168.0.6:3000 Test results

Session Logs Overview

Main Session Logs

  • Path: C:\Users\MikeSwanson\claude-projects\session-logs\
  • Contains: 20+ session logs (2025-12-12 through 2025-12-20)
  • Key Sessions:
    • 2025-12-14-dataforth-dos-machines.md - Dataforth implementation
    • 2025-12-15-gururmm-agent-services.md - GuruRMM agent work
    • 2025-12-15-grabbanddurando-*.md - Client work (multiple sessions)
    • 2025-12-16 to 2025-12-20 - Various development sessions

GuruRMM Session Logs

  • Path: C:\Users\MikeSwanson\claude-projects\gururmm\session-logs\
  • Contains:
    • 2025-12-15-build-server-setup.md - Build server configuration
    • 2025-12-20-v040-build.md - Version 0.40 build notes

Shared Data

Credentials File

  • Path: C:\Users\MikeSwanson\claude-projects\shared-data\credentials.md
  • Purpose: Centralized credential storage (UNREDACTED)
  • Sections:
    • Infrastructure - SSH Access (GuruRMM, Jupiter, AD2, D2TESTNAS)
    • Services - Web Applications (Gitea, ClaudeTools API)
    • Projects - ClaudeTools (Database, API auth, encryption keys)
    • Projects - Dataforth DOS (Update workflow, key files, folder structure)

Commands

  • Path: C:\Users\MikeSwanson\claude-projects.claude\commands\
  • Contains:
    • context.md - Context search command
    • s.md - Short save command
    • save.md - Save session log command
    • sync.md - Sync command

Technologies Used Across Projects

Languages

  • Rust (GuruRMM, GuruConnect, MSP Toolkit Rust)
  • PowerShell (MSP Toolkit, various scripts)
  • JavaScript/TypeScript (React dashboards)
  • Python (Seafile backend)
  • Perl (WHM plugins)
  • Bash (CLI tools, automation)
  • HTML/CSS (Website)
  • DOS Batch (Dataforth)

Frameworks & Libraries

  • React + Vite + TypeScript (dashboards)
  • Axum (Rust web framework)
  • Tokio (Rust async runtime)
  • Django (Seafile integration)
  • Protocol Buffers (GuruConnect)

Infrastructure

  • Docker + Docker Compose
  • Unraid (Jupiter, Saturn)
  • Ubuntu Server (build server)
  • Windows Server (Dataforth AD2)
  • cPanel/WHM (hosting)
  • Netgear ReadyNAS (Dataforth NAS)

Databases

  • PostgreSQL (GuruRMM, planned)
  • MariaDB (ClaudeTools API)
  • Redis (planned for caching)

APIs & Integration

  • Microsoft Graph API (Seafile email)
  • Cloudflare API (DNS management)
  • DattoRMM API (planned)
  • Autotask API (planned)
  • IT Glue API (planned)
  • Kaseya 365 API (planned)

Repository Information

Gitea Repositories

  • Gitea URL: https://git.azcomputerguru.com
  • Main User: azcomputerguru
  • Repositories:
    • azcomputerguru/gururmm - GuruRMM project
    • azcomputerguru/claude-projects - All projects
    • azcomputerguru/ai-3d-printing - 3D printing projects
  • Authentication:
  • SSH: git.azcomputerguru.com:2222

Client Work Documented

Dataforth Corporation

  • Project: DOS Test Machines SMB1 Proxy
  • Status: Production
  • Network: 192.168.0.0/24
  • Key Systems: AD2 (192.168.0.6), D2TESTNAS (192.168.0.9)
  • VPN: OpenVPN configuration available

Grabb & Durando (BGBuilders)

  • Multiple sessions documented: 2025-12-15
  • Work: Data migration, Calendar fixes, User reports, MariaDB fixes
  • DNS: bgbuilders-dns-records.txt, bgbuildersllc-godaddy-zonefile.txt

RalphsTransfer

  • Security audit: ralphstransfer-security-audit-2025-12-12.md

Lehman

  • Cleanup work: cleanup-lehman.ps1, scan-lehman.ps1
  • Duplicate contacts/events: lehman-dup-contacts.csv, lehman-dup-events.csv

Key Decisions & Context

GuruRMM Design Decisions

  1. WebSocket-based communication for real-time agent updates
  2. Rust for performance, safety, and cross-platform support
  3. React + Vite for modern, fast dashboard
  4. JWT authentication for API security
  5. Docker deployment for easy infrastructure management
  6. True integration philosophy - avoid Datto anti-pattern (separate products with APIs)

MSP Toolkit Design Decisions

  1. Workflow automation - auto-document and auto-track time
  2. AES-256-GCM encryption for credential storage
  3. Modular platform integrations - enable/disable per platform
  4. Async operations for performance
  5. Configuration-driven setup

Dataforth DOS Solution

  1. Netgear ReadyNAS as SMB1 proxy (modern servers can't use SMB1)
  2. Bidirectional sync for data flow (test results up, software down)
  3. TODO.BAT pattern for one-time remote commands
  4. UPDATE.BAT for centralized software management
  5. WINS server critical for NetBIOS name resolution

Website2025 Design Decisions

  1. Static site instead of WordPress (cleaner, faster, no bloat)
  2. CSS Variables for consistent theming
  3. Mega menu for service organization
  4. Responsive design with clear breakpoints
  5. Fixed header with scroll-triggered effects

Pending Work & Priorities

GuruRMM

  • Complete Phase 1 MVP (basic monitoring operational)
  • Build updated agent with extended metrics
  • Cross-platform builds (Linux/Windows/macOS)
  • Agent updates via server (built-in handler, not shell script)
  • System tray implementation (Windows/macOS)
  • Remote commands execution

MSP Toolkit Rust

  • Complete Phase 2 core integrations
  • DattoRMM client implementation
  • Autotask client implementation
  • IT Glue client implementation
  • Workflow system implementation

Dataforth DOS

  • Datasheets share creation on AD2 (BLOCKED - waiting for Engineering)
  • Update network config on remaining ~27 DOS machines
  • DattoRMM monitoring integration
  • Future: VLAN isolation, modernization planning

Website2025

  • Complete static site pages (services, about, contact)
  • Mobile optimization
  • Content migration from old WordPress site
  • Testing and launch

Seafile Email

  • Fix seafevents background email sender (move backend to Seafile Python path)
  • OR disable background sender, rely on synchronous email
  • Test password reset functionality

Important Notes for Context Recovery

Credentials Location

Primary: C:\Users\MikeSwanson\claude-projects\shared-data\credentials.md Project-Specific: Each project folder may have CREDENTIALS.md

Session Logs

Main: C:\Users\MikeSwanson\claude-projects\session-logs
Project-Specific: {project}/session-logs/

When User References Previous Work

  1. Use /context command - Searches session logs and credentials.md
  2. Never ask user for information already in logs/credentials
  3. Apply found information - Connect to servers, continue work
  4. Report findings - Summarize relevant credentials and previous work

SSH Access Patterns

  • Jupiter/Saturn: SSH key authentication (Tailscale or direct LAN)
  • Build Server: SSH with password
  • Dataforth NAS: SSH root@192.168.0.9 (ed25519 key or password)
  • WHM Servers: SSH claude@ix.azcomputerguru.com (password)

Quick Command Reference

GuruRMM

# Start dashboard dev server
cd gururmm/dashboard && npm run dev

# Build agent
cd gururmm/agent && cargo build --release

# Deploy to server
ssh root@172.16.3.20
cd /mnt/user/appdata/gururmm/

Dataforth DOS

# SSH to NAS
ssh root@192.168.0.9

# Check sync status
cat /var/log/ad2-sync.log

# Manual sync
/root/sync-to-ad2.sh

MSP Toolkit

# Run from web
iex (irm azcomputerguru.com/tools/msp-toolkit.ps1)

# Build Rust version
cd msp-toolkit-rust && cargo build --release

Cloudflare DNS

# List zones
cf-dns list-zones

# Add M365 records
cf-dns add-m365 clientdomain.com tenantname

File Organization

Project Documentation Standard

Most projects follow this structure:

  • CLAUDE.md - Development guide for Claude Code
  • README.md - User documentation
  • CREDENTIALS.md - Project-specific credentials (if applicable)
  • session-logs/ - Session notes and work logs
  • docs/ - Additional documentation

Configuration Files

  • .env - Environment variables (gitignored)
  • config.toml / settings.json - Application config
  • docker-compose.yml - Container orchestration

Data Import Recommendations

Priority 1 (Import First)

  1. GuruRMM - Active development, multiple infrastructure dependencies
  2. Dataforth DOS - Production system, detailed infrastructure
  3. MSP Toolkit Rust - Active development, API integrations
  4. Website2025 - Active client work

Priority 2 (Import Next)

  1. GuruConnect - Related to GuruRMM
  2. Cloudflare WHM - Production tool
  3. MSP Toolkit PowerShell - Production scripts
  4. Seafile Email - Operational troubleshooting

Priority 3 (Reference)

  1. WHM DNS Cleanup - Completed project
  2. Autocode Remix - Reference material
  3. Claude Settings - Configuration

Credentials to Import

  • All server SSH access (8 servers)
  • All service credentials (Gitea, APIs, databases)
  • Client-specific credentials (Dataforth VPN, etc.)

Infrastructure to Import

  • Server inventory (8 servers with roles, IPs, OS)
  • Service endpoints (internal and external URLs)
  • Network topology (especially Dataforth network)

Conclusion

This catalog represents the complete project landscape from the claude-projects directory. It documents:

  • 11 major projects (4 active development, 4 production, 3 reference)
  • 8 infrastructure servers with complete details
  • 5+ service endpoints (Gitea, GuruRMM, Seafile, etc.)
  • Multiple client projects (Dataforth, BGBuilders, RalphsTransfer, Lehman)
  • 20+ session logs documenting detailed work

All information is ready for import into the ClaudeTools tracking system for comprehensive context management.


Generated by: Claude Sonnet 4.5 Date: 2026-01-26 Source Directory: C:\Users\MikeSwanson\claude-projects
Total Files Scanned: 100+ markdown files, multiple CLAUDE.md, README.md, and project documentation files