- Imported AD1 Claude session files to clients/dataforth/session-logs/ - Created memory: project_datasheet_pipeline.md (full pipeline architecture) - Created memory: project_dataforth_incident_2026-03-27.md (security incident + MFA) - Updated MEMORY.md index - Updated session log with AD1 pipeline rebuild findings Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2.3 KiB
2.3 KiB
Memory Index
Reference
- Community Forum (Flarum) - Flarum forum at community.azcomputerguru.com, API access, database, posting workflow
- Radio Show Website - Astro static site at radio.azcomputerguru.com on IX server
- IX Server SSH Access - SSH access notes, no key auth from CachyOS workstation yet
- IX Access via Tailscale - IX server accessible with Tailscale on, no VPN needed
- Neptune Access via D2TESTNAS - Neptune must be routed through D2TESTNAS
- CachyOS Workstation Setup - Dual NVMe, autostart apps, key fixes applied, old home location
- Matomo Analytics - Self-hosted analytics at analytics.azcomputerguru.com, site IDs, tracking for all 3 sites
- Dataforth Contact - AJ - AJ at Dataforth, dataforthgit@ email forwarding to him
Feedback
- D2TESTNAS SSH Access - Use root@192.168.0.9 with Paper123!@#, not sysadmin
- Bypass Permissions Setting - Set permissions.defaultMode to bypassPermissions in settings.json on all machines
Machine
- Windows GURU-BEAST-ROG Setup - Fully configured: Node.js, Ollama (qwen3:14b, nomic-embed-text), GrepAI, MCP servers. Pending: codestral:22b pull
Project
- Audio Processor Architecture - Segment-first pipeline: detect breaks before transcription for complete content capture
- Neptune Email Routing Issues - Multiple clients (devcon, Sorensen/rieussetcorp) have email not routing properly from Neptune
- Neptune SBR Email Routing Setup - Full SBR routing chain, config file locations, MailProtector integration, access methods
- Dataforth Test Datasheet Pipeline - Full pipeline rebuilt 2026-03-27. Server-side generation replaces DFWDS/Uploader. Website upload still broken.
- Dataforth Security Incident - DF-JOEL2 compromised, MFA deployed, IC3 filed. CA policies enforce April 4.