I am learning more than I thought I would ever learn. It is a challenge. There isn't enough time in the day. But if it was easy anyone could do it.. Thanks for your help.
Lewis On Thu, May 28, 2015 at 1:37 PM, Josh Thompson <[email protected]> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Lewis, > > It sounds like you are progressing pretty well with VCL! > > Deleting things depends on how you have VCL set up. With VMware, the image > files will at least be in a datastore. You could also have copies of them > in > a different format in a repository, if you have one set up. I've not used > the > XenServer patch. So, I'm not sure where it will place files. > > As an example, if your query gave you a file named "linux-CentOS6-5-v0" > that > had been flagged as deleted, and you had a repository mounted on your > management node under "/install/vmware_repository", you could delete the > directory and its contents located at "/install/vmware_repository/linux- > CentOS6-5-v0". You would also need to delete the directory for that image > from the datastore being used by your VMware host servers. If you have > that > mounted from NFS, and also have it mounted on your management node, you > could > delete them that way. For example, if it was mounted at > "/install/vmware_datastore", you could delete the directory and its > contents > located at "/install/vmware_datastore/linux-CentOS6-5-v0". If you have it > set > up as a vmfs filesystem that is only available on the VMware hosts > themselves, > you could ssh to a host server from your management node, and delete it > from > there. You'll find everything mounted under /vmfs/volumes. An example > would > be deleting "/vmfs/volumes/datastore/linux-CentOS6-5-v0" and all of its > contents. > > Josh > > On Thursday, May 28, 2015 1:56:26 PM Litchfield, Elwin L. wrote: > > Sorry, I didn't have the nerve to try 2.4.2, I am waiting for it to > settle > > down before jumping in way over my head. 2.3.2 is over my head & I am > > slowly learning how to use it. Now that I have the list of deleted = 1, > I > > have been looking in the PHP and MySql book to figure how to delete the > > unwanted images & am totally lost. Can you point me in the correct > > direction. > > > > Thanks. > > > > Lewis Litchfield > > Technology Services – Viking Center Lab > > University of South Florida Sarasota-Manatee > > 941-359-4231 > > > > ________________________________________ > > From: Josh Thompson <[email protected]> > > Sent: Wednesday, May 27, 2015 11:02 AM > > To: [email protected] > > Subject: Re: vcld.log > > > > - gpg control packet > > Lewis, > > > > Under Manage Images, you can delete images (including all of their > > revisions) as well as deleting specific revisions (after clicking Edit > next > > for that image). However, doing this only flags them as deleted in the > > database. As a measure to prevent images from accidentally being > > permanently deleted, they are not automatically deleted. The following > > command should give you a list of base names for images that can then be > > manually deleted: > > > > mysql vcl -e "SELECT imagename FROM imagerevision WHERE deleted = 1" > > > > Also, in 2.4.2, you can delete VMware based images by using "vcl > --setup". > > > > Josh > > > > On Wednesday, May 27, 2015 9:47:38 AM Elwin Litchfield wrote: > > > Thanks, is there a way to remove deleted images? > > > > > > On Wed, May 27, 2015 at 9:08 AM, Josh Thompson <[email protected] > > > > > > > > wrote: > > > > -----BEGIN PGP SIGNED MESSAGE----- > > > > Hash: SHA1 > > > > > > > > Lewis, > > > > > > > > That is correct. However, if you can successfully make an imaging > > > > reservation > > > > and connect to it, you can use that as your starting point for > updating > > > > your > > > > firewall configuration. Then, just save it off as a new revision of > the > > > > image > > > > or as a new image. > > > > > > > > Josh > > > > > > > > On Tuesday, May 26, 2015 7:52:23 PM Litchfield, Elwin L. wrote: > > > > > I assume this configuration must be done before the image is > created. > > > > > > > > > > > > > > > Lewis Litchfield > > > > > Technology Services – Viking Center Lab > > > > > University of South Florida Sarasota-Manatee > > > > > 941-359-4231 > > > > > > > > > > ________________________________________ > > > > > From: Josh Thompson <[email protected]> > > > > > Sent: Tuesday, May 26, 2015 3:40 PM > > > > > To: [email protected] > > > > > Subject: Re: vcld.log > > > > > > > > > > Elwin, > > > > > > > > > > I can't find any docs on how you are supposed to configure the > > > > > firewall > > > > > > > > for > > > > > > > > > a base linux image under 2.3.2, and I don't remember the details of > > > > > it. > > > > > > > > I > > > > > > > > > think something like the following should get your working. > > > > > > > > > > First, stop iptables to clear all of the tables: > > > > > > > > > > service iptables stop > > > > > > > > > > Create a custom table - you can name it anything, we'll go with > "VCL". > > > > > > > > > > iptables -N VCL > > > > > > > > > > Create a rule in INPUT that jumps to the VCL table for everything: > > > > > > > > > > iptables -A INPUT -j VCL > > > > > > > > > > Add a few important rules to the VCL table: > > > > > > > > > > iptables -A VCL -i lo -j ACCEPT > > > > > iptables -A VCL -m state --state RELATED,ESTABLISHED -j ACCEPT > > > > > iptables -A VCL -p icmp -m icmp --icmp-type any -j ACCEPT > > > > > > > > > > Add a rule to the VCL table to accept traffic from your management > > > > > node: > > > > > > > > > > iptables -A VCL -s <management node IP> -m state --state NEW -m > tcp -p > > > > > > > > tcp > > > > > > > > > -- dport 22 -j ACCEPT > > > > > > > > > > Add a rule to the VCL table to reject other traffic: > > > > > > > > > > iptables -A VCL -j REJECT --reject-with icmp-host-prohibited > > > > > > > > > > Save the new configuration: > > > > > > > > > > service iptables save > > > > > > > > > > If I remember correctly, VCL should then manage required additions > and > > > > > removals on the INPUT table, and leave the VCL table alone, and > since > > > > > the > > > > > VCL table has a rule allowing traffic from your management node, it > > > > > > > > should > > > > > > > > > stop shutting itself out. > > > > > > > > > > Let me know if this works for you. > > > > > > > > > > Josh > > > > > > > > > > On Tuesday, May 26, 2015 1:13:37 PM Elwin Litchfield wrote: > > > > > > Everything seemed to work till the reservation was over. Port > 22 is > > > > > > blocked, but ping is OK & port 3389 is still available & > connection > > > > > > > > with > > > > > > > > > > admin ID & password presented at the beginning of the > reservation. > > > > > > I > > > > > > > > have > > > > > > > > > > bee reading the vcld.log & am unable to make any sense of it. > Can > > > > > > you > > > > > > help > > > > > > me understand what is hapening? > > > > > > > > > > > > > > > > > > Thanks 2015-05-26 > > > > > > 12:26:32|9344|46:46|timeout|utils.pm: > run_ssh_command(4902)|executing > > > > > > > > > > > > SSH command on VM7Cent6VCL1: > > > > > > |9344|46:46|timeout| /usr/bin/ssh -i /etc/vcl/vcl.key -o > > > > > > > > > > > > StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o > > > > > > ConnectionAttempts=1 -o ConnectTimeout=3 -l root -p 22 -x > > > > > > VM7Cent6VCL1 > > > > > > '/sbin/chkconfig --list iptables' 2>&1 > > > > > > 2015-05-26 > > > > > > > 12:26:32|9344|46:46|timeout|Linux.pm:service_exists(3186)|'iptables' > > > > > > service exists > > > > > > 2015-05-26 > > > > > > 12:26:32|9344|46:46|timeout|utils.pm: > run_ssh_command(4902)|executing > > > > > > > > > > > > SSH command on VM7Cent6VCL1: > > > > > > |9344|46:46|timeout| /usr/bin/ssh -i /etc/vcl/vcl.key -o > > > > > > > > > > > > StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o > > > > > > ConnectionAttempts=1 -o ConnectTimeout=3 -l root -p 22 -x > > > > > > VM7Cent6VCL1 > > > > > > 'iptables -L --line-number -n' 2>&1 > > > > > > 2015-05-26 > > > > > > > > > > 12:26:33|9344|46:46|timeout|utils.pm: > > > > run_ssh_command(5020)|run_ssh_command > > > > > > > > > > output: > > > > > > |9344|46:46|timeout| Chain INPUT (policy ACCEPT) > > > > > > |9344|46:46|timeout| num target prot opt source destination > > > > > > |9344|46:46|timeout| 1 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state > > > > > > > > > > > > NEW,RELATED,ESTABLISHED tcp dpt:22 > > > > > > > > > > > > |9344|46:46|timeout| 2 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state > > > > > > > > > > > > RELATED,ESTABLISHED > > > > > > > > > > > > |9344|46:46|timeout| 3 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 > > > > > > |9344|46:46|timeout| 4 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 > > > > > > |9344|46:46|timeout| 5 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state > NEW > > > > > > |tcp > > > > > > > > > > > > dpt:443 > > > > > > > > > > > > |9344|46:46|timeout| 6 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state > NEW > > > > > > |tcp > > > > > > > > > > > > dpt:80 > > > > > > > > > > > > |9344|46:46|timeout| 7 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state > NEW > > > > > > |tcp > > > > > > > > > > > > dpt:3389 > > > > > > > > > > > > |9344|46:46|timeout| 8 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state > NEW > > > > > > |udp > > > > > > > > > > > > dpt:3389 > > > > > > > > > > > > |9344|46:46|timeout| 9 REJECT all -- 0.0.0.0/0 0.0.0.0/0 > reject-with > > > > > > > > > > > > icmp-host-prohibited > > > > > > > > > > > > |9344|46:46|timeout| Chain FORWARD (policy ACCEPT) > > > > > > |9344|46:46|timeout| num target prot opt source destination > > > > > > |9344|46:46|timeout| 1 REJECT all -- 0.0.0.0/0 0.0.0.0/0 > reject-with > > > > > > > > > > > > icmp-host-prohibited > > > > > > > > > > > > |9344|46:46|timeout| Chain OUTPUT (policy ACCEPT) > > > > > > |9344|46:46|timeout| num target prot opt source destination > > > > > > > > > > > > 2015-05-26 12:26:33|9344|46:46|timeout|utils.pm: > > > > run_ssh_command(5034)|SSH > > > > > > > > > > command executed on VM7Cent6VCL1, returning (0, "Chain INPUT > (policy > > > > > > ACCEPT) nu...") > > > > > > 2015-05-26 > > > > > > > > > 12:26:33|9344|46:46|timeout|Linux.pm:get_firewall_configuration(3991)|ou > > > > tp > > > > > > > > > > ut Chain = INPUT > > > > > > 2015-05-26 > > > > > > > > > 12:26:33|9344|46:46|timeout|Linux.pm:get_firewall_configuration(4007)|ou > > > > tp > > > > > > > > > > ut rule: 1, ACCEPT, tcp, 0.0.0.0/0, 0.0.0.0/0, 22 > > > > > > 2015-05-26 > > > > > > > > > 12:26:35|9344|46:46|timeout|Linux.pm:get_firewall_configuration(4007)|ou > > > > tp > > > > > > > > > > ut rule: 5, ACCEPT, tcp, 0.0.0.0/0, 0.0.0.0/0, 443 > > > > > > 2015-05-26 > > > > > > > > > 12:26:36|9344|46:46|timeout|Linux.pm:get_firewall_configuration(4007)|ou > > > > tp > > > > > > > > > > ut rule: 6, ACCEPT, tcp, 0.0.0.0/0, 0.0.0.0/0, 80 > > > > > > 2015-05-26 > > > > > > > > > 12:26:36|9344|46:46|timeout|Linux.pm:get_firewall_configuration(4007)|ou > > > > tp > > > > > > > > > > ut rule: 7, ACCEPT, tcp, 0.0.0.0/0, 0.0.0.0/0, 3389 > > > > > > 2015-05-26 12:26:36|26123|vcld:main(167)|lastcheckin time updated > > > > > > for > > > > > > management node 1: 2015-05-26 12:26:36 > > > > > > 2015-05-26 > > > > > > > > > 12:26:37|9344|46:46|timeout|Linux.pm:get_firewall_configuration(4007)|ou > > > > tp > > > > > > > > > > ut rule: 8, ACCEPT, udp, 0.0.0.0/0, 0.0.0.0/0, 3389 > > > > > > 2015-05-26 > > > > > > > > > 12:26:38|9344|46:46|timeout|Linux.pm:get_firewall_configuration(3991)|ou > > > > tp > > > > > > > > > > ut Chain = FORWARD > > > > > > 2015-05-26 > > > > > > > > > 12:26:38|9344|46:46|timeout|Linux.pm:get_firewall_configuration(3991)|ou > > > > tp > > > > > > > > > > ut Chain = OUTPUT > > > > > > 2015-05-26 > > > > > > > > > 12:26:38|9344|46:46|timeout|Linux.pm:get_firewall_configuration(4050)|re > > > > tr > > > > > > > > > > ie ved > > > > > > > > > > > > firewall configuration from VM7Cent6VCL1: > > > > > > |9344|46:46|timeout| : { > > > > > > |9344|46:46|timeout| : "FORWARD" => { > > > > > > |9344|46:46|timeout| : "1" => { > > > > > > |9344|46:46|timeout| : "all" => { > > > > > > |9344|46:46|timeout| : "any" => { > > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "name" => "any", > > > > > > |9344|46:46|timeout| : "number" => 1, > > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "target" => "REJECT" > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : }, > > > > > > |9344|46:46|timeout| : "INPUT" => { > > > > > > |9344|46:46|timeout| : "1" => { > > > > > > |9344|46:46|timeout| : "tcp" => { > > > > > > |9344|46:46|timeout| : "22" => { > > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "name" => "ssh", > > > > > > |9344|46:46|timeout| : "number" => 1, > > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : }, > > > > > > |9344|46:46|timeout| : "2" => { > > > > > > |9344|46:46|timeout| : "all" => { > > > > > > |9344|46:46|timeout| : "any" => { > > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "name" => "any", > > > > > > |9344|46:46|timeout| : "number" => 2, > > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : }, > > > > > > |9344|46:46|timeout| : "3" => { > > > > > > |9344|46:46|timeout| : "icmp" => { > > > > > > |9344|46:46|timeout| : "any" => { > > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "name" => "any", > > > > > > |9344|46:46|timeout| : "number" => 3, > > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : }, > > > > > > |9344|46:46|timeout| : "4" => { > > > > > > |9344|46:46|timeout| : "all" => { > > > > > > |9344|46:46|timeout| : "any" => { > > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "name" => "any", > > > > > > |9344|46:46|timeout| : "number" => 4, > > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : }, > > > > > > |9344|46:46|timeout| : "5" => { > > > > > > |9344|46:46|timeout| : "tcp" => { > > > > > > |9344|46:46|timeout| : "443" => { > > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "name" => "https", > > > > > > |9344|46:46|timeout| : "number" => 5, > > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : }, > > > > > > |9344|46:46|timeout| : "6" => { > > > > > > |9344|46:46|timeout| : "tcp" => { > > > > > > |9344|46:46|timeout| : "80" => { > > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "name" => "http", > > > > > > |9344|46:46|timeout| : "number" => 6, > > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : }, > > > > > > |9344|46:46|timeout| : "7" => { > > > > > > |9344|46:46|timeout| : "tcp" => { > > > > > > |9344|46:46|timeout| : "3389" => { > > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "name" => "ms-wbt-server", > > > > > > |9344|46:46|timeout| : "number" => 7, > > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : }, > > > > > > |9344|46:46|timeout| : "8" => { > > > > > > |9344|46:46|timeout| : "udp" => { > > > > > > |9344|46:46|timeout| : "3389" => { > > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "name" => "ms-wbt-server", > > > > > > |9344|46:46|timeout| : "number" => 8, > > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : }, > > > > > > |9344|46:46|timeout| : "9" => { > > > > > > |9344|46:46|timeout| : "all" => { > > > > > > |9344|46:46|timeout| : "any" => { > > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "name" => "any", > > > > > > |9344|46:46|timeout| : "number" => 9, > > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > > |9344|46:46|timeout| : "target" => "REJECT" > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > |9344|46:46|timeout| : } > > > > > > > > > > > > 2015-05-26 > > > > > > > > > 12:26:38|9344|46:46|timeout|Linux.pm:disable_firewall_port(3783)|attempt > > > > in > > > > > > > > > > g > > > > > > to execute command on VM7Cent6VCL1: 'iptables -D INPUT 1' > > > > > > 2015-05-26 > > > > > > 12:26:38|9344|46:46|timeout|utils.pm: > run_ssh_command(4902)|executing > > > > > > > > > > > > SSH command on VM7Cent6VCL1: > > > > > > |9344|46:46|timeout| /usr/bin/ssh -i /etc/vcl/vcl.key -o > > > > > > > > > > > > StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o > > > > > > ConnectionAttempts=1 -o ConnectTimeout=3 -l root -p 22 -x > > > > > > VM7Cent6VCL1 > > > > > > 'iptables -D INPUT 1' 2>&1 > > > > > > 2015-05-26 > > > > > > > > > > 12:26:39|9344|46:46|timeout|utils.pm: > > > > run_ssh_command(5020)|run_ssh_command > > > > > > > > > > output: > > > > > > > > > > 2015-05-26 12:26:39|9344|46:46|timeout|utils.pm: > > > > run_ssh_command(5034)|SSH > > > > > > > > > > command executed on VM7Cent6VCL1, returning (0, "") > > > > > > 2015-05-26 > > > > > > > > > 12:26:39|9344|46:46|timeout|Linux.pm:disable_firewall_port(3785)|execute > > > > d > > > > > > > > > > command on VM7Cent6VCL1: 'iptables -D INPUT 1' > > > > > > 2015-05-26 > > > > > > 12:26:39|9344|46:46|timeout|utils.pm: > run_ssh_command(4902)|executing > > > > > > > > > > > > SSH command on VM7Cent6VCL1: > > > > > > |9344|46:46|timeout| /usr/bin/ssh -i /etc/vcl/vcl.key -o > > > > > > > > > > > > StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o > > > > > > ConnectionAttempts=1 -o ConnectTimeout=3 -l root -p 22 -x > > > > > > VM7Cent6VCL1 > > > > > > '/sbin/iptables-save > /etc/sysconfig/iptables' 2>&1 > > > > > > > > > > > > |9344|46:46|timeout| ---- WARNING ---- > > > > > > |9344|46:46|timeout| 2015-05-26 > > > > > > > > > > > > 12:26:39|9344|46:46|timeout|utils.pm: > run_ssh_command(5006)|attempt > > > > > > > > > > 1/3: failed to execute SSH command on VM7Cent6VCL1: > > > > '/sbin/iptables-save > > > > > > > > > > > /etc/sysconfig/iptables', exit status: 255, output: > > > > > > |9344|46:46|timeout| ssh output (/sbin/ipta...): ssh: connect to > > > > > > |host > > > > > > > > > > > > VM7Cent6VCL1 port 22: No route to host > > > > > > > > > > > > |9344|46:46|timeout| ( 0) utils.pm, run_ssh_command (line: 5006) > > > > > > |9344|46:46|timeout| (-1) OS.pm, execute (line: 1992) > > > > > > |9344|46:46|timeout| (-2) Linux.pm, disable_firewall_port (line: > > > > > > |3794) > > > > > > |9344|46:46|timeout| (-3) OS.pm, process_connect_methods (line: > > > > > > |2576) > > > > > > |9344|46:46|timeout| (-4) Linux.pm, sanitize (line: 1172) > > > > > > |9344|46:46|timeout| (-5) reclaim.pm, call_os_sanitize (line: > 271) > > > > > > > > > > > > 2015-05-26 > > > > > > 12:26:39|9344|46:46|timeout|utils.pm: > run_ssh_command(4894)|sleeping > > > > > > > > for 2 > > > > > > > > > > seconds before making next SSH attempt > > > > > > 201 > > > > > > > > > > > > Thanks > > > > > > > > > > > > Lewis > > > > > > > > > > -- > > > > > ------------------------------- > > > > > Josh Thompson > > > > > VCL Developer > > > > > North Carolina State University > > > > > > > > > > my GPG/PGP key can be found at pgp.mit.edu > > > > > > > > > > All electronic mail messages in connection with State business > which > > > > > are sent to or received by this account are subject to the NC > Public > > > > > Records Law and may be disclosed to third parties. > > > > > > > > - -- > > > > - ------------------------------- > > > > Josh Thompson > > > > VCL Developer > > > > North Carolina State University > > > > > > > > my GPG/PGP key can be found at pgp.mit.edu > > > > > > > > All electronic mail messages in connection with State business which > > > > are sent to or received by this account are subject to the NC Public > > > > Records Law and may be disclosed to third parties. > > > > -----BEGIN PGP SIGNATURE----- > > > > Version: GnuPG v2 > > > > > > > > iEYEARECAAYFAlVlweoACgkQV/LQcNdtPQMQMwCeKII154mTy404UH9lVj7Jay/C > > > > BFkAn1bCP/vRTeQIFeOsz73Rx/dDUL13 > > > > =1olU > > > > -----END PGP SIGNATURE----- > > > > -- > > ------------------------------- > > Josh Thompson > > VCL Developer > > North Carolina State University > > > > my GPG/PGP key can be found at pgp.mit.edu > > > > All electronic mail messages in connection with State business which > > are sent to or received by this account are subject to the NC Public > > Records Law and may be disclosed to third parties. > - -- > - ------------------------------- > Josh Thompson > VCL Developer > North Carolina State University > > my GPG/PGP key can be found at pgp.mit.edu > > All electronic mail messages in connection with State business which > are sent to or received by this account are subject to the NC Public > Records Law and may be disclosed to third parties. > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v2 > > iEUEARECAAYFAlVnUlMACgkQV/LQcNdtPQPQiQCfX8xKdZwzBEN1CgYTTiObgvL5 > iqgAmK4jDZzJBILWcY8c5YW0P30xkzI= > =i4iw > -----END PGP SIGNATURE----- > >
