Hi Xiao,

Here is the relevant zone:

zone "morgan.haib.org" in {
  type master;
  file "morgan/db.morgan.haib.org";
  allow-transfer {
    10.20.0.100/32;
    10.20.0.101/32;
   };
   allow-update {
   key "xcat_key";
   };
   notify yes;
};

Its "allow-update" looks the same as the one for zone
"20.10.IN-ADDR.ARPA." I saw no messages in /var/log/messages
concerning named.

But I did just try it again this morning and the opposite happened:
'morgan.haib.org' updated but "20.10.IN-ADDR.ARPA." did not. So the
issue is very inconsistent, other than that one of the two entries
gets omitted. See below (which I have shortened some), and notice
where it says "request is not signed" for the 20.10 zone, but it
signed (this time!) the morgain.haib.org zone:

0-Sep-2014 10:01:39.446 socket 0x7ff551edebc8 172.26.42.60#58640:
packet received correctly
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640: UDP request
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640: using view '_default'
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640: request is not signed
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640: recursion available
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640: query
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640
(20.10.IN-ADDR.ARPA): ns_client_attach: ref = 1
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640
(20.10.IN-ADDR.ARPA): query '20.10.IN-ADDR.ARPA/NS/IN' approved
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640 (20.10.IN-ADDR.ARPA): send
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640 (20.10.IN-ADDR.ARPA): sendto
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640
(20.10.IN-ADDR.ARPA): senddone
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640 (20.10.IN-ADDR.ARPA): next
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640
(20.10.IN-ADDR.ARPA): ns_client_detach: ref = 0
30-Sep-2014 10:01:39.446 client 172.26.42.60#58640
(20.10.IN-ADDR.ARPA): endrequest
30-Sep-2014 10:01:39.446 client @0x7ff5480d7710: udprecv
...
...
30-Sep-2014 10:01:39.454 socket 0x7ff551edebc8 172.26.42.60#42345:
packet received correctly
30-Sep-2014 10:01:39.454 client 172.26.42.60#42345: UDP request
30-Sep-2014 10:01:39.454 client 172.26.42.60#42345: using view '_default'
30-Sep-2014 10:01:39.455 client 172.26.42.60#42345: request has valid
signature: xcat_key
30-Sep-2014 10:01:39.455 client 172.26.42.60#42345/key xcat_key:
recursion available
30-Sep-2014 10:01:39.455 client 172.26.42.60#42345/key xcat_key: update
30-Sep-2014 10:01:39.455 client 172.26.42.60#42345/key xcat_key:
ns_client_attach: ref = 1
30-Sep-2014 10:01:39.455 client 172.26.42.60#42345/key xcat_key:
updating zone 'morgan.haib.org/IN': prerequisites are OK
30-Sep-2014 10:01:39.455 client 172.26.42.60#42345/key xcat_key:
signer "xcat_key" approved
30-Sep-2014 10:01:39.455 client 172.26.42.60#42345/key xcat_key:
update 'morgan.haib.org/IN' approved
30-Sep-2014 10:01:39.455 client 172.26.42.60#42345/key xcat_key:
updating zone 'morgan.haib.org/IN': update section prescan OK
30-Sep-2014 10:01:39.455 client 172.26.42.60#42345/key xcat_key:
updating zone 'morgan.haib.org/IN': adding an RR at
'node0014.morgan.haib.org' A 10.20.101.14
30-Sep-2014 10:01:39.455 client 172.26.42.60#42345/key xcat_key:
updating zone 'morgan.haib.org/IN': checking for NSEC3PARAM changes
30-Sep-2014 10:01:39.455 client 172.26.42.60#42345/key xcat_key:
updating zone 'morgan.haib.org/IN': writing journal
morgan/db.morgan.haib.org.jnl
30-Sep-2014 10:01:39.455 writing to journal
30-Sep-2014 10:01:39.455 del morgan.haib.org. 86400 IN SOA
dns01.morgan.haib.org. root.dns01.morgan.haib.org. 2012080935 10800
3600 604800 86400
30-Sep-2014 10:01:39.455 add morgan.haib.org. 86400 IN SOA
dns01.morgan.haib.org. root.dns01.morgan.haib.org. 2012080936 10800
3600 604800 86400
30-Sep-2014 10:01:39.455 add node0014.morgan.haib.org. 86400 IN A 10.20.101.14
30-Sep-2014 10:01:39.476 client 172.26.42.60#42345/key xcat_key:
updating zone 'morgan.haib.org/IN': committing update transaction
30-Sep-2014 10:01:39.477 zone_needdump: zone morgan.haib.org/IN: enter
30-Sep-2014 10:01:39.477 zone_settimer: zone morgan.haib.org/IN: enter
30-Sep-2014 10:01:39.477 zone_settimer: zone morgan.haib.org/IN: enter

I'll send another email with other possibly relevant details to keep
this one's length down.

-Josh

On Mon, Sep 29, 2014 at 9:40 PM, Xiao Peng Wang <w...@cn.ibm.com> wrote:
> Then, in this case, did you check the 'allow of key xcat_key' has been set
> correctly in name.conf for zone morgan.haib.org? And did you see any useful
> message for this error in the syslog of external server?
>
> Thanks
> Best Regards
> ----------------------------------------------------------------------
> Wang Xiaopeng (王晓朋)
> IBM China System Technology Laboratory
> Tel: 86-10-82453455
> Email: w...@cn.ibm.com
> Address: 28,ZhongGuanCun Software Park,No.8 Dong Bei Wang West Road, Haidian
> District Beijing P.R.China 100193
>
> Josh Nielsen ---2014/09/30 06:49:50---Okay, I have the external DNS server
> working: partly. For some very odd reason the external DNS serv
>
> From: Josh Nielsen <jniel...@hudsonalpha.org>
> To: xCAT Users Mailing list <xcat-user@lists.sourceforge.net>
> Date: 2014/09/30 06:49
> Subject: Re: [xcat-user] Questions on prerequisites for external DNS and
> makedns -e
>
> ________________________________
>
>
>
> Okay, I have the external DNS server working: partly. For some very odd
> reason the external DNS server is only receiving the request to enter the
> reverse lookup for a new node (ex: makedns -e node0014), but does not even
> attempt to add the forward lookup zone. I see the key authorization passed
> successfully for the reverse entry, so there are no authentication issues,
> and when I try a manual 'nsupdate' it adds the forward lookup definition
> just fine:
>
> # nsupdate -k /etc/rndc.key
>> server [external_dns_ip]
>> prereq nxdomain node0014.morgan.haib.org.
>> update add node0014.morgan.haib.org. 300 A 10.20.101.14
>> send
>
> It looks like 'makedns -e node0014' is somehow sending ONLY the reverse
> lookup definition (though this is only a guess). This is what the client
> sees:
>
> [root@JNDev ~]# makedns -e node0014
> Handling node0014 in /etc/hosts.
> Getting reverse zones, this may take several minutes for a large cluster.
> Completed getting reverse zones.
> Updating DNS records, this may take several minutes for a large cluster.
> Error: No reply received when sending DNS update to zone morgan.haib.org.
> Completed updating DNS records.
>
> It updates my reverse zone '20.10.IN-ADDR.ARPA' in the file 'db.10.20' but
> for the DNS zone 'morgan.haib.org' I see the message: "Error: No reply
> received when sending DNS update to zone morgan.haib.org".
>
> Here is what I see from running named in the foreground when running
> "makedns -e node0014":
>
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681: UDP request
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681: using view '_default'
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681: request has valid
> signature: xcat_key
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681/key xcat_key: recursion
> available
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681/key xcat_key: update
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681/key xcat_key:
> ns_client_attach: ref = 1
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681/key xcat_key: updating
> zone '20.10.IN-ADDR.ARPA/IN': prerequisites are OK
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681/key xcat_key: signer
> "xcat_key" approved
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681/key xcat_key: update
> '20.10.IN-ADDR.ARPA/IN' approved
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681/key xcat_key: updating
> zone '20.10.IN-ADDR.ARPA/IN': update section prescan OK
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681/key xcat_key: updating
> zone '20.10.IN-ADDR.ARPA/IN': adding an RR at '14.101.20.10.IN-ADDR.ARPA'
> PTR node0014.morgan.haib.org.
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681/key xcat_key: updating
> zone '20.10.IN-ADDR.ARPA/IN': checking for NSEC3PARAM changes
> 29-Sep-2014 15:13:07.022 client 172.26.42.60#60681/key xcat_key: updating
> zone '20.10.IN-ADDR.ARPA/IN': writing journal morgan/db.10.20.jnl
> 29-Sep-2014 15:13:07.022 writing to journal
> 29-Sep-2014 15:13:07.022 del 20.10.IN-ADDR.ARPA. 86400 IN SOA
> dns01.morgan.haib.org. root.dns01.morgan.haib.org. 2012072410 10800 3600
> 604800 86400
> 29-Sep-2014 15:13:07.022 add 20.10.IN-ADDR.ARPA. 86400 IN SOA
> dns01.morgan.haib.org. root.dns01.morgan.haib.org. 2012072411 10800 3600
> 604800 86400
> 29-Sep-2014 15:13:07.022 add 14.101.20.10.IN-ADDR.ARPA. 86400 IN PTR
> node0014.morgan.haib.org.
> 29-Sep-2014 15:13:07.033 client 172.26.42.60#60681/key xcat_key: updating
> zone '20.10.IN-ADDR.ARPA/IN': committing update transaction
> 29-Sep-2014 15:13:07.034 zone_needdump: zone 20.10.IN-ADDR.ARPA/IN: enter
> 29-Sep-2014 15:13:07.034 zone_settimer: zone 20.10.IN-ADDR.ARPA/IN: enter
> 29-Sep-2014 15:13:07.034 zone_settimer: zone 20.10.IN-ADDR.ARPA/IN: enter
> 29-Sep-2014 15:13:07.034 client 172.26.42.60#60681/key xcat_key: send
> 29-Sep-2014 15:13:07.034 client 172.26.42.60#60681/key xcat_key: sendto
> 29-Sep-2014 15:13:07.034 client 172.26.42.60#60681/key xcat_key: senddone
> 29-Sep-2014 15:13:07.034 client 172.26.42.60#60681/key xcat_key: next
> 29-Sep-2014 15:13:07.034 client 172.26.42.60#60681/key xcat_key:
> ns_client_detach: ref = 0
> 29-Sep-2014 15:13:07.034 client 172.26.42.60#60681/key xcat_key: endrequest
>
> Any ideas what debugging steps I can take to see why the forward lookup is
> not being sent as well? I would love to know the actual command makedns ends
> up executing on the operating system/Linux (unless it uses direct BIND
> library calls from perl instead - but in that case is there any way to print
> out messages from ddns.pm or whatever calls it?).
>
> Thanks,
> Josh Nielsen
>
>
> On Fri, Sep 26, 2014 at 10:03 AM, Josh Nielsen <jniel...@hudsonalpha.org>
> wrote:
>>
>> Thank you for the clarifications. I read the wiki entry on Cluster Name
>> Resolution but wanted to be sure of the particulars.
>>
>> Regards,
>> Josh
>>
>> On Thu, Sep 25, 2014 at 10:36 PM, Xiao Peng Wang <w...@cn.ibm.com> wrote:
>>>
>>> #1, you are right, you need prepare configuration files in external dns
>>> server.
>>>
>>> #2, the xcat_key is gotten from passwd table like this
>>> '"omapi","xcat_key","TjFYM2kwTUNOcWVVZG5QNWFhb2xPVkg1eTZLMXpuSGs=",,,,'
>>>
>>>
>>>
>>> Thanks
>>> Best Regards
>>> ----------------------------------------------------------------------
>>> Wang Xiaopeng (王晓朋)
>>> IBM China System Technology Laboratory
>>> Tel: 86-10-82453455
>>> Email: w...@cn.ibm.com
>>> Address: 28,ZhongGuanCun Software Park,No.8 Dong Bei Wang West Road,
>>> Haidian District Beijing P.R.China 100193
>>>
>>> Josh Nielsen ---2014/09/25 21:58:19---Hi Xiao, Thanks for the response.
>>> So if I have this straight, I need to manually
>>>
>>> From: Josh Nielsen <jniel...@hudsonalpha.org>
>>> To: xCAT Users Mailing list <xcat-user@lists.sourceforge.net>
>>> Date: 2014/09/25 21:58
>>> Subject: Re: [xcat-user] Questions on prerequisites for external DNS and
>>> makedns -e
>>>
>>> ________________________________
>>>
>>>
>>>
>>> Hi Xiao,
>>>
>>> Thanks for the response. So if I have this straight, I need to manually
>>> create and maintain the zone files on the external DNS server, and already
>>> have initially empty (but present) zone files in place. Is that right? And I
>>> imagine that I will need to "allow-update" from the IP of the xCAT server
>>> too.
>>>
>>> Secondly, I still don't quite understand about the xcat_key. On the
>>> server hosting xCAT the xcat_key is typically defined in /etc/rndc.key and
>>> in /etc/named.conf. I should not even need /etc/named.conf since I am not
>>> hosting DNS on the same server as xCAT correct? Or does makedns have some
>>> sort of dependency on a local /etc/named.conf even when pushing externally?
>>> If /etc/named.conf is not needed, however, then where does "makedns" (which
>>> I think ends up running 'nsupdate') read the key from?
>>>
>>> Note that I have already configured the xcat_key on the external DNS
>>> server in its own /etc/named.conf, but I am not asking about that host but
>>> rather the xCAT server (which for purposes of DNS I am calling the
>>> "client").
>>>
>>> Thanks,
>>> Josh
>>>
>>> On Wed, Sep 24, 2014 at 8:59 PM, Xiao Peng Wang <w...@cn.ibm.com> wrote:
>>>
>>> You can NOT depend on xCAT to setup dns server on remote server. You need
>>> get the xcat_key from local dns configuration.
>>>
>>> You need prepare the remote dns ready so that xCAT could push the new dns
>>> entry to the remote dns server, this is what xCAT 'makedns -e' does.
>>>
>>> Thanks
>>> Best Regards
>>> ----------------------------------------------------------------------
>>> Wang Xiaopeng (王晓朋)
>>> IBM China System Technology Laboratory
>>> Tel: 86-10-82453455
>>> Email: w...@cn.ibm.com
>>> Address: 28,ZhongGuanCun Software Park,No.8 Dong Bei Wang West Road,
>>> Haidian District Beijing P.R.China 100193
>>>
>>> Josh Nielsen ---2014/09/25 05:46:04---I'm starting to see an older
>>> conversation that I had back in January of this year in a different lig
>>>
>>> From: Josh Nielsen <jniel...@hudsonalpha.org>
>>> To: xCAT Users Mailing list <xcat-user@lists.sourceforge.net>
>>> Date: 2014/09/25 05:46
>>> Subject: Re: [xcat-user] Questions on prerequisites for external DNS and
>>> makedns -e
>>> ________________________________
>>>
>>>
>>>
>>> I'm starting to see an older conversation that I had back in January
>>> of this year in a different light now:
>>> http://permalink.gmane.org/gmane.comp.clustering.xcat.user/182
>>>
>>> There it was suggested that I "be aware that you may need to run a
>>> separate makedns to populate the local zone files as well as makedns
>>> -e to do the external name servers." Does this mean that an xCAT
>>> installation is required on the external DNS server just to populate
>>> the zones initially? Wouldn't having two xCAT installations, whose
>>> records you have to keep in sync, get tedious after a while? Maybe I'm
>>> misunderstanding how the external DNS solution is supposed to work in
>>> connection with xCAT. Any clarifications are welcome.
>>>
>>> -Josh
>>>
>>> On Wed, Sep 24, 2014 at 4:03 PM, Josh Nielsen <jniel...@hudsonalpha.org>
>>> wrote:
>>> > Hello all,
>>> >
>>> > I am in the process of trying to move to an external DNS implementation
>>> > for
>>> > name resolution with our compute cluster. The only requirement I see in
>>> > the
>>> > man page for makedns is to have one (and only one?) IP of the external
>>> > DNS
>>> > server that you want to update in /etc/resolv.conf and also a valid
>>> > xcat_key.
>>> >
>>> > Firstly, how do you specify the xcat_key to be used on the client
>>> > server
>>> > that is pushing out the dns changes with makedns -e? For a local setup
>>> > the
>>> > key definition in /etc/named.conf is sufficient, but since makedns -e
>>> > isn't
>>> > dependent on the local config (or is it?), how is the xcat_key
>>> > specified?
>>> > The local /etc/named.conf file doesn't even need to exist on the client
>>> > does
>>> > it?
>>> >
>>> > Secondly, the server I am pushing to only has a 127.0.0 zone since it
>>> > is a
>>> > fresh BIND install and I'm wanting 'makedns -e' to create the new zones
>>> > (and
>>> > zone files under /var/named/) for me on the remote server. With a local
>>> > DNS
>>> > setup, makedns would parse your settings and handle all the file
>>> > updates and
>>> > creation for you. But when I try makedns -e I see the following  but no
>>> > files or zone updates (is this an xcat_key problem?):
>>> >
>>> > (I ran the remote DNS BIND daemon in the foreground with -d 60
>>> > verbosity)
>>> >
>>> > 24-Sep-2014 15:30:14.686 client 172.26.42.60#56844: UDP request
>>> > 24-Sep-2014 15:30:14.686 client 172.26.42.60#56844: using view
>>> > '_default'
>>> > 24-Sep-2014 15:30:14.686 client 172.26.42.60#56844: request is not
>>> > signed
>>> > 24-Sep-2014 15:30:14.686 client 172.26.42.60#56844: recursion available
>>> > 24-Sep-2014 15:30:14.686 client 172.26.42.60#56844: query
>>> > 24-Sep-2014 15:30:14.686 client 172.26.42.60#56844
>>> > (9.101.20.10.IN-ADDR.ARPA): ns_client_attach: ref = 1
>>> > 24-Sep-2014 15:30:14.687 client 172.26.42.60#56844
>>> > (9.101.20.10.IN-ADDR.ARPA): query '9.101.20.10.IN-ADDR.ARPA/NS/IN'
>>> > approved
>>> > 24-Sep-2014 15:30:14.687 client 172.26.42.60#56844
>>> > (9.101.20.10.IN-ADDR.ARPA): send
>>> > 24-Sep-2014 15:30:14.687 client 172.26.42.60#56844
>>> > (9.101.20.10.IN-ADDR.ARPA): sendto
>>> > 24-Sep-2014 15:30:14.687 client 172.26.42.60#56844
>>> > (9.101.20.10.IN-ADDR.ARPA): senddone
>>> > 24-Sep-2014 15:30:14.687 client 172.26.42.60#56844
>>> > (9.101.20.10.IN-ADDR.ARPA): next
>>> > 24-Sep-2014 15:30:14.687 client 172.26.42.60#56844
>>> > (9.101.20.10.IN-ADDR.ARPA): ns_client_detach: ref = 0
>>> > 24-Sep-2014 15:30:14.687 client 172.26.42.60#56844
>>> > (9.101.20.10.IN-ADDR.ARPA): endrequest
>>> > 24-Sep-2014 15:30:14.687 client @0x7f000c0d7710: udprecv
>>> > 24-Sep-2014 15:30:14.687 sockmgr 0x7f0017e06010: watcher got message -3
>>> > for
>>> > socket 514
>>> > 24-Sep-2014 15:30:14.687 sockmgr 0x7f0017e06010: watcher got message -2
>>> > for
>>> > socket -1
>>> > 24-Sep-2014 15:30:14.687 socket 0x7f0017e1ebc8: socket_recv: event
>>> > 0x7f0017c8c160 -> task 0x7f0017e369d0
>>> > 24-Sep-2014 15:30:14.688 socket 0x7f0017e1ebc8: dispatch_recv:  event
>>> > 0x7f0017c8c160 -> task 0x7f0017e369d0
>>> > 24-Sep-2014 15:30:14.688 socket 0x7f0017e1ebc8: internal_recv: task
>>> > 0x7f0017e369d0 got event 0x7f0017e1ec88
>>> > 24-Sep-2014 15:30:14.688 socket 0x7f0017e1ebc8 172.26.42.60#46141:
>>> > packet
>>> > received correctly
>>> >
>>> > "9.101.20.10.IN-ADDR.ARPA/NS/IN" must be my test node definition in the
>>> > client's /etc/hosts file "10.20.101.9 node0009 node0009.mydomain.org",
>>> > but I
>>> > have no zone definition for 10.20 in /etc/named.conf on the external
>>> > DNS
>>> > server yet.
>>> >
>>> > On the Cluster Name Resolution wiki page
>>> >
>>> > (http://sourceforge.net/apps/mediawiki/xcat/index.php?title=Cluster_Name_Resolution)
>>> > under 'Option #2: Use a DNS That is Outside of the Cluster' it says:
>>> > "If you
>>> > already have a DNS on your site network and you want to use that for
>>> > your
>>> > cluster node names too, you can point all of the nodes to it. You must
>>> > ensure that your nodes have IP connectivity to the DNS, and you must
>>> > manually configure your DNS with the node hostnames and IP addresses."
>>> >
>>> > Does 'makedns -e' not populate the zone files for you, just like it
>>> > would if
>>> > DNS were running locally on the MN itself by just parsing /etc/hosts on
>>> > the
>>> > client and adding/pushing it to the (remote) DNS zone files for you?
>>> >
>>> > If not does this mean I need to hand configure the remote DNS server's
>>> > /etc/named.conf to stub out definitions for (as of yet) empty zones, or
>>> > will
>>> > makedns -e do that for me?
>>> >
>>> > Thanks,
>>> > Josh
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
>>> Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
>>> Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
>>> Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
>>>
>>> http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
>>> _______________________________________________
>>> xCAT-user mailing list
>>> xCAT-user@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/xcat-user
>>>
>>>
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
>>> Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
>>> Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
>>> Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
>>>
>>> http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
>>> _______________________________________________
>>> xCAT-user mailing list
>>> xCAT-user@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/xcat-user
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
>>> Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
>>> Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
>>> Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
>>>
>>> http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk_______________________________________________
>>> xCAT-user mailing list
>>> xCAT-user@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/xcat-user
>>>
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
>>> Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
>>> Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
>>> Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
>>>
>>> http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
>>> _______________________________________________
>>> xCAT-user mailing list
>>> xCAT-user@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/xcat-user
>>>
>>------------------------------------------------------------------------------
> Slashdot TV.  Videos for Nerds.  Stuff that Matters.
> http://pubads.g.doubleclick.net/gampad/clk?id=160591471&iu=/4140/ostg.clktrk_______________________________________________
> xCAT-user mailing list
> xCAT-user@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/xcat-user
>
>
> ------------------------------------------------------------------------------
> Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
> Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
> Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
> Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
> http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
> _______________________________________________
> xCAT-user mailing list
> xCAT-user@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/xcat-user
>

------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
xCAT-user mailing list
xCAT-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/xcat-user

Reply via email to