2011/10/7 Fábio Costa <[email protected]>:
> Will try both, you think that output habor can handle the workload?

Well, I wouldn't mind having some real testing about this.. It _should_ .. :-)

Romain

> Em 6 de outubro de 2011 20:18, Romain Beauxis <[email protected]>
> escreveu:
>>
>> Despite the fact that I cooked up output.harbor, I would say that the
>> KH branch is probably the safest option.
>>
>> However, if you dare to try output.harbor, I'll be very happy to have
>> feedback and fix what needs to be fixed :-)
>>
>> Romain
>>
>> 2011/10/6 Fábio Costa <[email protected]>:
>> > will take a look.
>> > Thanks
>> >
>> > Em 6 de outubro de 2011 16:53, Brandon Casci <[email protected]>
>> > escreveu:
>> >>
>> >> I would give this a try with the KH branch, it may not work but K,arl,
>> >> the
>> >> maintainer of that branch, has a put a lot of work into boosting
>> >> performance
>> >> and increasing the amounts of things that can be changed on the fly and
>> >> applied via a SIGHUP
>> >>
>> >> 2011/10/6 Fábio Costa <[email protected]>
>> >>>
>> >>> I need to authenticate any mount point by an external application i
>> >>> saw
>> >>> that i can do that with icecast but i have to change the config by
>> >>> hand for
>> >>> each mount point.Since i would dynamically create mountpiunts that is
>> >>> not an
>> >>> option.
>> >>>
>> >>>
>> >>> Em 6 de outubro de 2011 16:42, Brandon Casci <[email protected]>
>> >>> escreveu:
>> >>>>
>> >>>> What do you mean by dynamic authentication? Being able to
>> >>>> authenticate
>> >>>> against a username/password against any source? If so, use you can do
>> >>>> that
>> >>>> with Icecast. You may need to use the KH branch of Icecast to catch
>> >>>> bug
>> >>>> fixes, but briefly, you can a mount authenticate connections against
>> >>>> an
>> >>>> external script.
>> >>>>
>> >>>> 2011/10/6 Fábio Costa <[email protected]>
>> >>>>>
>> >>>>> Hi all.
>> >>>>> I found myself in the need of dynamic authentication and icecast
>> >>>>> doesn't support it.
>> >>>>> I'm considering making it in the network with samba but would rather
>> >>>>> use an alternative to icecast, does anyone have a good alternative
>> >>>>> to
>> >>>>> icecast with dynamic authentication to dynamic mountpoints?
>> >>>>>
>> >>>>>
>> >>>>>
>> >>>>> ------------------------------------------------------------------------------
>> >>>>> All the data continuously generated in your IT infrastructure
>> >>>>> contains
>> >>>>> a
>> >>>>> definitive record of customers, application performance, security
>> >>>>> threats, fraudulent activity and more. Splunk takes this data and
>> >>>>> makes
>> >>>>> sense of it. Business sense. IT sense. Common sense.
>> >>>>> http://p.sf.net/sfu/splunk-d2dcopy1
>> >>>>> _______________________________________________
>> >>>>> Savonet-users mailing list
>> >>>>> [email protected]
>> >>>>> https://lists.sourceforge.net/lists/listinfo/savonet-users
>> >>>>>
>> >>>>
>> >>>>
>> >>>>
>> >>>> --
>> >>>> =========================================
>> >>>> Brandon Casci
>> >>>> Loudcaster
>> >>>> http://loudcaster.com
>> >>>> =========================================
>> >>>
>> >>
>> >>
>> >>
>> >> --
>> >> =========================================
>> >> Brandon Casci
>> >> Loudcaster
>> >> http://loudcaster.com
>> >> =========================================
>> >
>> >
>> >
>> > ------------------------------------------------------------------------------
>> > All the data continuously generated in your IT infrastructure contains a
>> > definitive record of customers, application performance, security
>> > threats, fraudulent activity and more. Splunk takes this data and makes
>> > sense of it. Business sense. IT sense. Common sense.
>> > http://p.sf.net/sfu/splunk-d2dcopy1
>> > _______________________________________________
>> > Savonet-users mailing list
>> > [email protected]
>> > https://lists.sourceforge.net/lists/listinfo/savonet-users
>> >
>> >
>
>

------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Savonet-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/savonet-users

Reply via email to