2011/10/7 Fábio Costa <[email protected]>: > Will try both, you think that output habor can handle the workload?
Well, I wouldn't mind having some real testing about this.. It _should_ .. :-) Romain > Em 6 de outubro de 2011 20:18, Romain Beauxis <[email protected]> > escreveu: >> >> Despite the fact that I cooked up output.harbor, I would say that the >> KH branch is probably the safest option. >> >> However, if you dare to try output.harbor, I'll be very happy to have >> feedback and fix what needs to be fixed :-) >> >> Romain >> >> 2011/10/6 Fábio Costa <[email protected]>: >> > will take a look. >> > Thanks >> > >> > Em 6 de outubro de 2011 16:53, Brandon Casci <[email protected]> >> > escreveu: >> >> >> >> I would give this a try with the KH branch, it may not work but K,arl, >> >> the >> >> maintainer of that branch, has a put a lot of work into boosting >> >> performance >> >> and increasing the amounts of things that can be changed on the fly and >> >> applied via a SIGHUP >> >> >> >> 2011/10/6 Fábio Costa <[email protected]> >> >>> >> >>> I need to authenticate any mount point by an external application i >> >>> saw >> >>> that i can do that with icecast but i have to change the config by >> >>> hand for >> >>> each mount point.Since i would dynamically create mountpiunts that is >> >>> not an >> >>> option. >> >>> >> >>> >> >>> Em 6 de outubro de 2011 16:42, Brandon Casci <[email protected]> >> >>> escreveu: >> >>>> >> >>>> What do you mean by dynamic authentication? Being able to >> >>>> authenticate >> >>>> against a username/password against any source? If so, use you can do >> >>>> that >> >>>> with Icecast. You may need to use the KH branch of Icecast to catch >> >>>> bug >> >>>> fixes, but briefly, you can a mount authenticate connections against >> >>>> an >> >>>> external script. >> >>>> >> >>>> 2011/10/6 Fábio Costa <[email protected]> >> >>>>> >> >>>>> Hi all. >> >>>>> I found myself in the need of dynamic authentication and icecast >> >>>>> doesn't support it. >> >>>>> I'm considering making it in the network with samba but would rather >> >>>>> use an alternative to icecast, does anyone have a good alternative >> >>>>> to >> >>>>> icecast with dynamic authentication to dynamic mountpoints? >> >>>>> >> >>>>> >> >>>>> >> >>>>> ------------------------------------------------------------------------------ >> >>>>> All the data continuously generated in your IT infrastructure >> >>>>> contains >> >>>>> a >> >>>>> definitive record of customers, application performance, security >> >>>>> threats, fraudulent activity and more. Splunk takes this data and >> >>>>> makes >> >>>>> sense of it. Business sense. IT sense. Common sense. >> >>>>> http://p.sf.net/sfu/splunk-d2dcopy1 >> >>>>> _______________________________________________ >> >>>>> Savonet-users mailing list >> >>>>> [email protected] >> >>>>> https://lists.sourceforge.net/lists/listinfo/savonet-users >> >>>>> >> >>>> >> >>>> >> >>>> >> >>>> -- >> >>>> ========================================= >> >>>> Brandon Casci >> >>>> Loudcaster >> >>>> http://loudcaster.com >> >>>> ========================================= >> >>> >> >> >> >> >> >> >> >> -- >> >> ========================================= >> >> Brandon Casci >> >> Loudcaster >> >> http://loudcaster.com >> >> ========================================= >> > >> > >> > >> > ------------------------------------------------------------------------------ >> > All the data continuously generated in your IT infrastructure contains a >> > definitive record of customers, application performance, security >> > threats, fraudulent activity and more. Splunk takes this data and makes >> > sense of it. Business sense. IT sense. Common sense. >> > http://p.sf.net/sfu/splunk-d2dcopy1 >> > _______________________________________________ >> > Savonet-users mailing list >> > [email protected] >> > https://lists.sourceforge.net/lists/listinfo/savonet-users >> > >> > > > ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2dcopy2 _______________________________________________ Savonet-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/savonet-users
