I will test habor in the next week.
Gilles icecast do a global authentication for several user names in the KH
branch ,in the original, or neither?
Thanks to everybody for all the feedback.
Em 7 de outubro de 2011 08:11, Romain Beauxis <[email protected]>escreveu:
> 2011/10/7 Fábio Costa <[email protected]>:
> > Will try both, you think that output habor can handle the workload?
>
> Well, I wouldn't mind having some real testing about this.. It _should_ ..
> :-)
>
> Romain
>
> > Em 6 de outubro de 2011 20:18, Romain Beauxis <[email protected]>
> > escreveu:
> >>
> >> Despite the fact that I cooked up output.harbor, I would say that the
> >> KH branch is probably the safest option.
> >>
> >> However, if you dare to try output.harbor, I'll be very happy to have
> >> feedback and fix what needs to be fixed :-)
> >>
> >> Romain
> >>
> >> 2011/10/6 Fábio Costa <[email protected]>:
> >> > will take a look.
> >> > Thanks
> >> >
> >> > Em 6 de outubro de 2011 16:53, Brandon Casci <[email protected]>
> >> > escreveu:
> >> >>
> >> >> I would give this a try with the KH branch, it may not work but
> K,arl,
> >> >> the
> >> >> maintainer of that branch, has a put a lot of work into boosting
> >> >> performance
> >> >> and increasing the amounts of things that can be changed on the fly
> and
> >> >> applied via a SIGHUP
> >> >>
> >> >> 2011/10/6 Fábio Costa <[email protected]>
> >> >>>
> >> >>> I need to authenticate any mount point by an external application i
> >> >>> saw
> >> >>> that i can do that with icecast but i have to change the config by
> >> >>> hand for
> >> >>> each mount point.Since i would dynamically create mountpiunts that
> is
> >> >>> not an
> >> >>> option.
> >> >>>
> >> >>>
> >> >>> Em 6 de outubro de 2011 16:42, Brandon Casci <
> [email protected]>
> >> >>> escreveu:
> >> >>>>
> >> >>>> What do you mean by dynamic authentication? Being able to
> >> >>>> authenticate
> >> >>>> against a username/password against any source? If so, use you can
> do
> >> >>>> that
> >> >>>> with Icecast. You may need to use the KH branch of Icecast to catch
> >> >>>> bug
> >> >>>> fixes, but briefly, you can a mount authenticate connections
> against
> >> >>>> an
> >> >>>> external script.
> >> >>>>
> >> >>>> 2011/10/6 Fábio Costa <[email protected]>
> >> >>>>>
> >> >>>>> Hi all.
> >> >>>>> I found myself in the need of dynamic authentication and icecast
> >> >>>>> doesn't support it.
> >> >>>>> I'm considering making it in the network with samba but would
> rather
> >> >>>>> use an alternative to icecast, does anyone have a good alternative
> >> >>>>> to
> >> >>>>> icecast with dynamic authentication to dynamic mountpoints?
> >> >>>>>
> >> >>>>>
> >> >>>>>
> >> >>>>>
> ------------------------------------------------------------------------------
> >> >>>>> All the data continuously generated in your IT infrastructure
> >> >>>>> contains
> >> >>>>> a
> >> >>>>> definitive record of customers, application performance, security
> >> >>>>> threats, fraudulent activity and more. Splunk takes this data and
> >> >>>>> makes
> >> >>>>> sense of it. Business sense. IT sense. Common sense.
> >> >>>>> http://p.sf.net/sfu/splunk-d2dcopy1
> >> >>>>> _______________________________________________
> >> >>>>> Savonet-users mailing list
> >> >>>>> [email protected]
> >> >>>>> https://lists.sourceforge.net/lists/listinfo/savonet-users
> >> >>>>>
> >> >>>>
> >> >>>>
> >> >>>>
> >> >>>> --
> >> >>>> =========================================
> >> >>>> Brandon Casci
> >> >>>> Loudcaster
> >> >>>> http://loudcaster.com
> >> >>>> =========================================
> >> >>>
> >> >>
> >> >>
> >> >>
> >> >> --
> >> >> =========================================
> >> >> Brandon Casci
> >> >> Loudcaster
> >> >> http://loudcaster.com
> >> >> =========================================
> >> >
> >> >
> >> >
> >> >
> ------------------------------------------------------------------------------
> >> > All the data continuously generated in your IT infrastructure contains
> a
> >> > definitive record of customers, application performance, security
> >> > threats, fraudulent activity and more. Splunk takes this data and
> makes
> >> > sense of it. Business sense. IT sense. Common sense.
> >> > http://p.sf.net/sfu/splunk-d2dcopy1
> >> > _______________________________________________
> >> > Savonet-users mailing list
> >> > [email protected]
> >> > https://lists.sourceforge.net/lists/listinfo/savonet-users
> >> >
> >> >
> >
> >
>
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Savonet-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/savonet-users