Klaus Zerwes
Klaus Zerwes
> +1 > > This is a great enhancement to the overall role and removes an impediment to use the role to use multiple frontend/backend configurations. thx ... exactly this...
@corym-vermeer : if you can use the improved version successfully, you can review and comment the changes. I think this would be of some help for @geerlingguy having some ACKs...
... #48 shows that there are more people requiring the option to configure multiple front-/backends ... I have tried in my PR not to be to invasive and not to...
https://github.com/Rosa-Luxemburgstiftung-Berlin/ansible-role-haproxy/tree/main
I have read the CLA Document and I hereby sign the CLA or my organization already has a signed CLA.
for me it is only working with the `manage` priv included. ```yml zammad: cluster: [ "monitor", "manage_ingest_pipelines" ] indices: - names: [ 'Zammad_*', 'zammad_*' ] privileges: [ 'create_index', 'create_doc', 'create',...
Hello @AdSchellevis Yes, you are right, ocsp would be another option. As far as I know, the ocsp check was possible with openvpn using a external check script. But I...
Hello @fichtner and @AdSchellevis Sorry for the delay, I was kind of *stresstracted* from this topic. I will try to keep my answers short: ### ocsp #### openvpn Well, openvpn...
Hello @AdSchellevis and thank you for your prompt reply. Well, `ocsp` sounds like a good start and indeed the commands for the hook script should not be to complicated ......
Just one more thought in favor of supporting for CRL checks too: every PKI has a CRL but not every one has an OCSP server ...