Hi,
In your crontab there should be a pkill -USR2 sks || exit 1. This
reloads SKS. You can of course run this command manually to reload it
instantly.
Kind regards,
Christiaan de Die le Clercq
PGP: 0x9FB800372F2546D8
() ascii ribbon campaign - against HTML e-mail
/\ arc.pasp.de - against
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 04/21/2015 09:26 AM, Christiaan de Die le Clercq wrote:
Hi,
In your crontab there should be a pkill -USR2 sks || exit 1. This
reloads SKS. You can of course run this command manually to reload
it instantly.
just a FYI, this isn't
Hi!
Running it on a Raspberry Pi shouldn't be a problem as SKS is
pretty low on resources (except for the building process).
Well sks needs rather decent storage (or maybe lots of RAM as caches?)
to performe remotely useable in my experience. In terms of normal RAM
and CPU usage it's
On Mon, Apr 20, 2015 at 09:50:45PM +0200, ma...@wk3.org wrote:
Hi,
I am looking for peers for a new SKS keyserver installation.
I am running SKS version 1.1.5, on keys.enteig.net.
I'd be happy to peer:
gpg.n1zyy.com 11370 # Matt Wagner m...@ttwagner.com 0x2BE02E05
I am running this on a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Here's an example of using haproxy to proxy non-http traffic. The
example uses SMTP, but it should work with any TCP/IP traffic.
http://www.linickx.com/load-balance-anything-with-haproxy
-BEGIN PGP SIGNATURE-
Version: GnuPG v1