diff --git a/plays/monitoring.yml b/plays/monitoring.yml
index 79b0923d382f2b55c1e4541718455b7fa75aeb1a..59e74f37abec2e999e1943358c09da1739150e8e 100755
--- a/plays/monitoring.yml
+++ b/plays/monitoring.yml
@@ -11,11 +11,28 @@
       #  - quasar.adm.crans.org  # 4J
       unifi_snmp_targets: "{{ groups['crans_unifi'] | list | sort }}"
       blackbox_targets:
-        - https://crans.org
-        - https://www.crans.org
-        - https://grafana.crans.org
-        - https://wiki.crans.org
-        - https://pad.crans.org
+        - https://crans.org/
+        - https://www.crans.org/
+        - https://webirc.crans.org/
+        - https://jitsi.crans.org/
+        - https://ftps.crans.org/
+        - http://ftp.crans.org/
+        - https://grafana.crans.org/
+        - https://roundcube.crans.org/
+        - https://zero.crans.org/
+        - https://wiki.crans.org/PageAccueil
+        - https://framadate.crans.org/
+        - https://pad.crans.org/
+        - https://lists.crans.org/
+        - https://cas.crans.org/
+        - https://ethercalc.crans.org/
+        - https://phabricator.crans.org/
+        - https://webmail.crans.org/horde/login.php
+        - https://gitlab.crans.org/
+        - https://perso.crans.org/crans/
+        - https://install-party.crans.org/
+        - https://intranet.crans.org/
+        - https://owncloud.crans.org/
       nginx_targets:
         - hodaur.adm.crans.org
         - charybde.adm.crans.org
@@ -26,10 +43,9 @@
     grafana:
       root_url: https://grafana.crans.org
       icon: crans_icon_white.svg
-
-    ldap_base: 'dc=crans,dc=org'
-    ldap_master_ipv4: '172.16.10.1'
-    ldap_user_tree: "ou=passwd,{{ ldap_base }}"
+      ldap_base: "{{ glob_ldap.base }}"
+      ldap_master_ipv4: "{{ glob_ldap.servers[0] }}"
+      ldap_user_tree: "ou=passwd,{{ glob_ldap.base }}"
   roles:
     - prometheus
     - prometheus-alertmanager
@@ -38,30 +54,6 @@
     - ninjabot
     - grafana
 
-# Deploy backup Prometheus on backup server
-#- hosts: odlyd.adm.crans.org
-#  vars:
-#    # only critical infra
-#    prometheus:
-#      node_targets:
-#        - odlyd.adm.crans.org  # me, myself and I
-#        - zamok.adm.crans.org  # parce que WeeChat c'est critique
-#        - thot.adm.crans.org  # la bdd adh est critique... enfin a skip
-#        - zbee.adm.crans.org  # zbeu! la bay!
-#        - stitch.adm.crans.org  # last hope virtu
-#        - redisdead.adm.crans.org  # Postmen... youtu.be/vEkY6W-fEZQ?t=132
-#      ups_snmp_targets:
-#        - pulsar.adm.crans.org  # 0B
-#        - quasar.adm.crans.org  # 4J
-#
-#    snmp_unifi_password: "{{ vault_snmp_unifi_password }}"
-#  roles:
-#    - prometheus
-#    - prometheus-alertmanager
-#    - prometheus-snmp-exporter
-#    - ninjabot
-
-
 # Monitor all hosts
 - hosts: server
   vars:
diff --git a/roles/grafana/templates/ldap.toml.j2 b/roles/grafana/templates/ldap.toml.j2
index c918707aac8cabe5ecfd2b22128dd94867a7e9f4..c92a93308d8847a880f9e293d5866293e3ebbe83 100644
--- a/roles/grafana/templates/ldap.toml.j2
+++ b/roles/grafana/templates/ldap.toml.j2
@@ -5,7 +5,7 @@
 
 [[servers]]
 # Ldap server host (specify multiple hosts space separated)
-host = "{{ ldap_master_ipv4 }}"
+host = "{{ grafana.ldap_master_ipv4 }}"
 # Default port is 389 or 636 if use_ssl = true
 port = 636
 # Set to true if ldap server supports TLS
@@ -20,22 +20,18 @@ ssl_skip_verify = true
 # client_cert = "/path/to/client.crt"
 # client_key = "/path/to/client.key"
 
-# Search user bind dn
-bind_dn = "uid=%s,{{ ldap_user_tree }}"
-# Search user bind password
-# If the password contains # or ; you have to wrap it with triple quotes. Ex """#password;"""
-#bind_password = ''
+# Use direct bind
+bind_dn = "uid=%s,{{ grafana.ldap_user_tree }}"
 
-# User search filter, for example "(cn=%s)" or "(sAMAccountName=%s)" or "(uid=%s)"
+# Useless as we are doing direct bind,
+# but without LDAP auth hang
 search_filter = "(uid=%s)"
-
-# An array of base dns to search through
-search_base_dns = ["{{ ldap_user_tree }}"]
+search_base_dns = ["ou=passwd,dc=crans,dc=org"]
 
 ## For Posix or LDAP setups that does not support member_of attribute you can define the below settings
 ## Please check grafana LDAP docs for examples
 group_search_filter = "(&(objectClass=posixGroup)(memberUid=%s))"
-group_search_base_dns = ["ou=group,{{ ldap_base }}"]
+group_search_base_dns = ["ou=group,{{ grafana.ldap_base }}"]
 group_search_filter_user_attribute = "cn"
 
 # Specify names of the ldap attributes your ldap uses