Announcing HAProxy Enterprise 3.0
HAProxy Enterprise 3.0 extends HAProxy Enterprise’s legendary performance and flexibility and builds upon its cornerstone features.
Baptiste has focused on high-performance web architectures for more than a decade now, mainly on the front piece and through the angle of the Load-Balancer/Reverse proxies. Baptiste loves studying new use cases and finds solutions to make the magic happen with his software load-balancer of choice: HAProxy.
Twitter LinkedIn GitHubHAProxy Enterprise 3.0 extends HAProxy Enterprise’s legendary performance and flexibility and builds upon its cornerstone features.
Our implementation of the HTTP/2 protocol can effectively handle the CONTINUATION Flood.
In this blog post, you will learn more about persistent TCP connections in an HTTP world and the various ways in which HAProxy supports it.
Learn how to use DNS service discovery in HAProxy to detect server changes and automatically apply them to your configuration.
In the blog post, you'll learn various ways to health check your servers so that your APIs maintain a high level of reliability. This includes...
In the blog post, you'll learn more about using HAProxy as an API gateway, leveraging it to secure your API endpoints using OAuth 2.
In a service mesh, requests are passed to proxies that relay messages from one service to another. See how HAProxy can be used in the Consul service mesh.
An API gateway routes client requests intelligently and handles functions such as load balancing, security, and rate limiting.
In this blog post, we will show you a zero-touch method for integrating HAProxy with Consul by using DNS for service discovery available in HAProxy 1.8.
The monumental stable release of HAProxy 1.8 is here! The HAProxy 1.8 release candidate 1 (RC1) has been published by the R&D team here at HAProxy Technologies.
This blog contains information and provides a technical guide for getting started with the ELK stack, configuring HAProxy, parsing the data and troubleshooting.
In a Slow POST attack, an attacker begins by sending a legitimate HTTP POST header to a Web server, exactly as they would under normal circumstances.
Showing 1 of 7 Pages