Announcing HAProxy Enterprise 3.0
HAProxy Enterprise 3.0 extends HAProxy Enterprise’s legendary performance and flexibility and builds upon its cornerstone features.
HAProxy Enterprise 3.0 extends HAProxy Enterprise’s legendary performance and flexibility and builds upon its cornerstone features.
TikTok’s web scraper, Bytespider, is reportedly aggressively sucking up content to fuel generative AI models. We also noticed this while reviewing bot management analytics. Here's what we've learned.
HAProxy Fusion 1.3 is now available! New custom dashboards, high-performance Kubernetes service discovery, and optimized workflows bolster HAProxy Fusion's observability and flexibility.
HAProxy Enterprise lets you immediately drop connections and remove the client if their certificate is revoked. Here's how to strengthen security without disrupting other users and customers.
AI crawlers from large language model (LLM) companies often ignore the contents of robots.txt and crawl your site. If blocking AI crawlers is your goal, HAProxy Enterprise is the answer. Here's how.
HAProxy 3.0 brings many improvements to simplicity, security, reliability, flexibility, and more. We'll dive into what’s new with detailed examples. It’s a long list, so get cozy and bring a snack!
Introducing our next-generation HAProxy Enterprise WAF and HAProxy Enterprise Bot Management Module for unmatched security, performance, and reliability in a simple package.
When it comes to key technology purchases, businesses should look for two attributes: cost efficiency and flexibility.
In this blog post, we discuss what traffic shaping is and how you can implement it in HAProxy and HAProxy Enterprise using our bandwidth limitation filter.
In this blog post, we will describe how to implement autoscaling of your application pods using KEDA and the HAProxy Kubernetes Ingress Controller.
In this blog post, we show how you can use HAProxy connection limits and queues to protect your servers when load balancing heavy amounts of traffic.
HAProxy's high-performance security capabilities are utilized as a key line of defense by many of the world's top enterprises. Application-layer DDoS attacks are aimed at overwhelming an application w
Showing 1 of 1 Pages