My colleague Baptiste previously published an article on how to protect cookies while offloading SSL. I recently encountered a customer who wanted to achieve a very similar goal but using a more recent HAProxy Enterprise version. This post will explain the best practices for how to secure your cookies using HAProxy Enterprise.
For server administrators tasked with ensuring the reliable operation of their web applications, the thought of a lurking cyberattack can be one to lose sleep over. An attack on your system and the services you provide could render your web applications unresponsive. What’s worse, important information that depends on privacy and the careful storing of data is put at risk.
Containers have fast become one of the most efficient ways of virtually deploying applications, offering more agility than a virtual machine (VM) can typically provide. Both containers and VMs are great tools for managing resources and application deployment, but what is the difference between the two, and how do we manage containers?
Application acceleration is all about improving the responsiveness of a digital service. When clients access web applications, they are expecting near-immediate feedback from servers. Maintaining that level of performance requires ensuring the right resources are available to process requests, shortening the information retrieval process, and maintaining system uptime by warding off threats.
With HTTP REST APIs serving as the backbone of modern web applications, securing those APIs presents a critical challenge for organizations. APIs are typically designed to be discoverable, self-documenting, and easily consumed by a range of programming languages, and that makes them appetizing for hackers.
When talking about managing web applications and the services they provide, the term “API gateway” is often thrown around, but what does it mean? In order to unpack how a gateway functions, we first need to understand what an API is.
With the right load balancing in place, the demand of increasing web traffic can become manageable, but how do you determine which load balancing algorithm is best suited for your applications? Does the ease of use of static load balancing better suit the services you provide, or would your system benefit from a more complex and dynamic set of algorithms to maximize efficiency? In this blog post, we discuss what to consider when deciding on the right load-balancing algorithm.
HAProxy. High availability and a reverse proxy–it’s in the name, but what does it all mean? Before understanding how the two concepts work together in the load balancing space, we need to unpack the basics of high availability and how a reverse proxy functions.
If you host dozens of web services that reside at various subdomains, TCP ports, and paths, then migrating them to live under a single address could simplify how clients access them and make your job of managing access easier. It would mean moving from a hodgepodge of address schemes, such as: to a single address wherein services are designated by the URL’s path: The good news is that you don’t need to rearrange your entire network to make this happen.