Operations | Monitoring | ITSM | DevOps | Cloud

HAProxy

HAProxy User Reviews Show Community Momentum

{ If you think you can’t do something with HAProxy, go have a look, because you probably can. Onward and upward! In 2022, many happy HAProxy users turned to G2 – a leading aggregator of user reviews and product ratings – to leave their feedback. These user reviews were so positive that G2 recognized HAProxy as a Leader in Load Balancing, DDoS Protection, and API Management, with an additional leadership position for momentum in the load balancing market.

Announcing HAProxy 2.7 and HAProxy Enterprise 2.7r1

HAProxy 2.7 is now available! Register for the webinar HAProxy 2.7 Feature Roundup to learn more about this release and participate in a live Q&A with our experts. Once again, the latest HAProxy update features improvements across the board, upgrading old features and introducing some new ones. New elements in this release include: What a list!

4 Most Common Website Security Threats (2023) + Solutions

For infrastructure administrators tasked with ensuring the reliable operation of their applications, the thought of a lurking cyberattack can be one to lose sleep over. An attack on your system and the services you provide could render your applications unresponsive, resulting in a security breach, or loss of data.

HAProxyConf 2022 Recap

Earlier this month, I packed my bag and grabbed my lanyard to attend HAProxyConf in the beautiful city of Paris. I was far from alone: nearly 200 customers, colleagues, and community enthusiasts had the same idea. We overcame jetlag, stagefright, and introverted personality types for the joy of meeting and learning from some of the brightest minds in the industry. From load balancing to cybersecurity to endless cups of strong coffee: this is HAProxyConf 2022!

Secure Cookies Using HAProxy Enterprise

My colleague Baptiste previously published an article on how to protect cookies while offloading SSL. I recently encountered a customer who wanted to achieve a very similar goal but using a more recent HAProxy Enterprise version. This post will explain the best practices for how to secure your cookies using HAProxy Enterprise.

4 Website Security Threats (2022) + Solutions

For server administrators tasked with ensuring the reliable operation of their web applications, the thought of a lurking cyberattack can be one to lose sleep over. An attack on your system and the services you provide could render your web applications unresponsive. What’s worse, important information that depends on privacy and the careful storing of data is put at risk.

Fundamentals: What Sets Containers Apart from Virtual Machines

Containers have fast become one of the most efficient ways of virtually deploying applications, offering more agility than a virtual machine (VM) can typically provide. Both containers and VMs are great tools for managing resources and application deployment, but what is the difference between the two, and how do we manage containers?