Introduction to HAProxy Maps

Introduction to HAProxy Maps

An HAProxy map file stores key-value pairs and is the starting point for some inventive behavior including dynamic rate limiting and blue-green deployments. Dictionaries. Maps. Hashes. Associative arrays. Can you imagine life without these wonderful key-value data...
Introduction to HAProxy Stick Tables

Introduction to HAProxy Stick Tables

HTTP requests are stateless by design. However, this raises some questions regarding how to track user activities, including malicious ones, across requests so that you can collect metrics, block users, and make other decisions based on state. The only way to track...
Introduction to HAProxy ACLs

Introduction to HAProxy ACLs

An HAProxy ACL lets you define custom rules for blocking malicious requests, choosing backends, redirecting to HTTPS and using cached objects. See The Webinar: Introduction to HAProxy ACLs: Building Rules for Dynamically Routing Requests, Redirecting Users and...
HAProxy Log Customization

HAProxy Log Customization

Synopsis One of the strength of HAProxy is its logging system. It is very verbose and provides many information. HAProxy HTTP log line is briefly explained in an HAProxy Technologies memo. It’s a must have document when you have to analyze HAProxy‘s log...
ALOHA Load Balancer as a Reverse Proxy

ALOHA Load Balancer as a Reverse Proxy

Synopsis You own small public subnet and want to be able to access multiple web sites or application behind a single public IP address. Basically, you want to use your Aloha load-balancer as a reverse proxy. Diagram The diagram below shows how the reverse proxy works....