Choosing the Right Transport Protocol: TCP vs. UDP vs. QUIC
A decision-making framework breaking down the strengths, weaknesses and ideal use cases to help users choose the proper protocol for their systems.
A decision-making framework breaking down the strengths, weaknesses and ideal use cases to help users choose the proper protocol for their systems.
HAProxy 3.1 makes significant gains in performance and usability, with better capabilities for troubleshooting. Our blog post explores all the updates.
Different load balancer form factors don't always perform nor repackage well. Learn how HAProxy's unique software-first approach addresses common pain points when choosing the right form factor.
Modern load balancers need broad internet protocol support. We’ll outline HAProxy's product-specific protocol support, highlight core features, and share handy use cases.
The Kubernetes Gateway API is a specification or standard managed by the SIG-NETWORK community that models service networking in Kubernetes.
In this blog post, we outline the steps to get started and the reasons why users are choosing to serve applications using HTTP/3 over QUIC.
In this blog post, we discuss what traffic shaping is and how you can implement it in HAProxy and HAProxy Enterprise using our bandwidth limitation filter.
This blog post will discuss web threats and how to protect yourself against DDoS attacks, web scraping, brute-force attacks, and vulnerability scanning.
In this blog post, you will read how containers have become one of the most efficient ways of virtually deploying applications.
In this blog post, you will learn that application acceleration is all about improving the responsiveness of a digital service.
When talking about managing web applications and the services they provide, the term “API gateway” is often thrown around, but what does it mean?
In this blog, you will learn what algorithm is the best for you, both static and dynamic algorithms will help you manage incoming traffic for web applications.
In this blog post, we will explore the gold standard of high availability and the difference between a forward proxy and a reverse proxy.
Here's how to deploy the HAProxy load balancer in front of your services and then use path-based routing to direct requests to the correct backend service.
Learn how HAProxy can act as a log collection point that ingests logs from multiple applications and then forwards them to a centralized log aggregation server.
In this blog post, you will learn how HAProxy supports sticky sessions. You can choose to implement them either with a cookie or with the user’s IP address.
In this blog post, you'll learn how load balancing is an indispensable technique for improving a website’s performance.
Load balancing is the distribution of network traffic between backend servers to ensure high availability and performance. Here's everything you should know.
HAProxy provides three types of health checks: active health checks, passive health checks and agent health checks. In this blog, we will learn about each one.
Learn how to test your HAProxy Configuration. Properly testing your HAProxy configuration file is a simple yet crucial part of administering your load balancer.
In this blog post, you will learn more about HAProxy APIs and how you can manage your HAProxy configuration without editing its configuration file by hand.
In this post, you will learn how to install the open-source edition of HAProxy on Ubuntu, one of the most popular and powerful operating systems around.
In this blog post, you will learn how to set up basic load balancing using the HAProxy configuration file.
In this blog post, we will show several ways of handling multi-domain configurations, including an introduction to using HAProxy maps.
Log Sampling is a powerful feature introduced in HAProxy 2.0 that lets you create a representative view of your data allowing you to minimize your costs.
With HAProxy you can switch between proxying traffic at layer 4 (TCP) or layer 7 (HTTP). This blog post describes the features available to you in each mode.
This blog post covers how to set up custom error pages in HAProxy in order to ensure consistent, branded messaging that supports any backend web stack.
In this blog post, you will find out more about the HAProxy Process Manager, which allows you to start external programs that are hosted under HAProxy.
In this blog post, we show step-by-step, how to install the HAProxy Kubernetes Ingress Controller into your Kubernetes cluster using the popular Helm charts
Use rate limiting in HAProxy to stop clients from making too many requests and promote fair usage of your services.
This blog post shows how to quickly and easily enable SSL/TLS encryption for your applications by using high-performance SSL termination in HAProxy.
This blog post demonstrates how you can use custom Lua code to extend HAProxy for creating your own fetches, converters, actions, services, and tasks.
The HAProxy Stats page shows you an abundance of frontend and backend stats covering the health of your servers, current request rates, response times, etc.
Learn how to use The HAProxy Stream Processing Offload Engine (SPOE) filter to extend HAProxy in any language without modifying its core codebase.
In this blog post, we show how to set up HAProxy logging, target a Syslog server, understand the log fields, and suggest helpful tools for parsing log files.
The four essential sections of an HAProxy configuration file are global, defaults, frontend, and backend. These sections define performance, default settings, and request routing.
In this post, you’ll learn how to create an HAProxy map file, store it on your system, reference it in your HAProxy configuration, and update it in real time.
Learn more about HAProxy's fast, in-memory storage called stick tables that let you track user activities, including malicious ones, across requests.
Learn about using HAProxy ACLs to define custom rules for blocking malicious requests, choosing backends, redirecting to HTTPS, and using cached objects.
The HTTP 408 status code is an error returned by the server when it doesn't receive a timely request from the client.
Although HAProxy gives you detailed logging, sometimes you need a custom HAProxy log format. In this post, see how to define the template for logs.
In this blog post, we aim to demonstrate how to preserve source IP addresses when using the reverse-proxy mode in HAProxy.
This blog post shows why and how to use a load balancer, the differences between Affinity, Persistence, and Sticky Sessions, and how to enable them in HAProxy.
Microsoft Terminal Services or remoteapps both use the RDP protocol. One issue when using RDP is being able to stick a user to a server.
This blog post will show you how to use HAProxy ALOHA as a reverse proxy for accessing multiple websites or apps behind a single public IP address.
In this blog post, we explain what the Layer 4 Load Balancing Direct Server Return (DSR) Mode is, its pros and cons and when and how to use it.
In this blog post, we explain what the Layer 4 Load Balancing Tunnel Mode is, how it works, when to use it, as well as its pros and cons.
In this blog post, we explain what the Layer 4 Load Balancing NAT Mode is, its pros and cons and when to use this type of architecture.
Layer 4 is related to the transport layer of the OSI model, and layer 7 is related to the application level. A layer 7 load balancer makes routing decisions based on...