Protecting Against SAP NetWeaver Vulnerability (CVE-2025-31324) with HAProxy
Mitigate SAP NetWeaver CVE-2025-31324 with HAProxy. Learn how to block unauthenticated file uploads and protect your systems from severe risk.
Mitigate SAP NetWeaver CVE-2025-31324 with HAProxy. Learn how to block unauthenticated file uploads and protect your systems from severe risk.
Following the recent HAProxy 3.0 release, we're proud to announce that we've released HAProxy Data Plane API 3.0, which is available on our GitHub page.
HAProxy Enterprise lets you immediately drop connections and remove the client if their certificate is revoked. Here's how to strengthen security without disrupting other users and customers.
Securing traffic between systems is critical. Follow along as we explain how to use SPIFFE and SPIRE to automatically generate and renew identities that include mTLS certificates.
AI crawlers from large language model (LLM) companies often ignore the contents of robots.txt and crawl your site. If blocking AI crawlers is your goal, HAProxy Enterprise is the answer. Here's how.
HAProxy 3.0 brings many improvements to simplicity, security, reliability, flexibility, and more. We'll dive into what’s new with detailed examples. It’s a long list, so get cozy and bring a snack!
In this blog post, we discuss what traffic shaping is and how you can implement it in HAProxy and HAProxy Enterprise using our bandwidth limitation filter.
Learn how to test your HAProxy Configuration. Properly testing your HAProxy configuration file is a simple yet crucial part of administering your load balancer.
In this blog post, you will learn how to set up basic load balancing using the HAProxy configuration file.
This blog post shows how to quickly and easily enable SSL/TLS encryption for your applications by using high-performance SSL termination in HAProxy.
HAProxy's high-performance security capabilities are utilized as a key line of defense by many of the world's top enterprises. Application-layer DDoS attacks are aimed at overwhelming an application w
The four essential sections of an HAProxy configuration file are global, defaults, frontend, and backend. These sections define performance, default settings, and request routing.
HAProxy offers a patch set for enabling seamless reloads of HAProxy without dropping packets in the process. In this blog post, we show you how to enable this.
HAProxy Technologies is proud to announce the availability of an integrated Let’s Encrypt ACMEv2 Lua client for HAProxy and HAProxy Enterprise (HAPEE).
This blog post will provide an introduction to multithreading functionality in HAProxy, its configuration, and basic troubleshooting procedures.
The HTTP 408 status code is an error returned by the server when it doesn't receive a timely request from the client.
Basically, HAProxy uses the NPN (and later the ALPN) TLS extension to figure out whether the client can browse the website using SPDY.
In this blog post, we show how you can enable inserting client certificate information in HTTP headers and reporting them in the log line with HAProxy.
In this blog post, we'll explain how to use both HAProxy and Varnish on a web application hosted on a single domain name.
In this blog post, we will provide a configuration that you can use to protect your applications against HTTP request flood attacks.
Geolocation is the process of linking a third party to a geographical location. In easier words: know the country of a client's IP address. On the Internet, such a base is called GeoIP.
In this blog post, we will explain how to configure the HAProxy load balancer to build an efficient SMTP relay infrastructure with Postfix.
In this blog post, we aim to demonstrate how to preserve source IP addresses when using the reverse-proxy mode in HAProxy.