Sabina Cimic Sabina Cimic | Jan 7, 2021 | SECURITY, TECH
With HAProxy Enterprise, you can defend the network with Response Policies. In this infographic, we demonstrated countermeasures you can use against malicious clients and their requests. Deny Tarpit Silent Drop Reject Shadowban reCAPTCHA Want to stay up to date on...
Nick Ramirez Nick Ramirez | Sep 15, 2020 | SECURITY, TECH
Detect and stop fake web crawlers using HAProxy Enterprise’s Verify Crawler add-on. How your website ranks on Google can have a substantial impact on the number of visitors you receive, which can ultimately make or break the success of your online...
Nick Ramirez Nick Ramirez | Sep 8, 2020 | SECURITY, SSL
Guarantee strong encryption by enabling ‘FIPS mode’ with RHEL and HAProxy Enterprise. You can watch our on-demand webinar “Achieving FIPS 140-2 Encryption Compliance with HAProxy Enterprise on Red Hat Enterprise Linux” here. SSL and its...
Dinko Korunic Dinko Korunic | Apr 26, 2019 | CLOUD, TECH
In this blog post, learn to use HAProxy, Keepalived, Terraform and Ansible to set up highly-available load balancing in AWS. In the third part of this series, we are again tackling how to implement a highly available architecture in AWS. In the first article, HAProxy...
Baptiste Assmann and Nick Ramirez Baptiste Assmann and Nick Ramirez | Mar 1, 2019 | MICROSERVICES, TECH
Achieving high availability rests on having good health checks. HAProxy as an API gateway gives you several ways to do this. Run your service on multiple servers. Place your servers behind an HAProxy load balancer. Enable health checking to quickly remove unresponsive...