Quantcast
Channel: Chad Lavoie | HAProxy Technologies
Browsing all 9 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Using HAProxy with the Proxy Protocol to Better Secure Your Database

The Proxy protocol is a widely used invention of our CTO at HAProxy Technologies, Willy Tarreau, to solve the problem of TCP connection parameters being lost when relaying TCP connections through...

View Article



Image may be NSFW.
Clik here to view.

Dynamic Scaling for Microservices with the HAProxy Runtime API

Today’s microservices powered architectures require the ability to make frequent application delivery changes in an automated and reliable way. One of HAProxy’s top microservices users performs 20...

View Article

Image may be NSFW.
Clik here to view.

Introduction to HAProxy ACLs

An HAProxy ACL lets you define custom rules for blocking malicious requests, choosing backends, redirecting to HTTPS and using cached objects. See The Webinar: Introduction to HAProxy ACLs: Building...

View Article

Image may be NSFW.
Clik here to view.

Introduction to HAProxy Stick Tables

HTTP requests are stateless by design. However, this raises some questions regarding how to track user activities, including malicious ones, across requests so that you can collect metrics, block...

View Article

Image may be NSFW.
Clik here to view.

Introduction to HAProxy Maps

An HAProxy map file stores key-value pairs and is the starting point for some inventive behavior including dynamic rate limiting and blue-green deployments. Dictionaries. Maps. Hashes. Associative...

View Article


Image may be NSFW.
Clik here to view.

The Four Essential Sections of an HAProxy Configuration

An HAProxy configuration file guides the behavior of your HAProxy load balancer. In this post, we demonstrate its four most essential sections. There are four essential sections to an HAProxy...

View Article

Image may be NSFW.
Clik here to view.

Application-Layer DDoS Attack Protection with HAProxy

HAProxy’s high-performance security capabilities are utilized as a key line of defense by many of the world’s top enterprises. Application-layer DDoS attacks are aimed at overwhelming an application...

View Article

Image may be NSFW.
Clik here to view.

Bot Protection with HAProxy

HAProxy is a high-performance load balancer that provides advanced defense capabilities for detecting and protecting against malicious bot traffic to your website. Combining its unique ACL, map, and...

View Article


Image may be NSFW.
Clik here to view.

HAProxy Exposes a Prometheus Metrics Endpoint

HAProxy has added native support for Prometheus, allowing you to export metrics directly. Read on to learn more.   Metrics are a key aspect of observability, along with logging and tracing. They...

View Article

Browsing all 9 articles
Browse latest View live




Latest Images