ALOHA Pocket is Coming…
This is the ALOHA Pocket. Probably the smallest load balancer you have ever seen from any vendor.
This is the ALOHA Pocket. Probably the smallest load balancer you have ever seen from any vendor.
In a Slow POST attack, an attacker begins by sending a legitimate HTTP POST header to a Web server, exactly as they would under normal circumstances.
In this blog post, we will give a quick step-by-step guide on how to serve ECC and RSA certificates on the same IP with HAProxy.
Remote Desktop Services is a technology from Microsoft that allows users to remotely access a session-based desktop, virtual machine-based desktop, or...
Health checking is one of the most important features of a load balancer. Here we show how to match multiple conditions for HTTP health checking in HAProxy.
This blog post explains how to use HAProxy to simply prevent using SSLv3 or to prevent those users to reach your applications and print them a message.
Today’s article will explain how to use HAProxy to protect your application from Bash shellshock vulnerability if you’re in a case where you have to be protected.
In this blog post, we demonstrate how to enable binary health checks with HAProxy 1.5 by using a PHP-fpm/FastCGI probe example.
Some customers ask us to migrate the Apache mod_proxy configuration into HAProxy. This article explains how to translate ProxyPass-related rules.
In this blog post, we will demonstrate how to perform asymmetric routing and multiple default gateways on Linux with HAProxy.
You don’t want your clients to send their cookies (understand their identity) clearly through the Internet. This is today’s article's purpose.
In this blog post, we will show the different ways in which you can use the HAProxy load balancer to emulate an active/passive clustering mode.