Load Balancing VMware Horizon's UDP and TCP Traffic: A Guide with HAProxy
Learn how to load balance VMware Horizon's complex UDP and TCP traffic using HAProxy's stateless stickiness. Improve remote desktop performance and reliability.
Learn how to load balance VMware Horizon's complex UDP and TCP traffic using HAProxy's stateless stickiness. Improve remote desktop performance and reliability.
Get expert knowledge delivered directly to your inbox.
HAProxy Fusion Control Plane gives the power to simplify, scale, and secure HAProxy application delivery infrastructure using a centralized control plane.
HAProxy Technologies has announced that HAProxy 2.0 or newer, HAProxy Enterprise 2.0 or newer, and HAProxy ALOHA 12.5 or newer are affected by CVE-2023-25725. If you are using an affected product you
Taking the new G2 reports, user reviews, and real-world benchmark results, HAProxy stands as a market leader in application delivery and customer experience.
HAProxy 2.7 adds features such as Traffic Shaping, Stick Tables Sharding, Scalability Improvements, and Layer 7 HTTP Retry Updates.
This blog post will discuss web threats and how to protect yourself against DDoS attacks, web scraping, brute-force attacks, and vulnerability scanning.
The HAProxyConf 2022 gave us three days of workshops, keynotes, technical talks, and use cases from HAProxy core developers, community, and enterprise users.
Cookies have many usages, most notably user authentication and settings. This post will explain the best practices for how to secure your cookies.
If you are using OpenSSL version 3.0 or above with HAProxy, you should update to OpenSSL version 3.0.7.
In this blog post, you will read how containers have become one of the most efficient ways of virtually deploying applications.
In this blog post, you will learn that application acceleration is all about improving the responsiveness of a digital service.
When talking about managing web applications and the services they provide, the term “API gateway” is often thrown around, but what does it mean?
Learn how to secure your APIs against unauthorized access. The OAuth 2 protocol uses JSON Web Tokens to convey a client’s permissions and HAProxy can verify whether a token can be trusted.