Top Story

Test Driving “Power of Two Random Choices” Load Balancing
Willy TarreauThe Power of Two Random Choices load-balancing algorithm has piqued some curiosity. In this blog post, we see how it stacks up against other modern-day algorithms available in HAProxy. Recently, I was asked twice about my opinion on supporting an algorithm known as...
Browse By Topic
Recent Posts

Introduction to HAProxy Logging
Moemen MhedhbiWhen it comes to operationalizing your log data, HAProxy provides a wealth of information. In this blog post, we demonstrate how to set up HAProxy logging, target a Syslog server, understand the log fields, and suggest some helpful tools for parsing log files. [Live...
![[Live Webinar] Deep Dive Into HAProxy Logging](https://cdn.haproxy.com/wp-content/uploads/2018/12/Webinar-600x300.png)
[Live Webinar] Deep Dive Into HAProxy Logging
Senad CausWebinar date and time: February 26, 2019 Starting time (US): 12pm EST, 11am CST, 10am MST, 9am PST Starting time (EU): 5pm GTM, 6pm CET, 7pm EET There's more to logs than grep! In this deep dive, you'll learn how to unleash the power of your HAProxy logs. See how...
![Using HAProxy as an API Gateway, Part 2 [Authentication]](https://cdn.haproxy.com/wp-content/uploads/2019/01/image2-e1548174430466.png)
Using HAProxy as an API Gateway, Part 2 [Authentication]
Baptiste Assmann and Nick RamirezHAProxy is a powerful API gateway due to its ability to provide load balancing, rate limiting, observability and other features to your service endpoints. It also integrates with OAuth 2, giving you control over who can access your APIs. In this blog post, you'll see...

HAProxy 1.9.2 Adds gRPC Support
Nick RamirezHAProxy provides end-to-end proxying of HTTP/2 traffic. Use HAProxy to route, secure, and observe gRPC traffic over HTTP/2. Read on to learn more. HAProxy 1.9 introduced the Native HTTP Representation (HTX). Not only does this allow you to use HTTP/2 end-to-end, it...
![[On Demand Webinar] Introduction to HAProxy Maps](https://cdn.haproxy.com/wp-content/uploads/2018/12/Webinar-600x300.png)
[On Demand Webinar] Introduction to HAProxy Maps
Senad CausYour routing logic in HAProxy is simple in the beginning. Then it grows in complexity, perhaps requiring you to choose a different backend based upon the requested URL path, hostname or region. Not long after, you have dozens of similar rules—maybe even hundreds! When...

HAProxy 1.9 Has Arrived
Daniel CorbettHAProxy Technologies is proud to announce the release of HAProxy 1.9. This release brings a native HTTP representation (HTX) powering end-to-end HTTP/2 support and paving the way for future innovations such as HTTP/3 (QUIC). It also contains improvements to buffers...

Building a Service Mesh with HAProxy and Consul
Baptiste Assmann and Nick RamirezHashiCorp added a service mesh feature to Consul, its service-discovery and distributed storage tool. In this post, you'll see how HAProxy is the perfect fit as a data plane for this architecture. HAProxy is no stranger to the service mesh scene. Its high performance,...

Bot Protection with HAProxy
Chad LavoieHAProxy is a high-performance load balancer that provides advanced defense capabilities for detecting and protecting against malicious bot traffic to your website. Combining its unique ACL, map, and stick table systems with its powerful configuration language allows...
![[On-Demand Webinar] Introduction to HAProxy Stick Tables](https://cdn.haproxy.com/wp-content/uploads/2018/12/Webinar-600x300.png)
[On-Demand Webinar] Introduction to HAProxy Stick Tables
Senad CausHTTP requests are stateless by design. So how do you "remember" clients so that you can persist them to a server? Or how do you recognize when a client's behavior seems malicious? HAProxy Enterprise provides a unique feature for capturing and storing client activity...

Application-Layer DDoS Attack Protection with HAProxy
Chad LavoieHAProxy’s high-performance security capabilities are utilized as a key line of defense by many of the world’s top enterprises. Application-layer DDoS attacks are aimed at overwhelming an application with requests or connections, and in this post we will show you how...