
Content Library


eBook
HAProxy as an API Gateway
Our HAProxy as an API Gateway ebook provides a comprehensive overview of how to use the HAProxy load balancer as an API gateway. Download now for free.

Webinar
A Tour of HAProxy 2.2
In this webinar, we’ll tour the new features of HAProxy 2.2 and show how you can get the most out of this new version.


eBook
HAProxy in Kubernetes
Get started using HAProxy Ingress Controller in your cluster with our ebook! Learn how to route traffic in Kubernetes with ease. Download for free today.

Webinar
Achieving FIPS 140-2 Encryption Compliance with HAProxy Enterprise on Red Hat Enterprise Linux
In this webinar, you will learn how FIPS 140-2 is designed to protect data, how it relates to using TLS encryption, and how you can become compliant when using the HAProxy Enterprise load balancer on Red Hat Enterprise Linux.


eBook
The HAProxy Guide to Multi-Layered Security
Our The HAProxy Guide to Multi-layered Security ebook provides a comprehensive overview of HAProxy’s extensive security capabilities. Get your copy now!

Webinar
Achieving Multi-Datacenter High Availability with HAProxy ALOHA & GSLB
In this webinar, you will learn about GSLB in HAProxy ALOHA and how it can help you deliver your services more efficiently and with greater reliability.
Showing 1 of 8 Pages