Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Nearly 90% of our AI Crawler Traffic is From TikTok Parent Bytedance - Lessons Learned

This month, Fortune.com reported that TikTok’s web scraper — known as Bytespider — is aggressively sucking up content to fuel generative AI models. We noticed the same thing when looking at bot management analytics produced by HAProxy Edge — our global network that we ourselves use to serve traffic for haproxy.com. Some of the numbers we are seeing are fairly shocking, so let’s review the traffic sources and where they originate.

Encoding HAProxy logs in machine-readable JSON or CBOR

Standardized logging formats are important for teams that rely on logging for observability, troubleshooting, and workflow integration. Using structured formats simplifies parsing and eliminates the need to interpret fields manually, ensuring consistency across logging formats. This reduces manual work, prevents brittleness from unstructured logs, and simplifies integration between teams that feed logs into a shared aggregation system.

Announcing HAProxy Data Plane API 3.0

HAProxy Data Plane API 3.0 is now available! The latest version is hosted on our GitHub releases page. This release follows the recent HAProxy 3.0 release and incorporates its changes, along with some improvements and changes specific to the API. HAProxy Data Plane 3.0 adds multiple breaking changes. We'll cover the impacts of these changes in detail to highlight how your implementation and usage of Data Plane API may be affected.

Easily Remove Existing HAProxy Connections Made via Client Authentication

Most load balancers only check a client certificate when the client first connects. However, this can be problematic if a client stays connected for an extended period of time. Staying connected would allow clients to continually send and receive data. Imagine you have an employee whose certificate and key were stolen by an adversary. If you are using TLS client authentication, that adversary can connect to your infrastructure and maintain illegal access.

How To Identify Requests as Part of an End-To-End Tracing Strategy

Tracing follows requests as they move through an entire network, from the initial client request to the final response. In financial services, end-to-end tracing is essential for maintaining robust security, ensuring comprehensive observability of system operations, and understanding chains of events in case of issues or anomalies.

Zero-Trust mTLS Automation with HAProxy and SPIFFE/SPIRE

Whether you’re running a service mesh composed of HAProxy instances or facilitating communication between multiple systems, ensuring the authentication of traffic between your services is critical. This zero-trust security model operates under the assumption that you should not extend trust without verification, even within your own systems. By verifying every interaction, you mitigate the risks that arise when third parties imitate your systems.

How to Achieve Ultimate Freedom With Your Load Balancer

The popularity of open source software continues to soar alongside growth in cloud usage, including multi-cloud and hybrid cloud infrastructure. Pluralsight's State of Cloud 2023 report revealed that 65% of organizations actively leverage multi-cloud environments. Open source software is prized, in part, because it enables freedom of choice in an organization’s tech stack, especially in complex deployment environments.