HAProxy

Waltham, MA, USA
2013
  |  By Zlatko Bratkovic
HAProxy Kubernetes Ingress Controller 1.11 is now available. For our enterprise customers, HAProxy Enterprise Kubernetes Ingress Controller 1.11 is coming soon and will incorporate the same features. In this release, we enhanced security through the adoption of rootless containers, graduated our custom resource definitions to v1, made them easier to manage, and introduced support for the QUIC protocol.
  |  By HAProxy
With extensive open source and enterprise software experience, Bertrand joins HAProxy during a time of accelerated revenue growth and community adoption, and revolutionary product development.
  |  By Tyler Charboneau
Software load balancers and load balancing appliances have become indispensable components within a healthy application infrastructure. Scalability, security, observability, and reliability are more critical than ever as companies push harder towards 99.999% availability. Accordingly, traffic management is key to protecting servers and ensuring uptime. Vendors have offered load balancers in different form factors to serve evolving infrastructure needs.
  |  By Jakub Suchy
CitrixBleed, or CVE-2023-4966, is now an infamous security vulnerability affecting Citrix NetScaler that allows attackers to hijack user sessions by stealing session authentication tokens. Unfortunately, it has affected many NetScaler customers including Xfinity, which lost data for 36 million customers as a result of CitrixBleed. There is no way to protect against CitrixBleed by configuring the NetScaler WAF to detect and block it.
  |  By Tyler Charboneau
Every day, organizations face external threats as a consequence of exposing their services over the internet. An estimated 2,200+ attacks occur in a 24-hour period—or one attack every 39 seconds. Add the fact that an average data breach (one of many potential consequences of poor security) costs companies $4.45 million, and the need for strong security is impossible to ignore. Web application and API security is key to protecting your infrastructure, data, and users.
  |  By Daniel Skrba
Managing incoming web traffic for your applications is essential to ensuring optimal performance, preventing abuse, and maintaining the security of your cloud infrastructure. To accomplish this, one of the tools HAProxy Enterprise users have at their disposal is rate limiting—the practice of preventing clients from making too many requests and using system resources unfairly.
  |  By HAProxy
World's fastest and most widely used software load balancer provides scalable performance for efficient growth.
  |  By Nick Ramirez
HAProxy 2.9 further extends HAProxy's performance, flexibility, and observability. This release came together through the efforts of all the community members who got involved. A release like this requires feature requests, bug reports, forum discussions, code submissions, QA tests, and documentation! In other words, this project is fueled by people like you! If you're interested in joining this vibrant community, it can be found on GitHub, Slack, Discourse, and the HAProxy mailing list.
  |  By Iwan Price-Evans
HAProxy Fusion 1.2 is now available, making it even simpler to adopt modern, scalable application delivery. New efficiencies, workflows, and form factors enable you to be more productive, use familiar tools, and explore powerful new use cases.
  |  By Tyler Charboneau
The sun has officially set on KubeCon North America 2023, but the CNCF's flagship event has left a lasting impression on us. Roughly 9,000 Kubernetes enthusiasts descended on Chicago's McCormick Place West to see the K8s community's latest innovations. DevOps professionals, engineers, and architects alike were eager to share and boost their K8s knowledge. Overall, HAProxy joined over 250 other sponsor organizations to celebrate open-source, cloud-native technologies over four activity-packed days.
  |  By HAProxy
Presented by Sanjay Singh & Sri Ram Bathina (LinkedIn) at HAProxyConf 2022. In this talk, you will learn about LinkedIn's experiments with HAProxy in the past, their current HAProxy use cases, and the plan for replacing the existing stack with HAProxy. You will also see LinkedIn's evaluation process, why HAProxy came out as a winner, and how they are planning to leverage HAProxy’s features to modernize their traffic stack which will make them better prepared for the future.
  |  By HAProxy
Presented by Willy Tarreau (HAProxy) at HAProxyConf 2022. Discover the power of HAProxy in this must-watch talk by Willy Tarreau, the developer of the original HAProxy project. Learn how HAProxy has set new world records in performance and scalability and discover how its cutting-edge technology can help you save on costs and energy consumption. With climate change at the forefront of our minds, it's more important than ever to find ways to conserve energy in every aspect of our lives. Join Willy as he explores real-life examples of energy-efficient load balancing.
  |  By HAProxy
HAProxy version 2.7 is now available! This version of the world’s fastest and most widely used software load balancer brings improvements to scalability, performance, and ease of use. Register for this webinar to learn about the newest features and updates.
  |  By HAProxy
Recap of HAProxyConf in Paris, November 8-9 2022. HAProxyConf is the user conference for the highly-active community that has made HAProxy the world’s fastest and most widely deployed software load balancer.
  |  By HAProxy
The HAProxy Data Plane API now has the ability to get backends from AWS tags and Consul, upload SSL certificates, and other features that make it fit into modern configurations. In this presentation we will provide a brief introduction to the HAProxy Data Plane API and cover some of these new features in more depth.
  |  By HAProxy
There’s no shortage of articles on CI/CD and how to run a configuration validation utility before reloading or restarting a service, but this type of validation is not the same as acceptance testing. Furthermore, these validations don’t always give you (or your leadership team) the confidence to allow you to make big changes to your Production Infrastructure during normal business hours, often preferring to err on the side of caution and scheduling a maintenance window when you might prefer to be in bed.
  |  By HAProxy
When it comes to TLS in Kubernetes, the first thing to appreciate when you use the HAProxy Ingress Controller is that all traffic for all services traveling to your Kubernetes cluster passes through HAProxy. Requests are then routed towards the appropriate backend services depending on metadata in the request, such as the Host header. So, by enabling TLS in your ingress controller, you’re adding secure communication to all of your services at once. HAProxy is known for its advanced support of the important performance-oriented features available in TLS.
  |  By HAProxy
Performance has never been more important than in a cloud-native world. Cloud-hosted resources cost money and a slow-loading application can cause a suboptimal ROI. Have you taken the time to tune your Kubernetes ingress controller and proxy? Many organizations don't until it's absolutely necessary, and most users will typically run a default, out-of-the-box configuration. In this demo, we benchmark five popular ingress controllers and put them head-to-head against each other with their default configurations.
  |  By HAProxy
Helm, the Kubernetes package manager, revamps the way teams manage their Kubernetes resources and allows them to deploy applications in a consistent and reliable way. It is a valuable tool in a continuous delivery pipeline, with support for quick updates and rollbacks. At HAProxy Technologies, we offer Helm as the preferred method for installing the HAProxy Kubernetes Ingress Controller, and we’ll show you how to customize that installation to fit your use case.
  |  By HAProxy
This presentation will describe how Go and other developers can integrate with HAProxy via the HAProxy Data Plane API and it’s packages. We will explain the motivation behind this new product and provide an overview of how we used the OpenAPI specification, including how models and server stubs are generated using go-swagger. We will delve deeper with describing client-native and config-parser packages and explain how and when to use them, by showing how we use them in our HAProxy Kubernetes Ingress Controller. We will also briefly touch on how you can contribute to these projects.
  |  By HAProxy
This whitepaper is designed for anyone evaluating the pros and cons of different types of application delivery controllers for web applications and services. The Software Versus Appliance Load Balancers whitepaper will give you basic definitions for different types of load balancers. It will also provide you with guidance on how to choose the load balancer that best meets the application delivery requirements for your applications.
  |  By HAProxy
Your pods running in Kubernetes need to be exposed to the outside world. With the HAProxy Kubernetes Ingress Controller, you can route traffic to them faster, more reliably, and with improved security compared to any other ingress controller.
  |  By HAProxy
This whitepaper is designed for anyone responsible for ensuring the quality of service and business continuity for web applications and services. The All About Load Balancing whitepaper will give you the keys to a comprehensive load balancing strategy. It will also provide you with guidance on how to tune your architecture based on your requirements or constraints.
  |  By HAProxy
HAProxy gives you the building blocks to create a strong, layered defense against DDoS, malicious bot traffic, vulnerability scanners and more.
  |  By HAProxy
One of the biggest challenges for organizations that have adopted microservice architecture is the lack of architectural, operational, and organizational standardization. After splitting a monolithic application or building a microservice ecosystem from scratch, many engineers are left wondering what's next. In this practical book, author Susan Fowler presents a set of microservice standards in depth, drawing from her experience standardizing over a thousand microservices at Uber. You'll learn how to design microservices that are stable, reliable, scalable, fault tolerant, performant, monitored, documented, and prepared for any catastrophe.

We are the company behind HAProxy, the world’s fastest and most widely used software load balancer. Organizations rapidly deploy HAProxy products to deliver websites and applications with the utmost performance, observability, and security at any scale and in any environment.

HAProxy One is an industry-first end-to-end application delivery platform designed to simplify and secure modern application architectures. It features a suite of products consisting of application delivery software, appliances and turnkey services managed and observed through a unified control plane. It provides load balancing, application acceleration, CDN, DDoS protection, bot management, and WAF capabilities.

HAProxy Powers the Uptime of the Cloud Era:

  • Load Balancing: Load balance your services at any scale and in any environment with our feature-rich application delivery controllers.
  • High Availability: Deliver optimal user experiences regardless of volume of visitors, number of hits, or complexity of request.
  • Application Acceleration: High performance SSL offloading, advanced timings, high performance lookup maps, HTTP compression, device detection and HTTP routing.
  • Administration: Utilize HAProxy’s RESTful Data Plane API and Runtime API to manipulate your load balancer’s configuration or to drain traffic. Make changes dynamically without risking impact to other services.
  • Security: Receive the benefits of SSL with less hardware, reduce the number of services exposed to the Internet, stop DDoS and Brute Force attacks, detect and block SQL/XSS attacks, ensure protocol compliance and identify intrusions with our advanced logging.
  • Microservices: HAProxy is at the core of application delivery for some of the largest and most complex microservices architectures in the world and constantly releases new features to support these dynamic environments.

Powering the future of secure application delivery.