Operations | Monitoring | ITSM | DevOps | Cloud

HAProxy

HAProxyConf 2022 Recap

Earlier this month, I packed my bag and grabbed my lanyard to attend HAProxyConf in the beautiful city of Paris. I was far from alone: nearly 200 customers, colleagues, and community enthusiasts had the same idea. We overcame jetlag, stagefright, and introverted personality types for the joy of meeting and learning from some of the brightest minds in the industry. From load balancing to cybersecurity to endless cups of strong coffee: this is HAProxyConf 2022!

Secure Cookies Using HAProxy Enterprise

My colleague Baptiste previously published an article on how to protect cookies while offloading SSL. I recently encountered a customer who wanted to achieve a very similar goal but using a more recent HAProxy Enterprise version. This post will explain the best practices for how to secure your cookies using HAProxy Enterprise.

4 Website Security Threats (2022) + Solutions

For server administrators tasked with ensuring the reliable operation of their web applications, the thought of a lurking cyberattack can be one to lose sleep over. An attack on your system and the services you provide could render your web applications unresponsive. What’s worse, important information that depends on privacy and the careful storing of data is put at risk.

Fundamentals: What Sets Containers Apart from Virtual Machines

Containers have fast become one of the most efficient ways of virtually deploying applications, offering more agility than a virtual machine (VM) can typically provide. Both containers and VMs are great tools for managing resources and application deployment, but what is the difference between the two, and how do we manage containers?

Fundamentals: Application Acceleration and the Benefits for your Service Delivery

Application acceleration is all about improving the responsiveness of a digital service. When clients access web applications, they are expecting near-immediate feedback from servers. Maintaining that level of performance requires ensuring the right resources are available to process requests, shortening the information retrieval process, and maintaining system uptime by warding off threats.

Fundamentals: Load Balancing and the Right Distribution Algorithm for You

With the right load balancing in place, the demand of increasing web traffic can become manageable, but how do you determine which load balancing algorithm is best suited for your applications? Does the ease of use of static load balancing better suit the services you provide, or would your system benefit from a more complex and dynamic set of algorithms to maximize efficiency? In this blog post, we discuss what to consider when deciding on the right load-balancing algorithm.