HAProxy

Waltham, MA, USA
2013
  |  By Aurelien Darragon
Standardized logging formats are important for teams that rely on logging for observability, troubleshooting, and workflow integration. Using structured formats simplifies parsing and eliminates the need to interpret fields manually, ensuring consistency across logging formats. This reduces manual work, prevents brittleness from unstructured logs, and simplifies integration between teams that feed logs into a shared aggregation system.
  |  By HAProxy
G2 leader in API, container, and security categories a trusted open source and enterprise solution for on-premises, multi-cloud, and edge applications.
  |  By HAProxy
Innovators and enthusiasts are invited to submit their presentations to be featured in the HAProxyConf 2025 lineup.
  |  By Marko Juraga
HAProxy Data Plane API 3.0 is now available! The latest version is hosted on our GitHub releases page. This release follows the recent HAProxy 3.0 release and incorporates its changes, along with some improvements and changes specific to the API. HAProxy Data Plane 3.0 adds multiple breaking changes. We'll cover the impacts of these changes in detail to highlight how your implementation and usage of Data Plane API may be affected.
  |  By Nathan Wehrman
Most load balancers only check a client certificate when the client first connects. However, this can be problematic if a client stays connected for an extended period of time. Staying connected would allow clients to continually send and receive data. Imagine you have an employee whose certificate and key were stolen by an adversary. If you are using TLS client authentication, that adversary can connect to your infrastructure and maintain illegal access.
  |  By Jakub Suchy
Tracing follows requests as they move through an entire network, from the initial client request to the final response. In financial services, end-to-end tracing is essential for maintaining robust security, ensuring comprehensive observability of system operations, and understanding chains of events in case of issues or anomalies.
  |  By Jakub Suchy
Whether you’re running a service mesh composed of HAProxy instances or facilitating communication between multiple systems, ensuring the authentication of traffic between your services is critical. This zero-trust security model operates under the assumption that you should not extend trust without verification, even within your own systems. By verifying every interaction, you mitigate the risks that arise when third parties imitate your systems.
  |  By Tyler Charboneau
The popularity of open source software continues to soar alongside growth in cloud usage, including multi-cloud and hybrid cloud infrastructure. Pluralsight's State of Cloud 2023 report revealed that 65% of organizations actively leverage multi-cloud environments. Open source software is prized, in part, because it enables freedom of choice in an organization’s tech stack, especially in complex deployment environments.
  |  By Daniel Skrba
HAProxy Enterprise now supports RADIUS load balancing with its new HAProxy Enterprise UDP Module. This blog post addresses some of the challenges with implementing RADIUS load balancing and how you can get started with the new module below.
  |  By Jakub Suchy
The robots.txt file is a time-honored point of control for website publishers to assert whether or not their websites should be crawled by bots of various kinds. However, it turns out that AI crawlers from large language model (LLM) companies often ignore the contents of robots.txt and crawl your site regardless.
  |  By HAProxy
Presented by Sanjay Singh & Sri Ram Bathina (LinkedIn) at HAProxyConf 2022. In this talk, you will learn about LinkedIn's experiments with HAProxy in the past, their current HAProxy use cases, and the plan for replacing the existing stack with HAProxy. You will also see LinkedIn's evaluation process, why HAProxy came out as a winner, and how they are planning to leverage HAProxy’s features to modernize their traffic stack which will make them better prepared for the future.
  |  By HAProxy
Presented by Willy Tarreau (HAProxy) at HAProxyConf 2022. Discover the power of HAProxy in this must-watch talk by Willy Tarreau, the developer of the original HAProxy project. Learn how HAProxy has set new world records in performance and scalability and discover how its cutting-edge technology can help you save on costs and energy consumption. With climate change at the forefront of our minds, it's more important than ever to find ways to conserve energy in every aspect of our lives. Join Willy as he explores real-life examples of energy-efficient load balancing.
  |  By HAProxy
HAProxy version 2.7 is now available! This version of the world’s fastest and most widely used software load balancer brings improvements to scalability, performance, and ease of use. Register for this webinar to learn about the newest features and updates.
  |  By HAProxy
Recap of HAProxyConf in Paris, November 8-9 2022. HAProxyConf is the user conference for the highly-active community that has made HAProxy the world’s fastest and most widely deployed software load balancer.
  |  By HAProxy
The HAProxy Data Plane API now has the ability to get backends from AWS tags and Consul, upload SSL certificates, and other features that make it fit into modern configurations. In this presentation we will provide a brief introduction to the HAProxy Data Plane API and cover some of these new features in more depth.
  |  By HAProxy
There’s no shortage of articles on CI/CD and how to run a configuration validation utility before reloading or restarting a service, but this type of validation is not the same as acceptance testing. Furthermore, these validations don’t always give you (or your leadership team) the confidence to allow you to make big changes to your Production Infrastructure during normal business hours, often preferring to err on the side of caution and scheduling a maintenance window when you might prefer to be in bed.
  |  By HAProxy
When it comes to TLS in Kubernetes, the first thing to appreciate when you use the HAProxy Ingress Controller is that all traffic for all services traveling to your Kubernetes cluster passes through HAProxy. Requests are then routed towards the appropriate backend services depending on metadata in the request, such as the Host header. So, by enabling TLS in your ingress controller, you’re adding secure communication to all of your services at once. HAProxy is known for its advanced support of the important performance-oriented features available in TLS.
  |  By HAProxy
Performance has never been more important than in a cloud-native world. Cloud-hosted resources cost money and a slow-loading application can cause a suboptimal ROI. Have you taken the time to tune your Kubernetes ingress controller and proxy? Many organizations don't until it's absolutely necessary, and most users will typically run a default, out-of-the-box configuration. In this demo, we benchmark five popular ingress controllers and put them head-to-head against each other with their default configurations.
  |  By HAProxy
Helm, the Kubernetes package manager, revamps the way teams manage their Kubernetes resources and allows them to deploy applications in a consistent and reliable way. It is a valuable tool in a continuous delivery pipeline, with support for quick updates and rollbacks. At HAProxy Technologies, we offer Helm as the preferred method for installing the HAProxy Kubernetes Ingress Controller, and we’ll show you how to customize that installation to fit your use case.
  |  By HAProxy
This presentation will describe how Go and other developers can integrate with HAProxy via the HAProxy Data Plane API and it’s packages. We will explain the motivation behind this new product and provide an overview of how we used the OpenAPI specification, including how models and server stubs are generated using go-swagger. We will delve deeper with describing client-native and config-parser packages and explain how and when to use them, by showing how we use them in our HAProxy Kubernetes Ingress Controller. We will also briefly touch on how you can contribute to these projects.
  |  By HAProxy
This whitepaper is designed for anyone evaluating the pros and cons of different types of application delivery controllers for web applications and services. The Software Versus Appliance Load Balancers whitepaper will give you basic definitions for different types of load balancers. It will also provide you with guidance on how to choose the load balancer that best meets the application delivery requirements for your applications.
  |  By HAProxy
Your pods running in Kubernetes need to be exposed to the outside world. With the HAProxy Kubernetes Ingress Controller, you can route traffic to them faster, more reliably, and with improved security compared to any other ingress controller.
  |  By HAProxy
This whitepaper is designed for anyone responsible for ensuring the quality of service and business continuity for web applications and services. The All About Load Balancing whitepaper will give you the keys to a comprehensive load balancing strategy. It will also provide you with guidance on how to tune your architecture based on your requirements or constraints.
  |  By HAProxy
HAProxy gives you the building blocks to create a strong, layered defense against DDoS, malicious bot traffic, vulnerability scanners and more.
  |  By HAProxy
One of the biggest challenges for organizations that have adopted microservice architecture is the lack of architectural, operational, and organizational standardization. After splitting a monolithic application or building a microservice ecosystem from scratch, many engineers are left wondering what's next. In this practical book, author Susan Fowler presents a set of microservice standards in depth, drawing from her experience standardizing over a thousand microservices at Uber. You'll learn how to design microservices that are stable, reliable, scalable, fault tolerant, performant, monitored, documented, and prepared for any catastrophe.

We are the company behind HAProxy, the world’s fastest and most widely used software load balancer. Organizations rapidly deploy HAProxy products to deliver websites and applications with the utmost performance, observability, and security at any scale and in any environment.

HAProxy One is an industry-first end-to-end application delivery platform designed to simplify and secure modern application architectures. It features a suite of products consisting of application delivery software, appliances and turnkey services managed and observed through a unified control plane. It provides load balancing, application acceleration, CDN, DDoS protection, bot management, and WAF capabilities.

HAProxy Powers the Uptime of the Cloud Era:

  • Load Balancing: Load balance your services at any scale and in any environment with our feature-rich application delivery controllers.
  • High Availability: Deliver optimal user experiences regardless of volume of visitors, number of hits, or complexity of request.
  • Application Acceleration: High performance SSL offloading, advanced timings, high performance lookup maps, HTTP compression, device detection and HTTP routing.
  • Administration: Utilize HAProxy’s RESTful Data Plane API and Runtime API to manipulate your load balancer’s configuration or to drain traffic. Make changes dynamically without risking impact to other services.
  • Security: Receive the benefits of SSL with less hardware, reduce the number of services exposed to the Internet, stop DDoS and Brute Force attacks, detect and block SQL/XSS attacks, ensure protocol compliance and identify intrusions with our advanced logging.
  • Microservices: HAProxy is at the core of application delivery for some of the largest and most complex microservices architectures in the world and constantly releases new features to support these dynamic environments.

Powering the future of secure application delivery.