Operations | Monitoring | ITSM | DevOps | Cloud

How HAProxy built its modern application delivery architecture

Let’s be real: building reliable tech products is hard. Modernizing that same tech without compromising the user experience is even harder. The "rip and replace" approach to modernization can severely disrupt your customers’ integration efforts and workflows. When it doesn’t work, reversing course might be the least-worst option. By contrast, the evolution of the HAProxy One application delivery platform architecture at HAProxy Technologies over 25 years has been gradual and consistent.

How Criteo handles 23M requests per second (RPS) with HAProxy Runtime API automation

Criteo handles 23 million requests per second (RPS) while maintaining peak performance and minimizing downtime. For most organizations, handling that level of traffic is just a theoretical stress test — a what-if scenario should their infrastructure ever be overwhelmed by an unexpected wave of requests. But for Criteo, 23 million RPS is just another Tuesday.

How PayPal hyperscaled Kubernetes routing with HAProxy Fusion

PayPal runs six data centers, each with around 60,000 containers. Their 30,000 employees spin up nearly 10,000 test environments every day — roughly 6 to 10 every minute. Each environment requires three config updates: one to create the virtual service, and additional calls to configure and deploy the applications. Do the math and you get a staggering 30,000 config updates per day.

HAProxy at KubeCon Amsterdam 2026: the standard, by popular demand

KubeCon + CloudNativeCon Europe 2026 brought thousands of cloud-native practitioners to Amsterdam for four days of talks, demos, and hallway conversations about where Kubernetes is heading. HAProxy Technologies came as a Diamond Sponsor, and by the time the exhibition floor closed on Thursday, it was clear that the market had reached the same conclusion we had. HAProxy is the standard — and this year, more people than ever were ready to say so out loud.

KubeCon Europe 2026 | Universal Mesh: Connect and Secure Everything

Service mesh was a good start. But the industry needs something more comprehensive. At KubeCon + CloudNativeCon Europe 2026, HAProxy's Baptiste Assmann presents a new architectural vision: Universal Mesh — a boundary-first approach that unifies North-South and East-West traffic management into a single platform, without sidecar overhead.

Announcing HAProxy Unified Gateway 1.0

Today at KubeCon Amsterdam, we are announcing the 1.0 release of HAProxy Unified Gateway, incorporating valuable community feedback from our beta users. HAProxy Unified Gateway delivers unified, high-performance, cloud-native application routing backed by an open-source community with 25+ years of experience.

Back to fundamentals: 7 insights from Kelsey Hightower at HAProxyConf

Early in his career, Kelsey Hightower made a bet. The load balancer his team was running was consuming too much memory, and he was convinced he knew the fix. He told his manager: “If it doesn’t work, fire me. But I think I can make it work.” The fix was HAProxy. It was a story he shared publicly for the first time at HAProxyConf 2025, where he delivered a keynote address, “The Fundamentals.”

Announcing HAProxy Fusion 2.0

Today, we announce the release of HAProxy Fusion 2.0. This release marks a generational leap for the authoritative control plane that orchestrates HAProxy Enterprise’s high-performance application delivery and security. With a combination of new headliner features, structural changes, and improvements to the performance of the underlying API, HAProxy Fusion has jumped from version 1.3 to version 2.0.

Streamlining your NIS2 and DORA compliance solution with HAProxy

With NIS2 and DORA now in effect, EU organizations face a fundamental shift in how they approach security. Compliance is a standard built into every layer of your environment, from your hardware and OS to your software configuration. HAProxy alone doesn't make an organization compliant, yet it serves as a critical technical component of a strong security strategy.