How-Tos - Let’s get technical. Here you’ll find solutions from our experts.
Using Prometheus with your Loadbalancer.org appliance
How to export Loadbalancer.org's HAProxy metrics into an existing Prometheus environment.
Using Postman to upload certificates to your Loadbalancer.org appliance
Putting Postman to good use to make your life a whole lot easier!
How to load balance and optimize Hitachi Content Platform (HCP)
Organizations are making fundamental changes to their data infrastructure and embracing innovative object storage solutions.
How to load balance MinIO object storage
Setting up a Layer 7 VIP that connects back to your MinIO server.
Using Postman with the Loadbalancer.org API
How to use Postman to do API testing.
Handling large requests with a Web Application Firewall (WAF) while avoiding Denial of Service (DoS) attacks
How can we safely deal with very large HTTP requests when working with a WAF?
How to rate limit with HAProxy Stick Tables and the WAF
Rate limiting in HAProxy and the WAF, to prevent DOS-style attacks on customer servers.
How to set up email notifications on your Loadbalancer.org appliance
Get alerts for Heartbeat, Layer 4 services, and Layer 7 services, straight to your inbox.
When is it right to SSL offload?
Why would we want to bog down our nifty application with network-level considerations?
How many network ports do you need on a hardware load balancer?
Ever wondered if you need one network port per application? Or whether a two-arm load balancer configuration needs two physical ports...?
Ever wondered how you can avoid the pain of F5 iRules?
Making iRules less painful with this key how-to.
HAProxy ACL rules don't have to be painful
A rundown of the new enhancements to the WebUI as part of our 8.6 release, which is going to make the management of your load balancer far simpler.
Simplifying web application security with the Core Rule Set v3
Here we outline our new, simplified WAF offering, for easier configuration and superior web application security, using the core rule set v3.
I wonder…Can HAProxy Proxy Protocol fix my Secure Web Gateway routing problem?
HAProxy Proxy Protocol workarounds and techniques to fix a Secure Web Gateway routing problem.
Extending Net-SNMP for infrastructure monitoring
Net-SNMP is possibly the most popular protocol, and also the most advanced implementation of the SNMP protocol. Find out here how to harness it.
Let's Ansible the LBAPI
A playbook on how to Ansible the load balancer API.
Solving the Layer 4 ARP problem on Linux with Ansible
How to solve the "ARP problem" for Layer 4 DR (Direct Routing) mode for each of your Real Servers in the virtual service.
A+ Qualys with HAProxy — The Secret Sauce
Want to know how to achieve an A+ rating for your SSL web server on Qualys? Read on.
How to migrate your Loadbalancer.org appliance from hardware to virtual
How to migrate your Loadbalancer.org appliance from hardware to virtual.
Load balancing Leostream Connection Broker and Leostream Gateway for high availability
Here we take a look at how a load balancer can be utilized to provide high availability for Leostream Connection Broker and Leostream Gateway.
Automation of the initial setup of your Loadbalancer.org appliance (VMware Edition)
If you are one of those lucky people who have more than one pair of Loadbalancer.org appliances, you might be thinking about buying a Site License, automating the initial setup process. Although our appliances are absolutely awesome and fun to use, going through the same process many times may
Extending ModSecurity: How to add completely custom WAF functionality
ModSecurity is a web application firewall that we use to power our product’s WAF functionality. Here I outline, step-by-step, how to customize this.
How to load balance Microsoft Dynamics using HAProxy
Microsoft Dynamics is a critical ERP and CRM tool. It, therefore, needs to be highly available and scalable. Here's how you can achieve that.
How to achieve client source IP transparency with your load balancer
There is a misconception that you always need source IP transparency, which is not always the case. In fact, there are still many flexible ways to route traffic with or without source IP transparency.
HELP! I’ve Deleted My SSH Keys!
We all have the ability to absent-mindedly break installations with a single click. Here I will show you how not only to break your SSH keys, but also how to restore them in the event you end up doing the same thing as me!