

Why is public cloud potentially a bad idea from a programmer's perspective?
A zero-trust ethos, the risk of vendor lock-in, and a lack of tailoring opportunities should all be fundamental considerations.
A zero-trust ethos, the risk of vendor lock-in, and a lack of tailoring opportunities should all be fundamental considerations.
A zero-trust ethos, the risk of vendor lock-in, and a lack of tailoring opportunities should all be fundamental considerations.
If exploited, the F5 CVE-2022-1388 vulnerability can lead to a full system takeover.
How open source and enterprise solutions differ, and when to use them.
The vulnerability affects OpenSSL’s BN_mod_sqrt() function which can get stuck in an infinite loop.
The implications of the recent ModSecurity vulnerability on open-source Web Application Firewalls.
A recent visit to Southampton Solent University.
This critical vulnerability (that does not impact our products) could be a major headache, so it is crucial to check all of your applications to see if they are affected.
ModSecurity is a web application firewall that we use to power our product’s WAF functionality. Here I outline, step-by-step, how to customize this.
How Loadbalancer.org identified the CVE-2021-35368 vulnerability, and what it means for users.
No IT system is ever designed to fail. But they can - and they do. So how can you protect your critical IT systems and servers, to ensure high availability and guarantee zero downtime? Why do systems fail? In a world where tech is constantly evolving, it’s impossible to
Should you invest in a proprietary load balancer from one of the market leaders like F5? Or should you take a chance on open source load balancing software?
Follow our clear instructions if you want to use HAProxy with Red Hat Enterprise Linux.
Open source software plays an intrinsic part in our foundations –watch our roundtable chat to learn what that means, and how it benefits our customers.
Learn more about our method to implement a more robust solution for deprecating counters in ModSecurity WAF.
The X-Forwarded-For Header is a simple yet powerful solution to a very common problem. I'm not sure why, but for some reason it also seems to cause a lot of confusion. NGINX is often deployed as a cluster behind a layer 7 load balancer (Reverse Proxy). Being a proxy implementation,
We’re always keen to give back to the community that writes such great software – our new SNMP agents and MIBs for HAProxy make monitoring your Virtual Services and Real Servers a breeze.
Dealing with bugs and vulnerabilities is quite common in the tech space. Aaron West, the head of Solutions at Loadbalancer.org shares some insights about our approach of tackling such issues, and more.
Want to configure a load balancer for VMware's AirWatch Mobile Access Gateway (MAG) and Secure Email Gateway (SEG)? Let's help you out.
A critical vulnerability in HAProxy’s HTTP/2 HPACK decoder in versions 1.8 and above has been discovered. This does not impact the majority of Loadbalancer.org customers.
Loadbalancer.org’s evolving approach to partnerships reflects what’s at the heart of our ethos. The human element builds understanding, and the better we can understand our partners, the better we can meet their needs.
We recently released a completely rewritten version of our Windows Feedback Agent for HAProxy. This blog sets out to explore the issues caused by the previous Feedback Agent, and more importantly why the new Feedback Agent is better. Where can I get it? (Updated 01/09/2022) As always the
There's a saying you've probably heard: "Give a man a fish, and you feed him for a day. Teach a man to fish, and you feed him for a lifetime." Health checks are an important part of load balancing your application, and in many other circumstances too. We are often
The Christmas tree is still up, you’ve barely swept away the used party poppers and champagne corks from your New Year celebrations - and already, there’s a new security issue to be aware of. A vulnerability has been found which could enable a hacker to crash HAProxy when
The best thing about HAProxy is its single process event-driven architecture. It gives amazing performance in most real world scenarios and happily saturates gigabit + networks... Related blog: Breaking HAProxy with the help of a Spirent Avalanche and lots of very small packets... But the single process design is also the
What is Cloudflare? Cloudflare provides a content delivery network (CDN). A CDN is a worldwide network of servers that delivers web content to clients based on the geographic location of the client. Using the Cloudflare network in front of any website can add extra security and performance. Cloudflare works as