Our Ingress Controller brings HAProxy to Kubernetes where the controller reacts to Kubernetes events and generates HAProxy configuration based on user input. This input can be provided in different ways: annotations, static files, custom resources. In this presentation, we will go through the details of each input type and compare it with other types.…
Read more.
A typical SD-WAN solution consists of multiple components for management plane, control plane and data plane. Proxy services are required for data plane endpoints to communicate with OAM components across multiple underlay networks or routing domains. Separation of traffic across multiple routing domains is key to support a multi-tenant solution with mu…
Read more.
There's no shortage of articles on CI/CD and how to run a configuration validation utility before reloading or restarting a service, but this type of validation is not the same as acceptance testing. Furthermore, these validations don't always give you (or your leadership team) the confidence to allow you to make big changes to your Production Infrastru…
Read more.
Speaker
Michael "Irish" O'Neill
Principal Infrastructure Software EngineerBoomTown
BankSITE Services uses HAProxy Enterprise to assist in the mitigation of Web Attacks against our network of Bank websites. HAProxy has become a critical part of BankSITE's security posture and BankSITE continues to add/refine the rules being used to help secure both our sites and network infrastructure.…
Read more.
Last year, we at E Voyageurs SNCF launched our migration to the cloud and our journey provided valuable lessons for others on a similar path. Specifically, we will describe how we transitioned our security protocols, including adapting our traditional point-to-point communication and hardware firewalls to a cloud-native approach. We use HAProxy as a Sec…
Read more.
At TravelAndLeisure, our migration to the cloud meant moving more than 1200 VIPs from F5 to HAProxy. With applications spread across different technologies like Java, Node.js, Windows, and microservices, and load balancing that relied on F5's iRules, we expected the shift to be complex. However, the story we'll share is one of simplicity! How did we acc…
Read more.
Arm brings brilliant people together in a global ecosystem that is sparking the world’s potential. Arm technology enables specialized processing built on the economics, design freedom and accessibility of general-purpose compute that has, so far, led to more than 180 billion chips being shipped by our partners. In this presentation, we will discuss Arm'…
Read more.
In this presentation, Andjelko Iharos, Director of Engineering at HAProxy Technologies, describes how an ecosystem of open-source projects has flourished around the load balancer technology. Developers can extend the load balancer in several ways, such as by building core components, Runtime API integrations, and Data Plane API integrations. This extens…
Read more.
In this talk, Baptiste Assmann, principal solutions architect at HAProxy Technologies, recounts the history of the HAProxy load balancer up to the current day. As the way that teams deliver software has evolved, shifting towards cloud adoption, TLS everywhere, and containerization, HAProxy has adapted to meet those needs. While adhering to its core prin…
Read more.
The HAProxy Data Plane API now has the ability to get backends from AWS tags and Consul, upload SSL certificates, and other features that make it fit into modern configurations. In this presentation we will provide a brief introduction to the HAProxy Data Plane API and cover some of these new features in more depth.…
Read more.
Let's face it. The Internet is a scary place with intrusions, scraping, and attacks happening daily. At Modzy, we help developers deploy, manage, and get value from AI at scale, and we use HAProxy to protect our platform and our customers from threats lurking across the Web. In this talk, you will learn how we created a highly available and horizontally…
Read more.
This talk will describe a new feature introduced in HAProxy 2.4: dynamic servers. We will cover the goals of this new feature, how it should be used and how it interacts with the environment, and its limitations.…
Read more.
Processing real-time payments requires reliable and secure infrastructure, and as the daily volume at Form3 is expressed in millions, the stakes are extraordinarily high. At this scale, with customers relying on you for one of the most critical parts of their business, the technologies chosen have to be best-in-class. In this talk, we will share key dec…
Read more.
At WoltLab, we bill customers of our SaaS offering based on resource usage, which requires meticulous tracking of any request being processed. Although it appeared to be an easy task at first glance, we quickly realized that there is no simple solution that ticks all the boxes: accuracy, reliability, and zero impact on request processing. That was true …
Read more.