Русский flag Русский

All Posts

MySQL Proxy: A Database Intermediary 🛠️

2025-10-28

MySQL Proxy is a proxy application that sits between client applications (for example, your web server) and one or more MySQL servers. It uses the MySQL Network Protocol, which allows any standard MySQL-compatible client to connect to the proxy without changes, believing it is talking directly to a MySQL server.


How MySQL Proxy Works

In its basic configuration the proxy simply forwards requests from the client to the MySQL server and returns responses back.
However the key feature of MySQL Proxy and its counterparts is monitoring, analyzing, and modifying the passing traffic:

SSL certificates via DNS: automating Let’s Encrypt issuance

2025-10-06

Introduction

Let’s Encrypt is the standard for obtaining free TLS certificates. Most often certificates are issued via the HTTP-01 method, which requires a reachable web server on port 80. However, for internal services or wildcard certificates (for example, *.example.com) it is more convenient to use DNS-01, which verifies domain ownership via TXT records in DNS and does not require open ports.

This article covers:

  • Issuing certificates via the Cloudflare API,
  • Issuing certificates via Amazon Route 53 (AWS),
  • Integration with web servers Nginx, HAProxy and Traefik,
  • Automation of certificate renewal.

Note: Instructions are relevant for Certbot 2.x, acme.sh 3.x, Nginx 1.18+, HAProxy 2.4+, Traefik 2.x on Linux (Ubuntu/Debian). For other OSes or tool versions adjustments may be required.

TCP Connection Proxying with HAProxy: A Beginner’s Guide

2025-10-03

Introduction

If you are a beginner system administrator or developer, you’ve probably faced the task of managing network traffic. One of the most powerful tools for this is HAProxy, a high-performance load balancer for TCP and HTTP.

In this article, we will cover:

  • what TCP proxying is,
  • why to use HAProxy,
  • a sample configuration for beginners,
  • security and monitoring tips.

What is TCP Proxying?

TCP Proxying is the forwarding of TCP connections from a client to a server (or group of servers) through an intermediary. Unlike an HTTP proxy that operates at the application layer, TCP proxying happens at the transport layer, making it universal for any TCP protocol: from databases to mail services.

104 | Real-Time Revolution: Diving into the World of WebSockets and Long Polling

2025-09-12

Introduction

Modern users expect web applications to work as fast and responsive as native software. Chats, stock quotes, collaborative document editing — all these scenarios require instant data exchange. In this article, we’ll break down how Long Polling works, why it was replaced by WebSockets, and how to properly configure these technologies on popular web servers.


The Real-Time Problem and the First Solution: Long Polling

HTTP was originally designed for the request-response model: the client contacts the server, the server replies, and the connection closes. For dynamic applications, this is inconvenient.

102 | Caddy vs. Traefik vs. HAProxy vs. Nginx vs. Apache: Comparing Web Servers and Proxies

2025-09-06

Introduction

Choosing a web server and reverse proxy today depends on tasks and infrastructure. Caddy, Traefik, HAProxy, Nginx, and Apache are five popular solutions, each with its strengths and weaknesses.

In this article, we’ll compare them by key criteria: philosophy, installation, SSL, CI/CD, and complexity.


Comparison by Key Criteria

CriterionCaddyTraefikHAProxyNginxApache
PhilosophySimplicity, automatic SSLDynamic routing and Service DiscoveryHigh-performance load balancerUniversal web server and proxyClassic web server, static approach
InstallationSingle binaryContainer, requires setupSingle binary, manual configurationOS package, easy installationOS package, easy installation
SSL AutomationBuilt-in, main advantageBuilt-in, part of ecosystemNo (requires external integration, e.g., certbot)Partial (via certbot or modules)Partial (via certbot or modules)
CI/CDVery easy integrationIdeal for microservicesUsed for high-load balancingRequires manual steps, integration possibleRequires manual steps, integration possible
ComplexityLow, beginner-friendlyMedium/high, requires orchestrator knowledgeMedium, more complex configsMedium, rich ecosystemMedium, often bloated configs
PerformanceGood, but not top-tierGoodExcellent, optimized for load balancingExcellentAverage
Best Use CaseLocal development, quick MVPsDocker/Kubernetes, microservicesHigh-load systems, load balancingUniversal choice for web and proxyStatic site hosting, legacy systems

Who Is It For?

🔹 Caddy

Ideal for:

Installing n8n in Docker with HAProxy: A Clear Guide for Beginners

2025-07-02

Hi friends! Today, we’re diving into the world of automation and deploying n8n — a powerful workflow automation tool. We’ll install it in Docker, and use HAProxy as a reliable reverse proxy to expose it to the internet.

This guide is created especially for beginners. We’ll go step by step, explaining every command so you not only do it, but also understand how everything works.

Why do we even need HAProxy?

You could just expose n8n’s ports to the internet, right? Yes, but that’s unsafe and inconvenient. HAProxy acts as both a guard and a dispatcher:

029 | Proxy Servers in Action: HAProxy — High-Performance Load Balancer

2025-06-21

029 | Proxy Servers in Action: HAProxy — High-Performance Load Balancer⚡️🔗

In our series of articles on proxy servers, we’ve already discussed Nginx, a versatile tool combining the roles of a web server and a reverse proxy. Today, we’ll take a look at HAProxy (High Availability Proxy) — a specialized solution focused on a single but extremely important task: high-performance load balancing and ensuring high availability.


What is HAProxy?

HAProxy is free, open-source software that acts as a load balancer and reverse proxy for both TCP and HTTP protocols. It is designed to handle very large volumes of simultaneous connections and is a key component for building highly available and scalable web applications and services. HAProxy is often used as the “brain” in front of a group of servers, distributing incoming traffic among them.

027 | Proxy Servers: Your Reliable Network Middleman — Why You Need Them and How They Work

2025-06-19

In today’s internet-driven world, where data constantly travels between millions of devices, it’s often not enough to establish a direct connection — you may need a “middleman.” That’s where a proxy server comes in. It acts as a bridge between you (the client) and the destination resource (server), handling network requests on your behalf. Understanding how proxies work is critical for network security, optimization, and access management.


What is a Proxy Server?

A proxy server (from the English proxy — representative, intermediary) is a server in a computer network that acts as an intermediary between a user (client) and other internet servers. All client requests go through the proxy first, which then forwards them to the destination server. Responses from the destination server also return to the proxy first before being sent back to the client.