Web Application Security Driven by WAF is Favoring Organizations

Web application security through WAF is a great way to protect a company's web applications from hacking attempts. It provides comprehensive security for the server's web applications, allowing the company to protect the data stored in back-end databases. While a WAF cannot provide the same level of protection as a dedicated firewall, it can prevent data leakage in a secure manner.

First-Generation WAF

Although first-generation WAFs scanned web traffic without detecting malicious content, these models did not offer the highest level of security. They weren't flexible enough to handle constant software updates, and a stateless WAF could not prevent attackers from devising new attack behaviors. Additionally, they were too expensive, offered false positives, and required dedicated IT expertise to maintain.

Load-Balancing Minecraft Servers with Kong Gateway

It's time to have some fun. Sure, tell your colleagues or your family that you're doing research, experimenting with some new tech—because that is what we'll be doing—but just don't let them see you playing Minecraft!

Here's the scenario: You're organizing a full-day Minecraft class for local STEM students. You need to run your own Minecraft servers to ensure a kid-friendly multiplayer environment, restricted only to your students. One server won't be enough, so you'll run two servers simultaneously, expecting your load balancer to handle sending students to Server A or Server B, depending on the load.

Nginx: Reverse Proxy and Load Balancing

You might have seen many articles on the internet regarding Nginx and how we can use Nginx for load balancing and reverse proxy.  In this article, I would like to share my experience of setting up Nginx for load balancing and reverse proxy with SSL termination in Nginx.

Are Reverse Proxy and Load Balancer Similar?

Though both terminologies sound similar, a reverse proxy accepts requests from clients and forwards the request to servers for the actual processing.  The reverse proxy relays the results from servers to the client. 

Where Is My API Gateway?

Applications are changing and so is the infrastructure required to support these applications. Earlier, as applications were developed and deployed as monoliths, so was the network infrastructure around it. A monolith needed services from the perimeter proxy like security and monitoring. But as the monolithic application gets broken up into several smaller parts, the infrastructure to support it has to change.

At the center of this change is how the proxy has adapted to providing infrastructure for services which are smaller pieces of the monolithic application. The culmination of services has also created a service mesh pattern where typical application functions that were baked into an application (like traceability library integrated with application) have moved to the proxy.

Predictable Pitfalls of Scaling VoIP to Cluster

Avoid these pitfalls of scaling VoIP to cluster.

VoIP technologies have a reputation for being rather complex and not without good reason. This is not to say, however, that any mid-level developer will have much difficulty finding and handling one of many available open-source servers. The only problem is the lack of information and real-world examples, as VoIP server homepages rarely have configurations that go beyond the very simplest option, and even when they do, they may be not up-to-date.

You may also like: Application Scalability — How To Do Efficient Scaling

Modern Apache NiFi Load Balancing

In today's Apache NiFi, there is a new and improved means of load balancing data between nodes in a cluster. With the introduction of NiFi 1.8.0, connection load balancing has been added between every processor in any connection. You now have an easy to set option for automatically load balancing between your nodes. 

The legacy days of using Remote Process Groups to distribute the load between Apache NiFi nodes is over. For maximum flexibility, performance and ease, please make sure you upgrade your existing flows to use the built-in Connection Load Balancing.