HAProxy vs Kong Mesh comparison

Cancel
You must select at least 2 products to compare!
HAProxy Logo
732 views|488 comparisons
91% willing to recommend
Kong Logo
2,785 views|2,605 comparisons
0% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between HAProxy and Kong Mesh based on real PeerSpot user reviews.

Find out what your peers are saying about Isito, HAProxy, Kong and others in Service Mesh.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It improves our scalability and responsiveness services to meet our demanding customer requirements.""The features I find valuable in this solution are session control which automatically disconnects users that forget to log off, and the ability to write rules to either allow or block certain file requests.""I estimate that this product has saved our company hundreds, if not thousands, of dollars in possible downtime from previous load balancers. We make a lot of our money from online sales, so it is critical to have 99.9% uptime.""The solution is user-friendly and efficient.""HAProxy potentially has a good return on investment""We use it as a load balancer for our application servers.""​​Reliability. HAProxy is the most reliable product I have ever used.""We did not need technical support because the documentation is good."

More HAProxy Pros →

"It is a scalable product."

More Kong Mesh Pros →

Cons
"There is room for improvement in HAProxy's dynamic configuration.""There is room for improvement in the pricing model. It could be cheaper.""Dynamic update API. More things should be possible to be configured during runtime.""Pricing, monitoring, and reports can be improved.""HAProxy is very weak in the logging and monitoring part and requires improvement.""The product does not have any new technologies.""The logging functionality could use improvement, as it is a little cryptic.""I would like to see better search handling, and a user interface, with a complete functional graphical unit"

More HAProxy Cons →

"The initial setup is complicated. Although Kuma has its own CLI, CTL, and they say to use their CLI, if I have to build a generic solution, my personal preference would be to use Helm or another similar solution other than Kuma. If you have your own library CLI, it becomes hard for others to adopt it. For example, if I have to write some automation, infrastructure automation, I can't just use Kuma. I have to change my code to use Kuma's CTL, which is unfair because it doesn't make sense. It doesn't fit with my current automation structure. I have to do something extra, something additional, which I really don't like."

More Kong Mesh Cons →

Pricing and Cost Advice
  • "HAProxy is free software. There are optional paid products (support/appliances)."
  • "The price is well worth it. HAProxy Enterprise Edition paid for itself within months, simply due to the resiliency it brings. It was a bit more expensive than we were originally interested in paying, but we are thankful we chose to go with HAProxy."
  • "Very good value for the money. One of the simplest licensing schemes in this category of products."
  • "Test/lab virtual machines can be installed without a licence. They can't be used for performance testing but otherwise behave like production nodes."
  • "If you don't have expertise then go with the licensed version. Otherwise, open-source is the best solution."
  • "We use NGINX as well. However, because the health checks are a paid feature, I like to avoid it whenever possible​."
  • "I think that the pricing is very fair, I would definitely recommend buying the Enterprise license."
  • "The only cost is for the image manager, who is responsible for uploading the image, and that is trivial."
  • More HAProxy Pricing and Cost Advice →

  • "I have tried for my personal research and all those things. I have tried only the open-source version. So, for me, it was always free."
  • More Kong Mesh Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Service Mesh solutions are best for your needs.
    768,886 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:I do recommend HAProxy for more simple applications or for companies with a low budget, since HAProxy is a free, open-source product. HAProxy is also a good choice for someone looking for a stable… more »
    Top Answer:HAProxy's TCP load balancer is excellent and super stable.
    Top Answer:I use the open-source version of the product. I don't have experience with the licensed version of the solution.
    Top Answer:It is a scalable product.
    Top Answer:I have tried for my personal research and all those things. I have tried only the open-source version. So, for me, it was always free.
    Top Answer:There are a number of areas where Kong Kuma can improve. One is in terms of product delivery, such as Helm charts. There are a lot of gaps in the Helm charts currently. Another is in terms of the… more »
    Ranking
    2nd
    out of 11 in Service Mesh
    Views
    732
    Comparisons
    488
    Reviews
    13
    Average Words per Review
    436
    Rating
    7.4
    3rd
    out of 11 in Service Mesh
    Views
    2,785
    Comparisons
    2,605
    Reviews
    1
    Average Words per Review
    1,050
    Rating
    6.0
    Comparisons
    Also Known As
    HAProxy Community Edition, HAProxy Enterprise Edition, HAPEE
    Kuma
    Learn More
    HAProxy
    Video Not Available
    Kong
    Video Not Available
    Overview

    HAProxy is considered by many in the industry to be one of the fastest and most popular and trusted software load balancer products in the marketplace today. Organizations are able to immediately deploy HAProxy solutions to enable websites and applications to optimize performance, security, and observability. HAProxy solutions are available to scale to any environment.

    HAProxy is an open-source product and has a robust, active, reliable community. The solutions are continually tested and improved on by the community. HAProxy offers a dynamic design to support the most modern architectures, microservices, and deployment environments (appliances, containers, virtual, and cloud).

    HAProxy utilizes a cloud-native protocol, which makes it a complete solution for cloud services such as Red Hat OpenShift, OVH, Rackspace, Digital Ocean, Amazon Web Services (AWS), and more. It also can be used as the reference load balancer in OpenStack.

    HAProxy Products

    • HAProxy One: This is a next-gen end-to-end application delivery platform created to secure and streamline modern application architectures. It offers a complete suite of solutions, such as application delivery software, turnkey, and appliance services observed and administered through a central control plane. The product supplies application acceleration, CDN, DDoS, bot management, WAF capabilities, and load balancing.
    • HAProxy Fusion Control Plane: This product enables organizations to streamline workflows, arrange traffic routing and security protocols, enhance the speed of delivery, and scale out of the organization’s applications. HAProxy Fusion Control Plane offers an intuitive user interface to observe and control the complete product lineup and API for administering numerous fleets of HAProxy Enterprise servers, either in the cloud or on premises.
    • HAProxy Edge: This product offering is an application delivery network (ADN) that provides a broad array of turnkey application services with amazing scale and complete visibility. Services include application and content acceleration, advanced security, and load balancing.
    • HAProxy ALOHA Hardware or Virtual Load Balancer: This product is a virtual load balancer or plug-and-play hardware constructed upon HAProxy Enterprise that is designed to support proxying at Layer 4 and Layer 7. It has a user-friendly GUI, simple deployment, and no limit on backend servers, making it a complete product for organizations desiring a reliable system to provide high-end load distribution for critical services.
    • HAProxy Enterprise Kubernetes Ingress Controller: This product is designed to facilitate smooth traffic flow into a Kubernetes cluster. It is able to automatically discover anomalies and changes in an organization's Kubernetes infrastructure and provide precise distribution of traffic to healthy pods, with no downtime caused by poor pod health or scaling changes. The product comes with an embedded WAF to optimize the security of an organization’s applications running in Kubernetes.
    • HAProxy Enterprise: This product is the enterprise-class edition of HAProxy offering a dynamic and sturdy code base with next-generation features, an enterprise suite of add-ons, professional services, and trusted support. 

      • Cluster-wide tracking and rate limiting
      • Advanced DDoS and bot management
      • Web application firewall
      • Reliable expert support
      • High performance modules
      • Device detection and geolocation
      • Real-time dashboard

    Reviews from Real Users

    Having the right load balancing solution – which is what HAProxy is – and protection in place gives organizations peace of mind.” - Nathanel S., Platform Architect at SES

    “I use HAProxy for individuals who can not buy low balancers. I built NFV in a box and send individuals a pathway into an HAProxy VM. The setup was not difficult; it usually takes a day to complete for a VPC. When it comes to pricing, HAProxy is free.” - Nasir O., Network & Cloud Architect at Koala Compute Inc.

    Kong Mesh is the ultimate universal service mesh designed for enterprise organizations, offering simplicity and scalability with Kuma and Envoy technologies. This cloud-native solution is versatile, deployable on Kubernetes, VMware, and various environments. Kong Mesh excels in ease of installation, configuration, and management, making it a top choice for organizations seeking streamlined service mesh implementation. With robust features like fine-grained traffic control, observability tools for in-depth monitoring, and comprehensive security mechanisms such as authentication and encryption, Kong Mesh ensures that microservices are both secure and high-performing. Its multi-zone and multi-mesh support allow for distributed deployments, making it a flexible and powerful choice for those looking to enhance their service infrastructure.

    Sample Customers
    Booking.com, GitHub, Reddit, StackOverflow, Tumblr, Vimeo, Yelp
    First AbuDhabi Bank, CISCO, Papa johns pizza, Samsung, Expedia
    Top Industries
    REVIEWERS
    Financial Services Firm35%
    Retailer13%
    Computer Software Company13%
    Manufacturing Company13%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Financial Services Firm11%
    Government9%
    Comms Service Provider8%
    VISITORS READING REVIEWS
    Financial Services Firm21%
    Computer Software Company15%
    Comms Service Provider9%
    Manufacturing Company5%
    Company Size
    REVIEWERS
    Small Business34%
    Midsize Enterprise32%
    Large Enterprise34%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise17%
    Large Enterprise58%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise14%
    Large Enterprise69%

    HAProxy is ranked 2nd in Service Mesh with 41 reviews while Kong Mesh is ranked 3rd in Service Mesh with 1 review. HAProxy is rated 8.2, while Kong Mesh is rated 6.0. The top reviewer of HAProxy writes "Useful for for small and quick load-balancing tasks". On the other hand, the top reviewer of Kong Mesh writes "Provides a unique advantage by offering a global view for all workloads and clusters within the mesh but lack of a robust community for open-source support". HAProxy is most compared with Microsoft Azure Application Gateway, NGINX Plus, Kemp LoadMaster, Citrix NetScaler and F5 BIG-IP Local Traffic Manager (LTM), whereas Kong Mesh is most compared with Istio, Envoy, HashiCorp Consul and Traefik Enterprise.

    See our list of best Service Mesh vendors.

    We monitor all Service Mesh reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.