Global System-Wide Limits
Global rate limiting imposes a system-wide limit on all requests passing through the gateway. This is useful as an upper bound for overall capacity protection, ensuring the gateway or downstream services aren’t overwhelmed by total traffic.
Overview
- What it does: Caps the total request volume across all IPs and users.
- Common use cases:
- Protecting shared infrastructure.
- Enforcing service-level quotas or performance thresholds.
Basic Configuration
Below is an example showing how to enable global limits:
Configuration Fields
-
limit Maximum number of requests allowed for each user within the specified window.
-
window Time frame (e.g.,
1m
,30s
) for measuring requests. -
actions
- type:
reject
: Returns 429 status with retry informationblock
: Similar to reject but for permanent blocks
- retry_after: Seconds to wait before retrying
- type:
Window Configuration
The window
parameter supports any valid duration string:
s
: seconds (e.g., ”30s”)m
: minutes (e.g., “5m”)h
: hours (e.g., “1h”)d
: days (e.g., “1d”)
Example combinations:
Response Headers
The rate limiter adds the following headers to each response:
Per Limit Type Headers
Where {type}
is one of:
global
per_ip
per_user
Rate Limit Exceeded Response
Implementation Details
Storage and Tracking
- Uses Redis sorted sets for tracking
- Key format:
ratelimit:{level}:{id}:{limit_type}:{key}
- Automatic cleanup of expired entries
- Thread-safe operations
Counter Implementation
Use Cases and Considerations
System-Wide Quotas
If you have a backend with limited capacity, global limiting ensures no single spike can breach that capacity.
Fallback Mechanism
Even if you have per-IP or per-user limits, global limiting acts as a final line of defense when total traffic volume surges.
Fair Resource Distribution
In multi-tenant environments, it prevents one tenant from consuming the entire capacity, ensuring all tenants receive a baseline service.