By IP Address
Per-IP rate limiting tracks and enforces request limits based on the client’s IP address. This helps mitigate abuse or spam originating from a single IP.
Overview
- What it does: Ensures that an individual IP cannot exceed a specified rate of requests.
- Common use cases: Throttling malicious traffic, preventing DDoS, controlling bursts.
Basic Configuration
Below is an example showing how to enable per_ip limits:
Configuration Fields
-
limit Maximum number of requests allowed for each user within the specified window.
-
window Time frame (e.g.,
1m
,30s
) for measuring requests. -
actions
- type:
reject
: Returns 429 status with retry informationblock
: Similar to reject but for permanent blocks
- retry_after: Seconds to wait before retrying
- type:
Window Configuration
The window
parameter supports any valid duration string:
s
: seconds (e.g., ”30s”)m
: minutes (e.g., “5m”)h
: hours (e.g., “1h”)d
: days (e.g., “1d”)
Example combinations:
Response Headers
The rate limiter adds the following headers to each response:
Per Limit Type Headers
Where {type}
is one of:
global
per_ip
per_user
Rate Limit Exceeded Response
Implementation Details
Storage and Tracking
- Uses Redis sorted sets for tracking
- Key format:
ratelimit:{level}:{id}:{limit_type}:{key}
- Automatic cleanup of expired entries
- Thread-safe operations
Counter Implementation
Use Cases and Considerations
System-Wide Quotas
If you have a backend with limited capacity, global limiting ensures no single spike can breach that capacity.
Fallback Mechanism
Even if you have per-IP or per-user limits, global limiting acts as a final line of defense when total traffic volume surges.
Fair Resource Distribution
In multi-tenant environments, it prevents one tenant from consuming the entire capacity, ensuring all tenants receive a baseline service.