Skip to content

gravitee-io/gravitee-policy-ratelimit

Repository files navigation

RateLimit policy

License Releases CircleCI

Phase

onRequest onResponse

X

Description

There are three rate-limit policies:

  • Quota: configures the number of requests allowed over a period of time (hours, days, weeks, months) Gravitee.io

  • Rate-Limit: configures the number of requests allowed over a limited period of time (seconds, minutes) Gravitee.io

  • Spike-Arrest: throttles the number of requests processed and sends them to the backend to avoid a spike Gravitee.io

Compatibility with APIM

Plugin version APIM version

1.x

Up to 3.19

2.x

3.20 to 4.5

3.x

4.6 to 4.8

4.x

4.9 to latest

Configuration

You can configure the policies with the following options:

Quota

The Quota policy configures the number of requests allowed over a large period of time (from hours to months). This policy does not prevent request spikes.

Property Required Description Type Default

Failover passthrough

No

In case of failure, the request is forwarded without quota.

Boolean

false

Non-strict mode (async)

No

By activating this option, quota is applied in an asynchronous way meaning that the distributed counter value is not strict (backend can receive more queries than configured).

Boolean

false

key

No

Key to identify a consumer to apply the quota against. Leave it empty to apply the default behavior (plan/subscription pair). Supports Expression Language.

String

null

limit

No

Static limit on the number of requests that can be sent (this limit is used if the value > 0).

integer

0

dynamicLimit

No

Dynamic limit on the number of requests that can be sent (this limit is used if static limit = 0). The dynamic value is based on Expression Language expressions.

string

null

periodTime

Yes

Time duration

Integer

1

periodTimeUnit

Yes

Time unit (HOURS, DAYS, WEEKS, MONTHS)

String

MONTHS

Configuration example

  "quota": {
    "limit": "1000",
    "periodTime": 1,
    "periodTimeUnit": "MONTHS"
  }

Rate-Limit

The Rate-Limit policy configures the number of requests allow over a limited period of time (from seconds to minutes). This policy does not prevent request spikes.

Property Required Description Type Default

Failover passthrough

No

In case of failure, the request is forwarded without rate limiting.

Boolean

false

Non-strict mode (async)

No

By activating this option, rate-limiting is applied in an asynchronous way meaning that the distributed counter value is not strict (backend can receive more queries than configured).

Boolean

false

Add response headers

No

Add X-Rate-Limit-Limit, X-Rate-Limit-Remaining and X-Rate-Limit-Reset headers in HTTP response.

Boolean

false

key

No

Key to identify a consumer to apply rate-limiting against. Leave it empty to use the default behavior (plan/subscription pair). Supports Expression Language.

String

null

limit

No

Static limit on the number of requests that can be sent (this limit is used if the value > 0).

integer

0

dynamicLimit

No

Dynamic limit on the number of requests that can be sent (this limit is used if static limit = 0). The dynamic value is based on Expression Language expressions.

string

null

periodTime

Yes

Time duration

Integer

1

periodTimeUnit

Yes

Time unit ("SECONDS", "MINUTES" )

String

SECONDS

Configuration example

  "rate": {
    "limit": "10",
    "periodTime": 10,
    "periodTimeUnit": "MINUTES"
  }

Spike Arrest

The Spike-Arrest policy configures the number of requests allow over a limited period of time (from seconds to minutes). This policy prevents request spikes by throttling incoming requests. For example, a SpikeArrest policy configured to 2000 requests/second will limit the execution of simultaneous requests to 200 requests per 100ms.

By default, the SpikeArrest policy is applied to a plan, not a consumer. To apply a spike arrest to a consumer, you need to use the key attribute, which supports Expression Language.

Property Required Description Type Default

Failover passthrough

No

In case of failure, the request is forwarded without spike arrest.

Boolean

false

Non-strict mode (async)

No

By activating this option, spike arrest is applied in an asynchronous way meaning that the distributed counter value is not strict (backend can receive more queries than configured).

Boolean

false

key

No

Key to identify a consumer to apply spike arresting against. Leave it empty to use the default behavior. Supports Expression Language (example: {#request.headers['x-consumer-id']}).

String

null

limit

No

Static limit on the number of requests that can be sent (this limit is used if the value > 0).

integer

0

dynamicLimit

No

Dynamic limit on the number of requests that can be sent (this limit is used if static limit = 0). The dynamic value is based on Expression Language expressions.

string

null

periodTime

Yes

Time duration

Integer

1

periodTimeUnit

Yes

Time unit (SECONDS, MINUTES)

String

SECONDS

Configuration example

  "spike": {
    "limit": "10",
    "periodTime": 10,
    "periodTimeUnit": "MINUTES"
  }

Errors

Default response override

You can use the response template feature to override the default response provided by the policies. These templates must be defined at the API level (see the API Console Response Templates option in the API Proxy menu).

Error keys

The error keys sent by these policies are as follows:

Key Parameters

RATE_LIMIT_TOO_MANY_REQUESTS

limit - period_time - period_unit

QUOTA_TOO_MANY_REQUESTS

limit - period_time - period_unit

SPIKE_ARREST_TOO_MANY_REQUESTS

limit - period_time - period_unit - slice_limit - slice_period_time - slice_limit_period_unit

About

Gravitee Policy - Rate Limit

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Packages

No packages published

Contributors 23

Languages