Explores rate limiting algorithms including GCRA, leaky bucket, and exponential approaches with practical configuration guidance. Covers key parameters like limit and period, burst handling strategies, and variable cost requests. Includes real-world email server experiences showing different enforcement modes (strict, leaky, forgiving) and their trade-offs for handling spam while maintaining legitimate traffic flow.

7m read timeFrom dotat.at
Post cover image
Table of contents
mea culpaparametershow burstyvariable costhow lenient

Sort: