Tagged articles
46 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
May 3, 2026 · Backend Development

How to Implement Nginx Rate Limiting: Prevent Abuse, Scraping, and API Overload

This article explains how to use Nginx's built‑in limit_req and limit_conn modules—based on the leaky‑bucket algorithm—to protect APIs from malicious flooding, excessive crawling, sudden traffic spikes, and individual user abuse, covering configuration directives, practical examples, advanced scenarios, testing, and deployment best practices.

API SecurityNGINXleaky bucket
0 likes · 20 min read
How to Implement Nginx Rate Limiting: Prevent Abuse, Scraping, and API Overload
Ops Community
Ops Community
Apr 29, 2026 · Operations

Production-Ready Nginx Rate Limiting: Stop Crawlers, Block Malicious Requests, Protect APIs

This guide explains how to use Nginx's built‑in limit_req and limit_conn modules to implement production‑grade rate limiting, covering leaky‑bucket theory, IP and API‑key based limits, burst and nodelay handling, whitelist bypass, custom error responses, dry‑run testing, memory sizing, and the inherent limitations that may require Redis‑Lua or OpenResty extensions.

API protectionNGINXanti‑crawler
0 likes · 21 min read
Production-Ready Nginx Rate Limiting: Stop Crawlers, Block Malicious Requests, Protect APIs
Ray's Galactic Tech
Ray's Galactic Tech
Sep 29, 2025 · Backend Development

Mastering Nginx Rate Limiting: Production‑Ready Strategies

This guide explains how Nginx rate limiting works with the leaky‑bucket algorithm, provides step‑by‑step configuration examples for basic, burst, nodelay, and delay modes, and shows advanced techniques such as connection limiting, custom status codes, whitelisting, API‑key throttling, and a systematic deployment and tuning workflow.

Backendleaky bucket
0 likes · 8 min read
Mastering Nginx Rate Limiting: Production‑Ready Strategies
Architect's Journey
Architect's Journey
Sep 15, 2025 · Backend Development

Token Bucket vs Leaky Bucket: Deep Dive into Core Traffic‑Control Algorithms

This article compares the token‑bucket and leaky‑bucket rate‑limiting algorithms, explaining their core principles, Java implementation details, key advantages and drawbacks, suitable application scenarios, interview‑style Q&A, and advanced hybrid strategies for building robust high‑concurrency systems.

Distributed SystemsJavaToken Bucket
0 likes · 9 min read
Token Bucket vs Leaky Bucket: Deep Dive into Core Traffic‑Control Algorithms
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Oct 2, 2023 · Backend Development

Mastering Rate Limiting in Spring Boot: Token Bucket, Leaky Bucket, and Counter Techniques

An in‑depth guide explains three rate‑limiting algorithms—counter, leaky bucket, and token bucket—demonstrates their implementation in Spring Boot using Guava’s RateLimiter and Baidu’s ratelimiter‑spring‑boot‑starter, provides full Maven dependencies, configuration snippets, and Java code examples, and shows testing results.

Backend DevelopmentGuavaSpring Boot
0 likes · 8 min read
Mastering Rate Limiting in Spring Boot: Token Bucket, Leaky Bucket, and Counter Techniques
MaGe Linux Operations
MaGe Linux Operations
Mar 31, 2023 · Backend Development

Mastering Rate Limiting: Leaky Bucket, Token Bucket, and Sliding Window in Go

This article explains three core rate‑limiting algorithms—Leaky Bucket, Token Bucket, and Sliding Window—detailing their principles, suitable scenarios, and provides complete Go implementations to help developers choose and integrate the right strategy for handling traffic spikes and protecting backend resources.

BackendSliding WindowToken Bucket
0 likes · 15 min read
Mastering Rate Limiting: Leaky Bucket, Token Bucket, and Sliding Window in Go
MaGe Linux Operations
MaGe Linux Operations
Mar 27, 2023 · Backend Development

Mastering Rate Limiting: Concepts, Algorithms, and Real-World Implementations

This article explains the fundamental concepts of rate limiting, including time and resource dimensions, various rule types such as QPS, connection count, bandwidth, black/white lists, and distributed considerations, then details common algorithms like token bucket, leaky bucket, sliding window, and practical implementations using Nginx, Guava, Redis, and Sentinel.

BackendDistributed SystemsToken Bucket
0 likes · 16 min read
Mastering Rate Limiting: Concepts, Algorithms, and Real-World Implementations
Architecture Digest
Architecture Digest
Mar 27, 2023 · Backend Development

Rate Limiting: Concepts, Algorithms, and Implementation Strategies

This article explains the fundamental concepts of rate limiting, compares popular algorithms such as token bucket, leaky bucket, and sliding window, and reviews practical implementation methods including Nginx, middleware, Redis, Guava, and Tomcat configurations for both single‑machine and distributed environments.

Sliding WindowToken Bucketleaky bucket
0 likes · 17 min read
Rate Limiting: Concepts, Algorithms, and Implementation Strategies
Architect's Guide
Architect's Guide
Mar 21, 2023 · Backend Development

Fundamentals and Common Practices of Rate Limiting in Distributed Systems

This article explains the basic concepts, dimensions, and typical algorithms of rate limiting, discusses various implementation strategies such as token bucket, leaky bucket, and sliding window, and reviews practical solutions using Nginx, Guava, Redis, Sentinel, and Tomcat for both single‑node and distributed environments.

Sliding WindowToken Bucketleaky bucket
0 likes · 16 min read
Fundamentals and Common Practices of Rate Limiting in Distributed Systems
Architect
Architect
Dec 10, 2022 · Backend Development

Rate Limiting: Concepts, Common Algorithms, and Practical Implementation Strategies

This article explains the fundamentals of rate limiting, describes widely used algorithms such as token bucket, leaky bucket, and sliding window, and details practical implementation methods ranging from single‑machine tools like Guava and Tomcat to distributed solutions using Nginx, Redis, and Sentinel.

Distributed SystemsSliding WindowToken Bucket
0 likes · 17 min read
Rate Limiting: Concepts, Common Algorithms, and Practical Implementation Strategies
Tencent Cloud Developer
Tencent Cloud Developer
Sep 6, 2022 · Backend Development

Understanding Rate Limiting in Distributed Systems: Algorithms and Best Practices

Rate limiting safeguards distributed systems by controlling request rates through algorithms such as leaky bucket, token bucket, fixed and sliding windows, and back pressure, while client‑side tactics like exponential backoff, jitter, and careful retries, and requires atomic distributed storage solutions (e.g., Redis+Lua) to avoid race conditions.

Back-pressureDistributed SystemsSystem Design
0 likes · 16 min read
Understanding Rate Limiting in Distributed Systems: Algorithms and Best Practices
Architecture Digest
Architecture Digest
Jul 22, 2022 · Backend Development

Understanding Interface Idempotency and Distributed Rate Limiting: Concepts, Algorithms, and Java Implementations

This article explains the principle of interface idempotency, presents practical techniques such as version‑based updates and token mechanisms, and then delves into distributed rate‑limiting dimensions, common algorithms like token‑bucket and leaky‑bucket, and concrete implementations using Guava, Nginx, Redis and Lua with full code examples.

Backend DevelopmentIdempotencyNGINX
0 likes · 21 min read
Understanding Interface Idempotency and Distributed Rate Limiting: Concepts, Algorithms, and Java Implementations
IT Architects Alliance
IT Architects Alliance
May 24, 2022 · Backend Development

How to Ensure API Idempotency and Implement Distributed Rate Limiting in Java

This guide explains the principles of API idempotency using unique business IDs or token mechanisms, explores distributed rate‑limiting dimensions, compares token‑bucket and leaky‑bucket algorithms, and provides concrete implementations with Guava RateLimiter, Nginx configuration, and a Redis‑Lua script integrated into Spring Boot, including annotation‑based AOP for easy usage.

API idempotencyGuava RateLimiterNGINX
0 likes · 19 min read
How to Ensure API Idempotency and Implement Distributed Rate Limiting in Java
Top Architect
Top Architect
May 23, 2022 · Backend Development

Idempotent Interfaces and Distributed Rate Limiting: Concepts, Algorithms, and Practical Implementations

This article explains the importance of interface idempotency and presents a comprehensive guide to distributed rate limiting, covering key dimensions, token‑bucket and leaky‑bucket algorithms, and concrete implementations using Guava RateLimiter, Nginx, and Redis‑Lua with Java code examples.

IdempotencyToken Bucketleaky bucket
0 likes · 19 min read
Idempotent Interfaces and Distributed Rate Limiting: Concepts, Algorithms, and Practical Implementations
MaGe Linux Operations
MaGe Linux Operations
May 18, 2022 · Backend Development

Rate Limiting in Go: Leaky Bucket, Token Bucket, Sliding Window

This article explores three core rate‑limiting algorithms—Leaky Bucket, Token Bucket, and Sliding Window—detailing their principles, suitable scenarios, and provides complete Go implementations, enabling developers to choose and integrate the appropriate strategy for controlling request traffic without external dependencies.

BackendSliding WindowToken Bucket
0 likes · 15 min read
Rate Limiting in Go: Leaky Bucket, Token Bucket, Sliding Window
Architecture Digest
Architecture Digest
Mar 4, 2022 · Backend Development

Idempotent API Design and Distributed Rate Limiting with Token Bucket, Leaky Bucket, Nginx, and Redis+Lua

This article explains how to achieve interface idempotency using unique business IDs or token mechanisms and presents comprehensive distributed rate‑limiting techniques—including token‑bucket and leaky‑bucket algorithms, Nginx directives, Guava RateLimiter, and Redis‑Lua scripts—along with practical Spring Boot code examples.

IdempotencyLuaNGINX
0 likes · 16 min read
Idempotent API Design and Distributed Rate Limiting with Token Bucket, Leaky Bucket, Nginx, and Redis+Lua
IT Architects Alliance
IT Architects Alliance
Mar 1, 2022 · Backend Development

Interface Idempotency and Distributed Rate Limiting: Token Bucket, Leaky Bucket, Guava, Nginx, and Redis+Lua

This article explains the concept of interface idempotency, presents practical techniques such as version‑based updates and token mechanisms, and then dives into distributed rate‑limiting strategies covering dimensions, token‑bucket and leaky‑bucket algorithms, and concrete implementations using Guava RateLimiter, Nginx, and Redis‑Lua scripts.

LuaToken Bucketleaky bucket
0 likes · 18 min read
Interface Idempotency and Distributed Rate Limiting: Token Bucket, Leaky Bucket, Guava, Nginx, and Redis+Lua
Open Source Linux
Open Source Linux
Jul 25, 2021 · Backend Development

Mastering Nginx Rate Limiting: From Basics to Advanced Configurations

This article explains how Nginx implements rate limiting using the leaky‑bucket algorithm, walks through basic and advanced configurations—including zones, burst, nodelay, whitelists, multiple limits, logging, custom status codes, and request denial—while providing complete configuration examples.

NGINXSecuritybackend configuration
0 likes · 13 min read
Mastering Nginx Rate Limiting: From Basics to Advanced Configurations
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Jun 15, 2021 · Backend Development

Understanding Rate Limiting: Counter, Sliding Window, Leaky Bucket, and Token Bucket Algorithms

The article introduces the concept of rate limiting, explains why it is needed both offline (e.g., crowded theme parks) and online (e.g., flash sales), and details four common algorithms—counter, sliding window, leaky bucket, and token bucket—along with their implementation considerations and trade‑offs.

Sliding WindowToken Bucketcounter algorithm
0 likes · 9 min read
Understanding Rate Limiting: Counter, Sliding Window, Leaky Bucket, and Token Bucket Algorithms
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Mar 26, 2021 · Backend Development

Rate Limiting in Spring Boot: Counter, Leaky & Token Buckets using Guava & Baidu

This article explains three classic rate‑limiting algorithms—counter, leaky bucket, and token bucket—illustrates their principles, compares their behavior, and provides practical Spring Boot implementations using Google Guava’s RateLimiter and Baidu’s ratelimiter‑spring‑boot‑starter, including configuration, code samples, and performance testing.

BackendGuavaJava
0 likes · 10 min read
Rate Limiting in Spring Boot: Counter, Leaky & Token Buckets using Guava & Baidu
Code Ape Tech Column
Code Ape Tech Column
Jan 27, 2021 · Backend Development

An Introduction to Rate Limiting: Concepts, Classifications, Algorithms, and Go Implementation

This article introduces rate limiting, explains its purpose and classifications, compares fixed and sliding windows, describes common algorithms such as token bucket, leaky bucket, and counter, and provides detailed Go code examples using the golang.org/x/time/rate library for practical implementation.

GolangToken Bucketleaky bucket
0 likes · 25 min read
An Introduction to Rate Limiting: Concepts, Classifications, Algorithms, and Go Implementation
Aikesheng Open Source Community
Aikesheng Open Source Community
Sep 17, 2020 · Backend Development

Understanding Rate Limiting: Leaky Bucket and Token Bucket Algorithms with a Python Example

This article explains the principles of leaky‑bucket and token‑bucket rate‑limiting algorithms, compares their behavior in high‑concurrency e‑commerce scenarios, and provides a complete Python implementation to illustrate how token‑bucket can handle burst traffic while maintaining system stability.

PythonToken Buckethigh concurrency
0 likes · 7 min read
Understanding Rate Limiting: Leaky Bucket and Token Bucket Algorithms with a Python Example
Liangxu Linux
Liangxu Linux
Aug 6, 2020 · Backend Development

Mastering Nginx Rate Limiting: From Basics to Advanced Configurations

This guide explains how Nginx implements rate limiting using the leaky‑bucket algorithm, walks through basic and advanced configurations—including limit_req_zone, limit_req, burst, nodelay, whitelisting, multiple limits, logging, and custom status codes—while providing concrete code examples and practical tips.

Configurationleaky bucketlimit_req
0 likes · 14 min read
Mastering Nginx Rate Limiting: From Basics to Advanced Configurations
JD Retail Technology
JD Retail Technology
May 25, 2020 · Backend Development

Understanding Rate Limiting: Counter, Leaky Bucket, and Token Bucket Algorithms

This article explains the fundamentals of rate limiting for high‑concurrency systems, covering why it is needed, the conditions that trigger it, and detailed introductions to the three main algorithms—counter (fixed and sliding windows), leaky bucket, and token bucket—along with their advantages, drawbacks, and sample pseudo‑code implementations.

BackendToken Bucketcounter algorithm
0 likes · 13 min read
Understanding Rate Limiting: Counter, Leaky Bucket, and Token Bucket Algorithms
Architecture Digest
Architecture Digest
Apr 14, 2020 · Operations

Nginx Rate Limiting: Token‑Bucket, Leaky‑Bucket Algorithms and Configuration Examples

This article explains the principles of token‑bucket and leaky‑bucket rate‑limiting algorithms, shows how Nginx implements them with the limit_req and limit_conn modules, and provides detailed configuration examples—including burst, nodelay, and custom status codes—to control request rates and concurrent connections.

Token Bucketleaky bucketlimit_conn
0 likes · 12 min read
Nginx Rate Limiting: Token‑Bucket, Leaky‑Bucket Algorithms and Configuration Examples
Big Data Technology & Architecture
Big Data Technology & Architecture
Feb 22, 2020 · Backend Development

Understanding Rate Limiting: Leaky Bucket, Token Bucket, and Guava RateLimiter

The article explains the principles of traffic shaping through leaky‑bucket and token‑bucket algorithms, details how Google Guava's RateLimiter implements token‑bucket rate limiting, and provides Java code examples illustrating token generation, acquisition, and practical usage in high‑concurrency backend systems.

BackendGuavaJava
0 likes · 10 min read
Understanding Rate Limiting: Leaky Bucket, Token Bucket, and Guava RateLimiter
Java Backend Technology
Java Backend Technology
Dec 12, 2018 · Backend Development

Mastering Rate Limiting: Strategies, Best Practices, and Implementation Guide

This comprehensive guide explains the differences between rate limiting and circuit breaking, outlines how to determine system capacity, details four core throttling strategies (fixed window, sliding window, leaky bucket, token bucket), and offers practical best‑practice recommendations for distributed backend systems.

BackendToken Bucketleaky bucket
0 likes · 14 min read
Mastering Rate Limiting: Strategies, Best Practices, and Implementation Guide
dbaplus Community
dbaplus Community
Jun 25, 2018 · Backend Development

Mastering Rate Limiting for High‑Traffic Flash‑Sale Systems

This article explains why rate limiting is essential for flash‑sale (seckill) systems, compares token‑bucket and leaky‑bucket algorithms, and provides concrete Tomcat, Nginx, OpenResty, and Guava configurations along with code snippets and load‑testing results to help engineers implement robust throttling.

NGINXOpenRestySeckill
0 likes · 14 min read
Mastering Rate Limiting for High‑Traffic Flash‑Sale Systems
21CTO
21CTO
Jun 16, 2018 · Backend Development

Master Rate Limiting: Token & Leaky Buckets, Tomcat, Nginx & OpenResty

This article explains why high‑traffic scenarios like flash‑sale systems need rate limiting, compares token‑bucket and leaky‑bucket algorithms, and shows practical configurations for Tomcat, Nginx, and OpenResty to protect APIs and ensure system stability.

Backend DevelopmentNGINXOpenResty
0 likes · 10 min read
Master Rate Limiting: Token & Leaky Buckets, Tomcat, Nginx & OpenResty
ITFLY8 Architecture Home
ITFLY8 Architecture Home
May 18, 2018 · Backend Development

Rate Limiting Demystified: Token Bucket, Leaky Bucket & Counter Algorithms in Java

During high‑traffic scenarios, services can become unavailable, so implementing rate‑limiting techniques like token bucket, leaky bucket, and counter algorithms—illustrated with Java code examples using Guava RateLimiter, AtomicInteger, and Semaphore—helps smooth bursts, control concurrency, and prevent system overload.

GuavaToken Bucketcounter algorithm
0 likes · 6 min read
Rate Limiting Demystified: Token Bucket, Leaky Bucket & Counter Algorithms in Java
dbaplus Community
dbaplus Community
Jun 23, 2016 · Backend Development

Mastering Rate Limiting: Algorithms, Application, Distributed and Edge Strategies

This article provides a comprehensive guide to rate limiting in high‑concurrency systems, covering core concepts, token‑bucket and leaky‑bucket algorithms, application‑level techniques with Guava, distributed implementations using Redis+Lua and Nginx+Lua, and edge‑layer controls via Nginx modules, complete with configuration examples and test results.

Distributed SystemsGuavaToken Bucket
0 likes · 28 min read
Mastering Rate Limiting: Algorithms, Application, Distributed and Edge Strategies
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jun 19, 2016 · Backend Development

Master Rate Limiting: Token & Leaky Buckets, Distributed Strategies

This article explains how caching, degradation, and especially rate limiting—using token bucket, leaky bucket, and counter‑based methods—protect high‑concurrency systems, covering algorithm basics, application‑level techniques, and distributed implementations with Redis+Lua and Nginx+Lua.

Distributed SystemsToken Bucketleaky bucket
0 likes · 18 min read
Master Rate Limiting: Token & Leaky Buckets, Distributed Strategies
21CTO
21CTO
Jun 12, 2016 · Backend Development

Mastering Rate Limiting: Token Bucket, Leaky Bucket, and Real‑World Implementations

This article explains why caching, degradation, and rate limiting are essential for high‑concurrency systems, details token‑bucket and leaky‑bucket algorithms, shows application‑level, distributed, and edge‑level throttling techniques, and provides practical Java, Guava, Redis‑Lua, and Nginx‑Lua code examples.

GuavaJavaNGINX
0 likes · 17 min read
Mastering Rate Limiting: Token Bucket, Leaky Bucket, and Real‑World Implementations