Tagged articles
575 articles
Page 1 of 6
Coder Trainee
Coder Trainee
May 18, 2026 · Cloud Native

Spring Cloud Microservices Tutorial – Sentinel for Fault Tolerance and Rate Limiting

This article walks through adding Alibaba Sentinel to a Spring Cloud microservice suite to protect against service outages, traffic spikes, and slow calls by configuring rate limiting, circuit breaking, and fallback mechanisms across user, order, and gateway services, with full Docker‑compose setup and testing steps.

MicroservicesSpring Cloudcircuit breaker
0 likes · 14 min read
Spring Cloud Microservices Tutorial – Sentinel for Fault Tolerance and Rate Limiting
IT Services Circle
IT Services Circle
May 15, 2026 · Backend Development

When Splitting a System into 200 Microservices Almost Ruined the Company

The article uses a night‑market analogy to explain practical microservice design, covering domain‑based service decomposition, service discovery, communication protocols, data consistency strategies, fault‑tolerance, rate limiting, and monitoring, while warning against over‑splitting and unnecessary complexity.

Distributed TracingMicroservicescircuit breaker
0 likes · 14 min read
When Splitting a System into 200 Microservices Almost Ruined the Company
Java Tech Enthusiast
Java Tech Enthusiast
May 15, 2026 · Backend Development

How Splitting a System into 200 Microservices Almost Destroyed Our Company

The article uses a night‑market analogy to explain common microservice pitfalls—over‑splitting, poor service boundaries, fragile communication, data‑consistency challenges, fault‑tolerance, rate‑limiting, and monitoring—providing concrete examples, best‑practice rules, and Java code snippets to help teams avoid costly mistakes.

Distributed TracingMicroservicescircuit breaker
0 likes · 15 min read
How Splitting a System into 200 Microservices Almost Destroyed Our Company
Su San Talks Tech
Su San Talks Tech
May 6, 2026 · Backend Development

11 Essential Redis Use Cases Every Backend Engineer Should Know

This article walks through eleven practical Redis scenarios—from classic caching and distributed locks to rate limiting, leaderboards, timelines, social graph operations, lightweight queues, Bloom filters, hash‑based object storage, unique‑counting, and delayed tasks—providing code samples, advantages, drawbacks, and when to apply each pattern.

Sorted SetStreambloom-filter
0 likes · 15 min read
11 Essential Redis Use Cases Every Backend Engineer Should Know
Old Meng AI Explorer
Old Meng AI Explorer
May 5, 2026 · Artificial Intelligence

Free AI APIs That Won’t Break Your Budget: A Complete Global Guide

This article compiles a comprehensive list of free AI APIs from China and abroad, explains the three hard truths about free tiers, details each provider’s token limits, rate limits, and ideal use cases, and offers practical tips for handling rate‑limiting, key management, and fallback strategies.

AICloud AIFree API
0 likes · 21 min read
Free AI APIs That Won’t Break Your Budget: A Complete Global Guide
MaGe Linux Operations
MaGe Linux Operations
May 3, 2026 · Backend Development

How to Implement Nginx Rate Limiting: Prevent Abuse, Scraping, and API Overload

This article explains how to use Nginx's built‑in limit_req and limit_conn modules—based on the leaky‑bucket algorithm—to protect APIs from malicious flooding, excessive crawling, sudden traffic spikes, and individual user abuse, covering configuration directives, practical examples, advanced scenarios, testing, and deployment best practices.

API SecurityNGINXleaky bucket
0 likes · 20 min read
How to Implement Nginx Rate Limiting: Prevent Abuse, Scraping, and API Overload
ITPUB
ITPUB
Apr 29, 2026 · Backend Development

How to Rescue a System When QPS Jumps 100× in 10 Minutes

When a service experiences a sudden 100‑fold QPS surge, this guide walks through immediate emergency measures such as rate limiting, circuit breaking, and traffic shedding, followed by systematic analysis of traffic origins, robust architectural redesign including horizontal scaling, micro‑service decomposition, sharding, pooling, caching, and asynchronous processing, and finally stress testing to ensure resilience.

Circuit BreakingMicroservicescaching
0 likes · 13 min read
How to Rescue a System When QPS Jumps 100× in 10 Minutes
Ops Community
Ops Community
Apr 29, 2026 · Operations

Production-Ready Nginx Rate Limiting: Stop Crawlers, Block Malicious Requests, Protect APIs

This guide explains how to use Nginx's built‑in limit_req and limit_conn modules to implement production‑grade rate limiting, covering leaky‑bucket theory, IP and API‑key based limits, burst and nodelay handling, whitelist bypass, custom error responses, dry‑run testing, memory sizing, and the inherent limitations that may require Redis‑Lua or OpenResty extensions.

API protectionNGINXanti‑crawler
0 likes · 21 min read
Production-Ready Nginx Rate Limiting: Stop Crawlers, Block Malicious Requests, Protect APIs
Architect's Tech Stack
Architect's Tech Stack
Apr 29, 2026 · Databases

Redis 8.0 Beyond Simple Caching: 16 Powerful Use Cases You Must Try

Redis 8.0 consolidates many previously external modules—JSON, time‑series, vector search, probabilistic data structures, and more—into a single package, and this article walks through 16 concrete scenarios ranging from field‑level cache expiration to AI‑ready vector similarity search, showing exact commands and when to prefer each feature.

Full‑Text SearchRedis 8.0caching
0 likes · 19 min read
Redis 8.0 Beyond Simple Caching: 16 Powerful Use Cases You Must Try
IoT Full-Stack Technology
IoT Full-Stack Technology
Apr 29, 2026 · Databases

16 Practical Redis Use Cases You Should Know

This article walks through sixteen common Redis scenarios—including caching hot data, sharing state across services, implementing distributed locks, generating global IDs, counting events, rate limiting, bitmap statistics, shopping carts, timelines, message queues, lotteries, likes, tagging, product filtering, and leaderboards—each illustrated with concrete commands and code snippets.

BitmapsMessage Queuecaching
0 likes · 9 min read
16 Practical Redis Use Cases You Should Know
dbaplus Community
dbaplus Community
Apr 28, 2026 · Backend Development

Designing High‑Availability for Unreliable Third‑Party Services

When downstream APIs are unstable and slow, this article walks through building a dedicated defensive layer that provides a unified abstraction, client‑side governance (rate limiting, retries with idempotency checks), comprehensive observability, and mock‑based testing to keep your system highly available and interview‑ready.

MicroservicesMock TestingObservability
0 likes · 22 min read
Designing High‑Availability for Unreliable Third‑Party Services
Top Architect
Top Architect
Apr 28, 2026 · Backend Development

Elegant API Rate Limiting with Spring Interceptor and Redis

This article demonstrates a step‑by‑step implementation of API anti‑brush (rate limiting) using a Spring Interceptor combined with Redis, explains how to configure time windows and request limits, introduces a custom @AccessLimit annotation for fine‑grained control, discusses path‑parameter pitfalls, real‑IP handling, and shares practical testing results.

API SecurityInterceptorJava
0 likes · 20 min read
Elegant API Rate Limiting with Spring Interceptor and Redis
Data STUDIO
Data STUDIO
Apr 28, 2026 · Backend Development

FastAPI in Production: Auth, Rate Limiting, and Zero‑Downtime with One Codebase

This article walks through a complete production‑ready FastAPI setup, covering secure OIDC/JWKS authentication, Redis‑backed token‑bucket rate limiting, zero‑downtime rolling deployments on Docker/Kubernetes, and observability best practices such as request‑ID middleware and structured JSON logging.

AuthenticationDockerFastAPI
0 likes · 20 min read
FastAPI in Production: Auth, Rate Limiting, and Zero‑Downtime with One Codebase
AI Open-Source Efficiency Guide
AI Open-Source Efficiency Guide
Apr 27, 2026 · Backend Development

Turn Your Android Phone into an SMS Gateway with HTTPSMS and a Simple HTTP API

HTTPSMS is an open‑source SMS gateway that lets an Android phone act as a self‑hosted send/receive endpoint, controlled via a lightweight HTTP API, offering multi‑language SDKs, Docker deployment, AES‑256 encryption, rate limiting, message expiry and a feature‑by‑feature comparison with Twilio, cloud SMS services and DIY GSM modems.

AES-256AndroidDocker
0 likes · 7 min read
Turn Your Android Phone into an SMS Gateway with HTTPSMS and a Simple HTTP API
Coder Trainee
Coder Trainee
Apr 27, 2026 · Cloud Native

Spring Cloud Microservices Practice #6: Sentinel for Service Fault Tolerance and Rate Limiting

This article explains why service fault tolerance is essential in micro‑service architectures, compares Sentinel with Hystrix and Resilience4j, and provides step‑by‑step guidance on integrating Sentinel for circuit breaking, QPS and concurrency limiting, hot‑parameter control, system protection, and dynamic rule management with Nacos.

Circuit BreakingMicroservicesNacos
0 likes · 14 min read
Spring Cloud Microservices Practice #6: Sentinel for Service Fault Tolerance and Rate Limiting
AI Engineer Programming
AI Engineer Programming
Apr 22, 2026 · Artificial Intelligence

Free LLM API Tokens: Complete Provider List, Limits, and Usage Tips

This guide compiles free large‑language‑model APIs from official vendors and third‑party platforms, detailing each service's token quotas, rate limits, base URLs, usage restrictions, and available models, while offering practical advice on token optimization, multi‑platform rotation, rate‑limit handling, and key security.

AIFree APILLM
0 likes · 15 min read
Free LLM API Tokens: Complete Provider List, Limits, and Usage Tips
Coder Trainee
Coder Trainee
Apr 19, 2026 · Backend Development

How to Optimize Performance and Deploy a Production‑Ready Blog System

This article walks through a complete performance‑optimization and deployment pipeline for a Spring Boot blog, covering multi‑level caching with Caffeine and Redis, database indexing and cursor pagination, read‑write splitting, asynchronous processing, rate limiting, Docker multi‑stage builds, Nginx reverse‑proxy setup, Actuator monitoring, custom metrics, health checks, alerting, JMeter load testing, and JVM tuning.

CaffeineDockerPerformance Optimization
0 likes · 17 min read
How to Optimize Performance and Deploy a Production‑Ready Blog System
java1234
java1234
Apr 18, 2026 · Backend Development

Beyond Simple Caching: 8 Essential Redis Use Cases for Java Backend Engineers

This guide walks Java backend developers through Redis’s eight core scenarios—caching, distributed locks, rate limiting, session sharing, leaderboards, counters, message and delay queues, bitmap statistics, and geolocation—providing complete code, diagrams, and production‑grade best practices.

BitmapCacheGEO
0 likes · 21 min read
Beyond Simple Caching: 8 Essential Redis Use Cases for Java Backend Engineers
Java Web Project
Java Web Project
Apr 18, 2026 · Information Security

How a Midnight SMS Scam Revealed the Need for a Multi‑Layer Anti‑Abuse System

A night‑time SMS billing attack that drained ¥11,500 in two hours exposed flaws in a naïve Session‑based verification design, prompting a detailed, five‑layer defense architecture that combines gateway rate limiting, Redis token‑bucket controls, advanced captcha tracking, device fingerprinting, blacklist automation, and honey‑pot tactics to raise attack costs.

CaptchaNGINXSecurity
0 likes · 14 min read
How a Midnight SMS Scam Revealed the Need for a Multi‑Layer Anti‑Abuse System
Architect Chen
Architect Chen
Apr 13, 2026 · Backend Development

How to Make Spring Cloud Gateway Handle a Million Concurrent Requests

This article explains how Spring Cloud Gateway leverages a reactive, non‑blocking architecture, OS‑level tuning, zero‑copy networking, and built‑in rate‑limiting and circuit‑breaker features to reliably sustain million‑level concurrent traffic in production environments.

NettySpring Cloud Gatewayhigh concurrency
0 likes · 4 min read
How to Make Spring Cloud Gateway Handle a Million Concurrent Requests
Architect's Tech Stack
Architect's Tech Stack
Apr 10, 2026 · Backend Development

Unlock Redis: 12 Powerful Patterns Every Backend Engineer Should Know

Redis offers far more than simple key‑value caching; by leveraging its rich data structures—strings, hashes, lists, sets, sorted sets, bitmaps, HyperLogLog, GEO, and streams—developers can implement distributed locks, rate limiting, leaderboards, session storage, counters, geolocation, delayed queues, messaging, bloom filters, and more, all with concise commands.

Data Structurescachingdistributed-lock
0 likes · 9 min read
Unlock Redis: 12 Powerful Patterns Every Backend Engineer Should Know
Top Architect
Top Architect
Apr 8, 2026 · Backend Development

How to Prevent Duplicate Submissions and Rate‑Limit APIs with the Guardian Spring Boot Starter

This article explains how the Guardian Spring Boot starter provides a lightweight solution for preventing duplicate API submissions and applying rate‑limiting, covering Maven dependencies, annotation and YAML configurations, key generation strategies, response handling modes, Redis versus local storage, context‑path compatibility, concurrency safety, and built‑in monitoring features.

API protectionBackendduplicate submission
0 likes · 16 min read
How to Prevent Duplicate Submissions and Rate‑Limit APIs with the Guardian Spring Boot Starter
java1234
java1234
Apr 5, 2026 · Databases

Beyond Caching: 16 Powerful Redis Use Cases

This article explores sixteen practical Redis applications—including caching, distributed sessions, locks, global IDs, counters, rate limiting, bitmaps, shopping carts, timelines, message queues, lotteries, likes, product tags, filtering, follow relationships, and ranking—demonstrating how Redis can serve as a versatile data store beyond simple caching.

BitmapsData StructuresMessage Queue
0 likes · 9 min read
Beyond Caching: 16 Powerful Redis Use Cases
Java Architect Handbook
Java Architect Handbook
Apr 4, 2026 · Backend Development

16 Powerful Redis Use Cases Every Backend Engineer Should Know

This article presents a comprehensive guide to 16 practical Redis applications—including caching, distributed sessions, locks, global IDs, counters, rate limiting, bitmaps, shopping carts, timelines, queues, lotteries, likes, product tagging, filtering, social graphs, and leaderboards—complete with command examples, code snippets, and visual illustrations to help developers implement these patterns efficiently.

BitmapCacheShopping Cart
0 likes · 11 min read
16 Powerful Redis Use Cases Every Backend Engineer Should Know
Java Companion
Java Companion
Apr 3, 2026 · Cloud Native

Why Every Microservice Architecture Needs an API Gateway

The article explains that without a gateway each microservice must duplicate authentication, rate‑limiting, logging and other cross‑cutting concerns, leading to maintenance overhead and security risks, and shows how a gateway centralises these functions while providing routing, load‑balancing, circuit‑breaking and observability, backed by real‑world code examples and a comparative analysis of popular gateway solutions.

AuthenticationCircuit BreakingMicroservices
0 likes · 19 min read
Why Every Microservice Architecture Needs an API Gateway
Architect's Guide
Architect's Guide
Mar 26, 2026 · Backend Development

How to Prevent Duplicate Submissions and Rate‑Limit APIs with the Guardian Spring Boot Starter

This article explains how the open‑source Guardian starter provides a lightweight Spring Boot solution for anti‑repeat submission and API rate limiting, covering dependency setup, annotation and YAML configuration, key generation strategies, response handling, concurrency safety, extensible architecture, monitoring endpoints, and deployment options.

API protectionAnti repeat submitJava
0 likes · 16 min read
How to Prevent Duplicate Submissions and Rate‑Limit APIs with the Guardian Spring Boot Starter
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Mar 18, 2026 · Operations

Implementing Hierarchical QoS IP‑Port Granular Offload Rate Limiting with OVS and DPDK

This article explains how to design and implement hardware‑offloaded, IP‑ and port‑granular traffic shaping using Open vSwitch, OpenFlow meters, Mellanox HQoS, and DPDK, covering software limits, meter hierarchy, flow‑meter association, deletion workflows, RCU handling, and same‑host traffic considerations.

DPDKHQoSMeter Hierarchy
0 likes · 24 min read
Implementing Hierarchical QoS IP‑Port Granular Offload Rate Limiting with OVS and DPDK
SpringMeng
SpringMeng
Mar 15, 2026 · Backend Development

Boost Your Spring Boot APIs with a DIY Anti‑Duplicate and Rate‑Limiting Starter

Guardian is a lightweight Spring Boot starter that provides independent anti‑duplicate submission and rate‑limiting modules, offering annotation and YAML configuration, multi‑dimensional key scopes, customizable response modes, Redis or local storage, and built‑in monitoring, all illustrated with step‑by‑step code examples.

API protectionSpring BootYAML
0 likes · 17 min read
Boost Your Spring Boot APIs with a DIY Anti‑Duplicate and Rate‑Limiting Starter
Code Wrench
Code Wrench
Mar 11, 2026 · Backend Development

Beego V2: Functional Routing, Redis AOP Rate Limiting & Toolbox Security

Discover how to transform a basic Beego V2 project into a high‑performance, concurrent service by replacing reflection‑based controllers with functional routing, implementing a distributed Redis‑Lua token‑bucket rate limiter via AOP filters, and securing the built‑in Toolbox with essential production hardening steps.

BeegoFunctional RoutingGo
0 likes · 6 min read
Beego V2: Functional Routing, Redis AOP Rate Limiting & Toolbox Security
Architect's Guide
Architect's Guide
Mar 2, 2026 · Information Security

Essential API Security Measures and How to Implement Them

This article outlines key API security mechanisms—including encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist control, and data validation—and provides practical Java code examples and implementation guidelines for each technique.

API SecurityAppIddata validation
0 likes · 10 min read
Essential API Security Measures and How to Implement Them
Architect's Guide
Architect's Guide
Feb 27, 2026 · Backend Development

Mastering Rate Limiting: Algorithms, Strategies, and Practical Implementations

This article explains why rate limiting is essential for both physical venues and online services, outlines common throttling strategies such as circuit breaking, service degradation, delay processing, and privilege handling, compares caching, degradation, and limiting, and details popular algorithms and concrete code examples for implementing rate limiting in Java and Nginx/Lua environments.

GuavaLuarate limiting
0 likes · 15 min read
Mastering Rate Limiting: Algorithms, Strategies, and Practical Implementations
Java Companion
Java Companion
Feb 21, 2026 · Backend Development

Build Your Own Spring Boot API Guard: Anti‑Duplicate Submissions and Rate Limiting

The article introduces Guardian, a lightweight Spring Boot starter that provides independent anti‑duplicate‑submission and rate‑limiting modules, explains why a custom solution is preferable to raw Redis locks, and walks through annotation and YAML configurations, key generation, response handling, storage options, concurrency safety, and observability.

API GuardAnti-duplicate SubmissionSpring Boot
0 likes · 17 min read
Build Your Own Spring Boot API Guard: Anti‑Duplicate Submissions and Rate Limiting
Ops Community
Ops Community
Feb 12, 2026 · Operations

Why Did Our Nginx Hit Connection Limits? A Deep Dive into Misdiagnosis and Rate‑Limiting Redesign

This postmortem explains how a Nginx connection‑saturation incident was initially misidentified as traffic surge, details the metrics and command‑line checks that revealed a connection‑lifecycle failure, and describes the step‑by‑step redesign of rate‑limiting, budgeting, monitoring, and run‑book procedures that restored stability.

NGINXconnection limitsincident response
0 likes · 32 min read
Why Did Our Nginx Hit Connection Limits? A Deep Dive into Misdiagnosis and Rate‑Limiting Redesign
Go Development Architecture Practice
Go Development Architecture Practice
Feb 4, 2026 · Backend Development

Master Go Rate Limiting: Sliding Window, Token Bucket, and Redis Techniques

This article presents four practical Go rate‑limiting implementations—a sliding‑window algorithm, a token‑bucket approach, the built‑in golang.org/x/time/rate package, and a Redis‑backed distributed limiter—complete with code samples, usage guidance, and recommendations for different deployment scenarios.

Token Bucketgolang.org/x/time/raterate limiting
0 likes · 11 min read
Master Go Rate Limiting: Sliding Window, Token Bucket, and Redis Techniques
Shuge Unlimited
Shuge Unlimited
Feb 2, 2026 · Artificial Intelligence

Moltbook Architecture Deep Dive: Design Philosophy Behind the First OpenClaw AI Agent Social Network

Moltbook is a pioneering AI‑only social platform that lets agents post, comment and like, built with a Next.js front‑end, RESTful API back‑end, semantic vector search, heartbeat checks, dual human/agent modes and strict rate‑limiting to encourage quality over quantity while addressing scalability and security challenges.

HeartbeatMoltbookNext.js
0 likes · 18 min read
Moltbook Architecture Deep Dive: Design Philosophy Behind the First OpenClaw AI Agent Social Network
Ray's Galactic Tech
Ray's Galactic Tech
Jan 27, 2026 · Backend Development

Resilient Go Microservices: Rate Limiting, Circuit Breaking & K8s Architecture

This guide walks you through implementing a complete stability engineering system for Go microservices—covering token‑bucket rate limiting, concurrency and Redis‑based throttling, circuit breakers with slow‑request detection, graceful degradation strategies, Kubernetes‑aware deployment, monitoring, dynamic configuration, and load‑testing to set safe thresholds.

Resiliencecircuit breakerrate limiting
0 likes · 10 min read
Resilient Go Microservices: Rate Limiting, Circuit Breaking & K8s Architecture
Selected Java Interview Questions
Selected Java Interview Questions
Jan 15, 2026 · Backend Development

How to Build a Lightweight, Annotation‑Driven Rate Limiter with Spring AOP and Guava

This article explains how to create a non‑intrusive, configurable rate‑limiting component for Spring services by combining Spring AOP, a custom @RateLimit annotation, and Google Guava's RateLimiter, covering token‑bucket fundamentals, API usage, implementation details, common AOP pitfalls, and migration to distributed limiting.

BackendGuava RateLimiterJava
0 likes · 12 min read
How to Build a Lightweight, Annotation‑Driven Rate Limiter with Spring AOP and Guava
Java Companion
Java Companion
Jan 15, 2026 · Backend Development

Implement Multi‑Dimensional Bandwidth Throttling in Spring Boot 3

This article presents a complete Spring Boot 3 solution for multi‑dimensional network bandwidth throttling using a manually implemented token‑bucket algorithm, custom HandlerInterceptor, HttpServletResponseWrapper, and RateLimitedOutputStream, with detailed code samples, configuration options, and performance tuning guidance.

JavaSpring BootToken Bucket
0 likes · 13 min read
Implement Multi‑Dimensional Bandwidth Throttling in Spring Boot 3
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Jan 13, 2026 · Backend Development

Mastering Flash‑Sale TPS: Scalable Backend Architecture for E‑commerce

This article explains how e‑commerce flash‑sale systems handle extreme concurrency by defining TPS requirements for different scales, applying a layered filtering architecture, and using techniques like CDN caching, rate limiting, Redis pre‑deduction, and minimal database writes to ensure stability.

Backend ArchitectureTPSe‑commerce
0 likes · 5 min read
Mastering Flash‑Sale TPS: Scalable Backend Architecture for E‑commerce
Tech Freedom Circle
Tech Freedom Circle
Jan 12, 2026 · Backend Development

Why Sentinel Fails for Per‑User Hourly Limits and How Redis + Lua Solves It

The article compares four user‑level rate‑limiting approaches—Sentinel hotspot parameters, Sentinel ordinary flow control with cluster mode, Redis ZSet + Lua scripts, and Guava RateLimiter—explaining why Sentinel is unsuitable for long‑window low‑frequency limits and why Redis + Lua is the optimal solution for high‑traffic e‑commerce scenarios.

Distributed ConsistencyLong WindowLua
0 likes · 26 min read
Why Sentinel Fails for Per‑User Hourly Limits and How Redis + Lua Solves It
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Jan 2, 2026 · Backend Development

Implementing High‑Concurrency Circuit Breaking in Nginx with Lua

This guide explains how to use Nginx and OpenResty Lua scripts to implement rate limiting and circuit‑breaking for high‑concurrency services, detecting error rates and response latency, automatically opening and closing a 30‑second break window, and returning custom JSON responses when downstream services fail.

Circuit BreakingLuaNGINX
0 likes · 5 min read
Implementing High‑Concurrency Circuit Breaking in Nginx with Lua
Java Architect Handbook
Java Architect Handbook
Dec 31, 2025 · Backend Development

Mastering API Rate Limiting with Spring Interceptor and Redis

This article walks through building a Spring MVC interceptor that leverages Redis to enforce per‑IP request limits, explains configurable parameters, shows how to apply protection selectively via mapping rules or custom annotations, and discusses practical pitfalls such as sliding‑window logic, path‑parameter handling, and real‑IP detection.

API SecurityBackendInterceptor
0 likes · 20 min read
Mastering API Rate Limiting with Spring Interceptor and Redis
php Courses
php Courses
Dec 18, 2025 · Backend Development

Master Go Rate Limiting: Token Bucket, IP-Based, and Redis Distributed Strategies

This article explains how to protect Go services from overload by implementing HTTP request rate limiting using the standard token‑bucket limiter, per‑IP throttling with a map and mutex, and a distributed approach with Redis and Lua scripts, complete with practical code examples and middleware integration.

GoHTTPmiddleware
0 likes · 7 min read
Master Go Rate Limiting: Token Bucket, IP-Based, and Redis Distributed Strategies
DeWu Technology
DeWu Technology
Dec 15, 2025 · Backend Development

How Go Powers High‑Concurrency, High‑Availability Systems: 5 Real‑World Scenarios

This article explores five typical high‑concurrency, high‑availability scenarios—gRPC microservice communication, real‑time WebSocket messaging, API‑gateway rate limiting and circuit breaking, Redis‑Stream task queues, and Redis RedLock distributed locks—detailing the problems, Go‑centric solutions, code implementations, and supporting theory.

GoWebSocketgRPC
0 likes · 47 min read
How Go Powers High‑Concurrency, High‑Availability Systems: 5 Real‑World Scenarios
Java Baker
Java Baker
Nov 27, 2025 · Backend Development

Mastering Rate Limiting: Token Bucket & Sliding Window Algorithms in Java

This article explains the principles and implementation details of common rate‑limiting algorithms—token bucket and sliding‑window counting—including their core concepts, key processes, Java code examples, and how to extend them to distributed scenarios with Redis Lua scripts.

DistributedSliding WindowToken Bucket
0 likes · 19 min read
Mastering Rate Limiting: Token Bucket & Sliding Window Algorithms in Java
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Nov 24, 2025 · Backend Development

How to Prevent Cache Penetration in High‑Concurrency Systems

The article explains what cache penetration is in high‑concurrency architectures, why it occurs, and presents four practical mitigation strategies—including caching empty values, using Bloom filters, validating request data, and applying rate‑limiting—to protect backend databases from overload.

Cachebloom-filtercache-penetration
0 likes · 6 min read
How to Prevent Cache Penetration in High‑Concurrency Systems
SpringMeng
SpringMeng
Nov 19, 2025 · Backend Development

Building a High‑Performance Seckill System with SpringBoot, RabbitMQ and Redis (Full Code)

This article walks through the design and implementation of a complete seckill (flash‑sale) system built on SpringBoot, MyBatis, MySQL, RabbitMQ and Redis, covering double MD5 password hashing, distributed sessions, unified exception handling, caching strategies, memory flags, pre‑decrement inventory, asynchronous order processing, oversell prevention, and rate limiting, with code snippets and UI screenshots.

Distributed SessionRabbitMQSeckill
0 likes · 9 min read
Building a High‑Performance Seckill System with SpringBoot, RabbitMQ and Redis (Full Code)
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Nov 18, 2025 · Operations

How to Stop Brute‑Force Logins with Nginx Rate Limiting

Learn how to protect your web application from brute‑force login attacks by configuring Nginx rate limiting, with step‑by‑step instructions, example configurations, testing methods, custom error pages, and best‑practice tips such as IP whitelisting, HTTPS enforcement, and complementary security measures.

Brute-force protectionNGINXrate limiting
0 likes · 8 min read
How to Stop Brute‑Force Logins with Nginx Rate Limiting
Su San Talks Tech
Su San Talks Tech
Nov 12, 2025 · Operations

Master Nginx: From Reverse Proxy to HTTPS in Six Practical Scenarios

This guide walks backend engineers through six real‑world Nginx configurations—reverse proxy and load balancing, static asset handling, rate limiting with IP black/white lists, HTTPS encryption, and step‑by‑step deployment—showing how to secure, accelerate, and stabilize services.

HTTPSNGINXrate limiting
0 likes · 10 min read
Master Nginx: From Reverse Proxy to HTTPS in Six Practical Scenarios
Code Mala Tang
Code Mala Tang
Nov 5, 2025 · Backend Development

How to Build a Production-Ready Async LLM API with FastAPI

Learn how to design and deploy a high‑performance, production‑grade LLM API using FastAPI, covering async routing, type‑safe Pydantic models, streaming via SSE/WebSockets, middleware, caching, rate limiting, observability, retries, and cost‑control strategies for robust AI services.

AsyncFastAPILLM
0 likes · 12 min read
How to Build a Production-Ready Async LLM API with FastAPI
Architect's Guide
Architect's Guide
Oct 28, 2025 · Backend Development

How to Prevent API Scraping in High‑Traffic Seckill Systems with Java

During high‑traffic flash‑sale events like Double 11, malicious users can flood seckill APIs, causing service collapse and inventory errors; this article explains the business pain points and presents a multi‑layer anti‑scraping solution—including rate limiting, behavior detection, captchas, request signing, token mechanisms, and asynchronous order processing—with concrete Java implementations.

API SecurityCaptchaDistributed Systems
0 likes · 7 min read
How to Prevent API Scraping in High‑Traffic Seckill Systems with Java
Java Baker
Java Baker
Oct 27, 2025 · Backend Development

Master Java Rate Limiting: Guava, Sentinel, and Redisson Solutions

This article compares three Java rate‑limiting approaches—Guava RateLimiter for single‑node control, Sentinel for both single‑node and cluster scenarios, and Redisson RateLimiter for distributed limits—detailing their usage, advantages, disadvantages, and code examples to help developers choose the right solution for their traffic management needs.

BackendGuavaJava
0 likes · 12 min read
Master Java Rate Limiting: Guava, Sentinel, and Redisson Solutions
Python Programming Learning Circle
Python Programming Learning Circle
Oct 18, 2025 · Information Security

Master Nginx Rate Limiting & Anti‑Crawler: Complete Guide with Token Bucket, GeoIP, Lua & JS Challenges

This comprehensive guide explains why modern web services need rate limiting and anti‑crawler protection, compares token‑bucket and leaky‑bucket algorithms, and provides step‑by‑step Nginx configurations for IP, URI, and geographic throttling, advanced user‑agent filtering, JavaScript challenges, real‑time monitoring, performance tuning, and troubleshooting.

NGINXSecurityanti‑crawler
0 likes · 18 min read
Master Nginx Rate Limiting & Anti‑Crawler: Complete Guide with Token Bucket, GeoIP, Lua & JS Challenges
Lin is Dream
Lin is Dream
Oct 14, 2025 · Backend Development

Designing a Scalable Short‑Link System: From Base62 Encoding to Security

This article explains how to build a production‑grade short‑link service, covering the background of SMS short URLs, Base62 encoding principles, database schema design, request routing, security measures such as custom alphabets, rate limiting, and signed links, and additional management features for operation and monitoring.

Backend ArchitectureDatabase designSecurity
0 likes · 16 min read
Designing a Scalable Short‑Link System: From Base62 Encoding to Security
Ray's Galactic Tech
Ray's Galactic Tech
Oct 13, 2025 · Information Security

How to Implement Dynamic IP Blocking in Nginx: 3 Proven Methods

This guide explains three practical ways to achieve dynamic IP blocking in Nginx—using Fail2ban, Lua with Redis, and Nginx's built‑in limit modules—detailing configuration steps, code examples, advantages, drawbacks, and best‑practice recommendations for various deployment scenarios.

Fail2banIP blockingLua
0 likes · 7 min read
How to Implement Dynamic IP Blocking in Nginx: 3 Proven Methods
Su San Talks Tech
Su San Talks Tech
Oct 10, 2025 · Operations

How to Boost System Stability: Observability, Resilience, and High‑Availability Strategies

This comprehensive guide explains how to improve system stability and reduce online incidents by building observability, implementing distributed tracing, applying rate‑limiting and circuit‑breaker patterns, adopting blue‑green and gray deployments, managing data consistency with distributed transactions, planning capacity, optimizing performance, and preparing emergency response plans.

Deployment StrategiesDistributed TracingDistributed Transactions
0 likes · 19 min read
How to Boost System Stability: Observability, Resilience, and High‑Availability Strategies
Code Ape Tech Column
Code Ape Tech Column
Sep 19, 2025 · Backend Development

Sentinel Deep Dive: Flow Control, Circuit Breaking & Rate Limiting

This comprehensive tutorial introduces Alibaba Sentinel, explaining its core concepts, installation, configuration of flow control, degradation, hotspot parameters, system adaptive limits, black‑white lists, persistence with Nacos, cluster flow control, and advanced customization techniques such as custom block handlers and fallback strategies for resilient microservice architectures.

Circuit BreakingFlow ControlMicroservices
0 likes · 39 min read
Sentinel Deep Dive: Flow Control, Circuit Breaking & Rate Limiting
Tech Freedom Circle
Tech Freedom Circle
Sep 19, 2025 · Interview Experience

Designing a Rock‑Solid High‑Availability Solution for Unreliable Third‑Party Services

When third‑party services frequently fail, this article walks through a systematic high‑availability design—including an ACL anti‑corruption layer, strategy‑pattern master‑slave routing, precise rate limiting, circuit‑breaker fallback, full observability, async degradation, and mock testing—to keep external dependencies as stable as a mountain.

ACLMock TestingStrategy Pattern
0 likes · 24 min read
Designing a Rock‑Solid High‑Availability Solution for Unreliable Third‑Party Services
Su San Talks Tech
Su San Talks Tech
Sep 18, 2025 · Backend Development

Designing a Million‑QPS Rate Limiter for Backend System Interviews

This article walks through a complete, interview‑ready design of a high‑performance rate‑limiting system that can handle up to one million queries per second, covering requirements, core entities, algorithm choices, distributed state storage with Redis, scalability, high availability, latency optimization, hot‑key mitigation, and dynamic rule configuration.

Backend ArchitectureDistributed SystemsSystem Design
0 likes · 29 min read
Designing a Million‑QPS Rate Limiter for Backend System Interviews
Ops Community
Ops Community
Sep 17, 2025 · Operations

Mastering System Fault Tolerance: From Theory to Production‑Ready High‑Availability

This comprehensive guide explores the philosophy, core patterns, and practical techniques for designing fault‑tolerant, highly available systems, covering circuit breakers, retries, rate limiting, monitoring, cloud‑native deployment, and real‑world case studies to help engineers build resilient production architectures.

Cloud Nativecircuit breakerfault tolerance
0 likes · 24 min read
Mastering System Fault Tolerance: From Theory to Production‑Ready High‑Availability
Architect's Guide
Architect's Guide
Sep 17, 2025 · Backend Development

How to Build a High‑Performance Flash‑Sale System: 7 Key Architecture Strategies

This article explains the characteristics of flash‑sale traffic and presents a comprehensive backend architecture—including Nginx static separation, Redis caching and locking, MQ buffering, rate‑limiting, async order processing, database sharding, captcha protection, and page optimization—to handle massive concurrent requests while ensuring security and reliability.

NGINXSystem Architectureflash sale
0 likes · 11 min read
How to Build a High‑Performance Flash‑Sale System: 7 Key Architecture Strategies
Architect's Journey
Architect's Journey
Sep 15, 2025 · Backend Development

Token Bucket vs Leaky Bucket: Deep Dive into Core Traffic‑Control Algorithms

This article compares the token‑bucket and leaky‑bucket rate‑limiting algorithms, explaining their core principles, Java implementation details, key advantages and drawbacks, suitable application scenarios, interview‑style Q&A, and advanced hybrid strategies for building robust high‑concurrency systems.

Distributed SystemsJavaToken Bucket
0 likes · 9 min read
Token Bucket vs Leaky Bucket: Deep Dive into Core Traffic‑Control Algorithms
MaGe Linux Operations
MaGe Linux Operations
Sep 13, 2025 · Information Security

How to Build an Enterprise‑Grade WAF with OpenResty from Scratch

This guide walks through constructing a high‑performance, cost‑effective enterprise‑level Web Application Firewall using OpenResty, covering why OpenResty is ideal, core architecture, modules for request lifecycle management, IP control, rate limiting, SQL injection and XSS detection, intelligent CC protection, monitoring, performance tuning, deployment tips, real‑world case study, and future enhancements.

LuaNGINXOpenResty
0 likes · 24 min read
How to Build an Enterprise‑Grade WAF with OpenResty from Scratch
Architect's Guide
Architect's Guide
Sep 7, 2025 · Backend Development

User Login & Token Management: Flow, Rate Limiting, and Security

This article explains the complete user login process, from mobile verification and automatic registration to token generation, validation, expiration policies, logout handling, anonymous access strategies, rate‑limiting via authorized tokens, path‑regex checks, and blacklist management, illustrated with diagrams and Java‑Spring code examples.

API SecurityUser Authenticationrate limiting
0 likes · 10 min read
User Login & Token Management: Flow, Rate Limiting, and Security
Architect's Guide
Architect's Guide
Sep 4, 2025 · Information Security

How to Secure Public APIs: Essential Measures and Java Implementation Guide

This article outlines essential security measures for public APIs—including data encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist handling, and data validation—explaining why each is needed and providing concrete Java implementation examples such as HTTPS, MD5 signatures, token‑bucket algorithms, and RateLimiter usage.

API SecurityAppIdencryption
0 likes · 10 min read
How to Secure Public APIs: Essential Measures and Java Implementation Guide
macrozheng
macrozheng
Sep 3, 2025 · Backend Development

How to Build a Lightweight Spring Boot API Firewall for Real‑Time Protection

This article walks through the design and implementation of a lightweight API firewall embedded in a Spring Boot application, covering background pain points, core capabilities such as blacklist/whitelist, QPS and user‑limit controls, online configuration via a modern web console, technical choices, detailed code examples, deployment tips, and practical use cases for small‑to‑medium services.

BlacklistInterceptorMicroservices
0 likes · 24 min read
How to Build a Lightweight Spring Boot API Firewall for Real‑Time Protection
Selected Java Interview Questions
Selected Java Interview Questions
Sep 2, 2025 · Backend Development

Master Nginx: Essential Configurations for Backend Engineers

This guide walks backend engineers through essential Nginx configurations—including reverse proxy, load balancing, static file handling, rate limiting, and HTTPS—providing code examples and deployment steps to ensure stable, secure, and high‑performance services while keeping servers resilient during traffic spikes.

HTTPSload balancingrate limiting
0 likes · 10 min read
Master Nginx: Essential Configurations for Backend Engineers
Architect
Architect
Aug 29, 2025 · Backend Development

Mastering Rate Limiting and Circuit Breaking: Practical Guidelines with Sentinel

This article explains how to identify interfaces that need pre‑emptive rate limiting, allocate resources for isolation, apply circuit‑breaking wisely, calculate thresholds based on resource capacity, and leverage Sentinel's features to ensure stable backend performance.

Backend PerformanceCircuit Breakingrate limiting
0 likes · 10 min read
Mastering Rate Limiting and Circuit Breaking: Practical Guidelines with Sentinel
Top Architect
Top Architect
Aug 26, 2025 · Backend Development

Dynamic IP Blacklist with Nginx, Lua, and Redis: A Step‑by‑Step Guide

This article explains how to build a dynamic IP blacklist using Nginx, Lua scripts, and Redis, covering the problem definition, environment setup, design choices, Nginx configuration, Lua script implementation, testing, and extensions such as use‑case scenarios and advanced features.

LuaNGINXdynamic blocking
0 likes · 12 min read
Dynamic IP Blacklist with Nginx, Lua, and Redis: A Step‑by‑Step Guide
Su San Talks Tech
Su San Talks Tech
Aug 25, 2025 · Backend Development

How to Build a High‑Concurrency Queue System with OpenResty, Lua, and Redis

This article analyzes current system performance bottlenecks, compares hard‑rate‑limiting and flexible queuing strategies, and presents a non‑intrusive traffic‑control solution built with OpenResty+Lua and Redis that offers zero‑code changes, high performance, scalability, and real‑time visual feedback for high‑concurrency scenarios.

LuaOpenRestyhigh concurrency
0 likes · 18 min read
How to Build a High‑Concurrency Queue System with OpenResty, Lua, and Redis
Tech Freedom Circle
Tech Freedom Circle
Aug 15, 2025 · Backend Development

Calculating a 100k QPS Rate‑Limiting Threshold: Methods and Best Practices

This article explains how to determine a 100 000‑QPS rate‑limiting threshold by covering the purpose of throttling, the three core elements of limiting, common algorithms, target dimensions, capacity estimation for single‑service and full‑link scenarios, pressure‑testing techniques, monitoring data, and adaptive configuration strategies.

Performance TestingQPSadaptive throttling
0 likes · 18 min read
Calculating a 100k QPS Rate‑Limiting Threshold: Methods and Best Practices
mikechen
mikechen
Aug 6, 2025 · Big Data

How to Diagnose and Fix Kafka Message Backlog in High‑Concurrency Environments

In high‑concurrency systems, Kafka message backlog occurs when producers outpace consumers, leading to unprocessed messages that threaten stability and real‑time performance, and this article explains the root causes and provides practical producer‑side and consumer‑side optimization techniques to resolve the issue.

Batch Processingconsumer optimizationhigh concurrency
0 likes · 5 min read
How to Diagnose and Fix Kafka Message Backlog in High‑Concurrency Environments
Architect's Guide
Architect's Guide
Jul 21, 2025 · Operations

How to Achieve Five Nines: Practical High‑Availability Strategies for Modern Web Systems

This article explains key high‑availability concepts such as availability metrics, microservice modularization, load balancing, rate limiting, circuit breaking, isolation, retry strategies, rollback plans, stress testing, monitoring, and on‑call processes, providing concrete design guidelines for building resilient internet services.

Circuit BreakingMicroserviceshigh availability
0 likes · 12 min read
How to Achieve Five Nines: Practical High‑Availability Strategies for Modern Web Systems
Architect's Guide
Architect's Guide
Jul 20, 2025 · Information Security

Unlocking API Security: 10 Common Vulnerabilities Every Tester Must Know

This article explains the most frequent API security flaws—including information disclosure, broken object and function level authorizations, excessive data exposure, rate‑limiting gaps, mass‑assignment, misconfigurations, asset‑management errors, and business‑logic bugs—while providing practical examples, detection techniques, and code snippets for each vulnerability.

API SecurityBFLABOLA
0 likes · 16 min read
Unlocking API Security: 10 Common Vulnerabilities Every Tester Must Know
Java Backend Technology
Java Backend Technology
Jul 14, 2025 · Backend Development

Mastering Rate Limiting: 4 Proven Strategies to Boost System Resilience

This article explores four common rate‑limiting algorithms—fixed window, sliding window, leaky bucket, and token bucket—explains their core principles, shows Java and Redis implementations, discusses real‑world production cases, and provides practical tips for avoiding pitfalls and optimizing performance.

rate limitingredis
0 likes · 10 min read
Mastering Rate Limiting: 4 Proven Strategies to Boost System Resilience
Java Architect Essentials
Java Architect Essentials
Jul 12, 2025 · Backend Development

Why Reactive Programming Fails Without Backpressure and How to Fix It

During high‑traffic spikes, traditional servlet‑based services often crash due to thread‑pool exhaustion, while reactive systems using Reactor can still fail if backpressure is ignored; this article explains the pitfalls, compares models, and provides practical backpressure solutions such as dynamic rate limiting, bounded buffering, and circuit breaking.

Circuit BreakingJavaReactor
0 likes · 11 min read
Why Reactive Programming Fails Without Backpressure and How to Fix It
Lin is Dream
Lin is Dream
Jul 7, 2025 · Backend Development

Master Sliding‑Window Rate Limiting with Redis Sorted Sets

This article explains how to implement a precise sliding‑window rate‑limiting algorithm using Redis Sorted Sets, detailing the problem scenario, the algorithm steps, Lua script implementation, Java integration, and practical extensions for high‑performance backend services.

BackendJavaLua
0 likes · 8 min read
Master Sliding‑Window Rate Limiting with Redis Sorted Sets
Tencent Cloud Middleware
Tencent Cloud Middleware
Jun 25, 2025 · Cloud Computing

How Tencent Cloud TDMQ Serverless RabbitMQ Implements Distributed Rate Limiting for High‑Concurrency

This article deeply examines Tencent Cloud TDMQ RabbitMQ Serverless's distributed rate‑limiting mechanism, covering its necessity, design principles, token‑based throttling architecture, implementation challenges, client‑side error handling, and practical guidelines for planning load and configuring alerts to ensure stable high‑throughput messaging.

RabbitMQServerlessTDMQ
0 likes · 20 min read
How Tencent Cloud TDMQ Serverless RabbitMQ Implements Distributed Rate Limiting for High‑Concurrency
Code Mala Tang
Code Mala Tang
Jun 17, 2025 · Backend Development

Mastering Rate Limiting: Algorithms, Redis & Lua for Scalable Backend APIs

This article explains the concept of rate limiting, compares five common algorithms—including fixed‑window, sliding‑log, sliding‑window counter, token bucket and leaky bucket—covers distributed designs using Redis and Lua scripts, and provides complete FastAPI implementation and pytest tests for both fixed‑window and sliding‑log strategies.

BackendFastAPILua
0 likes · 13 min read
Mastering Rate Limiting: Algorithms, Redis & Lua for Scalable Backend APIs
IT Services Circle
IT Services Circle
Jun 13, 2025 · Information Security

Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting & Real‑Time Rules

This article explains how to protect systems from massive malicious traffic reaching millions of queries per second by combining gateway rate limiting, distributed circuit breaking, device fingerprinting, behavior analysis, dynamic rule engines, and real‑time risk scoring, illustrated with Nginx‑Lua, Sentinel, Drools, and Flink examples.

Backend SecurityDDoS mitigationdevice fingerprinting
0 likes · 15 min read
Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting & Real‑Time Rules
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Jun 12, 2025 · Backend Development

How Spring Cloud Gateway Handles Millions of Requests with Reactive Non‑Blocking Architecture

This article explains how Spring Cloud Gateway leverages an asynchronous non‑blocking model built on Netty and Project Reactor, along with rate limiting, circuit breaking, and degradation strategies, to sustain million‑level concurrent traffic while protecting backend services.

Backend DevelopmentCircuit BreakingSpring Cloud Gateway
0 likes · 5 min read
How Spring Cloud Gateway Handles Millions of Requests with Reactive Non‑Blocking Architecture
Su San Talks Tech
Su San Talks Tech
Jun 12, 2025 · Information Security

Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting, and Dynamic Rules

This article explains why a million‑QPS flood can cripple systems, outlines attackers' tactics, and presents a three‑layer defense strategy—including gateway rate limiting with Nginx + Lua, distributed circuit breaking via Sentinel, device fingerprinting, behavior analysis, and a dynamic rule engine—to protect high‑traffic services.

DDoSbehavior analysishigh QPS
0 likes · 14 min read
Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting, and Dynamic Rules
Architecture and Beyond
Architecture and Beyond
Jun 8, 2025 · Backend Development

Designing Queueing and Rate Limiting for Scalable AIGC Services

This article explains why queueing systems and rate‑limiting strategies are essential for AIGC platforms, describes the user‑facing product behaviors they produce, outlines design considerations, compares technical options, and provides practical implementation guidance to keep services stable, cost‑effective, and user‑friendly.

AIGCBackendQueue
0 likes · 30 min read
Designing Queueing and Rate Limiting for Scalable AIGC Services
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Jun 4, 2025 · Backend Development

Understanding Spring Cloud Gateway’s Non‑Blocking Architecture for Million‑Level Concurrency

The article explains how Spring Cloud Gateway leverages a fully non‑blocking, reactive architecture built on Project Reactor and Netty to handle millions of concurrent requests, and discusses essential protection mechanisms such as rate limiting, circuit breaking, and degradation for high‑traffic scenarios.

Circuit BreakingNon-blockingSpring Cloud Gateway
0 likes · 6 min read
Understanding Spring Cloud Gateway’s Non‑Blocking Architecture for Million‑Level Concurrency