Tagged articles
575 articles
Page 3 of 6
Architect
Architect
Jan 31, 2024 · Backend Development

How to Build Distributed Multi‑Rule Rate Limiting with Redis and Spring AOP

This article explains how to implement multi‑rule rate limiting in a distributed Java application using Redis, covering String‑based counters, Zset timestamp storage, Lua scripts for atomic checks, custom @RateLimiter annotations, key generation logic, and an AOP interceptor that enforces the limits.

Distributed SystemsJavaLua
0 likes · 12 min read
How to Build Distributed Multi‑Rule Rate Limiting with Redis and Spring AOP
Top Architect
Top Architect
Jan 29, 2024 · Backend Development

Implementing Interface Rate Limiting with Spring Interceptor and Redis

This article demonstrates how to implement API request throttling in a Spring Boot application using a custom Interceptor and Redis, covering basic principles, configuration, custom annotations, reflection for per‑endpoint limits, handling path parameters, and addressing timing logic nuances.

InterceptorJavarate limiting
0 likes · 21 min read
Implementing Interface Rate Limiting with Spring Interceptor and Redis
FunTester
FunTester
Jan 29, 2024 · Information Security

Fundamentals of API Security: Principles, Practices, and Lifecycle Management

This article provides a comprehensive overview of API security, covering authentication and authorization, privacy and encryption, input validation, detection, rate limiting, logging, secure coding, vulnerability management, lifecycle phases, and the importance of education and training to protect modern software ecosystems.

API SecurityAuthenticationAuthorization
0 likes · 14 min read
Fundamentals of API Security: Principles, Practices, and Lifecycle Management
Architecture Digest
Architecture Digest
Jan 28, 2024 · Backend Development

Implementing Interface Rate Limiting with Spring Interceptor and Redis

This article demonstrates how to build a Spring‑based API rate‑limiting solution using an Interceptor and Redis, covering the basic principle, project setup, code implementation, custom annotation with reflection for flexible limits, handling path‑parameter keys, real‑IP acquisition, and practical considerations for production use.

BackendInterceptorJava
0 likes · 18 min read
Implementing Interface Rate Limiting with Spring Interceptor and Redis
Java High-Performance Architecture
Java High-Performance Architecture
Jan 9, 2024 · Backend Development

How to Build a Flexible API Rate‑Limiting System with Spring Interceptor and Redis

This article demonstrates step‑by‑step how to prevent API abuse in a Spring MVC application by using an Interceptor combined with Redis for counting requests, customizing limits per endpoint through annotations and reflection, handling mapping rules, path‑parameter challenges, and obtaining the real client IP.

InterceptorJavaReflection
0 likes · 19 min read
How to Build a Flexible API Rate‑Limiting System with Spring Interceptor and Redis
Su San Talks Tech
Su San Talks Tech
Jan 6, 2024 · Information Security

11 Essential Techniques to Secure Your APIs: From Validation to Encryption

Learn eleven practical strategies to protect your APIs—including parameter validation, unified response handling, XSS escaping, permission and data access controls, captcha integration, rate limiting, IP whitelisting, sensitive word filtering, HTTPS adoption, data encryption, and risk management—to ensure robust security across your services.

API Securityencryptionrate limiting
0 likes · 17 min read
11 Essential Techniques to Secure Your APIs: From Validation to Encryption
Architect
Architect
Dec 28, 2023 · Backend Development

How to Implement Distributed Multi‑Rule Rate Limiting with Redis and Lua

This article explains how to design and implement a distributed rate‑limiting solution that supports multiple concurrent rules—such as per‑minute and per‑hour limits—by analyzing the shortcomings of simple string counters, introducing atomic Lua scripts and Zset structures, and providing complete Java annotation and AOP code examples.

Distributed SystemsJavaLua
0 likes · 13 min read
How to Implement Distributed Multi‑Rule Rate Limiting with Redis and Lua
Sanyou's Java Diary
Sanyou's Java Diary
Dec 28, 2023 · Operations

Mastering High Availability: Traffic Governance, Circuit Breakers, Isolation, Retries, Timeouts and Rate Limiting

This article explains how to achieve the three‑high goals of high performance, high availability and easy scalability in microservice systems by using traffic governance techniques such as circuit breaking, various isolation strategies, retry mechanisms, timeout controls, degradation tactics and rate‑limiting, illustrated with practical examples and diagrams.

MicroservicesTimeoutcircuit breaker
0 likes · 32 min read
Mastering High Availability: Traffic Governance, Circuit Breakers, Isolation, Retries, Timeouts and Rate Limiting
Amap Tech
Amap Tech
Dec 28, 2023 · Backend Development

Rate Limiting Algorithms and Their Java Implementations

Rate limiting protects system stability by capping request rates, and this article explains five Java algorithms—Fixed Window, Sliding Window, Leaky Bucket, Token Bucket, and Guava's RateLimiter—showing their principles, pros and cons, and providing sample implementations and a Spring @Limit annotation for practical enforcement.

Distributed SystemsGuavaJava
0 likes · 17 min read
Rate Limiting Algorithms and Their Java Implementations
Alibaba Cloud Developer
Alibaba Cloud Developer
Dec 21, 2023 · Backend Development

Mastering Rate Limiting: Algorithms, Java Implementations, and Guava Tips

This article explains why rate limiting is essential for high‑traffic systems, defines common rate‑limiting algorithms (fixed window, sliding window, leaky bucket, token bucket), provides complete Java code examples for each, and demonstrates practical usage with Guava's RateLimiter in real‑world applications.

BackendDistributed SystemsGuava
0 likes · 19 min read
Mastering Rate Limiting: Algorithms, Java Implementations, and Guava Tips
Senior Tony
Senior Tony
Nov 14, 2023 · Operations

Master Availability, Reliability, and Stability for High‑Availability Systems

Understanding the differences between system availability, reliability, and stability is essential for building resilient services; this guide explains each concept, illustrates their distinctions with examples, and outlines practical strategies such as rate limiting, anti‑scraping, timeout settings, system inspections, and fault post‑mortems to reduce failures and downtime.

AvailabilityReliabilityhigh availability
0 likes · 11 min read
Master Availability, Reliability, and Stability for High‑Availability Systems
NetEase LeiHuo Testing Center
NetEase LeiHuo Testing Center
Nov 3, 2023 · Operations

Best Practices for Third‑Party Interface Collaboration: Concepts, Rate Limiting, Monitoring, and Incident Handling

The article outlines how game QA and third‑party providers can improve cooperation by aligning basic performance concepts such as TPS, QPS and concurrency, selecting appropriate rate‑limiting strategies, establishing precise monitoring and alerting, and preparing clear incident‑response and delivery standards.

OperationsPerformance Testingmonitoring
0 likes · 15 min read
Best Practices for Third‑Party Interface Collaboration: Concepts, Rate Limiting, Monitoring, and Incident Handling
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Nov 2, 2023 · Backend Development

Designing High‑Concurrency Flash Sale (秒杀) Systems: Challenges and Solutions

This article analyzes the technical challenges of massive flash‑sale events such as Double‑11, including server and network spikes, extreme QPS, and system avalanche, and presents a comprehensive backend and frontend architecture using rate limiting, caching, message queues, and scalable design to ensure reliable high‑concurrency processing.

cachingflash salehigh concurrency
0 likes · 7 min read
Designing High‑Concurrency Flash Sale (秒杀) Systems: Challenges and Solutions
Code Ape Tech Column
Code Ape Tech Column
Oct 26, 2023 · Information Security

OpenAPI Security Practices: AppId/AppSecret, Signature Generation, and Implementation Guide

This article explains how to use OpenAPI standards to secure API interfaces by introducing AppId/AppSecret mechanisms, RSA‑based signatures, timestamp and nonce anti‑replay measures, and provides complete Java code examples for client‑side signing and server‑side verification along with common protection techniques such as rate limiting and data validation.

AppIdAppSecretJava
0 likes · 28 min read
OpenAPI Security Practices: AppId/AppSecret, Signature Generation, and Implementation Guide
Su San Talks Tech
Su San Talks Tech
Oct 22, 2023 · Backend Development

Mastering Rate Limiting: Algorithms, Scenarios, and Practical Implementations

Rate limiting controls request flow to protect system stability, covering its definition, motivations, common algorithms such as token bucket, leaky bucket, fixed and sliding windows, their pros and cons, single‑machine vs distributed implementations, and practical component choices for backend services.

BackendDistributed Systemsalgorithm
0 likes · 17 min read
Mastering Rate Limiting: Algorithms, Scenarios, and Practical Implementations
Programmer DD
Programmer DD
Oct 4, 2023 · Databases

5 Essential Redis Use Cases Every Developer Should Know

This article explores five common Redis applications—caching, session storage, distributed locking, rate limiting, and leaderboards—explaining how each leverages Redis’s in‑memory speed, atomic commands, and data structures to improve performance, scalability, and reliability of modern web services.

In-Memory DatabaseSession Managementdistributed-lock
0 likes · 7 min read
5 Essential Redis Use Cases Every Developer Should Know
Alibaba Cloud Native
Alibaba Cloud Native
Aug 17, 2023 · Cloud Native

How to Implement Robust Traffic Protection in Cloud‑Native Gateways with Sentinel

This article explains how cloud‑native gateways use Sentinel to provide multi‑layer traffic protection—including QPS limiting, concurrency control, and circuit breaking—detailing the underlying models, configuration steps, monitoring workflow, and practical examples for secure, resilient service delivery.

circuit breakergatewayrate limiting
0 likes · 10 min read
How to Implement Robust Traffic Protection in Cloud‑Native Gateways with Sentinel
Efficient Ops
Efficient Ops
Aug 16, 2023 · Operations

How to Accurately Set Service Rate‑Limiting Thresholds in Large Cloud Systems

This article examines the challenges of setting effective rate‑limiting thresholds for massive cloud‑native services, compares TPS and concurrency metrics, proposes stress‑testing and historical‑data‑ARMA forecasting methods, and presents a practical system that delivers reliable limits for both node‑wide and per‑service protection.

ARMA forecastingPerformance TestingService Mesh
0 likes · 10 min read
How to Accurately Set Service Rate‑Limiting Thresholds in Large Cloud Systems
JD Retail Technology
JD Retail Technology
Aug 14, 2023 · Backend Development

In‑Depth Analysis of Guava RateLimiter: Token‑Bucket Algorithm, Code Structure, and Usage

This article explains why rate limiting is essential in high‑concurrency and transaction‑processing systems, introduces Google Guava's RateLimiter as a token‑bucket implementation, walks through its source code—including class hierarchy, core algorithms, and usage examples—and discusses practical considerations and extensibility.

GuavaJavaRateLimiter
0 likes · 19 min read
In‑Depth Analysis of Guava RateLimiter: Token‑Bucket Algorithm, Code Structure, and Usage
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Aug 4, 2023 · Backend Development

Designing a High-Concurrency Flash Sale System: Architecture, Rate Limiting, Caching, and Monitoring

This article outlines the end‑to‑end design of a high‑availability flash‑sale system, covering traffic spikes, overload protection, inventory consistency, multi‑level caching, token‑bucket rate limiting, distributed queue processing, service monitoring, and stress‑testing strategies to ensure reliable million‑level transaction handling.

cachingdistributed-systemshigh-concurrency
0 likes · 15 min read
Designing a High-Concurrency Flash Sale System: Architecture, Rate Limiting, Caching, and Monitoring
Su San Talks Tech
Su San Talks Tech
Aug 3, 2023 · Backend Development

Unlocking Sentinel: Deep Dive into Alibaba’s Flow Control Engine

This article revisits Alibaba’s open‑source Sentinel, explaining its core concepts, resource and rule definitions, demonstrating basic and Spring‑integrated demos, and dissecting the internal processor slots and flow‑control mechanisms that enable traffic shaping, circuit breaking, and system protection in microservice architectures.

Flow ControlJavaprocessor slot
0 likes · 20 min read
Unlocking Sentinel: Deep Dive into Alibaba’s Flow Control Engine
Architect
Architect
Aug 1, 2023 · Backend Development

How to Master Rate Limiting in Microservices: From Dubbo to Redis and Sentinel

This article walks through the importance of rate limiting in microservice architectures, compares Dubbo, Spring Cloud, and gateway approaches, explains token‑bucket, leaky‑bucket and sliding‑window algorithms, and provides step‑by‑step AOP implementations using Guava, Sentinel, and Redis with full code samples.

DubboJavaMicroservices
0 likes · 32 min read
How to Master Rate Limiting in Microservices: From Dubbo to Redis and Sentinel
Liangxu Linux
Liangxu Linux
Jul 30, 2023 · Information Security

Top 12 Common API Vulnerabilities Every Tester Should Know

Understanding the most frequent API weaknesses—from information disclosure and broken object-level authorization to injection, misconfiguration, and business logic flaws—helps security testers identify, exploit, and report issues such as over‑exposed data, missing rate limits, and improper authentication across modern web services.

API SecurityBOLAbusiness logic
0 likes · 17 min read
Top 12 Common API Vulnerabilities Every Tester Should Know
Su San Talks Tech
Su San Talks Tech
Jul 26, 2023 · Operations

How to Quickly Sync Massive Third-Party Data with SFTP, Jobs, and Rate-Limiting

Learn a step‑by‑step strategy to synchronize millions of records from dozens of third‑party systems across all provinces, using SFTP for bulk transfers, standardized file formats, scheduled jobs, Redis‑based rate limiting, MQ‑driven ingestion, and data‑consistency checks, while addressing security and performance challenges.

Job SchedulingMessage QueueSFTP
0 likes · 12 min read
How to Quickly Sync Massive Third-Party Data with SFTP, Jobs, and Rate-Limiting
Weimob Technology Center
Weimob Technology Center
Jul 18, 2023 · Backend Development

How MOAT Enables Lightweight, Multi‑Dimensional Rate Limiting for Scalable Systems

MOAT is a lightweight, multi‑dimensional rate‑limiting component designed to ensure system stability amid traffic spikes, offering configurable rules, automatic blacklisting, and a closed‑loop control flow, with detailed architecture spanning access, logic, data, and logging layers, plus client‑side SDK integration.

Distributed SystemsJavaMicroservices
0 likes · 11 min read
How MOAT Enables Lightweight, Multi‑Dimensional Rate Limiting for Scalable Systems
MaGe Linux Operations
MaGe Linux Operations
Jul 15, 2023 · Information Security

Top API Vulnerabilities Every Tester Should Know

This article surveys the most common API security flaws—including information disclosure, broken object‑level and function‑level authorization, over‑exposure of data, missing rate limits, mass‑assignment, misconfigurations, injection attacks, improper asset management, and business‑logic bugs—providing examples, code snippets, and practical testing tips for security professionals.

API SecurityAuthenticationBOLA
0 likes · 17 min read
Top API Vulnerabilities Every Tester Should Know
Architects Research Society
Architects Research Society
Jul 13, 2023 · Operations

Five Patterns to Make Your Microservice Fault‑Tolerant

This article explains essential fault‑tolerance patterns for microservices—including timeouts, retries, circuit breakers, distributed deadlines, and rate limiting—detailing their basic forms, drawbacks, and practical implementation strategies to improve reliability and prevent cascading failures.

Microservicescircuit breakerfault tolerance
0 likes · 12 min read
Five Patterns to Make Your Microservice Fault‑Tolerant
Su San Talks Tech
Su San Talks Tech
Jul 13, 2023 · Backend Development

Distributed Rate Limiting in Java: Fixed, Sliding, Leaky & Token Bucket

This article explains why rate limiting is essential for distributed systems, compares it with circuit breaking and smoothing, outlines a generic limiting workflow, and provides complete Java implementations of four algorithms—fixed window, sliding window, leaky bucket, and token bucket—using Redis and Redisson.

Javarate limitingredis
0 likes · 18 min read
Distributed Rate Limiting in Java: Fixed, Sliding, Leaky & Token Bucket
Top Architect
Top Architect
Jul 3, 2023 · Backend Development

Comprehensive Guide to Implementing Rate Limiting in Microservices Using Guava, Sentinel, Redis, and a Custom Spring Boot Starter

This article provides an in‑depth tutorial on designing and implementing various rate‑limiting strategies—such as token bucket, leaky bucket, and sliding window—in Java microservice architectures, with practical code examples using Guava, Sentinel, Redis+Lua, and a reusable Spring Boot starter.

GuavaLuaStarter
0 likes · 31 min read
Comprehensive Guide to Implementing Rate Limiting in Microservices Using Guava, Sentinel, Redis, and a Custom Spring Boot Starter
ITPUB
ITPUB
Jul 1, 2023 · Fundamentals

Mastering Distributed Systems: CAP, BASE, Locks, Transactions, Paxos & Raft Explained

This article provides a comprehensive overview of core distributed‑system concepts—including the CAP theorem, BASE model, common distributed‑lock implementations, multiple distributed‑transaction patterns such as 2PC, 3PC, TCC, local‑message tables, MQ transactions and Seata, as well as consistency algorithms like Paxos and Raft, idempotency techniques, and rate‑limiting algorithms—explaining their motivations, trade‑offs, and practical usage.

BASECAP theoremIdempotency
0 likes · 30 min read
Mastering Distributed Systems: CAP, BASE, Locks, Transactions, Paxos & Raft Explained
Architecture Digest
Architecture Digest
Jun 30, 2023 · Backend Development

Comprehensive Guide to Implementing Rate Limiting in Java Microservices Using Guava, Sentinel, Redis, and a Custom Spring Boot Starter

This article explains why rate limiting is critical for microservice architectures, reviews common limiting algorithms, and provides step‑by‑step implementations using Dubbo, Spring Cloud, Guava token‑bucket, Sentinel, Redis+Lua, and a reusable Spring Boot starter with custom annotations and AOP.

GuavaJavaSpring Boot
0 likes · 27 min read
Comprehensive Guide to Implementing Rate Limiting in Java Microservices Using Guava, Sentinel, Redis, and a Custom Spring Boot Starter
Selected Java Interview Questions
Selected Java Interview Questions
Jun 30, 2023 · Backend Development

Implementing Rate Limiting in Java with Guava, Custom Annotations, and Redis Lua Scripts

This article explains how to protect high‑concurrency Java applications using rate‑limiting techniques, covering basic algorithms such as counter, leaky‑bucket and token‑bucket, demonstrating a single‑node implementation with Guava’s RateLimiter and custom annotations, and showing a distributed solution based on Redis and Lua scripts.

GuavaJavaToken Bucket
0 likes · 15 min read
Implementing Rate Limiting in Java with Guava, Custom Annotations, and Redis Lua Scripts
php Courses
php Courses
Jun 30, 2023 · Backend Development

Implementing API Rate Limiting in PHP with Redis

This article explains how to implement API rate limiting in PHP by connecting to Redis, defining a RateLimiter class with limitRequests method, and demonstrates usage to restrict requests per time window, while detailing the underlying logic and code examples.

API Rate LimitingPHPrate limiting
0 likes · 5 min read
Implementing API Rate Limiting in PHP with Redis
The Dominant Programmer
The Dominant Programmer
May 31, 2023 · Backend Development

SpringBoot Essentials: AES Encryption, Netty TCP Client, Redis Integration, and More

This article compiles a series of practical SpringBoot implementations—including AES encryption with Vue, a Netty‑based TCP client that parses hex data into MySQL, multiple Redis integration patterns, strategy‑factory designs, custom annotations for rate limiting, global exception handling, and scheduled tasks—each linked to detailed examples.

AESNettySpringBoot
0 likes · 5 min read
SpringBoot Essentials: AES Encryption, Netty TCP Client, Redis Integration, and More
Top Architect
Top Architect
May 24, 2023 · Backend Development

Implementing Business Rate Limiting with Redis, Lua, and Kotlin Annotations

This article explains why a custom business rate‑limiting component is needed, outlines the required rules, chooses Redis + Lua for counting, and provides complete Kotlin/Spring code—including a Detect annotation, Lua scripts, and usage examples—to enforce daily, hourly, and combined limits with real‑time adjustments.

KotlinLuaannotations
0 likes · 10 min read
Implementing Business Rate Limiting with Redis, Lua, and Kotlin Annotations
Architect
Architect
Apr 30, 2023 · Information Security

Common API Vulnerabilities and How to Detect Them

This article explains the most frequent API security weaknesses—including information disclosure, broken object‑level and function‑level authorization, authentication bypass, over‑exposure of data, missing rate limits, mass‑assignment, misconfiguration, injection, asset mismanagement, and business‑logic flaws—providing detection techniques and illustrative code examples.

Authenticationinformation disclosureinjection
0 likes · 17 min read
Common API Vulnerabilities and How to Detect Them
Code Ape Tech Column
Code Ape Tech Column
Apr 26, 2023 · Backend Development

Comprehensive Guide to Alibaba Sentinel: Installation, Dashboard, Flow Control, Degrade Rules, Hotspot Parameters, Persistence, Cluster Flow Control, and Integration with Spring Cloud

This article provides an in‑depth tutorial on Alibaba Sentinel, covering its core concepts, installation of the dashboard, version selection, flow‑control configuration, degrade rules, hotspot parameter limiting, system adaptive protection, custom block handlers, blacklist/whitelist settings, rule persistence with Nacos, push‑mode synchronization, and cluster flow‑control setup for microservice applications.

JavaMicroservicesNacos
0 likes · 38 min read
Comprehensive Guide to Alibaba Sentinel: Installation, Dashboard, Flow Control, Degrade Rules, Hotspot Parameters, Persistence, Cluster Flow Control, and Integration with Spring Cloud
Architect's Guide
Architect's Guide
Apr 22, 2023 · Information Security

Common API Security Measures and Their Implementation

This article outlines essential API security mechanisms—including encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist handling, and data validation—and provides practical Java implementation examples for each technique.

API SecurityJavaencryption
0 likes · 10 min read
Common API Security Measures and Their Implementation
58 Tech
58 Tech
Apr 20, 2023 · Big Data

Design and Implementation of a Data Application Platform for Business Opportunity Selection, Tagging, and Scheduling

The article describes a data application platform that enables business users to configure custom data selection rules for opportunities, create scheduled tasks, perform large‑scale data comparison, handle task dispatch with Redis queues, and implement rate‑limiting using sliding windows to ensure reliable processing.

Sparkrate limitingredis
0 likes · 9 min read
Design and Implementation of a Data Application Platform for Business Opportunity Selection, Tagging, and Scheduling
Architecture Digest
Architecture Digest
Apr 20, 2023 · Backend Development

Designing a High‑Concurrency Flash Sale System Architecture

This article outlines a comprehensive backend architecture for flash‑sale (秒杀) systems, covering traffic‑spike handling, rate‑limiting, Nginx static‑resource separation, Redis locking and caching, message‑queue throttling, database sharding, asynchronous order processing, and captcha‑based anti‑bot measures.

Captchaflash salehigh concurrency
0 likes · 11 min read
Designing a High‑Concurrency Flash Sale System Architecture
Selected Java Interview Questions
Selected Java Interview Questions
Apr 7, 2023 · Backend Development

Designing a High‑Concurrency Flash Sale (秒杀) System Architecture

This article explains the architecture of a flash‑sale system from seven dimensions, covering characteristics, overall design, peak‑limiting, security, page optimization, asynchronous processing, hotspot isolation, Nginx configuration, Redis clustering, message‑queue throttling, database design, and captcha mechanisms to handle massive concurrent requests.

Message QueueSystem Architectureflash sale
0 likes · 11 min read
Designing a High‑Concurrency Flash Sale (秒杀) System Architecture
MaGe Linux Operations
MaGe Linux Operations
Mar 31, 2023 · Backend Development

Mastering Rate Limiting: Leaky Bucket, Token Bucket, and Sliding Window in Go

This article explains three core rate‑limiting algorithms—Leaky Bucket, Token Bucket, and Sliding Window—detailing their principles, suitable scenarios, and provides complete Go implementations to help developers choose and integrate the right strategy for handling traffic spikes and protecting backend resources.

BackendSliding WindowToken Bucket
0 likes · 15 min read
Mastering Rate Limiting: Leaky Bucket, Token Bucket, and Sliding Window in Go
MaGe Linux Operations
MaGe Linux Operations
Mar 27, 2023 · Backend Development

Mastering Rate Limiting: Concepts, Algorithms, and Real-World Implementations

This article explains the fundamental concepts of rate limiting, including time and resource dimensions, various rule types such as QPS, connection count, bandwidth, black/white lists, and distributed considerations, then details common algorithms like token bucket, leaky bucket, sliding window, and practical implementations using Nginx, Guava, Redis, and Sentinel.

BackendDistributed SystemsToken Bucket
0 likes · 16 min read
Mastering Rate Limiting: Concepts, Algorithms, and Real-World Implementations
Architecture Digest
Architecture Digest
Mar 27, 2023 · Backend Development

Rate Limiting: Concepts, Algorithms, and Implementation Strategies

This article explains the fundamental concepts of rate limiting, compares popular algorithms such as token bucket, leaky bucket, and sliding window, and reviews practical implementation methods including Nginx, middleware, Redis, Guava, and Tomcat configurations for both single‑machine and distributed environments.

Sliding WindowToken Bucketleaky bucket
0 likes · 17 min read
Rate Limiting: Concepts, Algorithms, and Implementation Strategies
Top Architect
Top Architect
Mar 26, 2023 · Backend Development

Comprehensive Guide to Rate Limiting: Concepts, Algorithms, and Implementation Strategies

This article provides a thorough overview of rate limiting, covering its basic concepts, common algorithms such as token bucket, leaky bucket and sliding window, and practical implementation methods across Nginx, Tomcat, Guava, Redis, Sentinel and other middleware for both single‑machine and distributed systems.

Token Bucketmiddlewarerate limiting
0 likes · 17 min read
Comprehensive Guide to Rate Limiting: Concepts, Algorithms, and Implementation Strategies
ByteDance SYS Tech
ByteDance SYS Tech
Mar 23, 2023 · Backend Development

From Token Buckets to Carousel: Solving Rate Limiter Challenges in High‑Performance Networks

This article reviews the fundamentals of token‑bucket rate limiters, identifies precision, cascading compensation, and TCP‑loss sensitivity issues, and details two major improvements—port‑loan backpressure and the Carousel algorithm—while outlining future directions for more reliable network traffic shaping.

DPDKToken Bucketbackpressure
0 likes · 14 min read
From Token Buckets to Carousel: Solving Rate Limiter Challenges in High‑Performance Networks
Programmer DD
Programmer DD
Mar 16, 2023 · Backend Development

Mastering Rate Limiting with Redis: 3 Practical Implementations

This article explains three Redis‑based rate‑limiting techniques—using SETNX, sorted sets, and a token‑bucket with lists—providing code examples, discussing their advantages and drawbacks, and showing how to integrate them into Java Spring applications to protect high‑concurrency services.

BackendJavaSliding Window
0 likes · 7 min read
Mastering Rate Limiting with Redis: 3 Practical Implementations
ITPUB
ITPUB
Mar 14, 2023 · Fundamentals

Master Distributed Systems: CAP, BASE, Locks, Transactions, Paxos & Raft

This comprehensive guide explores core distributed system concepts—including the CAP theorem and its trade‑offs, BASE consistency, various distributed lock strategies, multiple transaction patterns such as 2PC, 3PC, TCC and Seata, as well as consensus algorithms Paxos and Raft, while also covering idempotency and rate‑limiting techniques.

CAP theoremDistributed SystemsDistributed Transactions
0 likes · 29 min read
Master Distributed Systems: CAP, BASE, Locks, Transactions, Paxos & Raft
IT Architects Alliance
IT Architects Alliance
Mar 14, 2023 · Operations

Key Practices for Achieving High Availability in Internet Services

The article outlines essential high‑availability techniques for internet‑scale systems, covering availability metrics, microservice modularization, database redundancy, load balancing, rate limiting, circuit breaking, isolation, retry strategies, rollback plans, stress testing, monitoring, and on‑call procedures.

OperationsSystem Designhigh availability
0 likes · 10 min read
Key Practices for Achieving High Availability in Internet Services
Top Architect
Top Architect
Mar 3, 2023 · Backend Development

Comprehensive Guide to Rate Limiting: Concepts, Algorithms, and Implementations

This article explains the principles and practical implementations of rate limiting in backend systems, covering real‑world scenarios, strategies such as circuit breaking, service degradation, delayed and privileged handling, common algorithms like counter, leaky‑bucket and token‑bucket, and code examples using Guava and Nginx + Lua.

Token Bucketcircuit breakerrate limiting
0 likes · 14 min read
Comprehensive Guide to Rate Limiting: Concepts, Algorithms, and Implementations
MaGe Linux Operations
MaGe Linux Operations
Feb 25, 2023 · Backend Development

Mastering Rate Limiting: Strategies, Algorithms, and Real‑World Implementations

This article explains how rate limiting protects system availability by controlling traffic flow, introduces common patterns such as circuit breaking, service degradation, delay and privilege handling, compares cache, degradation, and rate limiting, and details popular algorithms and practical code implementations for both single‑node and distributed environments.

Distributed SystemsGuavaToken Bucket
0 likes · 13 min read
Mastering Rate Limiting: Strategies, Algorithms, and Real‑World Implementations
dbaplus Community
dbaplus Community
Feb 25, 2023 · Backend Development

15 Proven Strategies to Design High‑Concurrency Systems

This article outlines fifteen practical techniques—including horizontal scaling, microservice decomposition, database sharding, connection pooling, caching, CDN, message queues, Elasticsearch, circuit breaking, rate limiting, and load testing—to help engineers build robust, high‑concurrency systems that can handle massive traffic spikes.

MicroservicesScalabilitySystem Design
0 likes · 13 min read
15 Proven Strategies to Design High‑Concurrency Systems
MaGe Linux Operations
MaGe Linux Operations
Feb 19, 2023 · Backend Development

Mastering API Protection: Rate Limiting, Caching, and Degradation for E‑Commerce Spikes

When a product suddenly surges in demand, this guide explains how to safeguard e‑commerce APIs using rate‑limiting algorithms (leaky bucket, token bucket, sliding window), Nginx and Java semaphore controls, distributed throttling with message queues, service degradation strategies, and caching techniques to maintain stability.

Distributed Systemse‑commercerate limiting
0 likes · 11 min read
Mastering API Protection: Rate Limiting, Caching, and Degradation for E‑Commerce Spikes
Selected Java Interview Questions
Selected Java Interview Questions
Feb 6, 2023 · Backend Development

Backend Token Authentication, Rate Limiting, and Anonymous Access Design

This article explains a comprehensive backend user login flow, covering token generation, expiration policies, request validation, logout handling, anonymous access strategies, rate‑limiting with authorized tokens, path‑regex filtering, blacklist management, and includes a Spring‑Redis implementation example.

AuthenticationBackendToken
0 likes · 9 min read
Backend Token Authentication, Rate Limiting, and Anonymous Access Design
Top Architect
Top Architect
Jan 1, 2023 · Backend Development

Understanding Software Architecture: Core Concepts, Common Technologies, Security Issues, and Design Pitfalls

This article provides a comprehensive overview of software architecture, explaining its definition, discussing distributed systems, clustering, caching, messaging, multithreading, rate limiting, security vulnerabilities, and common design mistakes, while emphasizing the need for practical experience and continuous learning.

rate limiting
0 likes · 15 min read
Understanding Software Architecture: Core Concepts, Common Technologies, Security Issues, and Design Pitfalls
Architecture Digest
Architecture Digest
Dec 27, 2022 · Backend Development

Rate Limiting, Service Degradation, and Caching Strategies for High‑Concurrency E‑commerce Interfaces

The article explains how to protect high‑traffic e‑commerce APIs by using caching, rate‑limiting (leaky‑bucket, token‑bucket, sliding‑window), local semaphore controls, distributed message‑queue buffering, service degradation tactics, and recovery plans to ensure stability during sudden traffic spikes.

rate limitingservice degradation
0 likes · 9 min read
Rate Limiting, Service Degradation, and Caching Strategies for High‑Concurrency E‑commerce Interfaces
IT Architects Alliance
IT Architects Alliance
Dec 19, 2022 · Backend Development

Distributed Service Rate Limiting, Degradation, and Caching Strategies

This article explains how e‑commerce systems handle sudden traffic spikes by applying caching, various rate‑limiting algorithms (leaky bucket, token bucket, sliding window), Nginx ingress controls, Java Semaphore concurrency limits, distributed queue buffering, service degradation tactics, and cache‑consistency techniques for high‑availability backend services.

Backendcachingrate limiting
0 likes · 7 min read
Distributed Service Rate Limiting, Degradation, and Caching Strategies
IT Architects Alliance
IT Architects Alliance
Dec 16, 2022 · Backend Development

Distributed Service Rate Limiting, Degradation, and Caching Strategies

The article explains how to handle sudden traffic spikes in e‑commerce systems by applying rate‑limiting algorithms, Nginx and Java semaphore controls, distributed queue buffering, service degradation tactics, and multi‑layer caching techniques to maintain high availability and data consistency.

BackendJavacaching
0 likes · 9 min read
Distributed Service Rate Limiting, Degradation, and Caching Strategies
Architect
Architect
Dec 14, 2022 · Backend Development

Service Rate Limiting, Degradation, and Caching Strategies for High-Concurrency E‑Commerce Systems

This article discusses how to handle sudden traffic spikes in e‑commerce APIs by employing caching, rate‑limiting (leaky bucket, token bucket, sliding window), Nginx and Java Semaphore limits, distributed queue buffering, service degradation, and cache‑consistency techniques to ensure system stability.

Distributed Systemsrate limitingservice degradation
0 likes · 8 min read
Service Rate Limiting, Degradation, and Caching Strategies for High-Concurrency E‑Commerce Systems
Java High-Performance Architecture
Java High-Performance Architecture
Dec 12, 2022 · Backend Development

Java Rate Limiting: Fixed, Sliding, Leaky & Token Bucket Algorithms Explained

This article introduces the concept of rate limiting, explains three core algorithms—fixed window, sliding window, and leaky bucket—along with the token bucket approach, provides Java code examples for each, discusses their principles, advantages, and pitfalls, and outlines practical implementation considerations.

BackendDistributed SystemsJava
0 likes · 15 min read
Java Rate Limiting: Fixed, Sliding, Leaky & Token Bucket Algorithms Explained
Su San Talks Tech
Su San Talks Tech
Dec 12, 2022 · Backend Development

Designing Secure and Robust APIs: Signatures, Encryption, Rate Limiting, and More

This article outlines essential practices for building secure, reliable API interfaces—including request signing, data encryption, IP whitelisting, rate limiting, parameter validation, unified responses, exception handling, logging, idempotency, payload limits, performance testing, asynchronous processing, data masking, and comprehensive documentation—to help developers meet safety, stability, and maintainability requirements.

IdempotencySecurityapi-design
0 likes · 15 min read
Designing Secure and Robust APIs: Signatures, Encryption, Rate Limiting, and More
Top Architect
Top Architect
Dec 11, 2022 · Backend Development

Comprehensive Guide to Rate Limiting: Concepts, Common Algorithms, and Practical Implementation Strategies

This article explains the fundamental concepts of rate limiting, reviews popular algorithms such as token bucket, leaky bucket, and sliding window, and details practical implementation methods across single‑machine and distributed environments using tools like Guava, Nginx, Redis, and Sentinel.

BackendToken Bucketrate limiting
0 likes · 18 min read
Comprehensive Guide to Rate Limiting: Concepts, Common Algorithms, and Practical Implementation Strategies
Architect
Architect
Dec 10, 2022 · Backend Development

Rate Limiting: Concepts, Common Algorithms, and Practical Implementation Strategies

This article explains the fundamentals of rate limiting, describes widely used algorithms such as token bucket, leaky bucket, and sliding window, and details practical implementation methods ranging from single‑machine tools like Guava and Tomcat to distributed solutions using Nginx, Redis, and Sentinel.

Distributed SystemsSliding WindowToken Bucket
0 likes · 17 min read
Rate Limiting: Concepts, Common Algorithms, and Practical Implementation Strategies
Java Architect Essentials
Java Architect Essentials
Nov 27, 2022 · Backend Development

Service Rate Limiting, Degradation, and Caching Strategies for High‑Concurrency E‑commerce Interfaces

The article explains how to protect a suddenly hot product API in an e‑commerce system by applying caching, various rate‑limiting algorithms, service degradation techniques, and distributed caching patterns, providing concrete Java code and architectural recommendations for backend developers.

BackendDistributed SystemsJava
0 likes · 9 min read
Service Rate Limiting, Degradation, and Caching Strategies for High‑Concurrency E‑commerce Interfaces
Tencent Cloud Middleware
Tencent Cloud Middleware
Nov 21, 2022 · Cloud Native

Mastering High‑Concurrency Rate Limiting: Architectures, Algorithms, and Cloud‑Native Practices

This guide explains how to design, implement, and configure rate‑limiting solutions for high‑traffic flash‑sale scenarios, covering architecture goals, algorithm choices, single‑node vs distributed approaches, cloud‑native gateway settings, scaling with Kubernetes, and practical Go code examples.

Golanghigh concurrencyrate limiting
0 likes · 19 min read
Mastering High‑Concurrency Rate Limiting: Architectures, Algorithms, and Cloud‑Native Practices
Selected Java Interview Questions
Selected Java Interview Questions
Nov 15, 2022 · Backend Development

Comprehensive Guide to Rate Limiting: Concepts, Algorithms, and Implementation Strategies

This article explains the fundamental concepts of rate limiting, compares common algorithms such as token bucket, leaky bucket and sliding window, and details practical implementations using Nginx, Tomcat, Redis, Guava, and Sentinel for both single‑node and distributed backend systems.

Distributed Systemsalgorithmrate limiting
0 likes · 17 min read
Comprehensive Guide to Rate Limiting: Concepts, Algorithms, and Implementation Strategies
Open Source Linux
Open Source Linux
Nov 11, 2022 · Backend Development

Mastering Nginx: From Basics to High‑Performance Load Balancing

This comprehensive guide explains what Nginx is, its advantages, deployment scenarios, request processing, high‑concurrency mechanisms, proxy types, directory layout, configuration directives, cookie vs session, threading model, load‑balancing algorithms, rate limiting, health checks, compression, and practical examples for building robust, scalable web services.

ConfigurationWeb serverhigh concurrency
0 likes · 33 min read
Mastering Nginx: From Basics to High‑Performance Load Balancing
Code Ape Tech Column
Code Ape Tech Column
Nov 8, 2022 · Operations

Designing Resilient Microservices: Fault Tolerance, Health Checks, and Reliability Patterns

This article explains how to build highly available microservice systems by addressing the risks of distributed architectures, employing graceful degradation, change management, health checks, self‑healing, failover caching, retry and rate‑limiting strategies, bulkhead and circuit‑breaker patterns, and continuous failure testing.

Deployment Strategiesfault tolerancehealth checks
0 likes · 18 min read
Designing Resilient Microservices: Fault Tolerance, Health Checks, and Reliability Patterns
Laravel Tech Community
Laravel Tech Community
Nov 6, 2022 · Information Security

Implementing Rate Limiting with iptables hashlimit Module

This article explains how to use the iptables hashlimit module to create a stateful rate‑limiting chain, details the required commands, clarifies the meaning of the --hashlimit‑upto and --hashlimit‑burst parameters, and provides an example illustrating credit‑based packet acceptance.

firewallhashlimitiptables
0 likes · 4 min read
Implementing Rate Limiting with iptables hashlimit Module
ITPUB
ITPUB
Oct 26, 2022 · Backend Development

How to Choose the Right Components When Building a Go Microservice Framework

This article walks through practical trade‑offs in designing a Go microservice framework, covering protocol choices, data transport, network handling, serialization methods, service registry options, routing algorithms, and rate‑limiting strategies, while highlighting real‑world implementation details and pitfalls.

GoMicroservicesprotocol design
0 likes · 12 min read
How to Choose the Right Components When Building a Go Microservice Framework
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 20, 2022 · Backend Development

Implementing Rate Limiting in Spring Cloud Gateway Using Redis

This article explains how to configure distributed rate limiting in Spring Cloud Gateway by adding the reactive Redis dependency, setting up Redis connection properties, defining a RequestRateLimiter filter with token‑bucket parameters, implementing a custom KeyResolver, and demonstrating the behavior with HTTP 429 and 403 responses.

JavaMicroservicesSpring Cloud Gateway
0 likes · 12 min read
Implementing Rate Limiting in Spring Cloud Gateway Using Redis
Architecture Digest
Architecture Digest
Oct 10, 2022 · Operations

Designing Fault‑Tolerant Microservices: Patterns and Practices

This article explains how to build highly available microservice systems by applying fault‑tolerance patterns such as graceful degradation, health checks, self‑healing, failover caches, retries, rate limiting, bulkhead isolation, circuit breakers, and systematic failure testing, while also covering change‑management and deployment strategies.

Microservicescircuit breakerfault tolerance
0 likes · 14 min read
Designing Fault‑Tolerant Microservices: Patterns and Practices
ITPUB
ITPUB
Oct 4, 2022 · Operations

What Makes a System Truly High‑Availability? Lessons from B‑Station’s Outage

The article examines B‑Station’s July 2021 outage, explains the concept and quantitative metrics of high availability, and outlines practical techniques such as rate limiting, isolation, failover, timeout control, circuit breaking, degradation, and multi‑region deployment to achieve resilient systems.

MTBFMTTRcircuit breaker
0 likes · 15 min read
What Makes a System Truly High‑Availability? Lessons from B‑Station’s Outage
IT Architects Alliance
IT Architects Alliance
Sep 29, 2022 · Backend Development

Comprehensive Guide to Nginx: Core Concepts, Configuration, and Advanced Features

This article provides a detailed overview of Nginx, covering its lightweight architecture, high‑concurrency event‑driven model, common use cases such as static file serving, reverse proxy and load balancing, step‑by‑step configuration examples, and advanced topics like rate limiting, health checks, gzip compression, and high‑availability deployment.

ConfigurationNginxWeb server
0 likes · 25 min read
Comprehensive Guide to Nginx: Core Concepts, Configuration, and Advanced Features
Architecture & Thinking
Architecture & Thinking
Sep 28, 2022 · Backend Development

Rate Limiting & Circuit Breaking: Algorithms and Practical Strategies

This article explores the avalanche effect in distributed systems, outlines common failure scenarios, and presents effective mitigation tactics such as hardware redundancy, dynamic scaling, and isolation, then delves into popular rate‑limiting algorithms—including count, fixed and sliding windows, leaky bucket, and token bucket—followed by an overview of leading circuit‑breaker solutions like Sentinel and Hystrix.

Hystrixrate limitingsentinel
0 likes · 13 min read
Rate Limiting & Circuit Breaking: Algorithms and Practical Strategies
dbaplus Community
dbaplus Community
Sep 27, 2022 · Operations

How to Build a Scalable Rate‑Limiting System with Kong in Cloud‑Native Operations

This article outlines a comprehensive, cloud‑native rate‑limiting solution using Kong gateway, covering background challenges, design considerations, multi‑layer architecture, plugin development, CI/CD workflow, deployment strategies, and operational best practices to achieve low cost, high efficiency, and high quality across diverse projects.

KongMicroservicesOperations
0 likes · 24 min read
How to Build a Scalable Rate‑Limiting System with Kong in Cloud‑Native Operations
21CTO
21CTO
Sep 27, 2022 · Backend Development

Mastering API Design: From Basics to Rate Limiting, Versioning, and Security

This article shares practical insights on API design, covering fundamentals, rate limiting, version management, security considerations, and inter‑team integration, illustrated with code snippets and diagrams to help developers build clear, standardized, and robust backend interfaces.

SecurityVersioningapi-design
0 likes · 17 min read
Mastering API Design: From Basics to Rate Limiting, Versioning, and Security
Tencent Cloud Developer
Tencent Cloud Developer
Sep 6, 2022 · Backend Development

Understanding Rate Limiting in Distributed Systems: Algorithms and Best Practices

Rate limiting safeguards distributed systems by controlling request rates through algorithms such as leaky bucket, token bucket, fixed and sliding windows, and back pressure, while client‑side tactics like exponential backoff, jitter, and careful retries, and requires atomic distributed storage solutions (e.g., Redis+Lua) to avoid race conditions.

Back-pressureDistributed SystemsSystem Design
0 likes · 16 min read
Understanding Rate Limiting in Distributed Systems: Algorithms and Best Practices
JavaEdge
JavaEdge
Sep 5, 2022 · Operations

Engineering Double‑11‑Scale E‑Commerce Events: A Complete Technical Playbook

From kickoff meetings and traffic forecasting to load‑testing strategies, rate‑limiting designs, emergency runbooks, and post‑event retrospectives, this guide walks engineers through the complete technical workflow required to ensure a Double‑11‑scale e‑commerce promotion runs smoothly and safely.

Load TestingTraffic Engineeringincident response
0 likes · 12 min read
Engineering Double‑11‑Scale E‑Commerce Events: A Complete Technical Playbook