Tagged articles
62 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
May 3, 2026 · Backend Development

How to Implement Nginx Rate Limiting: Prevent Abuse, Scraping, and API Overload

This article explains how to use Nginx's built‑in limit_req and limit_conn modules—based on the leaky‑bucket algorithm—to protect APIs from malicious flooding, excessive crawling, sudden traffic spikes, and individual user abuse, covering configuration directives, practical examples, advanced scenarios, testing, and deployment best practices.

API SecurityNginxleaky bucket
0 likes · 20 min read
How to Implement Nginx Rate Limiting: Prevent Abuse, Scraping, and API Overload
Huolala Tech
Huolala Tech
Jan 30, 2026 · Backend Development

How HuoLala Built a Scalable Todo Center to Handle Billions of Requests

To support HuoLala’s massive driver workflow, the team designed a platform‑wide Todo Center that standardizes tasks, optimizes performance, decouples services, and ensures strong and eventual consistency, while employing traffic‑shaping, asynchronous processing, and robust monitoring to sustain billions of daily queries with low latency.

Event-drivenMicroservicesScalability
0 likes · 14 min read
How HuoLala Built a Scalable Todo Center to Handle Billions of Requests
Architect's Journey
Architect's Journey
Sep 15, 2025 · Backend Development

Token Bucket vs Leaky Bucket: Deep Dive into Core Traffic‑Control Algorithms

This article compares the token‑bucket and leaky‑bucket rate‑limiting algorithms, explaining their core principles, Java implementation details, key advantages and drawbacks, suitable application scenarios, interview‑style Q&A, and advanced hybrid strategies for building robust high‑concurrency systems.

Distributed SystemsJavaToken Bucket
0 likes · 9 min read
Token Bucket vs Leaky Bucket: Deep Dive into Core Traffic‑Control Algorithms
macrozheng
macrozheng
Sep 10, 2025 · Backend Development

How to Build a Scalable Non‑Intrusive Traffic‑Control System with OpenResty, Lua, and Redis

This article explains how to evaluate system performance bottlenecks, choose between hard and soft rate‑limiting, and implement a non‑intrusive, high‑concurrency traffic‑control solution using OpenResty, Lua scripts, and Redis, covering architecture design, queue management, rate limiting, resource release, and performance testing.

Backend ArchitectureLuaOpenResty
0 likes · 18 min read
How to Build a Scalable Non‑Intrusive Traffic‑Control System with OpenResty, Lua, and Redis
Su San Talks Tech
Su San Talks Tech
Aug 25, 2025 · Backend Development

How to Build a High‑Concurrency Queue System with OpenResty, Lua, and Redis

This article analyzes current system performance bottlenecks, compares hard‑rate‑limiting and flexible queuing strategies, and presents a non‑intrusive traffic‑control solution built with OpenResty+Lua and Redis that offers zero‑code changes, high performance, scalability, and real‑time visual feedback for high‑concurrency scenarios.

LuaOpenRestyhigh concurrency
0 likes · 18 min read
How to Build a High‑Concurrency Queue System with OpenResty, Lua, and Redis
Sohu Smart Platform Tech Team
Sohu Smart Platform Tech Team
Aug 9, 2025 · Backend Development

Boost Your API Security and Traffic Management with OpenResty: Real‑World Practices

This article explains how OpenResty, built on Nginx and Lua, can be used in production to implement interface authentication, traffic control, and request logging, detailing practical implementation steps, configuration examples, and code snippets that help improve service reliability and operational efficiency.

API authenticationBackendLua
0 likes · 16 min read
Boost Your API Security and Traffic Management with OpenResty: Real‑World Practices
Lin is Dream
Lin is Dream
May 14, 2025 · Operations

Master Nginx Rate Limiting: Prevent Abuse with limit_req & limit_conn

Learn how to protect your services from abusive traffic and brute‑force attacks by using Nginx's rate‑limiting features—limit_req to control request rates and limit_conn to restrict concurrent connections—complete with configuration examples, explanations of zones, burst handling, custom error pages, and log monitoring.

OperationsServer Configurationlimit_conn
0 likes · 6 min read
Master Nginx Rate Limiting: Prevent Abuse with limit_req & limit_conn
Mingyi World Elasticsearch
Mingyi World Elasticsearch
Mar 18, 2025 · Databases

Six Real-World Enterprise Use Cases of INFINI Gateway for Elasticsearch

The article examines six practical enterprise scenarios where INFINI Gateway enhances Elasticsearch clusters—covering zero‑cost security, intelligent query protection, automated slow‑query circuit breaking, high‑performance proxy architecture, fine‑grained read/write throttling, and end‑to‑end request logging—detailing problems, traditional limitations, and the gateway’s concrete solutions.

ElasticsearchInfinI GatewayLog Auditing
0 likes · 6 min read
Six Real-World Enterprise Use Cases of INFINI Gateway for Elasticsearch
Mingyi World Elasticsearch
Mingyi World Elasticsearch
Mar 11, 2025 · Operations

How to Throttle Read and Write Traffic in an Elasticsearch Cluster

The article explains why native Elasticsearch throttling is insufficient, introduces node‑level traffic control provided by Infinilabs Gateway, shows detailed configuration examples, parameter meanings, FAQ solutions, advanced tuning tips, and performance comparisons to protect clusters from overload.

Infinilabs GatewayPerformance Testingcluster stability
0 likes · 7 min read
How to Throttle Read and Write Traffic in an Elasticsearch Cluster
Architect
Architect
Nov 3, 2024 · Backend Development

How Ctrip Scaled Its Ticket Booking System for Flash‑Sale Events

This article analyzes the challenges Ctrip faced when handling massive traffic during ticket flash‑sale events and details the architectural upgrades, caching strategies, database optimizations, supplier integration safeguards, and traffic‑control mechanisms that enabled stable, fast, and consistent booking experiences.

BackendDistributed SystemsSystem Architecture
0 likes · 18 min read
How Ctrip Scaled Its Ticket Booking System for Flash‑Sale Events
Sohu Tech Products
Sohu Tech Products
Oct 30, 2024 · Backend Development

How to Build Dynamic Parameter‑Level Rate Limiting with Sentinel

This article explains the need for dynamic, fine‑grained rate limiting in high‑traffic services, describes Sentinel's core mechanisms, and details a three‑step implementation—data collection, rule management, and traffic verification—using sliding‑window counters and priority‑based throttling.

BackendDynamic ThrottlingMicroservices
0 likes · 17 min read
How to Build Dynamic Parameter‑Level Rate Limiting with Sentinel
vivo Internet Technology
vivo Internet Technology
Oct 16, 2024 · Backend Development

Dynamic Rate Limiting Solution Based on Sentinel Secondary Development

This article presents a Sentinel‑based dynamic rate‑limiting solution that uses parameter priority and a sliding‑window counter to automatically adjust thresholds per scenario, addressing the limitations of static QPS limits, simplifying rule management via Zookeeper, and integrating as an independent SDK within Sentinel’s responsibility‑chain architecture.

Dynamic Rate LimitingMicroservicesRate Limiting Algorithm
0 likes · 14 min read
Dynamic Rate Limiting Solution Based on Sentinel Secondary Development
DaTaobao Tech
DaTaobao Tech
Sep 30, 2024 · Backend Development

KLimiter: Adaptive Rate Limiter for Downstream Resource Protection

KLimiter is an adaptive rate‑limiter that continuously monitors downstream resource water‑levels, computes impact coefficients from historical traffic, and dynamically throttles multiple upstream entries according to their priorities, using gradual reductions, slow‑start and fallback strategies to maintain stability and efficiency beyond static threshold methods.

Backendadaptive algorithmrate limiting
0 likes · 11 min read
KLimiter: Adaptive Rate Limiter for Downstream Resource Protection
Tencent Cloud Developer
Tencent Cloud Developer
Sep 3, 2024 · Backend Development

Rate Limiting: Purpose, Algorithms, Implementation Methods, Strategies, and Considerations

Rate limiting safeguards system stability by capping request rates, employing algorithms such as fixed‑window, sliding‑window, leaky‑bucket, and token‑bucket, and can be applied at application, proxy, or hardware layers while using strategies like threshold setting, request classification, feedback, and ensuring fairness, flexibility, and transparency.

BackendDistributed SystemsGolang
0 likes · 28 min read
Rate Limiting: Purpose, Algorithms, Implementation Methods, Strategies, and Considerations
Wukong Talks Architecture
Wukong Talks Architecture
Jul 8, 2024 · Backend Development

Design and Evolution of Ctrip Ticket Booking System for Flash‑Sale Events

This article analyzes the challenges faced by Ctrip's ticket‑booking transaction system during high‑traffic flash‑sale events and presents a series of architectural optimizations—including Redis caching, database load mitigation, supplier‑system safeguards, and fine‑grained traffic‑control strategies—to achieve stable, consistent, and fast performance under extreme concurrency.

BackendDatabase OptimizationSystem Architecture
0 likes · 15 min read
Design and Evolution of Ctrip Ticket Booking System for Flash‑Sale Events
Ctrip Technology
Ctrip Technology
Jul 5, 2024 · Backend Development

Design and Optimization of Ctrip Ticket Booking Transaction System for Flash‑Sale Events

This article examines the challenges faced by Ctrip’s ticket reservation transaction system during flash‑sale events and details the architectural optimizations—including Redis caching, database load reduction, supplier integration, and multi‑layer traffic throttling—that ensure system stability, strong consistency, and high availability under extreme concurrency.

Data ConsistencySystem Architecturehigh availability
0 likes · 16 min read
Design and Optimization of Ctrip Ticket Booking Transaction System for Flash‑Sale Events
360 Smart Cloud
360 Smart Cloud
Jul 3, 2024 · Operations

Practical Practices for Enhancing Kafka Cluster Stability at 360

This article details 360's comprehensive approach to improving Apache Kafka cluster stability through proactive operations, capacity assessment, parameter tuning, monitoring, version upgrades, and traffic control, offering concrete guidelines and best‑practice recommendations for large‑scale message‑queue deployments.

ClusterKafkaTuning
0 likes · 33 min read
Practical Practices for Enhancing Kafka Cluster Stability at 360
Lobster Programming
Lobster Programming
May 27, 2024 · Backend Development

Mastering Rate Limiting: 5 Algorithms to Prevent Service Avalanches

This article explains why rate limiting is essential in high‑traffic microservice architectures, illustrates the avalanche effect, and introduces five practical algorithms—including counter, sliding window, leaky bucket, token bucket, and Redis‑based implementations—complete with code examples and usage scenarios.

Backendrate limitingtraffic control
0 likes · 7 min read
Mastering Rate Limiting: 5 Algorithms to Prevent Service Avalanches
Sohu Tech Products
Sohu Tech Products
Mar 13, 2024 · Backend Development

OpenResty‑Based Interface Authentication, Traffic Control, and Request Tracing in Production

The article shows how OpenResty’s Lua‑based extensions can implement lightweight, version‑controlled API authentication, dynamic traffic‑shaping via shared‑memory peer status, and selective request tracing with batch‑sent logs to Elasticsearch, enabling secure, highly available services and rich observability without sacrificing Nginx performance in production.

API authenticationLuaNginx
0 likes · 18 min read
OpenResty‑Based Interface Authentication, Traffic Control, and Request Tracing in Production
Qunhe Technology Quality Tech
Qunhe Technology Quality Tech
Nov 7, 2023 · Backend Development

How Kujiale Guarantees Stable Open APIs with Automated Governance and Traffic Control

This article explains how Kujiale’s open API platform implements pre‑release process controls, full automation testing, field‑mapping, online traffic inspection, active health checks, and customizable throttling rules to ensure high stability, early fault detection, and safe handling of traffic spikes for customer integrations.

API governanceAutomationfield mapping
0 likes · 8 min read
How Kujiale Guarantees Stable Open APIs with Automated Governance and Traffic Control
Su San Talks Tech
Su San Talks Tech
Oct 22, 2023 · Backend Development

Mastering Rate Limiting: Algorithms, Scenarios, and Practical Implementations

Rate limiting controls request flow to protect system stability, covering its definition, motivations, common algorithms such as token bucket, leaky bucket, fixed and sliding windows, their pros and cons, single‑machine vs distributed implementations, and practical component choices for backend services.

BackendDistributed Systemsalgorithm
0 likes · 17 min read
Mastering Rate Limiting: Algorithms, Scenarios, and Practical Implementations
AI Cyberspace
AI Cyberspace
Jun 13, 2023 · Operations

Master Linux Traffic Control: Practical TC Commands and QoS Strategies

This article explains Linux traffic control fundamentals, covering the three-layer processing model, queue types, token‑bucket mechanisms, kernel TC architecture, Qdisc/Class/Filter hierarchy, and provides step‑by‑step tc CLI examples for implementing QoS, DiffServ, and enterprise networking policies.

QoSToken Bucketlinux
0 likes · 28 min read
Master Linux Traffic Control: Practical TC Commands and QoS Strategies
vivo Internet Technology
vivo Internet Technology
Apr 26, 2023 · Operations

Disaster Recovery Design and Practices for Vivo Push System

Vivo’s push platform achieves high‑availability disaster recovery by deploying multi‑region broker clusters, implementing dual‑active logic nodes across two data centers, adding a Kafka‑backed buffering layer for traffic spikes, and using a hybrid Redis‑plus‑disk KV storage scheme to ensure durable, real‑time message delivery.

KafkaPush Systemdisaster recovery
0 likes · 11 min read
Disaster Recovery Design and Practices for Vivo Push System
DeWu Technology
DeWu Technology
Feb 21, 2023 · Backend Development

Design and Implementation of a Traffic Control Platform for E-commerce Search and Recommendation

The article describes a modular traffic‑control platform for e‑commerce search and recommendation that lets operators quickly adjust strategies for emergencies, cold‑start items, and experiments, replacing costly multi‑team development with a unified operation center, service center, data hub, algorithmic PID controller, real‑time metrics, independent recall chain, and cross‑scene AB testing, while outlining future extensions.

AB testingPID controllerplatform architecture
0 likes · 16 min read
Design and Implementation of a Traffic Control Platform for E-commerce Search and Recommendation
Programmer DD
Programmer DD
Oct 28, 2022 · Backend Development

How to Build a Million-User Flash Sale System: Architecture, Scaling & Performance

This article details the end‑to‑end design of a high‑traffic flash‑sale (秒杀) system, covering functional and non‑functional requirements, performance estimations, dynamic/static separation, traffic‑layer control, high‑availability strategies, inventory‑deduction methods, and the key technologies needed for a resilient, scalable backend.

System Architecturecachingflash sale
0 likes · 17 min read
How to Build a Million-User Flash Sale System: Architecture, Scaling & Performance
Alibaba Cloud Native
Alibaba Cloud Native
Aug 29, 2022 · Cloud Native

How to Ensure Microservice Runtime Stability with Sentinel, CloudWeGo, and OpenSergo

This article explains common runtime instability scenarios in microservices, introduces Sentinel‑based traffic protection, shows how CloudWeGo Kitex and Hertz integrate with MSE Sentinel, and demonstrates OpenSergo‑standardized flow control and fault‑tolerance configurations with concrete code and YAML examples.

Circuit BreakingCloudWeGoMSE
0 likes · 14 min read
How to Ensure Microservice Runtime Stability with Sentinel, CloudWeGo, and OpenSergo
Xiao Lou's Tech Notes
Xiao Lou's Tech Notes
Aug 25, 2022 · Backend Development

Beyond Service Discovery: Advanced Features to Supercharge Your Registry Center

This article explores a range of advanced registry‑center capabilities—including console UI, service configuration, event tracing, topology mapping, traffic control, health‑check extensions, graceful release, framework adaptation, and DNS‑based discovery—to illustrate how to make a service registry more powerful and flexible.

service discoveryservice registrytraffic control
0 likes · 9 min read
Beyond Service Discovery: Advanced Features to Supercharge Your Registry Center
Programmer DD
Programmer DD
Jul 23, 2022 · Backend Development

Sentinel vs Hystrix: Which Distributed Flow‑Control Tool Wins?

This article compares Alibaba’s Sentinel and Netflix’s Hystrix, detailing their differing focuses on traffic control, isolation strategies, circuit‑breaker mechanisms, real‑time metrics, and ecosystem support, to help developers choose the most suitable fault‑tolerance solution for distributed services.

HystrixJavaMicroservices
0 likes · 14 min read
Sentinel vs Hystrix: Which Distributed Flow‑Control Tool Wins?
Dada Group Technology
Dada Group Technology
Jul 18, 2022 · Backend Development

Design and Implementation of JD Daojia Open Platform Services

The article presents a comprehensive overview of JD Daojia's Open Platform, detailing its service lifecycle—from platform introduction, service design, publishing, and authorization to state management and traffic‑control mechanisms—while explaining the underlying RPC‑based architecture and fixed‑window rate‑limiting algorithm.

Backend DevelopmentOpen PlatformService Architecture
0 likes · 12 min read
Design and Implementation of JD Daojia Open Platform Services
Architecture & Thinking
Architecture & Thinking
May 5, 2022 · Cloud Native

Microservice Reliability: Key Governance Strategies for High Availability

This article examines the inherent complexities of microservice architectures—such as performance, reliability, data consistency, and operational costs—and presents four essential governance approaches, including traffic control, request resilience, self‑protection mechanisms, and fault‑instance handling, to achieve robust high‑availability services.

service governancetraffic control
0 likes · 16 min read
Microservice Reliability: Key Governance Strategies for High Availability
Top Architect
Top Architect
Apr 7, 2022 · Backend Development

High‑Availability Architecture and Migration Strategies for a Large‑Scale Membership System

This article details the design and implementation of a highly available membership platform, covering Elasticsearch dual‑center primary‑backup clusters, traffic‑isolation architectures, deep ES optimizations, Redis caching and dual‑center clusters, MySQL partitioned clusters, seamless SqlServer‑to‑MySQL migration, abnormal member governance, and refined flow‑control and degradation strategies.

Backendhigh-availabilitymigration
0 likes · 20 min read
High‑Availability Architecture and Migration Strategies for a Large‑Scale Membership System
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Feb 11, 2022 · Operations

Overview and Implementation of eBPF for Android Network Statistics and Control

The article explains how Android’s shift to Linux kernel 4.x/5.x introduced the eBPF framework, detailing its advantages over iptables, the programming model with helper macros and maps, and its implementation in netd and HAL to collect network statistics, enforce traffic control, and support power‑saving Doze policies.

AndroidBPFNetwork Monitoring
0 likes · 8 min read
Overview and Implementation of eBPF for Android Network Statistics and Control
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Oct 20, 2021 · Backend Development

Why Rate Limiting Matters: Strategies, Algorithms, and Real-World Implementations

Rate limiting protects services from overload by controlling traffic, using techniques such as circuit breaking, degradation, buffering, privilege handling, and algorithms like counters, leaky bucket, and token bucket, with implementations ranging from Guava in Java to Nginx+Lua for distributed systems.

algorithmrate limitingtraffic control
0 likes · 14 min read
Why Rate Limiting Matters: Strategies, Algorithms, and Real-World Implementations
Ops Development Stories
Ops Development Stories
May 7, 2021 · Backend Development

Mastering Sentinel: Traffic Control, Circuit Breaking, and System Protection for Microservices

This article introduces Sentinel, a Java‑based library that safeguards microservice stability through traffic shaping, circuit breaking, and system‑level protection, compares it with Hystrix and resilience4j, explains core concepts, usage patterns, annotation support, and dashboard monitoring, and provides practical code examples.

Circuit Breakingspring-boottraffic control
0 likes · 17 min read
Mastering Sentinel: Traffic Control, Circuit Breaking, and System Protection for Microservices
Big Data Technology Architecture
Big Data Technology Architecture
Mar 11, 2021 · Big Data

Challenges and Optimizations of Hive MetaStore at Kuaishou

This article details how Kuaishou tackled performance, scalability, and stability challenges of Hive MetaStore by introducing a BeaconServer hook architecture, read‑write separation, API refinements, traffic control, and federation designs, resulting in significant query efficiency and service reliability improvements.

FederationHiveRead-Write Separation
0 likes · 14 min read
Challenges and Optimizations of Hive MetaStore at Kuaishou
Alibaba Cloud Native
Alibaba Cloud Native
Dec 4, 2020 · Cloud Native

How Sentinel Go Guarantees Microservice Stability in Cloud‑Native Environments

This article explains how Sentinel Go, Alibaba’s open‑source flow‑control library, provides high‑availability protection for microservices through traffic shaping, warm‑up, concurrency control, hotspot limiting, and adaptive system protection, and describes its cloud‑native integrations such as Kubernetes CRD data sources, Service Mesh support, and HPA‑based scaling.

Cloud NativeGohigh availability
0 likes · 17 min read
How Sentinel Go Guarantees Microservice Stability in Cloud‑Native Environments
JavaEdge
JavaEdge
Jul 28, 2020 · Backend Development

Why Message Queues Are the Secret to Faster, Scalable Systems

This article explains the real‑world origin of message queues, illustrates how they enable asynchronous processing, traffic control, and service decoupling, and compares their benefits and drawbacks with concrete examples such as flash‑sale systems and token‑bucket flow control.

Backend Architectureasynchronous processingservice decoupling
0 likes · 8 min read
Why Message Queues Are the Secret to Faster, Scalable Systems
Efficient Ops
Efficient Ops
Jun 21, 2020 · Operations

How to Simulate Real-World Network Conditions with Linux Netem and tc

This guide explains how to use Linux's Netem module via the tc command to emulate network conditions such as delay, loss, duplication, corruption, and packet reordering, providing practical examples and command syntax for effective testing and troubleshooting of network performance issues.

linuxnetemnetwork simulation
0 likes · 8 min read
How to Simulate Real-World Network Conditions with Linux Netem and tc
Alibaba Cloud Developer
Alibaba Cloud Developer
Feb 18, 2020 · Cloud Native

Why Do Your Apps Crash? Alibaba’s High‑Availability Architecture Playbook

This article explains why online applications experience crashes during traffic spikes, outlines the complexity of modern cloud‑based service architectures, and shares Alibaba engineers’ practical notes on high‑availability design, capacity planning, full‑link stress testing, monitoring, traffic control, routine inspections, and chaos‑engineering drills using tools such as AHAS, PTS, Sentinel and Advisor.

Alibaba Cloudcapacity planningchaos engineering
0 likes · 12 min read
Why Do Your Apps Crash? Alibaba’s High‑Availability Architecture Playbook
Big Data Technology & Architecture
Big Data Technology & Architecture
Jan 29, 2020 · Operations

Capacity Planning, Full‑Link Stress Testing, and Traffic Control for Alibaba's Double‑11 Mega‑Event

The article explains how Alibaba introduced systematic capacity planning, four‑stage capacity assessment, various single‑machine stress‑test techniques, and a full‑link stress‑testing platform to reliably handle the massive traffic spikes of the Double‑11 shopping festival, while also describing a flexible traffic‑control framework to prevent overload and avalanche effects.

Load TestingScalabilitybig-event
0 likes · 16 min read
Capacity Planning, Full‑Link Stress Testing, and Traffic Control for Alibaba's Double‑11 Mega‑Event
Youzan Coder
Youzan Coder
Jan 10, 2020 · Cloud Native

How Youzan Implements Traffic Control, Gray and Blue‑Green Deployments with Istio

This article details Youzan's design and implementation of a traffic‑control system built on Istio/Envoy, describing the protocols, architecture, and concrete JSON routing rules for gray releases and blue‑green deployments, along with observability features and future multi‑service release plans.

Blue‑Green deploymentIstioKubernetes
0 likes · 22 min read
How Youzan Implements Traffic Control, Gray and Blue‑Green Deployments with Istio
iQIYI Technical Product Team
iQIYI Technical Product Team
Nov 15, 2019 · Operations

QTC: A Dynamic Network Simulation and Low‑Interference Packet Capture Solution for Mobile Video App Testing

QTC, iQIYI’s extended ATC tool combining a dual‑NIC workstation, wireless hotspot and Python‑based software, dynamically simulates static and changing network conditions while providing low‑interference automated packet capture, enabling rapid mobile video app testing across diverse scenarios and uncovering numerous bugs.

AutomationPacket CaptureQTC
0 likes · 9 min read
QTC: A Dynamic Network Simulation and Low‑Interference Packet Capture Solution for Mobile Video App Testing
Architect's Tech Stack
Architect's Tech Stack
Jun 9, 2019 · Backend Development

Rate Limiting Strategies and Considerations for Microservices

This article reviews why rate limiting is crucial in microservice architectures, outlines common limiting techniques such as semaphore counting, thread‑pool isolation, fixed and sliding windows, token‑bucket and leaky‑bucket algorithms, and discusses practical considerations like clock sync, SDK vs. server enforcement, and accuracy‑latency trade‑offs.

Backendalgorithmtraffic control
0 likes · 13 min read
Rate Limiting Strategies and Considerations for Microservices
Architecture Digest
Architecture Digest
Mar 19, 2019 · Operations

Capacity Planning and Full‑Link Stress Testing for Alibaba Double 11 Promotion

The article explains how Alibaba introduced full‑link stress testing and a four‑step capacity‑planning process for the Double 11 shopping festival, detailing traffic‑prediction, system‑capacity evaluation, fine‑tuning via production‑environment load tests, and dynamic flow‑control mechanisms that together ensure system stability during massive traffic spikes.

AlibabaDouble 11capacity-planning
0 likes · 17 min read
Capacity Planning and Full‑Link Stress Testing for Alibaba Double 11 Promotion
Java Architect Essentials
Java Architect Essentials
Mar 4, 2019 · Backend Development

Service Rate Limiting: Principles, Design Patterns, and Implementation Techniques

The article explains why service rate limiting is essential in distributed systems, describes common design patterns such as circuit breaking, service degradation, delayed processing, and privilege handling, and outlines practical techniques like circuit‑breaker libraries, counters, queues, and token‑bucket algorithms while highlighting key operational considerations.

Backendcircuit breakerservice degradation
0 likes · 9 min read
Service Rate Limiting: Principles, Design Patterns, and Implementation Techniques
Programmer DD
Programmer DD
Dec 19, 2018 · Backend Development

Mastering Rate Limiting: When to Use Fixed, Sliding, Leaky or Token Buckets

This article explains the difference between rate limiting and circuit breaking, shows how to determine system capacity, compares fixed‑window, sliding‑window, leaky‑bucket and token‑bucket algorithms with code examples, and offers best‑practice guidance for applying them in distributed backend systems.

Backend ArchitectureCircuit BreakingDistributed Systems
0 likes · 15 min read
Mastering Rate Limiting: When to Use Fixed, Sliding, Leaky or Token Buckets
ITPUB
ITPUB
Oct 26, 2018 · Operations

Master Linux TC: Control Bandwidth with HTB, Classes, and Filters

This guide explains Linux traffic control (TC), covering its core components—qdisc, classes, and filters—along with HTB hierarchy, queue disciplines, iptables marking, and step‑by‑step command examples for limiting bandwidth per interface, IP or application.

HTBbandwidth shapingiptables
0 likes · 11 min read
Master Linux TC: Control Bandwidth with HTB, Classes, and Filters
Java Captain
Java Captain
Sep 1, 2018 · Backend Development

Thoughts on High‑Concurrency Traffic Control and Rate‑Limiting Techniques

This article shares practical insights on handling high‑concurrency traffic, explaining what constitutes large traffic, common mitigation strategies such as caching, downgrade, and focusing on rate‑limiting techniques—including counters, sliding windows, leaky‑bucket and token‑bucket algorithms—and demonstrates using Guava’s RateLimiter for Java applications.

Backend PerformanceGuavaToken Bucket
0 likes · 6 min read
Thoughts on High‑Concurrency Traffic Control and Rate‑Limiting Techniques
JD Tech
JD Tech
Jul 5, 2018 · Backend Development

Design and Optimization of JD's High‑Availability Open Gateway System

This article describes how JD's open gateway handles billions of requests during major sales events by employing a multi‑layer architecture, Nginx + Lua unified access, NIO asynchronous processing, service isolation, dynamic routing, degradation, rate‑limiting, circuit‑breaking, fast‑fail mechanisms, and comprehensive monitoring to ensure high performance and reliability.

Circuit Breakingasynchronous processinggateway
0 likes · 16 min read
Design and Optimization of JD's High‑Availability Open Gateway System
Java Captain
Java Captain
Jun 27, 2018 · Backend Development

High Concurrency Traffic Control and Rate Limiting Techniques

This article discusses practical approaches to handling massive traffic spikes—defining high‑traffic scenarios, common mitigation methods such as caching, degradation, and various rate‑limiting algorithms (counter, sliding window, leaky bucket, token bucket), including Guava's RateLimiter and brief notes on distributed implementations.

Backend PerformanceGuavaJava
0 likes · 6 min read
High Concurrency Traffic Control and Rate Limiting Techniques
Architecture Digest
Architecture Digest
Feb 12, 2018 · Backend Development

Handling High Traffic: Common Rate‑Limiting Techniques and Guava RateLimiter

This article discusses the definition of high traffic, common mitigation methods such as caching, degradation, and especially various rate‑limiting algorithms—including counters, sliding windows, leaky bucket, and token bucket—and demonstrates using Guava's RateLimiter for practical throttling.

Backend PerformanceGuavaToken Bucket
0 likes · 7 min read
Handling High Traffic: Common Rate‑Limiting Techniques and Guava RateLimiter
ITPUB
ITPUB
Oct 12, 2017 · Operations

Master Linux TC: Shape Bandwidth and Control Traffic with HTB, Qdisc, and Filters

This guide explains Linux traffic control (TC), covering its core components—queueing disciplines, classes, and filters—along with HTB configuration, step‑by‑step command examples, burst handling, and practical use cases for limiting bandwidth per IP or subnet.

HTBbandwidth shapingnetwork
0 likes · 12 min read
Master Linux TC: Shape Bandwidth and Control Traffic with HTB, Qdisc, and Filters
ITPUB
ITPUB
Sep 13, 2017 · Operations

Master Linux TC: Control Bandwidth with HTB, Classes, and Filters

This guide explains Linux traffic control (TC), covering its core components—queueing disciplines, classes, and filters—along with step‑by‑step commands to shape outbound bandwidth, set rate and ceiling limits, use bursts, and apply iptables marks for precise traffic management.

HTBbandwidth managementiptables
0 likes · 11 min read
Master Linux TC: Control Bandwidth with HTB, Classes, and Filters
Alibaba Cloud Developer
Alibaba Cloud Developer
Jun 1, 2017 · Operations

How Alibaba Engineers Capacity Planning and Full‑Link Load Testing for Massive Sales Events

This article explains Alibaba's four‑step capacity‑planning methodology, the various single‑machine load‑testing techniques, the design of a full‑link load‑testing platform for Double‑11, and the dynamic flow‑control framework that together ensure system stability during extreme traffic spikes.

AlibabaLoad TestingOperations
0 likes · 18 min read
How Alibaba Engineers Capacity Planning and Full‑Link Load Testing for Massive Sales Events
Meituan Technology Team
Meituan Technology Team
Jun 17, 2016 · Operations

How to Prevent and Recover from Cache‑Induced Service Overload

Service overload caused by cache failures can cripple dependent systems, but by adopting smart cache get patterns, proactive client‑side checks, traffic throttling, service degradation, and dynamic scaling, developers can both prevent overload and recover gracefully when it occurs.

BackendCacheOperations
0 likes · 22 min read
How to Prevent and Recover from Cache‑Induced Service Overload
ITPUB
ITPUB
May 16, 2016 · Operations

How to Use Linux TC for Precise Bandwidth and Burst Control

This guide explains Linux traffic control (TC), covering its core components, queueing disciplines, classes, filters, burst parameters, and provides step‑by‑step command examples to limit download speeds for individual IPs or subnets.

bandwidth shapinglinuxnetwork
0 likes · 12 min read
How to Use Linux TC for Precise Bandwidth and Burst Control