Hey Istvan,

On 10.01.24 03:27, Szabo, Istvan (Agoda) wrote:
I'm using in the frontend https config on haproxy like this, it works so far good:

stick-table type ip size 1m expire 10s store http_req_rate(10s)

tcp-request inspect-delay 10s
tcp-request content track-sc0 src
http-request deny deny_status 429 if { sc_http_req_rate(0) gt 10000 }


But this serves as a basic rate limit for all request coming from a single IP address, right?


My question was rather about limiting clients in regards to authentication requests / unauthorized requests,
which end up hammering the auth system (Keystone in my case) at full rate.



Regards


Christian
_______________________________________________
ceph-users mailing list -- ceph-users@ceph.io
To unsubscribe send an email to ceph-users-le...@ceph.io

Reply via email to