-
Notifications
You must be signed in to change notification settings - Fork 43
RHINENG-22821: temporarily increate ratelimit #2052
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Reviewer's guide (collapsed on small PRs)Reviewer's GuideIncreases the configured RATELIMIT parameter in the ClowdApp deployment manifest from 100 to 1000 requests per second to temporarily allow higher request throughput for testing. Sequence diagram for request handling with updated RATELIMITsequenceDiagram
actor Client
participant Ingress
participant ServicePod
participant RateLimiter
participant UpstreamHandler
Client->>Ingress: HTTP request
Ingress->>ServicePod: Forward request
ServicePod->>RateLimiter: Check allowed(RATELIMIT=1000)
alt under_limit
RateLimiter-->>ServicePod: allowed
ServicePod->>UpstreamHandler: Process request
UpstreamHandler-->>ServicePod: Response
ServicePod-->>Ingress: HTTP 2xx/4xx/5xx
Ingress-->>Client: Response
else over_limit
RateLimiter-->>ServicePod: rejected
ServicePod-->>Ingress: HTTP 429
Ingress-->>Client: HTTP 429 Too Many Requests
end
File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #2052 +/- ##
==========================================
- Coverage 59.39% 59.36% -0.03%
==========================================
Files 134 134
Lines 8678 8678
==========================================
- Hits 5154 5152 -2
- Misses 2977 2979 +2
Partials 547 547
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey - I've left some high level feedback:
- Given this is intended as a temporary change to support load/DOS-style testing, consider scoping the higher RATELIMIT to a non-production environment or a dedicated testing configuration rather than changing the shared default parameter.
- It would be helpful to encode the temporary nature of this change directly in the config (e.g., via a comment with the RHINENG-22821 reference and revert criteria) so it’s clear when and why this should be rolled back.
- Raising the RATELIMIT by 10x may impact upstream/downstream components’ stability and monitoring signals; consider whether additional protective limits (e.g., at the ingress or per-IP level) are needed to avoid unintended collateral effects during your experiment.
Prompt for AI Agents
Please address the comments from this code review:
## Overall Comments
- Given this is intended as a temporary change to support load/DOS-style testing, consider scoping the higher RATELIMIT to a non-production environment or a dedicated testing configuration rather than changing the shared default parameter.
- It would be helpful to encode the temporary nature of this change directly in the config (e.g., via a comment with the RHINENG-22821 reference and revert criteria) so it’s clear when and why this should be rolled back.
- Raising the RATELIMIT by 10x may impact upstream/downstream components’ stability and monitoring signals; consider whether additional protective limits (e.g., at the ingress or per-IP level) are needed to avoid unintended collateral effects during your experiment.Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.
I hope this change will enable us to basically DOS attack an endpoint and evaluate the high-req-per-second hypothesis for RHINENG-22821.
Secure Coding Practices Checklist GitHub Link
Secure Coding Checklist
Summary by Sourcery
Enhancements:
Summary by Sourcery
Enhancements: