RateLimit¶
To Control the Number of Requests Going to a Service
The RateLimit middleware ensures that services will receive a fair amount of requests, and allows one to define what fair is.
It is based on a token bucket implementation. In this analogy, the average parameter (defined below) is the rate at which the bucket refills, and the burst is the size (volume) of the bucket.
Configuration Example¶
# Here, an average of 100 requests per second is allowed.
# In addition, a burst of 200 requests is allowed.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.average=100"
- "traefik.http.middlewares.test-ratelimit.ratelimit.burst=200"# Here, an average of 100 requests per second is allowed.
# In addition, a burst of 200 requests is allowed.
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
average: 100
burst: 200# Here, an average of 100 requests per second is allowed.
# In addition, a burst of 200 requests is allowed.
- "traefik.http.middlewares.test-ratelimit.ratelimit.average=100"
- "traefik.http.middlewares.test-ratelimit.ratelimit.burst=50"# Here, an average of 100 requests per second is allowed.
# In addition, a burst of 200 requests is allowed.
http:
middlewares:
test-ratelimit:
rateLimit:
average: 100
burst: 200# Here, an average of 100 requests per second is allowed.
# In addition, a burst of 200 requests is allowed.
[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
average = 100
burst = 200Configuration Options¶
average¶
average is the maximum rate, by default in requests per second, allowed from a given source.
It defaults to 0, which means no rate limiting.
The rate is actually defined by dividing average by period.
So for a rate below 1 req/s, one needs to define a period larger than a second.
# 100 reqs/s
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.average=100"# 100 reqs/s
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
average: 100# 100 reqs/s
- "traefik.http.middlewares.test-ratelimit.ratelimit.average=100"# 100 reqs/s
http:
middlewares:
test-ratelimit:
rateLimit:
average: 100# 100 reqs/s
[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
average = 100period¶
period, in combination with average, defines the actual maximum rate, such as:
r = average / period
It defaults to 1 second.
# 6 reqs/minute
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.average=6"
- "traefik.http.middlewares.test-ratelimit.ratelimit.period=1m"# 6 reqs/minute
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
period: 1m
average: 6# 6 reqs/minute
- "traefik.http.middlewares.test-ratelimit.ratelimit.average=6"
- "traefik.http.middlewares.test-ratelimit.ratelimit.period=1m"# 6 reqs/minute
http:
middlewares:
test-ratelimit:
rateLimit:
average: 6
period: 1m# 6 reqs/minute
[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
average = 6
period = "1m"burst¶
burst is the maximum number of requests allowed to go through in the same arbitrarily small period of time.
It defaults to 1.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.burst=100"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
burst: 100- "traefik.http.middlewares.test-ratelimit.ratelimit.burst=100"http:
middlewares:
test-ratelimit:
rateLimit:
burst: 100[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
burst = 100sourceCriterion¶
The sourceCriterion option defines what criterion is used to group requests as originating from a common source.
If several strategies are defined at the same time, an error will be raised.
If none are set, the default is to use the request's remote address field (as an ipStrategy).
sourceCriterion.ipStrategy¶
The ipStrategy option defines three parameters that configures how Traefik determines the client IP: depth, excludedIPs and ipv6Subnet.
As a middleware, rate-limiting happens before the actual proxying to the backend takes place. In addition, the previous network hop only gets appended to X-Forwarded-For during the last stages of proxying, i.e. after it has already passed through rate-limiting. Therefore, during rate-limiting, as the previous network hop is not yet present in X-Forwarded-For, it cannot be found and/or relied upon.
ipStrategy.depth¶
The depth option tells Traefik to use the X-Forwarded-For header and select the IP located at the depth position (starting from the right).
- If
depthis greater than the total number of IPs inX-Forwarded-For, then the client IP is empty. depthis ignored if its value is less than or equal to 0.
If ipStrategy.ipv6Subnet is provided and the selected IP is IPv6, the IP is transformed into the first IP of the subnet it belongs to.
See ipStrategy.ipv6Subnet for more details.
Example of Depth & X-Forwarded-For
If depth is set to 2, and the request X-Forwarded-For header is "10.0.0.1,11.0.0.1,12.0.0.1,13.0.0.1" then the "real" client IP is "10.0.0.1" (at depth 4) but the IP used as the criterion is "12.0.0.1" (depth=2).
X-Forwarded-For |
depth |
clientIP |
|---|---|---|
"10.0.0.1,11.0.0.1,12.0.0.1,13.0.0.1" |
1 |
"13.0.0.1" |
"10.0.0.1,11.0.0.1,12.0.0.1,13.0.0.1" |
3 |
"11.0.0.1" |
"10.0.0.1,11.0.0.1,12.0.0.1,13.0.0.1" |
5 |
"" |
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.sourcecriterion.ipstrategy.depth=2"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
sourceCriterion:
ipStrategy:
depth: 2- "traefik.http.middlewares.test-ratelimit.ratelimit.sourcecriterion.ipstrategy.depth=2"http:
middlewares:
test-ratelimit:
rateLimit:
sourceCriterion:
ipStrategy:
depth: 2[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.sourceCriterion.ipStrategy]
depth = 2ipStrategy.excludedIPs¶
Contrary to what the name might suggest, this option is not about excluding an IP from the rate limiter, and therefore cannot be used to deactivate rate limiting for some IPs.
If depth is specified, excludedIPs is ignored.
excludedIPs is meant to address two classes of somewhat distinct use-cases:
-
Distinguish IPs which are behind the same (set of) reverse-proxies so that each of them contributes, independently to the others, to its own rate-limit "bucket" (cf the leaky bucket analogy). In this case,
excludedIPsshould be set to match the list ofX-Forwarded-For IPsthat are to be excluded, in order to find the actual clientIP.Each IP as a distinct source
X-Forwarded-For excludedIPs clientIP "10.0.0.1,11.0.0.1,12.0.0.1""11.0.0.1,12.0.0.1""10.0.0.1""10.0.0.2,11.0.0.1,12.0.0.1""11.0.0.1,12.0.0.1""10.0.0.2" -
Group together a set of IPs (also behind a common set of reverse-proxies) so that they are considered the same source, and all contribute to the same rate-limit bucket.
Group IPs together as same source
X-Forwarded-For excludedIPs clientIP "10.0.0.1,11.0.0.1,12.0.0.1""12.0.0.1""11.0.0.1""10.0.0.2,11.0.0.1,12.0.0.1""12.0.0.1""11.0.0.1""10.0.0.3,11.0.0.1,12.0.0.1""12.0.0.1""11.0.0.1"
For completeness, below are additional examples to illustrate how the matching works.
For a given request the list of X-Forwarded-For IPs is checked from most recent to most distant against the excludedIPs pool,
and the first IP that is not in the pool (if any) is returned.
Matching for clientIP
| X-Forwarded-For | excludedIPs | clientIP |
|---|---|---|
"10.0.0.1,11.0.0.1,13.0.0.1" |
"11.0.0.1" |
"13.0.0.1" |
"10.0.0.1,11.0.0.1,13.0.0.1" |
"15.0.0.1,16.0.0.1" |
"13.0.0.1" |
"10.0.0.1,11.0.0.1" |
"10.0.0.1,11.0.0.1" |
"" |
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.sourcecriterion.ipstrategy.excludedips=127.0.0.1/32, 192.168.1.7"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
sourceCriterion:
ipStrategy:
excludedIPs:
- 127.0.0.1/32
- 192.168.1.7- "traefik.http.middlewares.test-ratelimit.ratelimit.sourcecriterion.ipstrategy.excludedips=127.0.0.1/32, 192.168.1.7"http:
middlewares:
test-ratelimit:
rateLimit:
sourceCriterion:
ipStrategy:
excludedIPs:
- "127.0.0.1/32"
- "192.168.1.7"[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.sourceCriterion.ipStrategy]
excludedIPs = ["127.0.0.1/32", "192.168.1.7"]ipStrategy.ipv6Subnet¶
This strategy applies to Depth and RemoteAddr strategy only.
If ipv6Subnet is provided and the selected IP is IPv6, the IP is transformed into the first IP of the subnet it belongs to.
This is useful for grouping IPv6 addresses into subnets to prevent bypassing this middleware by obtaining a new IPv6.
ipv6Subnetis ignored if its value is outside of 0-128 interval
Example of ipv6Subnet
If ipv6Subnet is provided, the IP is transformed in the following way.
IP |
ipv6Subnet |
clientIP |
|---|---|---|
"::abcd:1111:2222:3333" |
64 |
"::0:0:0:0" |
"::abcd:1111:2222:3333" |
80 |
"::abcd:0:0:0:0" |
"::abcd:1111:2222:3333" |
96 |
"::abcd:1111:0:0:0" |
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.sourcecriterion.ipstrategy.ipv6Subnet=64"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
ratelimit:
sourceCriterion:
ipStrategy:
ipv6Subnet: 64- "traefik.http.middlewares.test-ratelimit.ratelimit.sourcecriterion.ipstrategy.ipv6Subnet=64"http:
middlewares:
test-ratelimit:
ratelimit:
sourceCriterion:
ipStrategy:
ipv6Subnet: 64[http.middlewares]
[http.middlewares.test-ratelimit.ratelimit]
[http.middlewares.test-ratelimit.ratelimit.sourceCriterion.ipStrategy]
ipv6Subnet = 64sourceCriterion.requestHeaderName¶
Name of the header used to group incoming requests.
If the header is not present, rate limiting will still be applied, but all requests without the specified header will be grouped together.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.sourcecriterion.requestheadername=username"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
sourceCriterion:
requestHeaderName: username- "traefik.http.middlewares.test-ratelimit.ratelimit.sourcecriterion.requestheadername=username"http:
middlewares:
test-ratelimit:
rateLimit:
sourceCriterion:
requestHeaderName: username[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.sourceCriterion]
requestHeaderName = "username"sourceCriterion.requestHost¶
Whether to consider the request host as the source.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.sourcecriterion.requesthost=true"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
sourceCriterion:
requestHost: true- "traefik.http.middlewares.test-ratelimit.ratelimit.sourcecriterion.requesthost=true"http:
middlewares:
test-ratelimit:
rateLimit:
sourceCriterion:
requestHost: true[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.sourceCriterion]
requestHost = trueredis¶
Enables distributed rate limit using redis to store the tokens.
If not set, Traefik's in-memory storage is used by default.
redis.endpoints¶
Required, Default="127.0.0.1:6379"
Defines how to connect to the Redis server.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.endpoints=127.0.0.1:6379"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
endpoints:
- "127.0.0.1:6379"- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.endpoints=127.0.0.1:6379"http:
middlewares:
test-ratelimit:
rateLimit:
# ...
redis:
endpoints:
- "127.0.0.1:6379"[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
endpoints = ["127.0.0.1:6379"]redis.username¶
Optional, Default=""
Defines the username used to authenticate with the Redis server.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.username=user"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
secret: mysecret
---
apiVersion: v1
kind: Secret
metadata:
name: mysecret
namespace: default
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.username=user"http:
middlewares:
test-ratelimit:
rateLimit:
# ...
redis:
username: user[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
username = "user"redis.password¶
Optional, Default=""
Defines the password to authenticate against the Redis server.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.password=password"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
secret: mysecret
---
apiVersion: v1
kind: Secret
metadata:
name: mysecret
namespace: default
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.password=password"http:
middlewares:
test-ratelimit:
rateLimit:
# ...
redis:
password: password[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
password = "password"redis.db¶
Optional, Default=0
Defines the database to select after connecting to the Redis.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.db=0"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
db: 0- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.db=0"http:
middlewares:
test-ratelimit:
rateLimit:
# ...
redis:
db: 0[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
db = 0redis.tls¶
Same as this config
Optional
Defines the TLS configuration used for the secure connection to Redis.
redis.tls.ca¶
Optional
ca is the path to the certificate authority used for the secure connection to Redis,
it defaults to the system bundle.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.tls.ca=path/to/ca.crt"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
tls:
caSecret: mycasercret
---
apiVersion: v1
kind: Secret
metadata:
name: mycasercret
namespace: default
data:
# Must contain a certificate under either a `tls.ca` or a `ca.crt` key.
tls.ca: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0=- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.tls.ca=path/to/ca.crt"http:
middlewares:
rateLimit:
# ...
redis:
tls:
ca: path/to/ca.crt[providers.redis.tls]
ca = "path/to/ca.crt"redis.tls.cert¶
Optional
cert is the path to the public certificate used for the secure connection to Redis.
When this option is set, the key option is required.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.tls.cert=path/to/foo.cert"
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.tls.key=path/to/foo.key"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
tls:
certSecret: mytlscert
---
apiVersion: v1
kind: Secret
metadata:
name: mytlscert
namespace: default
data:
tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0=
tls.key: LS0tLS1CRUdJTiBQUklWQVRFIEtFWS0tLS0tCi0tLS0tRU5EIFBSSVZBVEUgS0VZLS0tLS0=- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.tls.cert=path/to/foo.cert"
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.tls.key=path/to/foo.key"http:
middlewares:
test-ratelimit:
rateLimit:
redis:
tls:
cert: path/to/foo.cert
key: path/to/foo.key[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
[http.middlewares.test-ratelimit.rateLimit.redis.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"redis.tls.key¶
Optional
key is the path to the private key used for the secure connection to Redis.
When this option is set, the cert option is required.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.tls.cert=path/to/foo.cert"
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.tls.key=path/to/foo.key"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
tls:
certSecret: mytlscert
---
apiVersion: v1
kind: Secret
metadata:
name: mytlscert
namespace: default
data:
tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0=
tls.key: LS0tLS1CRUdJTiBQUklWQVRFIEtFWS0tLS0tCi0tLS0tRU5EIFBSSVZBVEUgS0VZLS0tLS0=- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.tls.cert=path/to/foo.cert"
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.tls.key=path/to/foo.key"http:
middlewares:
test-ratelimit:
rateLimit:
redis:
tls:
cert: path/to/foo.cert
key: path/to/foo.key[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
[http.middlewares.test-ratelimit.rateLimit.redis.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"redis.tls.insecureSkipVerify¶
Optional, Default=false
If insecureSkipVerify is true, the TLS connection to Redis accepts any certificate presented by the server regardless of the hostnames it covers.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.tls.insecureSkipVerify=true"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
tls:
insecureSkipVerify: true- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.tls.insecureSkipVerify=true"http:
middlewares:
test-ratelimit:
rateLimit:
# ...
redis:
tls:
insecureSkipVerify: true[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
[http.middlewares.test-ratelimit.rateLimit.redis.tls]
insecureSkipVerify = trueredis.poolSize¶
Optional, Default=0
Defines the base number of socket connections.
If there are not enough connections in the pool, new connections will be allocated beyond redis.poolSize.
You can limit this using redis.maxActiveConns.
Zero means 10 connections per every available CPU as reported by runtime.GOMAXPROCS.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.poolSize=42"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
poolSize: 42- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.poolSize=42"http:
middlewares:
test-ratelimit:
rateLimit:
# ...
redis:
poolSize: 42[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
poolSize = 42redis.minIdleConns¶
Optional, Default=0
Defines the minimum number of idle connections, which is useful when establishing new connections is slow. Zero means that idle connections are not closed.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.minIdleConns=42"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
minIdleConns: 42- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.minIdleConns=42"http:
middlewares:
test-ratelimit:
rateLimit:
# ...
redis:
minIdleConns: 42[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
minIdleConns = 42redis.maxActiveConns¶
Optional, Default=0
Defines the maximum number of connections the pool can allocate at a given time. Zero means no limit.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.maxActiveConns=42"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
maxActiveConns: 42- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.maxActiveConns=42"http:
middlewares:
test-ratelimit:
rateLimit:
# ...
redis:
maxActiveConns: 42[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
maxActiveConns = 42redis.readTimeout¶
Optional, Default=3s
Defines the timeout for socket reads. If reached, commands will fail with a timeout instead of blocking. Zero means no timeout.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.readTimeout=42s"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
readTimeout: 42s- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.readTimeout=42s"http:
middlewares:
test-ratelimit:
rateLimit:
# ...
redis:
readTimeout: 42s[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
readTimeout = "42s"redis.writeTimeout¶
Optional, Default=3s
Defines the timeout for socket writes. If reached, commands will fail with a timeout instead of blocking. Zero means no timeout.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.writeTimeout=42s"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
writeTimeout: 42s- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.writeTimeout=42s"http:
middlewares:
test-ratelimit:
rateLimit:
# ...
redis:
writeTimeout: 42s[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
writeTimeout = "42s"redis.dialTimeout¶
Optional, Default=5s
Defines the dial timeout for establishing new connections. Zero means no timeout.
labels:
- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.dialTimeout=42s"apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: test-ratelimit
spec:
rateLimit:
# ...
redis:
dialTimeout: 42s- "traefik.http.middlewares.test-ratelimit.ratelimit.redis.dialTimeout=42s"http:
middlewares:
test-ratelimit:
rateLimit:
# ...
redis:
dialTimeout: 42s[http.middlewares]
[http.middlewares.test-ratelimit.rateLimit]
[http.middlewares.test-ratelimit.rateLimit.redis]
dialTimeout = "42s"