Detailed explanation of Nginx current limiting configuration

Detailed explanation of Nginx current limiting configuration

This article uses examples to explain the Nginx current limiting configuration from the simplest to the most complex, which is a positive supplement to the brief official documentation.

Nginx uses the leaky bucket algorithm to limit current. If you are interested in the algorithm, you can read it on Wikipedia first. However, not understanding this algorithm will not affect your reading of this article.

Empty Bucket

Let's start with the simplest current limiting configuration:

limit_req_zone $binary_remote_addr zone=ip_limit:10m rate=10r/s;

server {
  location /login/ {
    limit_req zone=ip_limit;
    proxy_pass http://login_upstream;
  }
}

  • $binary_remote_addr limits the flow of client IP;
  • zone=ip_limit:10m The name of the current limiting rule is ip_limit, which allows 10MB of memory space to record the current limiting status corresponding to the IP address;
  • rate=10r/s The current limit is 10 requests per second
  • location /login/ Limit login flow

The rate limit is 10 requests per second. If 10 requests arrive at an idle nginx at the same time, can they all be executed?

The leaky bucket leaks requests at a uniform rate. How is 10r/s a constant speed? One request is leaked every 100ms.

In this configuration, the bucket is empty, and all requests that cannot be leaked in real time will be rejected.

So if 10 requests arrive at the same time, only one request can be executed, and the others will be rejected.

This is not very friendly. In most business scenarios, we hope that these 10 requests can be executed.

Burst

Let's change the configuration to solve the problem in the previous section.

limit_req_zone $binary_remote_addr zone=ip_limit:10m rate=10r/s;

server {
  location /login/ {
    limit_req zone=ip_limit burst=12;
    proxy_pass http://login_upstream;
  }
}

burst=12 The size of the leaky bucket is set to 12

Logically it is called a leaky bucket, and is implemented as a FIFO queue, which temporarily caches requests that cannot be executed.

In this way, the leakage speed is still 100ms per request, but the concurrent requests that cannot be executed temporarily can be cached first. Only when the queue is full will new requests be rejected.

In this way, the leaky bucket not only limits the flow, but also plays the role of peak reduction and valley filling.

In this configuration, if 10 requests arrive at the same time, they will be executed sequentially, one every 100ms.

Although it was executed, the delay was greatly increased due to queue execution, which is still unacceptable in many scenarios.

NoDelay

Continue to modify the configuration to solve the problem of increased delay caused by too long Delay

limit_req_zone $binary_remote_addr zone=ip_limit:10m rate=10r/s;

server {
  location /login/ {
    limit_req zone=ip_limit burst=12 nodelay;
    proxy_pass http://login_upstream;
  }
}

Nodelay advances the time to start executing requests. Previously, the execution was delayed until the request leaked out of the bucket. Now, there is no delay and the execution starts as soon as it enters the bucket.

Either it is executed immediately or it is rejected, and the request will not be delayed due to current limiting.

Because requests leak out of the bucket at a uniform speed and the bucket space is fixed, on average, 5 requests are executed per second, and the purpose of current limiting is achieved.

But this also has disadvantages. The flow is limited, but the limit is not so uniform. Taking the above configuration as an example, if 12 requests arrive at the same time, then these 12 requests can be executed immediately, and the subsequent requests can only enter the bucket at a uniform speed, with one request executed every 100ms. If there are no requests for a period of time and the bucket is empty, then 12 concurrent requests may be executed together.

In most cases, this uneven current limiting is not a big problem. However, nginx also provides a parameter to control the number of concurrent executions, that is, nodelay requests.

limit_req_zone $binary_remote_addr zone=ip_limit:10m rate=10r/s;

server {
  location /login/ {
    limit_req zone=ip_limit burst=12 delay=4;
    proxy_pass http://login_upstream;
  }
}

delay=4 starts delaying from the fifth request in the bucket

In this way, by controlling the value of the delay parameter, the number of requests allowed to be executed concurrently can be adjusted to make the requests more evenly distributed. It is still necessary to control this number on some resource-consuming services.

Reference

http://nginx.org/en/docs/http/ngx_http_limit_req_module.html
https://www.nginx.com/blog/rate-limiting-nginx/

Summarize

The above is the Nginx current limiting configuration introduced by the editor. I hope it will be helpful to everyone. If you have any questions, please leave me a message and the editor will reply to you in time. I would also like to thank everyone for their support of the 123WORDPRESS.COM website!
If you find this article helpful, please feel free to reprint it and please indicate the source. Thank you!

You may also be interested in:
  • Detailed explanation of Nginx's connection limit configuration for IP addresses in a network segment
  • Nginx rush purchase current limiting configuration implementation analysis
  • Practical Record of Nginx Current Limitation and Configuration Management

<<:  A brief discussion on the pitfalls and solutions of the new features of MySQL 8.0 (summary)

>>:  Detailed explanation of Angular routing animation and advanced animation functions

Recommend

Solve the problem of garbled Chinese characters in Mysql5.7

When using MySQL 5.7, you will find that garbled ...

Realize breadcrumb function based on vue-router's matched

This article mainly introduces the breadcrumb fun...

Centos6.9 installation Mysql5.7.18 step record

Installation sequence rpm -ivh mysql-community-co...

How to Completely Clean Your Docker Data

Table of contents Prune regularly Mirror Eviction...

Teach you how to insert 1 million records into MySQL in 6 seconds

1. Idea It only took 6 seconds to insert 1,000,00...

Linux uses stty to display and modify terminal line settings

Sttty is a common command for changing and printi...

Implementation of MySQL custom list sorting by specified field

Problem Description As we all know, the SQL to so...

Steps to install Pyenv under Deepin

Preface In the past, I always switched Python ver...

Rhit efficient visualization Nginx log viewing tool

Table of contents Introduction Install Display Fi...