RHINENG-22821: temporarily increate ratelimit#2052
Closed
Dugowitch wants to merge 1 commit intoRedHatInsights:masterfrom
Closed
RHINENG-22821: temporarily increate ratelimit#2052Dugowitch wants to merge 1 commit intoRedHatInsights:masterfrom
Dugowitch wants to merge 1 commit intoRedHatInsights:masterfrom
Conversation
Reviewer's guide (collapsed on small PRs)Reviewer's GuideIncreases the configured RATELIMIT parameter in the ClowdApp deployment manifest from 100 to 1000 requests per second to temporarily allow higher request throughput for testing. Sequence diagram for request handling with updated RATELIMITsequenceDiagram
actor Client
participant Ingress
participant ServicePod
participant RateLimiter
participant UpstreamHandler
Client->>Ingress: HTTP request
Ingress->>ServicePod: Forward request
ServicePod->>RateLimiter: Check allowed(RATELIMIT=1000)
alt under_limit
RateLimiter-->>ServicePod: allowed
ServicePod->>UpstreamHandler: Process request
UpstreamHandler-->>ServicePod: Response
ServicePod-->>Ingress: HTTP 2xx/4xx/5xx
Ingress-->>Client: Response
else over_limit
RateLimiter-->>ServicePod: rejected
ServicePod-->>Ingress: HTTP 429
Ingress-->>Client: HTTP 429 Too Many Requests
end
File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #2052 +/- ##
==========================================
- Coverage 59.39% 59.36% -0.03%
==========================================
Files 134 134
Lines 8678 8678
==========================================
- Hits 5154 5152 -2
- Misses 2977 2979 +2
Partials 547 547
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
There was a problem hiding this comment.
Hey - I've left some high level feedback:
- Given this is intended as a temporary change to support load/DOS-style testing, consider scoping the higher RATELIMIT to a non-production environment or a dedicated testing configuration rather than changing the shared default parameter.
- It would be helpful to encode the temporary nature of this change directly in the config (e.g., via a comment with the RHINENG-22821 reference and revert criteria) so it’s clear when and why this should be rolled back.
- Raising the RATELIMIT by 10x may impact upstream/downstream components’ stability and monitoring signals; consider whether additional protective limits (e.g., at the ingress or per-IP level) are needed to avoid unintended collateral effects during your experiment.
Prompt for AI Agents
Please address the comments from this code review:
## Overall Comments
- Given this is intended as a temporary change to support load/DOS-style testing, consider scoping the higher RATELIMIT to a non-production environment or a dedicated testing configuration rather than changing the shared default parameter.
- It would be helpful to encode the temporary nature of this change directly in the config (e.g., via a comment with the RHINENG-22821 reference and revert criteria) so it’s clear when and why this should be rolled back.
- Raising the RATELIMIT by 10x may impact upstream/downstream components’ stability and monitoring signals; consider whether additional protective limits (e.g., at the ingress or per-IP level) are needed to avoid unintended collateral effects during your experiment.Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
I hope this change will enable us to basically DOS attack an endpoint and evaluate the high-req-per-second hypothesis for RHINENG-22821.
Secure Coding Practices Checklist GitHub Link
Secure Coding Checklist
Summary by Sourcery
Enhancements:
Summary by Sourcery
Enhancements: