Rate limiting is a technique used to control the rate of incoming or outgoing traffic to or from a system by imposing restrictions on the number of requests within a specified time frame. Its primary purpose is to prevent resource exhaustion, protect against abuse, and ensure fair usage among users or clients.
ELM Applications, underlying Liberty Application Server and the supported Reverse Proxy (IBM HTTP Server) does not include / support Rate limiting. There are third party and open-source software like HAProxy
We have performed a simple configuration of HAProxy with ELM applications and documented instructions of the setup in this article
For open-source software, including HAProxy, the following IBM Policy applies: IBM Open Source and Third-party software policy
We have performed a simple rate limiting configuration using HAProxy with ELM applications and documented the instructions of the setup and use cases in this article. For detailed instructions please visit http://www.haproxy.org/
HAProxy is a free and open source software that provides a high availability load balancer and reverse proxy. It supports a rich set of Load Balancing algorithms and the default is Leastconn. Since we have tested the use of HAProxy with EWM/ETM Clustering and Load Balancing LQE Application, the same is being used for rate limiting. HAProxy is not supported on Microsoft Windows Operating System. You can continue to the next step if your environment is Linux based.
The steps provided this section is a simple setup of HAProxy. For detailed instructions please visit http://www.haproxy.org/. The Idea of this setup is to introduce a HAProxy layer in between IBM HTTP Server and the IBM Liberty Server hosting ELM Application.
You need a Linux based server in your environment to install and configure HAProxy. Run the following commands
# yum update # yum install haproxy
Generate SSL Certificates to be used with HAProxy via OpenSSL
# mkdir /etc/haproxy/ssl # cd /etc/haproxy/ssl # openssl req -newkey rsa:3072 -sha256 -new -x509 -days 3652 -nodes -out haproxy.crt -keyout haproxy.key # cat haproxy.crt haproxy.key > haproxy.pem # chmod +rx haproxy.*
Import this certificate and key file into IBM HTTP Server certificate kdb file and the Plugin kdb file.
Here is a sample haproxy.cfg
file for load balancing 2 LQE nodes. You could change the ports (8080, 8443, 1936) to the ports of your choice and the user/group as well.
In addition, change the path to the SSL certificate to the one created in the previous step.
global log 127.0.0.1 local2 chroot /var/lib/haproxy pidfile /var/run/haproxy.pid maxconn 4000 user haproxy group haproxy daemon # utilize system-wide crypto-policies ssl-default-bind-ciphers PROFILE=SYSTEM ssl-default-server-ciphers PROFILE=SYSTEM lua-load /etc/haproxy/delay.lua #--------------------------------------------------------------------- # common defaults that all the 'listen' and 'backend' sections will # use if not designated in their block #--------------------------------------------------------------------- defaults mode http log global option httplog option dontlognull option http-server-close option forwardfor except 127.0.0.0/8 option redispatch retries 3 timeout http-request 10s timeout queue 1m timeout connect 10s timeout client 1m timeout server 1m timeout http-keep-alive 10s timeout check 10s maxconn 3000 mode http stats enable stats uri /stats stats realm Haproxy\ Statistics #--------------------------------------------------------------------- # main frontend which proxys to the backends #--------------------------------------------------------------------- #frontend lanneluc-proxy # bind *:9442 ssl crt /etc/haproxy/ssl/proxy.pem no-sslv3 alpn h2,http/1.1 # log global # option httplog # mode http # capture cookie SERVERID len 32 # redirect scheme https if !{ ssl_fc } # maxconn 2000 # stick-table type ip size 100k expire 600s store http_req_rate(120s) # http-request track-sc0 src # http-request deny deny_status 429 if { sc_http_req_rate(0) gt 1000 } # default_backend ccm frontend stats bind *:8404 stats enable stats uri /stats stats refresh 10s stats admin if LOCALHOST stats auth root:test123 frontend lanneluc-proxy bind *:443 ssl crt /etc/haproxy/ssl/haproxy.pem no-sslv3 alpn h2,http/1.1 log global option httplog mode http capture cookie SERVERID len 32 redirect scheme https if !{ ssl_fc } maxconn 2000 #TODO add a redirect for paths ending in ccm or jts use_backend ccm if { path_beg /ccm/ } backend ccm option forwardfor http-request set-header X-Forwarded-Port %[dst_port] http-request set-header X-Forwarded-Port %[dst_port] http-request add-header X-Forwarded-Proto https if { ssl_fc } fullconn 1000 balance leastconn cookie SERVERID insert indirect nocache timeout queue 300s server ccm c69878v1.fyre.ibm.com:9443 minconn 20 maxconn 100 ssl check cookie ccm1 verify none listen statistics bind *:1936 stats uri / stats admin if TRUE stats enable stats hide-version stats auth root:clu8ter8 stats refresh
Run the following commands to start the HAProxy Server, enable it to auto start during machine startup and to check status of the HAProxy server
# systemctl start haproxy # systemctl enable haproxy # systemctl status haproxy
Edit the merged plugin file for IBM HTTP Server and update the host for EWM host to the HAProxy setup.
a) Create a mapping file called rates.map
inside the folder =/etc/haproxy/=and include the following lines:
dashboard 4 Dashboard 4
This will allow 4 requests to any HTTP calls that include dashboard
b) We will now configure HAProxy to use the file and set to configuration for the use case. Here is the excerpt of the changes to be made to the default configuration provided above:
frontend lanneluc-proxy bind *:443 ssl crt /etc/haproxy/ssl/haproxy.pem no-sslv3 alpn h2,http/1.1 log global option httplog mode http capture cookie SERVERID len 32 redirect scheme https if !{ ssl_fc } maxconn 2000 # key is a binary value, value is the http_req_rate (in built function) stick-table type binary len 8 size 100k expire 15s store http_req_rate(180s) # track by base32+src. base32 is a shorthand for host header and URL path # To get a URL Path, remove the scheme:host+port part of the url. The rest of # the string is the path. http-request track-sc0 base32+src # Get rate limit for path by checking rates.map file. In this file, we have stored # parts of the path like com.ibm.team.dashboard.service or com.ibm.team.filesystem.service # We do a pattern match on the path with the entries in the map (map_sub_int). # You can also have full paths specified in the rates.map file and retreive values based # on a full match http-request set-var(req.rate_limit) path,map_sub_int(/etc/haproxy/rates.map,2000) # Get the value for client's current request rate http-request set-var(req.request_rate) base32+src,table_http_req_rate() # create a acl by subtracting current request rate from limit acl rate_abuse_acl var(req.rate_limit),sub(req.request_rate) lt 0 # Deny if the limit is exceeded # You can also slow down the request instead of denying the limit http-request deny deny_status 429 if rate_abuse_acl #TODO add a redirect for paths ending in ccm or jts use_backend ccm if { path_beg /ccm/ } use_backend jts if { path_beg /jts/ } #use_backend jts if { path_beg /gc/ } #Custom error page if the paths don't match either of the apps # errorfile 503 /etc/haproxy/errorfiles/503.http
Status icon key: