Istio · Rate Limits
Istio Rate Limits
Istio is open-source software, not a hosted SaaS, so there are no provider-enforced API rate limits. The "Istio APIs" are Kubernetes Custom Resources (VirtualService, DestinationRule, Gateway, AuthorizationPolicy, etc.) read and written via the Kubernetes API server. Rate limiting in an Istio mesh is something operators *configure* (local rate limit via Envoy, or global rate limit via an external rate-limit service) — it is not enforced against Istio itself.
1 Limits
Throttle: 429
Rate LimitingService MeshOpen SourceNetworking
Limits
Self-managed cluster
operator-configured
Policies
Operator-controlled
Throughput against Istio control-plane CRDs is governed by the underlying Kubernetes API server; clients should respect kube-apiserver QPS/burst settings.
In-mesh rate limiting
Use Istio's local rate limit (Envoy local rate limit filter) for per-instance limits and the global rate limit pattern (Envoy + ext_authz to a rate-limit service) for shared quotas.
No vendor SaaS limit
Istio itself does not impose a service-side rate limit; community / vendor distributions may set their own SLOs.