Spring Cloud · Rate Limits
Spring Cloud Rate Limits
Spring Cloud is a set of self-hosted libraries (Config Server, Gateway, Eureka, etc.) — there is no vendor-hosted API and therefore no vendor-imposed throughput limits. Operators define their own throttling using Spring Cloud Gateway's RequestRateLimiter filter (Redis-backed token bucket) or Resilience4j RateLimiter. Numeric limits are entirely operator-determined.
1 Limits
Throttle: 429
Circuit BreakerCloud NativeDistributed SystemsJavaMicroservicesService DiscoverySpring FrameworkRate Limiting
Limits
Operator-Defined (Spring Cloud Gateway / Resilience4j) deployment
see operator gateway and Resilience4j configuration
Effective limits depend on the RequestRateLimiter filter (replenishRate, burstCapacity) or Resilience4j RateLimiter configuration the operator deploys.
Policies
Self-Hosted Throttling
Spring Cloud Gateway emits a 429 with Retry-After when the configured token bucket is empty. Resilience4j RateLimiter throws a RequestNotPermitted exception that the application maps to 429. Both are configured per-route by the operator.
Distributed Coordination
Multi-instance deployments require a shared store (Redis is the documented default for Spring Cloud Gateway's RequestRateLimiter) so the bucket is consistent across replicas.