Filter for rate limiting and IP whitelisting/blacklisting
Rejects request based on the following rules:
1. if IP is in whitelist => let pass
2. else if IP is in blacklist => reject with ‘403 FORBIDDEN’
3. else if IP rate limit exceeded => reject with ‘429 TOO_MANY_REQUEST’
4. else if global rate limit exceeded => reject with ‘429 TOO_MANY_REQUEST’
Filter for rate limiting and IP whitelisting/blacklisting
Rejects request based on the following rules:
1. if IP is in whitelist => let pass 2. else if IP is in blacklist => reject with ‘403 FORBIDDEN’ 3. else if IP rate limit exceeded => reject with ‘429 TOO_MANY_REQUEST’ 4. else if global rate limit exceeded => reject with ‘429 TOO_MANY_REQUEST’