Advanced rate limiting and DDoS protection for Python web applications
Project description
Ratethrottle
Advanced rate limiting and DDoS protection for Python web applications.
RateThrottle is a comprehensive rate limiting library that provides enterprise-level features for protecting your APIs and web applications from abuse, with built-in DDoS protection, different storage backends, multiple strategies and protocols, ML adaptive ratelimiting and seamless integration with popular Python web frameworks.
✨ Features
-
🚀 Multiple Rate Limiting Strategies
- Sliding Window Counter (default)
- Sliding Window Log
- Token Bucket
- Leaky Bucket
- Fixed Window
-
🚀 Different protocol support
- REST
- GRPC
- GraphQL
- Websocket
-
🛡️ Advanced DDoS Protection
- Traffic pattern analysis
- Automatic suspicious activity detection
- Auto-blocking capabilities
-
💾 Flexible Storage Backends
- In-memory (single instance)
- Redis (distributed/multi-server)
- Easy to extend with custom backends
-
🔧 Framework Integration
- Flask
- FastAPI
- Django
- Starlette
- Generic WSGI/ASGI support
-
📊 Monitoring & Analytics
- Real-time metrics
- Violation tracking
- CLI dashboard
-
⚙️ Configuration Management
- YAML configuration files
- Programmatic configuration
- Hot-reloading support
-
🤖 ML Adaptive Limiting
- Pattern learning with Exponential Moving Average
- Z-score based anomaly detection
- Trust scoring system
- Automatic limit adjustment
🚀 Quick Start
Installation
# Basic installation
pip install ratethrottle
# With Redis support
pip install ratethrottle[redis]
# With Flask support
pip install ratethrottle[flask]
# With FastAPI support
pip install ratethrottle[fastapi]
# With Django support
pip install ratethrottle[django]
# With all frameworks
pip install ratethrottle[frameworks]
# With grpc support
pip install ratethrottle[grpc]
# With graphQL support
pip install ratethrottle[graphql]
# With websocket support
pip install ratethrottle[websocket]
# With all protocols
pip install ratethrottle[protocols]
Flask Example
from flask import Flask
from ratethrottle import FlaskRateLimiter
app = Flask(__name__)
limiter = FlaskRateLimiter(app)
@app.route('/api/data')
@limiter.limit("100/minute")
def get_data():
return {'data': 'value'}
@app.route('/api/auth')
@limiter.limit("5/minute")
def login():
return {'token': 'abc123'}
if __name__ == '__main__':
app.run()
FastAPI Example
from fastapi import FastAPI, Depends
from ratethrottle import FastAPIRateLimiter
app = FastAPI()
limiter = FastAPIRateLimiter()
rate_limit = limiter.limit(100, 60)
@app.get("/api/data")
async def get_data(request, _=Depends(ratelimit)):
return {"data": "value"}
Django Example
from django.http import JsonResponse
from ratethrottle import django_ratelimit
@django_ratelimit(limit=100, window=60, key='ip')
def api_view(request):
return JsonResponse({'data': 'value'})
Standalone Usage
Basic limiting
from ratethrottle import RateThrottleCore, RateThrottleRule
# Create limiter
limiter = RateThrottleCore()
# Add rule
rule = RateThrottleRule(
name='api_limit',
limit=100,
window=60,
strategy='sliding_counter'
)
limiter.add_rule(rule)
# Check rate limit
status = limiter.check_rate_limit('192.168.1.100', 'api_limit')
if status.allowed:
# Process request
print(f"Request allowed! {status.remaining} requests remaining")
else:
# Reject request
print(f"Request blocked! Retry after {status.retry_after} seconds")
Adaptive limiting
from ratethrottle import AdaptiveRateLimiter
limiter = AdaptiveRateLimiter(
base_limit=100,
learning_rate=0.1,
anomaly_threshold=3.0
)
result = limiter.check_adaptive('user_123')
if result['allowed']:
print(f"Limit: {result['adjusted_limit']}")
print(f"Trust: {result['trust_score']:.2f}")
else:
print(f"Request blocked! Reason{result['reason']}")
print(f"Retry after {result['retry_after']}")
📖 Documentation
Rate Limiting Strategies
1. Token Bucket
Best for: APIs with burst allowances
rule = RateThrottleRule(
name='api_burst',
limit=100,
window=60,
strategy='token_bucket',
burst=150 # Allow up to 150 tokens in bucket
)
2. Leaky Bucket
Best for: Smooth, constant rate processing
rule = RateThrottleRule(
name='api_steady',
limit=100,
window=60,
strategy='leaky_bucket'
)
3. Fixed Window
Best for: Simple, efficient rate limiting
rule = RateThrottleRule(
name='api_window',
limit=100,
window=60,
strategy='fixed_window'
)
4. Sliding Window Log
Best for: Precise rate limiting without edge cases
rule = RateThrottleRule(
name='api_precise',
limit=100,
window=60,
strategy='sliding_window'
)
4. Sliding Window Counter
Best for: Accurate limiting with efficient memory usage
rule = RateThrottleRule(
name='api_default',
limit=100,
window=60,
strategy='sliding_counter'
)
Redis Backend (Distributed)
from ratethrottle import create_limiter
# Using Redis for distributed rate limiting
limiter = create_limiter('redis', 'redis://localhost:6379/0')
# Now works across multiple servers!
Configuration Files
Create ratethrottle.yaml:
# Storage backend
storage:
type: redis
redis:
host: localhost
port: 6379
db: 0
# Global settings
global:
enabled: true
default_strategy: sliding_counter
headers_enabled: true
# Rate limiting rules
rules:
- name: api_default
limit: 1000
window: 3600
strategy: token_bucket
- name: auth_strict
limit: 5
window: 60
strategy: sliding_window
block_duration: 900
# DDoS Protection
ddos_protection:
enabled: true
threshold: 10000
auto_block: true
block_duration: 3600
Load configuration:
from ratethrottle import ConfigManager, RateThrottleCore
config = ConfigManager('ratethrottle.yaml')
limiter = RateThrottleCore()
for rule in config.get_rules():
limiter.add_rule(rule)
GRPC Example
from concurrent import futures
import grpc
from ratethrottle import GRPCRateLimitInterceptor, GRPCLimits
# Create interceptor
interceptor = GRPCRateLimitInterceptor(
GRPCLimits(
requests_per_minute=100,
concurrent_requests=10
)
)
# Create server with rate limiting
server = grpc.server(
futures.ThreadPoolExecutor(max_workers=10),
interceptors=[interceptor]
)
GraphQL Example
from ratethrottle import GraphQLRateLimiter, GraphQLLimits
limiter = GraphQLRateLimiter(
GraphQLLimits(
queries_per_minute=100,
max_complexity=1000
)
)
# Check if query is allowed
error = limiter.check_rate_limit(
document_ast=parsed_query,
context=request_context
)
if error:
raise error # GraphQLError
Websocket Example
from ratethrottle import WebSocketRateLimiter, WebSocketLimits
limiter = WebSocketRateLimiter(
WebSocketLimits(
connections_per_minute=10,
messages_per_minute=100
)
)
# Check if connection allowed
if await limiter.check_connection("client_id"):
# Accept connection
await limiter.register_connection("client_id", websocket)
Monitoring and Alerting
from ratethrottle.monitoring import RateThrottleMonitor
from ratethrottle.alerting import AlertDispatcher
monitor = RateThrottleMonitor(
{
'enabled': True,
'interval': 60,
'log_metrics': True,
'export_json': True,
'export_path': 'metrics/metrics.json',
},
limiter=limiter,
ddos=ddos,
analytics=analytics,
)
dispatcher = AlertDispatcher(
{
'enabled': True,
'cooldown_seconds': 300,
'thresholds': {
'block_rate_warning': 5.0,
'block_rate_critical': 20.0,
'violations_per_minute_warning': 50.0,
'violations_per_minute_critical': 200.0,
'ddos_score_warning': 0.5,
'ddos_score_critical': 0.8,
},
'slack': {
'enabled': True,
'channel': '#alerts',
'username': 'RateThrottle',
},
'webhook': {
'enabled': False,
'url': '',
'timeout': 10,
},
}
)
monitor.start()
snapshot = monitor.snapshot_now()
dispatcher.check_and_alert(snapshot)
DDoS Protection
from ratethrottle import DDoSProtection
ddos = DDoSProtection({
'enabled': True,
'threshold': 10000,
'window': 60,
'auto_block': True,
'block_duration': 3600
})
# Analyze traffic pattern
pattern = ddos.analyze_traffic(
identifier='192.168.1.100',
endpoint='/api/data'
)
if pattern.is_suspicious:
print(f"⚠️ Suspicious activity detected!")
print(f"Request rate: {pattern.request_rate:.2f} req/s")
print(f"Suspicion score: {pattern.suspicious_score:.2f}")
Whitelist/Blacklist Management
# Add to whitelist (bypass all limits)
limiter.add_to_whitelist('192.168.1.100')
# Add to blacklist (block all requests)
limiter.add_to_blacklist('192.168.1.200', duration=3600) # Block for 1 hour
# Remove from blacklist
limiter.remove_from_blacklist('192.168.1.200')
Violation Callbacks
def handle_violation(violation):
"""Custom violation handler"""
print(f"⚠️ Violation: {violation.identifier}")
print(f"Rule: {violation.rule_name}")
print(f"Requests: {violation.requests_made}/{violation.limit}")
# Send alert, log to database, etc.
limiter.register_violation_callback(handle_violation)
Metrics
# Get metrics
metrics = limiter.get_metrics()
print(f"Total requests: {metrics['total_requests']}")
print(f"Blocked requests: {metrics['blocked_requests']}")
print(f"Block rate: {metrics['block_rate']:.2f}%")
print(f"Recent violations: {len(metrics['recent_violations'])}")
# Reset metrics
limiter.reset_metrics()
🖥️ CLI Usage
RateThrottle includes a powerful CLI for monitoring and management:
# Start interactive monitoring dashboard
ratethrottle monitor --config ratethrottle.yaml
# Test rate limiting configuration
ratethrottle test --rule api_default --identifier 192.168.1.100 --requests 150
# Manage whitelist/blacklist
ratethrottle manage --blacklist-add 192.168.1.50 --duration 3600
ratethrottle manage --whitelist-add 10.0.0.5
# View configuration
ratethrottle config --show
# Validate configuration
ratethrottle config --validate
# Export statistics
ratethrottle stats --export report.json
📊 Performance
RateThrottle is designed for high performance:
- In-memory storage: 10,000+ requests/second
- Redis storage: 50,000+ requests/second (network dependent)
- Minimal overhead: < 1ms per request check
- Thread-safe: Safe for concurrent use
- Memory efficient: Automatic cleanup of expired data
📝 License
This project is licensed under the MIT License - see the LICENSE file for details.
📮 Support
- 🐛 Issues: GitHub Issues
- 📖 Documentation: Full Documentation
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file ratethrottle-1.3.3.tar.gz.
File metadata
- Download URL: ratethrottle-1.3.3.tar.gz
- Upload date:
- Size: 108.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
516e265e88ab2682d1f1377d4693ef3996d1b3a19999845e071f1b44af4d5604
|
|
| MD5 |
39dd3bf326ea8ff9df855c763971e838
|
|
| BLAKE2b-256 |
9b7f97910518c86d7c16753c5dcbc31153bcd11f45980ea7c44d47f1f50ef233
|
Provenance
The following attestation bundles were made for ratethrottle-1.3.3.tar.gz:
Publisher:
publish.yml on MykeChidi/ratethrottle
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
ratethrottle-1.3.3.tar.gz -
Subject digest:
516e265e88ab2682d1f1377d4693ef3996d1b3a19999845e071f1b44af4d5604 - Sigstore transparency entry: 1252945837
- Sigstore integration time:
-
Permalink:
MykeChidi/ratethrottle@c4713ca94ed2e7fa32eeaa60cabc2b9ea2e2d977 -
Branch / Tag:
refs/tags/v1.3.3 - Owner: https://github.com/MykeChidi
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@c4713ca94ed2e7fa32eeaa60cabc2b9ea2e2d977 -
Trigger Event:
release
-
Statement type:
File details
Details for the file ratethrottle-1.3.3-py3-none-any.whl.
File metadata
- Download URL: ratethrottle-1.3.3-py3-none-any.whl
- Upload date:
- Size: 83.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
73407e65995d3736f6b779b6c604e81c5e7a4567805d67452dec3f944c9ba8ce
|
|
| MD5 |
2f7d67b1a80a7d45eb9c09eedfbdc574
|
|
| BLAKE2b-256 |
1d3fec94ff234c490f1d7733a43c622363561e65ead0ef2c2eef2b843ea7dd9e
|
Provenance
The following attestation bundles were made for ratethrottle-1.3.3-py3-none-any.whl:
Publisher:
publish.yml on MykeChidi/ratethrottle
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
ratethrottle-1.3.3-py3-none-any.whl -
Subject digest:
73407e65995d3736f6b779b6c604e81c5e7a4567805d67452dec3f944c9ba8ce - Sigstore transparency entry: 1252945856
- Sigstore integration time:
-
Permalink:
MykeChidi/ratethrottle@c4713ca94ed2e7fa32eeaa60cabc2b9ea2e2d977 -
Branch / Tag:
refs/tags/v1.3.3 - Owner: https://github.com/MykeChidi
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@c4713ca94ed2e7fa32eeaa60cabc2b9ea2e2d977 -
Trigger Event:
release
-
Statement type: