You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/reference/motlp.md
+31-14Lines changed: 31 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,8 +7,8 @@ applies_to:
7
7
observability:
8
8
security:
9
9
deployment:
10
-
ess:
11
-
stack: preview 9.2
10
+
ess:preview
11
+
self: unavailable
12
12
products:
13
13
- id: cloud-serverless
14
14
- id: observability
@@ -111,17 +111,25 @@ For more information on billing, refer to [Elastic Cloud pricing](https://www.el
111
111
112
112
## Rate limiting
113
113
114
-
Requests to the {{motlp}} are subject to rate limiting and throttling. If you exceed your {{es}} capacity in {{ech}}, or send data at a rate that exceeds the limits, your requests might be rejected.
114
+
Requests to the {{motlp}} are subject to rate limiting and throttling. If you send data at a rate that exceeds the limits, your requests might be rejected.
As long as your data ingestion rate stays at or below the rate limit and burst limit, your requests are accepted.
124
124
125
+
### Dynamic rate scaling for {{ech}}
126
+
```{applies_to}
127
+
ess:
128
+
stack: preview 9.2
129
+
```
130
+
131
+
For {{ech}} deployments, rate limits can scale up or down dynamically based on backpressure from {{es}}. Every deployment starts with a 1 MB/s rate limit and 2 MB/s burst limit. The system automatically adjusts these limits based on your {{es}} capacity and load patterns. Scaling requires time, so sudden load spikes might still result in temporary rate limiting.
132
+
125
133
### Exceeding the rate limit
126
134
127
135
If you send data that exceeds the available limits, the {{motlp}} responds with an HTTP `429` Too Many Requests status code. A log message similar to this appears in the OpenTelemetry Collector's output:
@@ -133,22 +141,31 @@ If you send data that exceeds the available limits, the {{motlp}} responds with
133
141
}
134
142
```
135
143
136
-
After your sending rate goes back to the allowed limit, the system automatically begins accepting requests again.
144
+
The causes of rate limiting differ by deployment type:
145
+
146
+
- **{{serverless-full}}**: You exceed the 15 MB/s rate limit or 30 MB/s burst limit.
147
+
- **{{ech}}**: You send load spikes that exceed current limits (temporary `429`s) or your {{es}} cluster can't keep up with the load (consistent `429`s).
148
+
149
+
After your sending rate goes back to the allowed limit, or after the system scales up the rate limit for {{ech}}, requests are automatically accepted again.
137
150
138
151
### Solutions to rate limiting
139
152
140
-
Depending on the reason for the rate limiting, you can either increase your {{es}} capacity or request higher limits.
153
+
The solutions to rate limiting depend on your deployment type:
154
+
155
+
#### {{ech}} deployments
141
156
142
-
#### Increase your {{es}} capacity
157
+
For {{ech}} deployments, if you're experiencing consistent `429` errors, the primary solution is to increase your {{es}} capacity. Because rate limits are affected by {{es}} backpressure, scaling up your {{es}} cluster reduces backpressure and, over time, increases the ingestion rate for your deployment.
143
158
144
-
If data intake exceeds the capacity of {{es}} in your {{ech}} deployment, you might get rate limiting errors. To solve this issue, scale or resize your deployment:
0 commit comments