Rate Limiter in System Design. Part 2 - Commonly Used Algorithms
Jul 19, 2023 · 5 min read · Leaky Bucket Conceptually, the Leaky Bucket algorithm operates as follows. The server utilizes a fixed-sized bucket, and the bottom of the bucket has a hole (output) to hold a certain number of tokens. In this context, a token represents a request se...
Join discussion