Hi everyone,
I’m hoping someone here might have some insight into a specific rate-limiting behavior I’m seeing with the Kong Gateway. I’m currently building a small analytics middleware that sits between a mobile application and our backend database. We are using the Kong Rate Limiting plugin to prevent abuse, but I’ve run into a strange edge case with a specific group of power users.
These users are running delta scripts to automate data reporting from within a mobile sandbox environment. I’m noticing that when the requests originate from these delta scripts, Kong intermittently returns 429 Too Many Requests, even though the total request count for that specific IP is well below the threshold we’ve set in our YAML config.
I have a suspicion that the way the mobile environment handles connection pooling or keep-alive headers might be causing Kong to misinterpret the request frequency or reuse a consumer identity in a way that triggers the limit prematurely. Has anyone else experienced issues with Kong’s policy: local vs policy: redis when handling traffic from automated client-side executors like this? I’m also seeing some custom headers being stripped before they reach the upstream service, and I can’t figure out if it’s the executor’s networking library or a default Kong transformation plugin that’s causing the cleanup. If anyone has experience fine-tuning Kong to handle high-velocity traffic from mobile-based automation without accidentally flagging it as a DDoS attempt, I’d love to hear your thoughts on the best plugin configuration to use!