Token bucket rate limiter with Redis and .NET
Implement a token bucket rate limiter using Redis and Lua scripts in .NET
This guide shows you how to implement a distributed token bucket rate limiter using Redis and Lua scripts in .NET with the StackExchange.Redis client library.
Overview
Rate limiting is a critical technique for controlling the rate at which operations are performed. Common use cases include:
- Limiting API requests per user or IP address
- Preventing abuse and protecting against denial-of-service attacks
- Ensuring fair resource allocation across multiple clients
- Throttling background jobs or batch operations
The token bucket algorithm is a popular rate limiting approach that allows bursts of traffic while maintaining an average rate limit over time. This guide covers the .NET implementation using the StackExchange.Redis client library, taking advantage of ConnectionMultiplexer for connection management and record types for clean result types.
How it works
The token bucket algorithm works like a bucket that holds tokens:
- Initialization: The bucket starts with a maximum capacity of tokens
- Refill: Tokens are added to the bucket at a constant rate (for example, 1 token per second)
- Consumption: Each request consumes one token from the bucket
- Decision: If tokens are available, the request is allowed; otherwise, it's denied
- Capacity limit: The bucket never exceeds its maximum capacity
This approach allows for burst traffic (using accumulated tokens) while enforcing an average rate limit over time.
Why use Redis?
Redis is ideal for distributed rate limiting because:
- Atomic operations: Lua scripts execute atomically, preventing race conditions
- Shared state: Multiple application servers can share the same rate limit counters
- High performance: In-memory operations provide microsecond latency
- Automatic expiration: Keys can be set to expire automatically (though not used in this implementation)
The Lua script
The core of this implementation is a Lua script that runs atomically on the Redis server. This ensures that checking and updating the token bucket happens in a single operation, preventing race conditions in distributed environments.
Here's how the script works:
local key = KEYS[1]
local capacity = tonumber(ARGV[1])
local refill_rate = tonumber(ARGV[2])
local refill_interval = tonumber(ARGV[3])
local now = tonumber(ARGV[4])
-- Get current state or initialize
local bucket = redis.call('HMGET', key, 'tokens', 'last_refill')
local tokens = tonumber(bucket[1])
local last_refill = tonumber(bucket[2])
-- Initialize if this is the first request
if tokens == nil then
tokens = capacity
last_refill = now
end
-- Calculate token refill
local time_passed = now - last_refill
local refills = math.floor(time_passed / refill_interval)
if refills > 0 then
tokens = math.min(capacity, tokens + (refills * refill_rate))
last_refill = last_refill + (refills * refill_interval)
end
-- Try to consume a token
local allowed = 0
if tokens >= 1 then
tokens = tokens - 1
allowed = 1
end
-- Update state
redis.call('HMSET', key, 'tokens', tokens, 'last_refill', last_refill)
-- Return result: allowed (1 or 0) and remaining tokens
return {allowed, tokens}
Script breakdown
- State retrieval: Uses
HMGETto fetch the current token count and last refill time from a hash - Initialization: On first use, sets tokens to full capacity
- Token refill calculation: Computes how many tokens should be added based on elapsed time
- Capacity enforcement: Uses
math.min()to ensure tokens never exceed capacity - Token consumption: Decrements the token count if available
- State update: Uses
HMSETto save the new state - Return value: Returns both the decision (allowed/denied) and remaining tokens
Why atomicity matters
Without atomic execution, race conditions could occur:
- Double spending: Two requests could read the same token count and both succeed when only one should
- Lost updates: Concurrent updates could overwrite each other's changes
- Inconsistent state: Token count and refill time could become desynchronized
Using EVAL or EVALSHA ensures the entire operation executes atomically, making it safe for distributed systems.
Installation
Add the StackExchange.Redis NuGet package to your project:
dotnet add package StackExchange.Redis
Or add it directly to your .csproj file:
<PackageReference Include="StackExchange.Redis" Version="2.8.0" />
Using the .NET class
The TokenBucket class provides an interface for rate limiting
(source):
using StackExchange.Redis;
// Create a Redis connection
var redis = ConnectionMultiplexer.Connect("localhost:6379");
var db = redis.GetDatabase();
// Create a rate limiter: 10 requests per second
var limiter = new TokenBucket(
db: db,
capacity: 10, // Maximum burst size
refillRate: 1, // Add 1 token per interval
refillInterval: 1.0 // Every 1 second
);
// Check if a request should be allowed
var result = limiter.Allow("user:123");
if (result.Allowed)
{
Console.WriteLine($"Request allowed. {result.Remaining} tokens remaining.");
// Process the request
}
else
{
Console.WriteLine("Request denied. Rate limit exceeded.");
// Return 429 Too Many Requests
}
The Allow method executes the Lua script synchronously via StackExchange.Redis. The ConnectionMultiplexer manages connections automatically, including reconnection and multiplexing commands across a single TCP connection. The result is returned as a RateLimitResult record containing both the decision and the remaining token count.
Configuration parameters
- capacity: Maximum number of tokens in the bucket (controls burst size)
- refillRate: Number of tokens added per refill interval
- refillInterval: Time in seconds between refills
For example:
capacity=10, refillRate=1, refillInterval=1.0allows 10 requests per second with bursts up to 10capacity=100, refillRate=10, refillInterval=1.0allows 10 requests per second with bursts up to 100capacity=60, refillRate=1, refillInterval=60.0allows 1 request per minute with bursts up to 60
Rate limit keys
The key parameter identifies what you're rate limiting. Common patterns:
- Per user:
user:{userId}- Limit each user independently - Per IP address:
ip:{ipAddress}- Limit by client IP - Per API endpoint:
api:{endpoint}:{userId}- Different limits per endpoint - Global:
global:api- Single limit shared across all requests
Script caching with EVALSHA
The .NET implementation uses EVALSHA for optimal performance. On first use, the Lua script is loaded into Redis with SCRIPT LOAD, and subsequent calls use the cached SHA1 hash. If the script is evicted from the cache, the class automatically falls back to EVAL and reloads the script. Script loading is thread-safe, using volatile fields and locking to handle concurrent access.
// The class handles script caching automatically.
// First call loads the script, subsequent calls use EVALSHA.
var result1 = limiter.Allow("user:123"); // Uses EVAL + caches
var result2 = limiter.Allow("user:123"); // Uses EVALSHA (faster)
Thread safety
The TokenBucket class is thread-safe. StackExchange.Redis's IDatabase is designed for concurrent use, and you can share a single TokenBucket instance across your entire application:
// Create a shared limiter instance
var limiter = new TokenBucket(db, capacity: 10, refillRate: 1, refillInterval: 1.0);
// Safe to call from multiple threads
var tasks = Enumerable.Range(0, 20).Select(i =>
{
var result = limiter.Allow("shared:resource");
Console.WriteLine($"Request {i}: allowed={result.Allowed} remaining={result.Remaining}");
return result;
}).ToList();
Running the demo
A demonstration HTTP server is included to show the rate limiter in action (source):
# Run the demo server
dotnet run
The demo provides an interactive web interface where you can:
- Submit requests and see them allowed or denied in real-time
- View the current token count
- Adjust rate limit parameters dynamically
- Test different rate limiting scenarios
The demo assumes Redis is running on localhost:6379 but you can specify a different host and port using the --redis-host HOST and --redis-port PORT command-line arguments. Visit http://localhost:8080 in your browser to try it out.
Response headers
It's common to include rate limit information in HTTP response headers:
int capacity = 10;
double refillInterval = 1.0;
var limiter = new TokenBucket(db, capacity: capacity, refillRate: 1, refillInterval: refillInterval);
var result = limiter.Allow($"user:{userId}");
// Add standard rate limit headers
Response.Headers["X-RateLimit-Limit"] = capacity.ToString();
Response.Headers["X-RateLimit-Remaining"] = ((int)result.Remaining).ToString();
Response.Headers["X-RateLimit-Reset"] =
DateTimeOffset.UtcNow.AddSeconds(refillInterval).ToUnixTimeSeconds().ToString();
if (!result.Allowed)
{
Response.Headers["Retry-After"] = ((int)refillInterval).ToString();
Response.StatusCode = 429; // Too Many Requests
}
Customization
Using as ASP.NET Core middleware
You can wrap the rate limiter as middleware for use with ASP.NET Core:
public class RateLimitMiddleware
{
private readonly RequestDelegate _next;
private readonly TokenBucket _limiter;
public RateLimitMiddleware(RequestDelegate next, IDatabase db)
{
_next = next;
_limiter = new TokenBucket(db, capacity: 10, refillRate: 1, refillInterval: 1.0);
}
public async Task InvokeAsync(HttpContext context)
{
var key = $"ip:{context.Connection.RemoteIpAddress}";
var result = _limiter.Allow(key);
context.Response.Headers["X-RateLimit-Remaining"] =
((int)result.Remaining).ToString();
if (!result.Allowed)
{
context.Response.StatusCode = 429;
await context.Response.WriteAsJsonAsync(
new { error = "Rate limit exceeded" });
return;
}
await _next(context);
}
}
Error handling
The Allow method may throw a RedisException if the Redis connection is lost. Wrap calls in try/catch blocks for production use:
try
{
var result = limiter.Allow("user:123");
// Handle result
}
catch (RedisException ex)
{
Console.Error.WriteLine($"Rate limiter error: {ex.Message}");
// Fail open: allow the request when Redis is unavailable
// Or fail closed: deny the request
}
Learn more
- EVAL command - Execute Lua scripts
- EVALSHA command - Execute cached Lua scripts
- Lua scripting - Introduction to Redis Lua scripting
- HMGET command - Get multiple hash fields
- HMSET command - Set multiple hash fields
- .NET client - Redis .NET client documentation