이 정책은 들어오는 요청을 기록하는 분산 '카운터'를 유지하여 클라이언트 앱에 소비 한도를 적용합니다. 카운터는 앱, 개발자, API 키, 액세스 토큰 등을 포함하여 식별 가능한 모든 항목의 API 호출을 기록할 수 있습니다. 일반적으로 API 키는 클라이언트 앱을 식별하는 데 사용됩니다. 이 정책의 계산 비용이 높으므로 트래픽이 높은 API의 경우 정책 시간 간격을 일 또는 월과 같이 길게 구성해야 합니다. 이 정책은 운영 트래픽 관리가 아닌 개발자 및 파트너와 비즈니스 계약이나 SLA를 적용하는 데 사용되어야 합니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-08-19(UTC)"],[[["\u003cp\u003eThis page provides information regarding traffic management using Apigee and Apigee hybrid.\u003c/p\u003e\n"],["\u003cp\u003eThe SpikeArrest policy is used to protect against traffic surges, limiting the number of requests processed by an API proxy.\u003c/p\u003e\n"],["\u003cp\u003eThe Quota policy enforces consumption limits on client apps by tracking incoming requests, making it ideal for business contract or SLA enforcement.\u003c/p\u003e\n"],["\u003cp\u003eBoth policies aim to maintain the performance and availability of APIs and backend services, and might be used simultaneously.\u003c/p\u003e\n"]]],[],null,["# Rate-limiting\n\n*This page\napplies to **Apigee** and **Apigee hybrid**.*\n\n\n*View [Apigee Edge](https://docs.apigee.com/api-platform/get-started/what-apigee-edge) documentation.*\n\nTo maintain performance and availability across a diverse base of client apps, it's critical\nto maintain app traffic within the limits of the capacity of your APIs and backend services. It's\nalso important to ensure that apps don't consume more resources than permitted.\n\nApigee provides two policies that enable you to optimize traffic management to\nminimize latency for apps while maintaining the health of backend services. Each policy type\naddresses a distinct aspect of traffic management. In some cases, you might use both policy\ntypes in a single API proxy.\n\nSpikeArrest policy\n------------------\n\nThe SpikeArrest policy protects against traffic surges. This\npolicy limits the number of requests processed by an API proxy and sent to a backend,\nprotecting against performance lags and downtime.\n\nThis policy should be\nused to prevent sudden traffic bursts caused by malicious attackers attempting to disrupt a\nservice using a denial-of-service (DOS) attack or by buggy client applications.\n\nSee [SpikeArrest\npolicy](/apigee/docs/api-platform/reference/policies/spike-arrest-policy).\n\nQuota policy\n------------\n\nThis policy enforces consumption limits on client apps by maintaining a distributed 'counter'\nthat tallies incoming requests. The counter can tally API calls for any identifiable entity,\nincluding apps, developers, API keys, access tokens, and so on. Usually, API keys are used to\nidentify client apps. This policy is computationally expensive so, for high-traffic APIs, it\nshould configured for longer time intervals, such as a day or month. This policy should be used\nto enforce business contracts or SLAs with developers and partners, rather than for operational\ntraffic management.\n\nSee [Quota policy](/apigee/docs/api-platform/reference/policies/quota-policy)."]]