Change theme
Help
Press space for more information.
Show links for this issue (Shortcut: i, l)
Copy issue ID
Previous Issue (Shortcut: k)
Next Issue (Shortcut: j)
Sign in to use full features.
Vote: I am impacted
Notification menu
Refresh (Shortcut: Shift+r)
Go home (Shortcut: u)
Pending code changes (auto-populated)
View issue level access limits(Press Alt + Right arrow for more information)
Request for new functionality
View staffing
Description
This will create a feature request which anybody can view and comment on.
Please describe your requested enhancement. Good feature requests will solve common problems or enable new use cases.
What you would like to accomplish: To be able to set a maximum number of requests done by a specific IP address during a set period of time.
How this might work: To prevent situations like DDoS attacks in which changing IP addresses create an exaggerated amount of requests to a specific service. If these requests reach the service, they can increase the number of instances (i.e.: App Engine, Cloud Function.. ) and thus increasing the costs or making the service unable to respond to legit requests.
This could be implemented by adding a new element for this specific purpose available to the Cloud Endpoints configuration files.
If applicable, reasons why alternative solutions are not sufficient: Using CloudFlare can be an alternative solution for this specific situation, but it is not viable for people not wanting to use third party products.
Other information (workarounds you have tried, documentation consulted, etc): Implementing a pipeline using BigQuery that checks the logs and updates the firewall rules to block abusive IP addresses is an option but it can be quite cumbersome to use.