🎁 End of Year Gift: Use Code CROWDMAS25 for 60% Off CrowdSec Console Premium.

Check out now

Protecting CAPI reliability: Introducing rate limiting on CrowdSec’s Central API

CrowdSec’s Central API (CAPI) is a shared service used by CrowdSec Security Engines to authenticate, exchange data, and keep your deployments up to date with the latest threat intelligence. As our community and customer footprint continues to grow, we need to ensure CAPI remains reliable and responsive for everyone, from a single homelab instance to large production fleets.

To support that goal, we have deployed rate limiting on CAPI. This change is designed to reduce the impact of misconfigured or broken setups that unintentionally generate excessive traffic and consume disproportionate shared resources.

Why we are doing this

In the vast majority of cases, high request volume to CAPI is not malicious. It is typically caused by:

  • Instances stuck in restart loops (for example, a container that repeatedly fails health checks and restarts)
  • Misconfigured deployments that retry too aggressively on errors
  • Credentials being reused across large fleets, causing many engines to behave like one “super client” from the API’s perspective

Even when unintentional, these patterns create unnecessary load, degrade performance, and increase cloud resource consumption. Rate limiting is a practical safeguard to ensure continuity of service and responsible use of infrastructure and environmental footprint.

Who should expect to be impacted

For normal deployments, including large and well managed ones, you should not notice any change.

This rate limiting primarily targets outlier behaviour, typically stemming from:

  • Broken instances repeatedly trying to authenticate or fetch resources
  • Large numbers of engines using shared credentials in a way that creates excessive repeated calls

How the rate limiting works

We have implemented multiple thresholds for free Security Engines. The exact thresholds depend on how the engine is configured and used, including:

  • Whether the engine shares signals
  • Whether the engine is enrolled
  • Whether multiple engines appear to be using the same credentials

The objective is to keep legitimate usage unaffected while preventing misconfigurations from consuming an unfair share of capacity.

What happens if you cross a threshold

If a threshold is exceeded, the offending source IP may be temporarily banned from our service for several hours.

This is intentional: when a system is stuck in a tight retry loop, a short ban window is often the fastest way to stop the runaway traffic and give operators time to correct the underlying issue.

We are actively monitoring these thresholds and adjusting them based on real world behaviour and community feedback.

What to do if you are affected

If you suspect your setup has been rate limited, the right next step is to treat it as a signal to check for excessive retry behaviour. Common remediation steps include:

1) Check for restart loops and repeated failures

Look at your service manager or container runtime logs (systemd, Docker, Kubernetes) and confirm whether the engine is repeatedly restarting or failing to authenticate.

2) Validate credentials and identity usage

If you operate a fleet, ensure you are not unintentionally sharing the same credentials across a large number of engines in a way that causes excessive repeated calls.

3) Ensure your deployment uses sensible retry and backoff behaviour

If you have custom automation around CAPI, confirm it uses exponential backoff on failures rather than retrying immediately in a tight loop.

4) Confirm your engine is configured as intended

Misconfigurations are often small (a missing token, a wrong environment variable, a stale secret), but the resulting behaviour can create constant retries.

If you believe you were wrongfully impacted

If you believe your deployment has been incorrectly rate limited, contact us at: security at crowdsec dot net

Please include the approximate time of impact, your source IP, and any relevant logs or error messages. This will help us verify what happened and adjust thresholds where needed.

Closing note

This change is about keeping CAPI dependable for everyone. Rate limiting allows us to protect service quality, reduce operational waste, and ensure fair access to shared resources across the CrowdSec ecosystem.

As always, we appreciate your feedback and will continue tuning these protections based on what we observe in the field.

WRITTEN BY

You may also like

Explore and Prioritize Vulnerabilities with the CrowdSec CVE Explorer
Announcement

Explore and Prioritize Vulnerabilities with the CrowdSec CVE Explorer

Introducing our new CVE Explorer. Learn what it is and how it can help your organization prioritize threats and vulnerabilities.

When Hackers Go Back to School: Introducing CrowdSec Education and Public Sector Blocklists
Announcement

When Hackers Go Back to School: Introducing CrowdSec Education and Public Sector Blocklists

CrowdSec’s new Education and Public Sector Blocklists deliver proactive cybersecurity powered by real-world attack data & AI insights.

crowdsec notification center: slack
Announcement

Introducing CrowdSec’s New Notification Center: Seamless Integrations and Custom Alerts

CrowdSec now allows you to configure notifications directly from the Console and integrate with Slack. Stay alert and secure with ease.