Rate limits

Per-IP and per-key windows, 429 handling, anomaly alerts.

What this is

COHESION applies two rate-limit layers and a monthly per-org quota. Understanding them prevents surprise 429s.

Two layers

Layer 1: per-IP, pre-auth

Layer 2: per-key, post-auth

429 response

HTTP/1.1 429 Too Many Requests
Retry-After: 27

Retry-After is always an integer >= 1, per RFC 7231. Back off at least that long.

Per-org monthly quota

TierMonthly requests
Starter10,000
Standard100,000
Enterprise1,000,000

A quota breach does not throttle (the two-layer rate limit does that). It triggers a HIGH anomaly alert when the 24-hour rate exceeds 10x the 30-day rolling p95.

SDK behavior

Both SDKs auto-retry with exponential backoff, capped at maxRetries (default 3). On exhaustion they throw CohesionRateLimitError (TS) / CohesionRateLimitError (Py) including retryAfterSeconds.

Best practices

Next step