Gist: The post explains three internal rate-limiting designs used for different traffic patterns: one exact but dependency-heavy, one approximate and scalable, and one probabilistic for shard-based processing. It frames rate limiting as a reliability trade-off under misconfigured or abusive traffic.
Signal reason: The post introduces and explains three rate limiter implementations and their operating patterns.
