traffic_shaping
The traffic_shaping configuration object provides control over how the Hive Router manages
connections and executes requests to your subgraph services.
These settings are crucial for ensuring the router operates efficiently under load and for protecting your downstream subgraphs from being overwhelmed. For a detailed guide on how to tune these settings, see the Performance Tuning & Traffic Shaping Guide.
max_connections_per_host
- Type:
integer - Default:
100
Limits the maximum number of concurrent HTTP connections the router will open to a single subgraph host. This acts as a safeguard to prevent overwhelming a subgraph with too many simultaneous requests.
Inbound Options
The following options are set under traffic_shaping.router and control behaviour of the router
itself (i.e. how it handles incoming client requests).
router.dedupe
Configures inbound in-flight request deduplication. When enabled, identical concurrent
incoming GraphQL query requests are coalesced into a single execution, with the result shared
among all waiting clients. Subscriptions are also deduplicated: N clients subscribing to the same
operation with the same variables result in exactly one upstream subgraph connection, with events
fanned out to all connected clients via a broadcast channel.
This is distinct from the outbound dedupe_enabled, which deduplicates the requests the router
sends to subgraphs.
For a detailed explanation and tuning guidance see the Request Deduplication section of the Performance Tuning guide.
router.dedupe.enabled
- Type:
boolean - Default:
false
Enables or disables inbound in-flight request deduplication.
traffic_shaping:
router:
dedupe:
enabled: truerouter.dedupe.headers
- Type:
string | object - Default:
"all"
Controls which request headers are factored into the deduplication fingerprint. Header names are case-insensitive and validated as standard HTTP header names.
| Value | Behaviour |
|---|---|
all | All headers are included in the fingerprint (default). |
none | No headers are included — requests from different users may share an execution. |
{ include: [...] } | Only the listed header names are included. |
traffic_shaping:
router:
dedupe:
enabled: true
headers: alltraffic_shaping:
router:
dedupe:
enabled: true
headers: nonetraffic_shaping:
router:
dedupe:
enabled: true
headers:
include:
- authorization
- cookierouter.max_long_lived_clients
- Type:
integer - Default:
128
traffic_shaping:
router:
max_long_lived_clients: 256Limits the maximum number of concurrent long-lived client connections: WebSocket connections and
HTTP streaming responses (SSE, Incremental Delivery, Multipart HTTP). When the limit is reached,
new long-lived connection attempts are rejected with 503 Service Unavailable and a
Retry-After: 5 response header. Regular HTTP requests (queries and mutations) are not affected.
This limit only activates when at least one of WebSocket or Subscriptions is enabled. Setting it
to 0 disables the limit entirely.
router.tls (Client ↔ Router)
Use this configuration field to make the router serve HTTPS traffic (TLS) and optionally require client certificates (mTLS). For a conceptual overview and step-by-step setup, see TLS & mTLS.
cert_file(required): Router server certificate file path, or a list of certificate file paths.key_file(required): Router server private key file path.client_auth.cert_file(optional): Trusted client CA certificate file path, or a list of certificate file paths.client_auth.required(optional, defaulttrue): Whether client certificates are required whenclient_authis set.
traffic_shaping:
router:
tls:
cert_file: /etc/router/tls/server.crt
key_file: /etc/router/tls/server.keytraffic_shaping:
router:
tls:
cert_file:
- /etc/router/tls/server.crt
- /etc/router/tls/intermediate.crt
key_file: /etc/router/tls/server.key
client_auth:
cert_file: /etc/router/tls/client-ca.crt
required: trueOutbound Options
The following options (allow_only_http2, circuit_breaker, dedupe_enabled, pool_idle_timeout,
request_timeout, and tls) can be set globally for all subgraphs or overridden on a per-subgraph
basis by nesting them under the subgraph's name within the traffic_shaping map.
For example, the following example shows how to set global defaults and override them for a specific
subgraph named products:
traffic_shaping:
max_connections_per_host: 150
all:
pool_idle_timeout: 60s
subgraphs:
products:
dedupe_enabled: false
pool_idle_timeout: 120sallow_only_http2
- Type:
boolean - Default:
false
Forces HTTP/2 for requests to subgraphs. When enabled:
- For plain HTTP connections, it will use HTTP/2 cleartext (h2c).
- For HTTPS connections, it also requires HTTP/2.
This means subgraph requests will never fall back to HTTP/1.1, and the router will fail to connect if the subgraph does not support HTTP/2.
traffic_shaping:
all:
allow_only_http2: truecircuit_breaker
- Type:
object | null - Default:
null(disabled)
Enables the circuit breaker pattern for subgraph requests. When the error rate of requests to a
subgraph exceeds the configured threshold, the circuit breaker opens and subsequent requests are
immediately rejected with a SUBGRAPH_CIRCUIT_BREAKER_REJECTED error, instead of waiting for the
subgraph to respond. After the reset_timeout elapses, the circuit enters a half-open state and
lets the next request probe the subgraph. If the probe succeeds, the circuit closes again;
otherwise, it returns to the open state.
For a detailed explanation and tuning guidance see the Circuit Breaker section of the Performance Tuning guide.
circuit_breaker.enabled
- Type:
boolean - Default:
false
Enables or disables the circuit breaker for the subgraph(s). When omitted in a per-subgraph
circuit_breaker block, the value inherits from the global traffic_shaping.all.circuit_breaker
configuration.
circuit_breaker.error_threshold
- Type:
string - Default:
50%
The error rate (as a percentage string) above which the circuit breaker opens. For example, 50%
means the circuit trips when 50% or more of requests in the evaluation window fail. When omitted in
a per-subgraph override, the value falls back to the global configuration.
circuit_breaker.volume_threshold
- Type:
integer - Default:
5
Size of the rolling window the breaker uses to track call outcomes. The first volume_threshold
calls fill the window; from then on, every subsequent call triggers an error-rate check over the
most recent volume_threshold outcomes. This prevents the circuit from tripping due to a handful
of failures during low-traffic periods. When omitted in a per-subgraph override, the value falls
back to the global configuration.
circuit_breaker.reset_timeout
- Type:
string - Default:
30s
The duration the circuit breaker stays open before transitioning to a half-open state and allowing
probe calls through to test whether the subgraph has recovered. Accepts a duration string (e.g.
30s, 1m). When omitted in a per-subgraph override, the value falls back to the global
configuration.
circuit_breaker.half_open_attempts
- Type:
integer - Default:
10
Size of the rolling sample of probe requests collected while the breaker is in the half-open state
after reset_timeout has elapsed. The breaker fills this sample first; the next probe after the
sample is full is the one whose result is evaluated against error_threshold to decide whether
to transition back to closed (resuming normal traffic) or back to open (waiting for
another reset_timeout window). In practice the breaker needs at least half_open_attempts + 1
probe calls before it can transition out of half-open.
Lower values make recovery faster but more aggressive; higher values gather more samples before re-closing the circuit. When omitted in a per-subgraph override, the value falls back to the global configuration.
circuit_breaker.error_status_codes
- Type:
(integer | string)[] - Default:
[500, 502, 503, 504]
The list of HTTP status codes returned by the subgraph that should be counted as failures by the circuit breaker. Only responses whose status code matches an entry in this list are recorded as failures. Responses with any other status code (including other 4xx/5xx codes) are treated as successes from the circuit breaker's perspective. When omitted in a per-subgraph override, the value falls back to the global configuration.
Each entry may be either:
- An exact HTTP status code, given as an integer or its string form:
500,503,"503". - A wildcard pattern, given as a string. Two pattern forms are accepted (case-insensitive):
"5xx"(or any[1-5]xx) matches every status in the corresponding 100-code range. For example,"5xx"matches500–599."50x"(or any[1-5][0-9]x) matches every status in the corresponding 10-code range. For example,"50x"matches500–509,"52x"matches520–529.
Exact codes and wildcards can be mixed freely in the same list:
traffic_shaping:
all:
circuit_breaker:
enabled: true
error_status_codes: [501, "5xx", "52x"]When a subgraph response matches one of the configured error_status_codes,
the original response from the subgraph (status, body, and headers) is still
surfaced to the client. The breaker counts it as a failure for trip-evaluation
purposes only, it does not alter the response. This preserves the pre-existing
behavior of the router for subgraphs that legitimately return error status
codes.
Example: global circuit breaker with a per-subgraph override
traffic_shaping:
all:
circuit_breaker:
enabled: true
error_threshold: 50%
volume_threshold: 5
reset_timeout: 30s
subgraphs:
payments:
circuit_breaker:
volume_threshold: 3 # more sensitive for the payments subgraph; other settings inherit from globaldedupe_enabled
- Type:
boolean - Default:
true
Enables or disables in-flight request deduplication. When true, identical, concurrent requests to
a subgraph are coalesced into a single request, with the response being shared among all clients.
pool_idle_timeout
- Type:
string - Default:
50s
Controls the timeout in duration string format (e.g. 1m for 1 minute, 30s for 30 seconds) for
idle keep-alive connections in the router's connection pool. Connections that are unused for this
duration will be closed.
This example configuration increases the connection limit for a high-capacity subgraph and sets a longer idle timeout.
traffic_shaping:
subgraphs:
high_capacity_subgraph:
pool_idle_timeout: 90srequest_timeout
- Default:
30s
Request timeout in duration string format (e.g. 30s for 30 seconds, 1m for 1 minute). This
setting specifies the maximum time the router will wait for a response from a subgraph before timing
out the request. By default, the router will wait up to 30 seconds for a subgraph to respond.
The value for request_timeout must be a valid duration string or a VRL expression that evaluates
to a duration string.
Static
- Type:
string
When a static duration string is provided, it sets a fixed timeout for all requests to subgraphs.
traffic_shaping:
all:
request_timeout: 30sDynamic
- Type:
object
When an object is provided, it must contain a VRL expression that evaluates to a duration
string. The expression is evaluated for each request, allowing for dynamic timeout values based on
request characteristics.
expression: (string, required) A VRL expression that computes the request timeout duration.
Within the expression, you have access to the following context:
.request: The incoming HTTP request object, including its headers..default: The default timeout value set at the global level (available for subgraph overrides).
traffic_shaping:
all:
request_timeout:
expression: |
if .request.headers."X-Priority" == "high" {
"10s"
} else {
"60s"
}
subgraphs:
product:
request_timeout:
expression: |
if .request.headers."X-Region" == "Europe" {
"10s"
} else {
.default
}This example sets a shorter timeout for high-priority requests based on a custom header, and
configures the product subgraph to have a different timeout for requests originating from Europe.
tls (Router ↔ Subgraphs)
Use these configuration fields to configure TLS for outbound requests from the router to subgraphs. For a conceptual overview and step-by-step setup, see TLS & mTLS.
all.tls: global default TLS config for all subgraphs.subgraphs.<name>.tls: per-subgraph override.
Supported fields:
cert_file(optional): Trusted subgraph CA certificate file path, or a list of certificate file paths.client_auth.cert_file+client_auth.key_file(optional): Router client certificate and key for mTLS to subgraphs.insecure_skip_ca_verification(optional, defaultfalse): Disables server certificate verification.
When both all.tls and subgraphs.<name>.tls are set, the subgraph config overrides the matching
global fields. Fields not set in the subgraph config fall back to all.tls.
traffic_shaping:
all:
tls:
cert_file: /etc/router/tls/subgraph-ca.crt
subgraphs:
payments:
tls:
cert_file: /etc/router/tls/payments-ca.crt
accounts:
tls:
cert_file: /etc/router/tls/accounts-ca.crt
client_auth:
cert_file: /etc/router/tls/router-client.crt
key_file: /etc/router/tls/router-client.keyinsecure_skip_ca_verification: true should only be used for local
development or controlled testing. It disables verification of subgraph server
certificates.