← スキル一覧に戻る

deepgram-rate-limits
by jeremylongshore
deepgram-rate-limitsは、システム間の統合と連携を実現するスキルです。APIとデータの統合により、シームレスな情報フローと業務効率の向上をサポートします。
⭐ 1,042🍴 135📅 2026年1月23日
SKILL.md
name: deepgram-rate-limits description: | Implement Deepgram rate limiting and backoff strategies. Use when handling API quotas, implementing request throttling, or dealing with rate limit errors. Trigger with phrases like "deepgram rate limit", "deepgram throttling", "429 error deepgram", "deepgram quota", "deepgram backoff". allowed-tools: Read, Grep, Bash(curl:*) version: 1.0.0 license: MIT author: Jeremy Longshore jeremy@intentsolutions.io
Deepgram Rate Limits
Overview
Implement proper rate limiting and backoff strategies for Deepgram API integration.
Deepgram Rate Limits
| Plan | Concurrent Requests | Requests/Minute | Audio Hours/Month |
|---|---|---|---|
| Pay As You Go | 100 | 1000 | Unlimited |
| Growth | 200 | 2000 | Included hours |
| Enterprise | Custom | Custom | Custom |
Instructions
Step 1: Implement Request Queue
Create a queue to manage concurrent request limits.
Step 2: Add Exponential Backoff
Handle rate limit responses with intelligent retry.
Step 3: Monitor Usage
Track request counts and audio duration.
Step 4: Implement Circuit Breaker
Prevent cascade failures during rate limiting.
Output
- Rate-limited request queue
- Exponential backoff handler
- Usage monitoring dashboard
- Circuit breaker implementation
Examples
TypeScript Rate Limiter
// lib/rate-limiter.ts
interface RateLimiterConfig {
maxConcurrent: number;
maxPerMinute: number;
retryAttempts: number;
baseDelay: number;
}
export class DeepgramRateLimiter {
private queue: Array<{
fn: () => Promise<unknown>;
resolve: (value: unknown) => void;
reject: (error: Error) => void;
}> = [];
private activeRequests = 0;
private requestsThisMinute = 0;
private minuteStart = Date.now();
private config: RateLimiterConfig;
constructor(config: Partial<RateLimiterConfig> = {}) {
this.config = {
maxConcurrent: config.maxConcurrent ?? 50,
maxPerMinute: config.maxPerMinute ?? 500,
retryAttempts: config.retryAttempts ?? 3,
baseDelay: config.baseDelay ?? 1000,
};
}
async execute<T>(fn: () => Promise<T>): Promise<T> {
return new Promise((resolve, reject) => {
this.queue.push({
fn,
resolve: resolve as (value: unknown) => void,
reject,
});
this.processQueue();
});
}
private async processQueue() {
// Reset minute counter if needed
const now = Date.now();
if (now - this.minuteStart >= 60000) {
this.requestsThisMinute = 0;
this.minuteStart = now;
}
// Check limits
if (this.activeRequests >= this.config.maxConcurrent) return;
if (this.requestsThisMinute >= this.config.maxPerMinute) return;
if (this.queue.length === 0) return;
const { fn, resolve, reject } = this.queue.shift()!;
this.activeRequests++;
this.requestsThisMinute++;
try {
const result = await this.executeWithRetry(fn);
resolve(result);
} catch (error) {
reject(error instanceof Error ? error : new Error(String(error)));
} finally {
this.activeRequests--;
this.processQueue();
}
}
private async executeWithRetry<T>(
fn: () => Promise<T>,
attempt = 0
): Promise<T> {
try {
return await fn();
} catch (error) {
const isRateLimited = error instanceof Error &&
(error.message.includes('429') || error.message.includes('rate limit'));
if (isRateLimited && attempt < this.config.retryAttempts) {
const delay = this.config.baseDelay * Math.pow(2, attempt);
const jitter = Math.random() * 1000;
await new Promise(r => setTimeout(r, delay + jitter));
return this.executeWithRetry(fn, attempt + 1);
}
throw error;
}
}
getStats() {
return {
activeRequests: this.activeRequests,
queuedRequests: this.queue.length,
requestsThisMinute: this.requestsThisMinute,
};
}
}
Exponential Backoff with Jitter
// lib/backoff.ts
interface BackoffConfig {
baseDelay: number;
maxDelay: number;
factor: number;
jitter: boolean;
}
export class ExponentialBackoff {
private attempt = 0;
private config: BackoffConfig;
constructor(config: Partial<BackoffConfig> = {}) {
this.config = {
baseDelay: config.baseDelay ?? 1000,
maxDelay: config.maxDelay ?? 60000,
factor: config.factor ?? 2,
jitter: config.jitter ?? true,
};
}
getDelay(): number {
const exponential = this.config.baseDelay *
Math.pow(this.config.factor, this.attempt);
const capped = Math.min(exponential, this.config.maxDelay);
if (this.config.jitter) {
// Full jitter: random value between 0 and calculated delay
return Math.random() * capped;
}
return capped;
}
increment(): void {
this.attempt++;
}
reset(): void {
this.attempt = 0;
}
async wait(): Promise<void> {
const delay = this.getDelay();
await new Promise(resolve => setTimeout(resolve, delay));
this.increment();
}
}
// Usage
const backoff = new ExponentialBackoff();
async function transcribeWithBackoff(url: string) {
const maxAttempts = 5;
for (let i = 0; i < maxAttempts; i++) {
try {
return await transcribe(url);
} catch (error) {
if (i === maxAttempts - 1) throw error;
if (error instanceof Error && error.message.includes('429')) {
console.log(`Rate limited, waiting ${backoff.getDelay()}ms...`);
await backoff.wait();
} else {
throw error;
}
}
}
}
Circuit Breaker Pattern
// lib/circuit-breaker.ts
enum CircuitState {
CLOSED = 'CLOSED',
OPEN = 'OPEN',
HALF_OPEN = 'HALF_OPEN',
}
interface CircuitBreakerConfig {
failureThreshold: number;
resetTimeout: number;
halfOpenRequests: number;
}
export class CircuitBreaker {
private state = CircuitState.CLOSED;
private failures = 0;
private lastFailure = 0;
private halfOpenSuccesses = 0;
private config: CircuitBreakerConfig;
constructor(config: Partial<CircuitBreakerConfig> = {}) {
this.config = {
failureThreshold: config.failureThreshold ?? 5,
resetTimeout: config.resetTimeout ?? 30000,
halfOpenRequests: config.halfOpenRequests ?? 3,
};
}
async execute<T>(fn: () => Promise<T>): Promise<T> {
if (this.state === CircuitState.OPEN) {
if (Date.now() - this.lastFailure > this.config.resetTimeout) {
this.state = CircuitState.HALF_OPEN;
this.halfOpenSuccesses = 0;
} else {
throw new Error('Circuit breaker is OPEN');
}
}
try {
const result = await fn();
if (this.state === CircuitState.HALF_OPEN) {
this.halfOpenSuccesses++;
if (this.halfOpenSuccesses >= this.config.halfOpenRequests) {
this.state = CircuitState.CLOSED;
this.failures = 0;
}
}
return result;
} catch (error) {
this.recordFailure();
throw error;
}
}
private recordFailure() {
this.failures++;
this.lastFailure = Date.now();
if (this.failures >= this.config.failureThreshold) {
this.state = CircuitState.OPEN;
console.log('Circuit breaker OPENED');
}
}
getState(): CircuitState {
return this.state;
}
}
Usage Monitor
// lib/usage-monitor.ts
interface UsageStats {
requestCount: number;
audioSeconds: number;
errorCount: number;
rateLimitHits: number;
startTime: Date;
}
export class DeepgramUsageMonitor {
private stats: UsageStats = {
requestCount: 0,
audioSeconds: 0,
errorCount: 0,
rateLimitHits: 0,
startTime: new Date(),
};
recordRequest(audioSeconds: number = 0) {
this.stats.requestCount++;
this.stats.audioSeconds += audioSeconds;
}
recordError(isRateLimit: boolean = false) {
this.stats.errorCount++;
if (isRateLimit) {
this.stats.rateLimitHits++;
}
}
getStats(): UsageStats & { audioDuration: string; uptimeHours: number } {
const uptimeMs = Date.now() - this.stats.startTime.getTime();
return {
...this.stats,
audioDuration: this.formatDuration(this.stats.audioSeconds),
uptimeHours: uptimeMs / 3600000,
};
}
private formatDuration(seconds: number): string {
const hours = Math.floor(seconds / 3600);
const minutes = Math.floor((seconds % 3600) / 60);
return `${hours}h ${minutes}m`;
}
shouldAlert(): boolean {
// Alert if rate limit hit rate exceeds 10%
const hitRate = this.stats.rateLimitHits / this.stats.requestCount;
return hitRate > 0.1 && this.stats.requestCount > 10;
}
}
Python Rate Limiter
# lib/rate_limiter.py
import asyncio
import time
from collections import deque
from typing import Callable, TypeVar
T = TypeVar('T')
class RateLimiter:
def __init__(
self,
max_concurrent: int = 50,
max_per_minute: int = 500
):
self.max_concurrent = max_concurrent
self.max_per_minute = max_per_minute
self.semaphore = asyncio.Semaphore(max_concurrent)
self.request_times: deque = deque()
async def execute(self, fn: Callable[[], T]) -> T:
await self._wait_for_rate_limit()
async with self.semaphore:
self.request_times.append(time.time())
return await fn()
async def _wait_for_rate_limit(self):
now = time.time()
# Remove requests older than 1 minute
while self.request_times and now - self.request_times[0] > 60:
self.request_times.popleft()
# Wait if at limit
if len(self.request_times) >= self.max_per_minute:
wait_time = 60 - (now - self.request_times[0])
if wait_time > 0:
await asyncio.sleep(wait_time)
Resources
Next Steps
Proceed to deepgram-security-basics for security best practices.
スコア
総合スコア
85/100
リポジトリの品質指標に基づく評価
✓SKILL.md
SKILL.mdファイルが含まれている
+20
✓LICENSE
ライセンスが設定されている
+10
○説明文
100文字以上の説明がある
0/10
✓人気
GitHub Stars 1000以上
+15
✓最近の活動
3ヶ月以内に更新
+5
✓フォーク
10回以上フォークされている
+5
✓Issue管理
オープンIssueが50未満
+5
✓言語
プログラミング言語が設定されている
+5
✓タグ
1つ以上のタグが設定されている
+5
レビュー
💬
レビュー機能は近日公開予定です

