429 Too Many Requests response.
Rate limit structure
By default we enforce two rate limits:Requests per minute
- 300 requests per minute per API key or OAuth token
- Applied individually to each user in your organization
Daily limit
- 100,000 requests per day per organization
- Resets at midnight UTC
- Shared across all users in your organization
Handling rate limit errors
When you exceed a rate limit, you’ll receive a429 Too Many Requests response with these headers:
X-RateLimit-Limit: Maximum capacity (e.g., 300 for requests per minute limit)X-RateLimit-Remaining: Remaining capacityX-RateLimit-Reset: Unix timestamp when the rate limit will go back to full capacityRetry-After: Recommended seconds to wait before retrying
Best practices
- Monitor the headers: Check
X-RateLimit-Remainingbefore making large batch requests - Implement exponential backoff: Wait progressively longer between retries (e.g., 1s, 2s, 4s, 8s)
- Respect
Retry-After: Always wait at least this long before retrying - Spread out scheduled jobs: Avoid running all batch operations at the same time