Ideally, traffic within our network would not go through the API gateway.
However, as long as it does, it should be excempt from limits (or have very permissive limits).
In particular, in codfw we are seeing a lot of traffic from 172.16.x.x and from 10.192.x.x (upwards of 100 req/sec). Eqiad probably sees similar traffic.
To avoid blocking internal traffic, we should identify such requests using a regex (in theory, network masks would be better, but hard to implement in Envoy), and assign the "no-limit" class to them for now. That would disable rate limiting for them completely. They would even vanish from the ratelimiter metrics, because the ratelimit service would not be called for them.