Titan applies different limits depending on whether you are calling normal control-plane JSON APIs (tasks, executions, billing, analytics) or preview endpoints that run short-lived work. Exact numbers are configured per environment—the figures below are typical defaults when limits are enabled. Your live Titan deployment may use higher, lower, or disabled limits.Documentation Index
Fetch the complete documentation index at: https://webscraping.titannet.io/docs/llms.txt
Use this file to discover all available pages before exploring further.
Control-plane APIs (requests per minute)
Task, analytics, and billing APIs are usually throttled to a steady requests-per-minute (RPM) budget per caller. A common default when limiting is enabled is on the order of ~120 RPM per service surface (task, analytics, billing).| Surface | Typical RPM (when enabled) | Applies to |
|---|---|---|
| Task API | ~120 | Routes such as /api/v1/tasks, /api/v1/executions, and authenticated template actions. |
| Analytics API | ~120 | /api/v1/analytics/* routes. |
| Billing API | ~120 | /api/v1/billing/* routes. |
Burst and headers
Limiters often allow a short burst above the steady RPM so occasional spikes do not fail immediately. On successful responses you should see:X-RateLimit-LimitX-RateLimit-Remaining
X-RateLimit-Reset (Unix seconds). Titan’s control-plane limiter does not always set Retry-After; clients should read X-RateLimit-Reset or use exponential backoff with jitter.
JSON body on HTTP 429 (control plane)
When the shared limiter rejects a call, the response is typically429 Too Many Requests with the standard error envelope:
Preview endpoints (daily quotas)
Preview routes (for examplePOST /api/v1/templates/:id/preview and task preview endpoints) use daily quotas, separate from the RPM bucket used for ordinary control-plane calls. Limits are enforced per environment and may be backed by shared storage so counts stay consistent across instances.
Example of the kind of knobs operators configure (illustrative only):
| Kind of limit | Example value | Meaning |
|---|---|---|
| Total previews per day | 100 | Successful preview checks per principal per day. |
| Per scope (for example per template) | 20 | Additional ceiling for a narrower scope. |
| URLs in one preview | 5 | Upper bound on URLs in a preview payload where enforced. |
Preview HTTP 429 body (non-standard)
When preview quota is exceeded, the task API may return 429 with a different JSON shape (nosuccess field):
message text is environment-specific; align product UI with what your deployment returns.
Authentication endpoints
Sign-in, session, and token endpoints may use separate rate limits from the task and billing APIs. Numeric defaults are not fixed in this documentation—observe429 responses and headers, or ask your operator for the policy that applies to your auth host.
What this page does not cover
Background infrastructure—queues, workers, proxies, and internal schedulers—can impose additional throughput or fairness limits that are not the same as the REST API limits above. Those belong in operator runbooks, not in end-user API documentation. Non-production environments sometimes disable control-plane throttling for convenience; production is expected to enforce sensible limits.Related reading
- Credits and billing — wallet, ledger, and how usage maps to debits.
- Authentication and API keys — scopes for billing and task APIs.
- API Reference → Task Service API / Billing API — concrete paths and response shapes.