An Azure service that automates the access and use of data across clouds without writing code.
Hello Kavin Ramasamy,
In Azure Logic Apps, connector-level throttling is designed to protect both the connector infrastructure and the downstream services from excessive requests. When designing an architecture around these limits, it is important to understand how throttling is scoped and how to design workflows to avoid bursts of traffic.
- Where throttling happens in Azure Logic Apps
Microsoft documents three distinct throttling layers in Azure Logic Apps (Consumption and Standard): Logic App resource, Connector, and Destination system. [learn.microsoft.com]
LevelScopeWhat gets throttledLogic App resourceEntire Logic App (all workflows)CPU / action throughput limitsConnector throttling__Per connector _connection___Calls issued via that connectorDestination serviceTarget API or backendIndependent service‑side limitsYour question is primarily about the connector layer, which is the most commonly misunderstood.
- Connector throttling: the key rule (often missed)
Connector throttling is applied per connection__, not per workflow__
Microsoft and partner guidance consistently state that connector limits are enforced per connection instance, not per workflow or per Logic App resource. [codit.eu], [serverlessnotes.com]
This has several important consequences:
- Multiple workflows sharing the same connection compete for the same rate limit
- Multiple actions using the same connector + same connection also share limits
- Creating additional connections increases effective throughput
Think of the connection as the throttling boundary, not the workflow.
- Special case: HTTP connector (no visible “connection”)
Your question specifically calls out the HTTP connector, which doesn’t require credentials.
How HTTP throttling works
Even though you don’t explicitly create a connection:
- The HTTP action is still treated internally as a connector
- Throttling applies at the connector runtime level
- HTTP retry behavior respects
Retry‑Afterheaders automatically [estudy247.com]
Important: For HTTP, throttling is not based on the target URL domain. Two different APIs called via HTTP still count against the same internal HTTP connector capacity for that workflow instance.
- What happens when throttling occurs
When a connector exceeds its quota:
- The connector returns HTTP 429 (Too Many Requests)
- Logic Apps automatically applies retries (default: 4 retries, fixed interval)
- Sustained over‑limit traffic can create a retry storm, slowing everything down [codit.eu]
- Architectural best practices to handle per‑minute limits
Below are design‑time practices, not just operational workarounds.
- Control concurrency aggressively
Most throttling incidents are caused by uncontrolled parallelism.
Use:
- Trigger concurrency control
- For‑each loop concurrency limits
- Avoid unbounded
Split On
Microsoft explicitly recommends limiting concurrent workflow instances to reduce throttling at connector and resource levels. [learn.microsoft.com]
- Use multiple connections (where supported)
For connectors that support named connections (SQL, Storage, Service Bus, etc.):
- Create multiple connections
- Distribute calls across them
- Each connection has its own throttle quota
This is a documented and supported scale‑out pattern for connector‑level throttling. [serverlessnotes.com]
This does not apply to HTTP in the same way, since HTTP doesn’t expose connection objects.
- Put API Management in front of HTTP‑based integrations
When using HTTP heavily:
- Front APIs with Azure API Management
- Use APIM rate‑limit and quota policies
- Throttle before the Logic App hits connector/runtime limits
This shifts control from reactive (429 handling) to proactive traffic shaping.
- Prefer asynchronous, queue‑based designs
For bursty or high‑volume integrations:
- Ingest via Service Bus, Storage Queue, or Event Grid
- Process messages at a controlled rate
- Decouple ingest speed from processing speed
This pattern avoids hitting connector limits during traffic spikes and is a recommended mitigation across Microsoft integration guidance. [learn.microsoft.com]
- Batch whenever possible
Instead of:
N items → N connector calls
Prefer:
N items → 1 batch call
Batching reduces connector call count and is a first‑line defense against throttling. [estudy247.com]
- Monitor throttling signals early
Enable Metrics → “Action throttled events” and “Trigger throttled events” on the Logic App resource to detect rate‑limit pressure before failures occur. [learn.microsoft.com]
This helps you determine:
- Is the throttle at the connector or app resource level?
- Which workflows/actions are the contributors?
- Practical summary for architecture decisions
Direct answers to your questions:
QuestionAnswerPer workflow?❌ NoPer Logic App resource?❌ No (connector throttles first)Per connector connection?✅ __Yes__HTTP connector different?✅ Still throttled, but connectionlessMultiple connections help?✅ For most connectorsAPIM useful?✅ Strongly recommendedAsync patterns?✅ Best practice--- 7. Recommended reference links
- Handle throttling (official) – Microsoft Learn Handle throttling in Azure Logic Apps [learn.microsoft.com]
- Connector limits and configuration Logic Apps limits and configuration [learn.microsoft.com]
- Multiple connections pattern Avoid connector throttling using multiple connections [serverlessnotes.com]
Please accept as answer and do a Thumbs-up to upvote this response if you are satisfied with the community help. Your upvote will be beneficial for the community users facing similar issues.