Overview
Bifrost provides two complementary layers of resilience:- Retries — When a provider returns a transient error (network issue, rate limit, 5xx), Bifrost automatically retries the same request against the same provider with exponential backoff. On rate-limit errors, it can also rotate to a different API key from your pool.
- Fallbacks — When the primary provider fails after exhausting all retries, Bifrost moves on to the next provider in your fallback chain. Each fallback provider gets its own full retry budget.
Retries
How retries work
When a request fails with a retryable error, Bifrost:- Waits using exponential backoff with jitter before the next attempt
- Retries the request against the same provider
- On rate-limit errors (
429): rotates to a different API key from the pool (if multiple keys are configured) so fresh capacity is used - On network/server errors (
5xx, DNS, connection refused): reuses the same key — these are transient server issues, not per-key capacity problems - Continues until the request succeeds or
max_retriesis exhausted
Backoff formula
retry_backoff_initial = 500ms and retry_backoff_max = 5000ms:
| Attempt | Base backoff | With jitter (approx.) |
|---|---|---|
| 1st retry | 500 ms | 400–600 ms |
| 2nd retry | 1000 ms | 800 ms–1.2 s |
| 3rd retry | 2000 ms | 1.6–2.4 s |
| 4th retry | 4000 ms | 3.2–4.8 s |
| 5th+ retry | 5000 ms (capped) | 4–5 s |
What triggers a retry
| Condition | Retried? | Key rotation? |
|---|---|---|
| Network error (DNS, connection refused) | Yes | No — same key reused |
5xx server errors (500, 502, 503, 504) | Yes | No — same key reused |
Rate limit (429 or rate-limit message pattern) | Yes | Yes — next key from pool |
| Request validation error | No | — |
| Plugin-enforced block | No | — |
| Cancelled request | No | — |
Configuring retries
Retries are configured per-provider innetwork_config. The defaults are max_retries: 0 (no retries), retry_backoff_initial: 500 ms, and retry_backoff_max: 5000 ms.
- Web UI
- API
- Go SDK
- config.json
Navigate to Providers, select a provider, and open the Network Config section.Set:
- Max Retries — number of additional attempts after the first failure (e.g.
3) - Retry Backoff Initial — starting backoff in milliseconds (e.g.
500) - Retry Backoff Max — maximum backoff cap in milliseconds (e.g.
5000)
Key rotation on rate limits
Key rotation on retries requires v1.5.0-prerelease4 or later.
max_retries: 5, Bifrost cycles through all three keys twice before giving up. Once all keys in the pool have been tried, it resets and starts a fresh weighted round.
Key rotation on rate limits only applies when
max_retries > 0 and more than one key is configured for the provider. With a single key, all retries reuse that key.Fallbacks
Fallbacks provide automatic failover to a different provider when the primary fails after exhausting all its retries. Each fallback is tried in order until one succeeds.How fallbacks work
- Primary attempt: Tries your configured provider with its full retry budget
- Fallback decision: If the primary fails (and the error is retryable at the provider level), Bifrost moves to the first fallback
- Sequential fallbacks: Each fallback provider also gets its own full retry budget
- First success wins: Returns the response from the first provider that succeeds
- All fail: Returns the original error from the primary provider. Exception: if a plugin on a fallback provider sets
AllowFallbacks = falseon the error (e.g. a security or compliance plugin that should halt the chain regardless of remaining fallbacks), Bifrost stops immediately and returns that fallback’s error rather than continuing to the next provider or returning the primary error.
Implementation
- Gateway
- Go SDK
Pass a The response
fallbacks array in the request body. Each entry specifies a provider/model string:extra_fields.provider tells you which provider actually served the request:How retries and fallbacks work together
The two mechanisms form a nested resilience loop. Retries run inside each provider attempt; fallbacks run across providers once retries are exhausted. Key point: each provider in the chain — primary and every fallback — gets its own fullmax_retries budget. A primary configured with max_retries: 3 and two fallbacks each also configured with max_retries: 3 means up to 12 total attempts before giving up.
The retry budget is set per-provider in
network_config. If your fallback providers have different retry configurations, each will use their own settings.Real-world scenarios
Scenario 1: Rate limiting with key rotation OpenAI key 1 hits its rate limit. Bifrost rotates to key 2 on the next retry — no fallback needed, the request succeeds within the same provider. Scenario 2: Provider outage OpenAI is experiencing downtime (returning503). Bifrost retries with the same key (transient server issue), exhausts max_retries, then fails over to Anthropic. Anthropic succeeds on the first attempt.
Scenario 3: Cascading failure
Both primary and first fallback are down. Bifrost works through each provider’s retry budget sequentially until the second fallback succeeds.
Scenario 4: Cost-sensitive fallback
Primary: a premium model for quality. Fallback: a cost-effective alternative. Governance rules can trigger a budget-exceeded error on the primary, which cascades into the fallback chain.
Plugin execution
When a fallback is triggered, the fallback request is treated as completely new:- Semantic cache checks run again (the fallback provider may have a cached response)
- Governance rules apply to the new provider
- Logging captures the fallback attempt separately
- All configured plugins execute fresh for each provider in the chain
AllowFallbacks = false on the error, the fallback chain is skipped entirely and the original error is returned immediately.
Next steps
- Keys Management — Configure multiple API keys per provider to enable key rotation on retries
- Governance — Use virtual keys and routing rules to control which providers are used
- Observability — Track retry counts and fallback usage in your logs

