Hello Luke,
Thanks for your answer.
As of today I can confirm that the Rate Limit is indeed changed on Yeti2024 (since we're still recovering at a steady rate after the weekend) without any application code change.
Thanks for the link, it provides some good advice on how not to hit rate limiting. Sadly, it's a bit hard to implement that logic with our current application because we do automatically detect the batch size using clamping, then we mass parallelize a block of Get-Entries between the min-max, as "chunked requests". This means while the other calls are done sequentially, there is a specific time when mass Get-Entries are done in parallel from the same IP and that would trigger the 1-minute ban.
We'll try to see if we can adapt the algorithm (but we have currently no issues in fetching Nimbus, even if we hit the 429, we have more than enough fetching space to stay on par even after limit hits) but we'll see what we can do.
As of today, using some mirrors and some retires, we're able to fetch all currently usable CTs except Yeti2025.
Thank you!
Alessandro