debian-mirror-gitlab/doc/user/gitlab_com/index.md

544 lines
32 KiB
Markdown
Raw Normal View History

2021-01-29 00:20:46 +05:30
---
stage: none
group: unassigned
2022-11-25 23:54:43 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
2021-01-29 00:20:46 +05:30
---
2021-04-17 20:07:23 +05:30
# GitLab.com settings **(FREE SAAS)**
2018-05-09 12:01:36 +05:30
2021-09-30 23:02:18 +05:30
This page contains information about the settings that are used on GitLab.com, available to
[GitLab SaaS](https://about.gitlab.com/pricing/) customers.
2018-05-09 12:01:36 +05:30
2022-07-16 23:28:13 +05:30
See some of these settings on the [instance configuration page](https://gitlab.com/help/instance_configuration) of GitLab.com.
2021-11-11 11:23:49 +05:30
## Password requirements
GitLab.com has the following requirements for passwords on new accounts and password changes:
- Minimum character length 8 characters.
- Maximum character length 128 characters.
- All characters are accepted. For example, `~`, `!`, `@`, `#`, `$`, `%`, `^`, `&`, `*`, `()`,
`[]`, `_`, `+`, `=`, and `-`.
## SSH key restrictions
GitLab.com uses the default [SSH key restrictions](../../security/ssh_keys_restrictions.md).
2018-05-09 12:01:36 +05:30
## SSH host keys fingerprints
2021-09-30 23:02:18 +05:30
Below are the fingerprints for SSH host keys on GitLab.com. The first time you
2021-09-04 01:27:46 +05:30
connect to a GitLab.com repository, one of these keys is displayed in the output.
2018-05-09 12:01:36 +05:30
2021-09-04 01:27:46 +05:30
| Algorithm | MD5 (deprecated) | SHA256 |
|------------------|------------------|---------|
| ED25519 | `2e:65:6a:c8:cf:bf:b2:8b:9a:bd:6d:9f:11:5c:12:16` | `eUXGGm1YGsMAS7vkcx6JOJdOGHPem5gQp4taiCfCLB8` |
| RSA | `b6:03:0e:39:97:9e:d0:e7:24:ce:a3:77:3e:01:42:09` | `ROQFvPThGrW4RuWLoL9tq9I9zJ42fK4XywyRtbOz/EQ` |
| DSA (deprecated) | `7a:47:81:3a:ee:89:89:64:33:ca:44:52:3d:30:d4:87` | `p8vZBUOR0XQz6sYiaWSMLmh0t9i8srqYKool/Xfdfqw` |
| ECDSA | `f1:d0:fb:46:73:7a:70:92:5a:ab:5d:ef:43:e2:1c:35` | `HbW3g8zUjNSksFbqTiUWPWg2Bq1x8xdGUrliXFzSnUw` |
2018-05-09 12:01:36 +05:30
2020-01-01 13:55:28 +05:30
## SSH `known_hosts` entries
Add the following to `.ssh/known_hosts` to skip manual fingerprint
confirmation in SSH:
2020-03-13 15:44:24 +05:30
```plaintext
2020-01-01 13:55:28 +05:30
gitlab.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAfuCHKVTjquxvt6CM6tdG4SLp1Btn/nOeHHE5UOzRdf
gitlab.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsj2bNKTBSpIYDEGk9KxsGh3mySTRgMtXL583qmBpzeQ+jqCMRgBqB98u3z++J1sKlXHWfM9dyhSevkMwSbhoR8XIq/U0tCNyokEi/ueaBMCvbcTHhO7FcwzY92WK4Yt0aGROY5qX2UKSeOvuP4D6TPqKF1onrSzH9bx9XUf2lEdWT/ia1NEKjunUqu1xOB/StKDHMoX4/OKyIzuS0q/T1zOATthvasJFoPrAjkohTyaDUz2LN5JoH839hViyEG82yB+MjcFV5MU3N1l1QL3cVUCh93xSaua1N85qivl+siMkPGbO5xR/En4iEY6K2XPASUEMaieWVNTRCtJ4S8H+9
gitlab.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFSMqzJeV9rUzU4kWitGjeR4PWSa29SPqJ1fVkhtj3Hw9xjLVXVYrU9QlYWrOLXBpQ6KWjbjTDTdDkoohFzgbEY=
```
2018-05-09 12:01:36 +05:30
## Mail configuration
2021-09-04 01:27:46 +05:30
GitLab.com sends emails from the `mg.gitlab.com` domain by using [Mailgun](https://www.mailgun.com/),
2022-06-21 17:19:12 +05:30
and has its own dedicated IP addresses:
2020-10-24 23:57:45 +05:30
2022-06-21 17:19:12 +05:30
- `161.38.202.219`
- `159.135.226.146`
- `192.237.158.143`
- `198.61.254.136`
- `23.253.183.236`
- `69.72.35.190`
The IP addresses for `mg.gitlab.com` are subject to change at any time.
2018-05-09 12:01:36 +05:30
2021-09-30 23:02:18 +05:30
### Service Desk custom mailbox
On GitLab.com, there's a mailbox configured for Service Desk with the email address:
`contact-project+%{key}@incoming.gitlab.com`. To use this mailbox, configure the
[custom suffix](../project/service_desk.md#configuring-a-custom-email-address-suffix) in project
settings.
2020-06-23 00:09:42 +05:30
## Backups
[See our backup strategy](https://about.gitlab.com/handbook/engineering/infrastructure/production/#backups).
2021-09-04 01:27:46 +05:30
To back up an entire project on GitLab.com, you can export it either:
2021-01-03 14:25:43 +05:30
2021-09-04 01:27:46 +05:30
- [Through the UI](../project/settings/import_export.md).
- [Through the API](../../api/project_import_export.md#schedule-an-export). You
can also use the API to programmatically upload exports to a storage platform,
such as Amazon S3.
2021-01-03 14:25:43 +05:30
2022-03-02 08:16:31 +05:30
With exports, be aware of [what is and is not](../project/settings/import_export.md#items-that-are-exported)
2021-09-04 01:27:46 +05:30
included in a project export.
2021-01-03 14:25:43 +05:30
2021-09-04 01:27:46 +05:30
GitLab is built on Git, so you can back up just the repository of a project by
[cloning](../../gitlab-basics/start-using-git.md#clone-a-repository) it to
another computer.
Similarly, you can clone a project's wiki to back it up. All files
[uploaded after August 22, 2020](../project/wiki/index.md#create-a-new-wiki-page)
are included when cloning.
2021-01-03 14:25:43 +05:30
2021-10-27 15:23:28 +05:30
## Delayed project deletion **(PREMIUM SAAS)**
Top-level groups created after August 12, 2021 have delayed project deletion enabled by default.
Projects are permanently deleted after a seven-day delay.
2022-05-07 20:08:51 +05:30
If you are on:
2022-08-27 11:52:29 +05:30
- Premium tier and above, you can disable this by changing the [group setting](../group/manage.md#enable-delayed-project-deletion).
2022-05-07 20:08:51 +05:30
- Free tier, you cannot disable this setting or restore projects.
2021-10-27 15:23:28 +05:30
2022-07-16 23:28:13 +05:30
## Inactive project deletion
[Inactive project deletion](../../administration/inactive_project_deletion.md) is disabled on GitLab.com.
2018-05-09 12:01:36 +05:30
## Alternative SSH port
2021-09-04 01:27:46 +05:30
GitLab.com can be reached by using a [different SSH port](https://about.gitlab.com/blog/2016/02/18/gitlab-dot-com-now-supports-an-alternate-git-plus-ssh-port/) for `git+ssh`.
2018-05-09 12:01:36 +05:30
2021-09-04 01:27:46 +05:30
| Setting | Value |
|------------|---------------------|
| `Hostname` | `altssh.gitlab.com` |
| `Port` | `443` |
2018-05-09 12:01:36 +05:30
An example `~/.ssh/config` is the following:
2020-03-13 15:44:24 +05:30
```plaintext
2018-05-09 12:01:36 +05:30
Host gitlab.com
Hostname altssh.gitlab.com
User git
Port 443
PreferredAuthentications publickey
IdentityFile ~/.ssh/gitlab
```
## GitLab Pages
2020-04-22 19:07:51 +05:30
Below are the settings for [GitLab Pages](https://about.gitlab.com/stages-devops-lifecycle/pages/).
2018-05-09 12:01:36 +05:30
2021-09-04 01:27:46 +05:30
| Setting | GitLab.com | Default |
|---------------------------|------------------------|------------------------|
| Domain name | `gitlab.io` | - |
| IP address | `35.185.44.232` | - |
| Custom domains support | **{check-circle}** Yes | **{dotted-circle}** No |
| TLS certificates support | **{check-circle}** Yes | **{dotted-circle}** No |
2022-07-23 23:45:48 +05:30
| [Maximum size](../../administration/pages/index.md#set-global-maximum-size-of-each-gitlab-pages-site) (compressed) | 1 GB | 100 MB |
2018-05-09 12:01:36 +05:30
2022-07-16 23:28:13 +05:30
The maximum size of your Pages site is also regulated by the artifacts maximum size,
2019-07-07 11:18:12 +05:30
which is part of [GitLab CI/CD](#gitlab-cicd).
2018-05-09 12:01:36 +05:30
2022-04-04 11:22:00 +05:30
There are also [rate limits set for GitLab Pages](#gitlabcom-specific-rate-limits).
2018-05-09 12:01:36 +05:30
## GitLab CI/CD
2021-09-30 23:02:18 +05:30
Below are the current settings regarding [GitLab CI/CD](../../ci/index.md).
2021-09-04 01:27:46 +05:30
Any settings or feature limits not listed here are using the defaults listed in
the related documentation.
2018-05-09 12:01:36 +05:30
2022-11-25 23:54:43 +05:30
| Setting | GitLab.com | Default (self-managed) |
|----------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------|------------------------|
| Artifacts maximum size (compressed) | 1 GB | See [Maximum artifacts size](../../user/admin_area/settings/continuous_integration.md#maximum-artifacts-size). |
| Artifacts [expiry time](../../ci/yaml/index.md#artifactsexpire_in) | From June 22, 2020, deleted after 30 days unless otherwise specified (artifacts created before that date have no expiry). | See [Default artifacts expiration](../admin_area/settings/continuous_integration.md#default-artifacts-expiration). |
| Scheduled Pipeline Cron | `*/5 * * * *` | See [Pipeline schedules advanced configuration](../../administration/cicd.md#change-maximum-scheduled-pipeline-frequency). |
| Maximum jobs in active pipelines | `500` for Free tier, `1000` for all trial tiers, and unlimited otherwise. | See [Number of jobs in active pipelines](../../administration/instance_limits.md#number-of-jobs-in-active-pipelines). |
| Maximum CI/CD subscriptions to a project | `2` | See [Number of CI/CD subscriptions to a project](../../administration/instance_limits.md#number-of-cicd-subscriptions-to-a-project). |
| Maximum number of pipeline triggers in a project | `25000` for Free tier, Unlimited for all paid tiers | See [Limit the number of pipeline triggers](../../administration/instance_limits.md#limit-the-number-of-pipeline-triggers). |
| Maximum pipeline schedules in projects | `10` for Free tier, `50` for all paid tiers | See [Number of pipeline schedules](../../administration/instance_limits.md#number-of-pipeline-schedules). |
| Maximum pipelines per schedule | `24` for Free tier, `288` for all paid tiers | See [Limit the number of pipelines created by a pipeline schedule per day](../../administration/instance_limits.md#limit-the-number-of-pipelines-created-by-a-pipeline-schedule-per-day). |
| Maximum number of schedule rules defined for each security policy project | Unlimited for all paid tiers | See [Number of schedule rules defined for each security policy project](../../administration/instance_limits.md#limit-the-number-of-schedule-rules-defined-for-security-policy-project). |
| Scheduled job archiving | 3 months (from June 22, 2020). Jobs created before that date were archived after September 22, 2020. | Never. |
| Maximum test cases per [unit test report](../../ci/testing/unit_test_reports.md) | `500000` | Unlimited. |
| Maximum registered runners | Free tier: `50` per-group / `50` per-project<br/>All paid tiers: `1000` per-group / `1000` per-project | See [Number of registered runners per scope](../../administration/instance_limits.md#number-of-registered-runners-per-scope). |
| Limit of dotenv variables | Free tier: `50` / Premium tier: `100` / Ultimate tier: `150` | See [Limit dotenv variables](../../administration/instance_limits.md#limit-dotenv-variables). |
| Authorization token duration (minutes) | `15` | To set a custom value, in the Rails console, run `ApplicationSetting.last.update(container_registry_token_expire_delay: <integer>)`, where `<integer>` is the desired number of minutes. |
2022-01-26 12:08:38 +05:30
## Package registry limits
The [maximum file size](../../administration/instance_limits.md#file-size-limits)
for a package uploaded to the [GitLab Package Registry](../../user/packages/package_registry/index.md)
varies by format:
| Package type | GitLab.com |
|--------------|------------|
| Conan | 5 GB |
| Generic | 5 GB |
| Helm | 5 MB |
| Maven | 5 GB |
| npm: | 5 GB |
| NuGet | 5 GB |
| PyPI | 5 GB |
| Terraform | 1 GB |
2018-05-09 12:01:36 +05:30
2020-11-24 15:15:51 +05:30
## Account and limit settings
2018-05-09 12:01:36 +05:30
2022-03-02 08:16:31 +05:30
GitLab.com has the following account limits enabled. If a setting is not listed,
the default value [is the same as for self-managed instances](../admin_area/settings/account_and_limit_settings.md):
2018-05-09 12:01:36 +05:30
2022-03-02 08:16:31 +05:30
| Setting | GitLab.com default |
|-------------------------------|--------------------|
| [Repository size including LFS](../admin_area/settings/account_and_limit_settings.md#repository-size-limit) | 10 GB |
2022-07-23 23:45:48 +05:30
| [Maximum import size](../project/settings/import_export.md#maximum-import-file-size) | 5 GB |
2023-03-04 22:38:38 +05:30
| Maximum attachment size | 100 MB |
2020-07-28 23:09:34 +05:30
2022-03-02 08:16:31 +05:30
If you are near or over the repository size limit, you can either
[reduce your repository size with Git](../project/repository/reducing_the_repo_size_using_git.md)
or [purchase additional storage](https://about.gitlab.com/pricing/licensing-faq/#can-i-buy-more-storage).
2018-05-09 12:01:36 +05:30
2021-02-22 17:27:13 +05:30
NOTE:
2021-09-04 01:27:46 +05:30
`git push` and GitLab project imports are limited to 5 GB per request through
Cloudflare. Git LFS and imports other than a file upload are not affected by
2021-12-11 22:18:48 +05:30
this limit. Repository limits apply to both public and private projects.
2020-04-22 19:07:51 +05:30
2019-07-07 11:18:12 +05:30
## IP range
2021-04-29 21:17:54 +05:30
GitLab.com uses the IP ranges `34.74.90.64/28` and `34.74.226.0/24` for traffic from its Web/API
2020-04-22 19:07:51 +05:30
fleet. This whole range is solely allocated to GitLab. You can expect connections from webhooks or repository mirroring to come
2020-07-28 23:09:34 +05:30
from those IPs and allow them.
2020-04-08 14:13:33 +05:30
2022-05-07 20:08:51 +05:30
GitLab.com is fronted by Cloudflare. For incoming connections to GitLab.com, you might need to allow CIDR blocks of Cloudflare ([IPv4](https://www.cloudflare.com/ips-v4/) and [IPv6](https://www.cloudflare.com/ips-v6/)).
2020-04-22 19:07:51 +05:30
2022-10-11 01:57:18 +05:30
For outgoing connections from CI/CD runners, we are not providing static IP addresses.
All GitLab.com shared runners are deployed into Google Cloud Platform (GCP) in `us-east1`.
Any IP-based firewall can be configured by looking up
2021-03-11 19:13:27 +05:30
[IP address ranges or CIDR blocks for GCP](https://cloud.google.com/compute/docs/faq#find_ip_range).
2019-07-07 11:18:12 +05:30
2021-03-08 18:12:59 +05:30
## Hostname list
2021-09-04 01:27:46 +05:30
Add these hostnames when you configure allow-lists in local HTTP(S) proxies,
or other web-blocking software that governs end-user computers. Pages on
GitLab.com load content from these hostnames:
2021-03-08 18:12:59 +05:30
- `gitlab.com`
- `*.gitlab.com`
- `*.gitlab-static.net`
- `*.gitlab.io`
- `*.gitlab.net`
2021-09-04 01:27:46 +05:30
Documentation and Company pages served over `docs.gitlab.com` and `about.gitlab.com`
also load certain page content directly from common public CDN hostnames.
2021-03-08 18:12:59 +05:30
2020-10-24 23:57:45 +05:30
## Webhooks
2020-04-08 14:13:33 +05:30
2022-08-13 15:12:31 +05:30
The following limits apply for [webhooks](../project/integrations/webhooks.md).
### Rate limits
The number of times a webhook can be called per minute, per top-level namespace.
The limit varies depending on your plan and the number of seats in your subscription.
| Plan | Default for GitLab.com |
|----------------------|-------------------------|
| Free | `500` |
| Premium | `99` seats or fewer: `1,600`<br>`100-399` seats: `2,800`<br>`400` seats or more: `4,000` |
| Ultimate and open source |`999` seats or fewer: `6,000`<br>`1,000-4,999` seats: `9,000`<br>`5,000` seats or more: `13,000` |
### Other limits
2022-03-02 08:16:31 +05:30
| Setting | Default for GitLab.com |
|----------------------|-------------------------|
| Number of webhooks | `100` per project, `50` per group |
| Maximum payload size | 25 MB |
2022-11-25 23:54:43 +05:30
| Timeout | 10 seconds |
2020-04-08 14:13:33 +05:30
2022-11-25 23:54:43 +05:30
For self-managed instance limits, see:
- [Webhook rate limit](../../administration/instance_limits.md#webhook-rate-limit).
- [Number of webhooks](../../administration/instance_limits.md#number-of-webhooks).
- [Webhook timeout](../../administration/instance_limits.md#webhook-timeout).
2019-07-07 11:18:12 +05:30
2022-01-26 12:08:38 +05:30
## Runner SaaS
2018-05-09 12:01:36 +05:30
2022-01-26 12:08:38 +05:30
Runner SaaS is the hosted, secure, and managed build environment you can use to run CI/CD jobs for your GitLab.com hosted project.
2020-03-13 15:44:24 +05:30
2022-01-26 12:08:38 +05:30
For more information, see [Runner SaaS](../../ci/runners/index.md).
2020-03-13 15:44:24 +05:30
2018-05-09 12:01:36 +05:30
## Sidekiq
2019-12-21 20:55:43 +05:30
GitLab.com runs [Sidekiq](https://sidekiq.org) with arguments `--timeout=4 --concurrency=4`
2018-05-09 12:01:36 +05:30
and the following environment variables:
2023-04-23 21:23:45 +05:30
| Setting | GitLab.com | Default |
|----------------------------------------|------------|-----------|
| `GITLAB_MEMORY_WATCHDOG_ENABLED` | - | `true` |
| `SIDEKIQ_MEMORY_KILLER_MAX_RSS` | - | `2000000` |
| `SIDEKIQ_MEMORY_KILLER_HARD_LIMIT_RSS` | - | - |
| `SIDEKIQ_MEMORY_KILLER_CHECK_INTERVAL` | - | `3` |
| `SIDEKIQ_MEMORY_KILLER_GRACE_TIME` | - | `900` |
| `SIDEKIQ_MEMORY_KILLER_SHUTDOWN_WAIT` | - | `30` |
| `SIDEKIQ_LOG_ARGUMENTS` | `1` | `1` |
For more information, see how to
[configure the environment variables](../../administration/sidekiq/sidekiq_memory_killer.md).
2019-12-21 20:55:43 +05:30
2021-02-22 17:27:13 +05:30
NOTE:
2019-12-21 20:55:43 +05:30
The `SIDEKIQ_MEMORY_KILLER_MAX_RSS` setting is `16000000` on Sidekiq import
nodes and Sidekiq export nodes.
2018-05-09 12:01:36 +05:30
## PostgreSQL
GitLab.com being a fairly large installation of GitLab means we have changed
various PostgreSQL settings to better suit our needs. For example, we use
streaming replication and servers in hot-standby mode to balance queries across
different database servers.
The list of GitLab.com specific settings (and their defaults) is as follows:
2020-06-23 00:09:42 +05:30
| Setting | GitLab.com | Default |
|:--------------------------------------|:--------------------------------------------------------------------|:--------------------------------------|
| `archive_command` | `/usr/bin/envdir /etc/wal-e.d/env /opt/wal-e/bin/wal-e wal-push %p` | empty |
| `archive_mode` | on | off |
| `autovacuum_analyze_scale_factor` | 0.01 | 0.01 |
| `autovacuum_max_workers` | 6 | 3 |
| `autovacuum_vacuum_cost_limit` | 1000 | -1 |
| `autovacuum_vacuum_scale_factor` | 0.01 | 0.02 |
| `checkpoint_completion_target` | 0.7 | 0.9 |
| `checkpoint_segments` | 32 | 10 |
2023-04-23 21:23:45 +05:30
| `effective_cache_size` | 338688 MB | Based on how much memory is available |
2020-06-23 00:09:42 +05:30
| `hot_standby` | on | off |
| `hot_standby_feedback` | on | off |
| `log_autovacuum_min_duration` | 0 | -1 |
| `log_checkpoints` | on | off |
| `log_line_prefix` | `%t [%p]: [%l-1]` | empty |
| `log_min_duration_statement` | 1000 | -1 |
| `log_temp_files` | 0 | -1 |
2023-04-23 21:23:45 +05:30
| `maintenance_work_mem` | 2048 MB | 16 MB |
2020-06-23 00:09:42 +05:30
| `max_replication_slots` | 5 | 0 |
| `max_wal_senders` | 32 | 0 |
2023-04-23 21:23:45 +05:30
| `max_wal_size` | 5 GB | 1 GB |
| `shared_buffers` | 112896 MB | Based on how much memory is available |
2023-03-04 22:38:38 +05:30
| `shared_preload_libraries` | `pg_stat_statements` | empty |
2020-06-23 00:09:42 +05:30
| `shmall` | 30146560 | Based on the server's capabilities |
| `shmmax` | 123480309760 | Based on the server's capabilities |
2023-04-23 21:23:45 +05:30
| `wal_buffers` | 16 MB | -1 |
2020-06-23 00:09:42 +05:30
| `wal_keep_segments` | 512 | 10 |
| `wal_level` | replica | minimal |
2023-04-23 21:23:45 +05:30
| `statement_timeout` | 15 s | 60 s |
| `idle_in_transaction_session_timeout` | 60 s | 60 s |
2018-05-09 12:01:36 +05:30
Some of these settings are in the process being adjusted. For example, the value
2021-09-04 01:27:46 +05:30
for `shared_buffers` is quite high, and we are
2022-08-27 11:52:29 +05:30
[considering adjusting it](https://gitlab.com/gitlab-com/gl-infra/reliability/-/issues/4985).
2018-05-09 12:01:36 +05:30
2021-01-03 14:25:43 +05:30
## Puma
2022-05-07 20:08:51 +05:30
GitLab.com uses the default of 60 seconds for [Puma request timeouts](../../administration/operations/puma.md#change-the-worker-timeout).
2021-01-03 14:25:43 +05:30
2023-04-23 21:23:45 +05:30
## Maximum number of reviewers and assignees
2022-10-11 01:57:18 +05:30
2023-04-23 21:23:45 +05:30
> - Maximum assignees [introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/368936) in GitLab 15.6.
> - Maximum reviewers [introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/366485) in GitLab 15.9.
2022-10-11 01:57:18 +05:30
2023-04-23 21:23:45 +05:30
Merge requests enforce these maximums:
- Maximum assignees: 200
- Maximum reviewers: 200
2022-10-11 01:57:18 +05:30
2019-10-12 21:52:04 +05:30
## GitLab.com-specific rate limits
2021-02-22 17:27:13 +05:30
NOTE:
2019-10-12 21:52:04 +05:30
See [Rate limits](../../security/rate_limits.md) for administrator
documentation.
2021-02-22 17:27:13 +05:30
When a request is rate limited, GitLab responds with a `429` status
code. The client should wait before attempting the request again. There
2022-10-11 01:57:18 +05:30
are also informational headers with this response detailed in
2022-08-27 11:52:29 +05:30
[rate limiting responses](#rate-limiting-responses).
2019-10-12 21:52:04 +05:30
2021-02-22 17:27:13 +05:30
The following table describes the rate limits for GitLab.com, both before and
after the limits change in January, 2021:
2019-10-12 21:52:04 +05:30
2022-07-23 23:45:48 +05:30
| Rate limit | From 2021-02-12 | From 2022-02-03 |
|:---------------------------------------------------------------------------|:------------------------------|:----------------------------------------|
| **Protected paths** (for a given **IP address**) | **10** requests per minute | **10** requests per minute |
| **Raw endpoint** traffic (for a given **project, commit, and file path**) | **300** requests per minute | **300** requests per minute |
| **Unauthenticated** traffic (from a given **IP address**) | **500** requests per minute | **500** requests per minute |
| **Authenticated** API traffic (for a given **user**) | **2,000** requests per minute | **2,000** requests per minute |
| **Authenticated** non-API HTTP traffic (for a given **user**) | **1,000** requests per minute | **1,000** requests per minute |
| **All** traffic (from a given **IP address**) | **2,000** requests per minute | **2,000** requests per minute |
| **Issue creation** | **300** requests per minute | **200** requests per minute |
| **Note creation** (on issues and merge requests) | **60** requests per minute | **60** requests per minute |
| **Advanced, project, and group search** API (for a given **IP address**) | **10** requests per minute | **10** requests per minute |
| **GitLab Pages** requests (for a given **IP address**) | | **1000** requests per **50 seconds** |
| **GitLab Pages** requests (for a given **GitLab Pages domain**) | | **5000** requests per **10 seconds** |
| **Pipeline creation** requests (for a given **project, user, and commit**) | | **25** requests per minute |
2022-08-13 15:12:31 +05:30
| **Alert integration endpoint** requests (for a given **project**) | | **3600** requests per hour |
2019-10-12 21:52:04 +05:30
2022-10-11 01:57:18 +05:30
More details are available on the rate limits for
[protected paths](#protected-paths-throttle) and
2022-08-27 11:52:29 +05:30
[raw endpoints](../../user/admin_area/settings/rate_limits_on_raw_endpoints.md).
2019-10-12 21:52:04 +05:30
2022-06-21 17:19:12 +05:30
GitLab can rate-limit requests at several layers. The rate limits listed here
are configured in the application. These limits are the most
2023-04-23 21:23:45 +05:30
restrictive per IP address. For more information about the rate limits
for GitLab.com, see
[an overview](https://gitlab.com/gitlab-com/runbooks/-/tree/master/docs/rate-limiting).
2022-06-21 17:19:12 +05:30
2021-02-22 17:27:13 +05:30
### Rate limiting responses
2019-10-12 21:52:04 +05:30
2021-03-08 18:12:59 +05:30
For information on rate limiting responses, see:
2019-10-12 21:52:04 +05:30
2021-03-08 18:12:59 +05:30
- [List of headers on responses to blocked requests](../admin_area/settings/user_and_ip_rate_limits.md#response-headers).
2021-11-11 11:23:49 +05:30
- [Customizable response text](../admin_area/settings/user_and_ip_rate_limits.md#use-a-custom-rate-limit-response).
2020-11-24 15:15:51 +05:30
2021-02-22 17:27:13 +05:30
### Protected paths throttle
2019-10-12 21:52:04 +05:30
GitLab.com responds with HTTP status code `429` to POST requests at protected
paths that exceed 10 requests per **minute** per IP address.
See the source below for which paths are protected. This includes user creation,
user confirmation, user sign in, and password reset.
2021-09-04 01:27:46 +05:30
[User and IP rate limits](../admin_area/settings/user_and_ip_rate_limits.md#response-headers)
includes a list of the headers responded to blocked requests.
2019-10-12 21:52:04 +05:30
2019-12-21 20:55:43 +05:30
See [Protected Paths](../admin_area/settings/protected_paths.md) for more details.
2019-10-12 21:52:04 +05:30
2021-02-22 17:27:13 +05:30
### IP blocks
IP blocks can occur when GitLab.com receives unusual traffic from a single
2021-09-04 01:27:46 +05:30
IP address that the system views as potentially malicious. This can be based on
rate limit settings. After the unusual traffic ceases, the IP address is
automatically released depending on the type of block, as described in a
following section.
2021-02-22 17:27:13 +05:30
If you receive a `403 Forbidden` error for all requests to GitLab.com,
check for any automated processes that may be triggering a block. For
2022-08-27 11:52:29 +05:30
assistance, contact [GitLab Support](https://support.gitlab.com)
2021-02-22 17:27:13 +05:30
with details, such as the affected IP address.
2019-10-12 21:52:04 +05:30
#### Git and container registry failed authentication ban
2019-12-04 20:38:33 +05:30
GitLab.com responds with HTTP status code `403` for 1 hour, if 30 failed
2019-10-12 21:52:04 +05:30
authentication requests were received in a 3-minute period from a single IP address.
This applies only to Git requests and container registry (`/jwt/auth`) requests
(combined).
2019-12-04 20:38:33 +05:30
This limit:
- Is reset by requests that authenticate successfully. For example, 29
2021-09-04 01:27:46 +05:30
failed authentication requests followed by 1 successful request, followed by
29 more failed authentication requests would not trigger a ban.
2019-12-04 20:38:33 +05:30
- Does not apply to JWT requests authenticated by `gitlab-ci-token`.
2019-10-12 21:52:04 +05:30
No response headers are provided.
2021-02-22 17:27:13 +05:30
### Pagination response headers
2019-10-12 21:52:04 +05:30
2023-04-23 21:23:45 +05:30
For performance reasons, if a query returns more than 10,000 records, [GitLab excludes some headers](../../api/rest/index.md#pagination-response-headers).
2019-10-12 21:52:04 +05:30
2020-01-01 13:55:28 +05:30
### Visibility settings
2022-08-27 11:52:29 +05:30
Projects, groups, and snippets have the
2022-06-21 17:19:12 +05:30
[Internal visibility](../public_access.md#internal-projects-and-groups)
2022-08-27 11:52:29 +05:30
setting [disabled on GitLab.com](https://gitlab.com/gitlab-org/gitlab/-/issues/12388).
2020-01-01 13:55:28 +05:30
2020-04-08 14:13:33 +05:30
### SSH maximum number of connections
2021-09-04 01:27:46 +05:30
GitLab.com defines the maximum number of concurrent, unauthenticated SSH
2022-07-23 23:45:48 +05:30
connections by using the [MaxStartups setting](https://man.openbsd.org/sshd_config.5#MaxStartups).
2021-09-04 01:27:46 +05:30
If more than the maximum number of allowed connections occur concurrently, they
are dropped and users get
2020-04-08 14:13:33 +05:30
[an `ssh_exchange_identification` error](../../topics/git/troubleshooting_git.md#ssh_exchange_identification-error).
2023-03-04 22:38:38 +05:30
### Group and project import by uploading export files
2020-06-23 00:09:42 +05:30
2023-03-04 22:38:38 +05:30
To help avoid abuse, the following are rate limited:
- Project and group imports.
- Group and project exports that use files.
- Export downloads.
For more information, see:
- [Project import/export rate limits](../../user/project/settings/import_export.md#rate-limits).
- [Group import/export rate limits](../../user/group/import/index.md#rate-limits).
2020-06-23 00:09:42 +05:30
2021-01-03 14:25:43 +05:30
### Non-configurable limits
2021-09-04 01:27:46 +05:30
See [non-configurable limits](../../security/rate_limits.md#non-configurable-limits)
for information on rate limits that are not configurable, and therefore also
used on GitLab.com.
2021-01-03 14:25:43 +05:30
2021-09-30 23:02:18 +05:30
## GitLab.com logging
2020-01-01 13:55:28 +05:30
2021-09-04 01:27:46 +05:30
We use [Fluentd](https://gitlab.com/gitlab-com/runbooks/tree/master/logging/doc#fluentd)
to parse our logs. Fluentd sends our logs to
[Stackdriver Logging](https://gitlab.com/gitlab-com/runbooks/tree/master/logging/doc#stackdriver)
and [Cloud Pub/Sub](https://gitlab.com/gitlab-com/runbooks/tree/master/logging/doc#cloud-pubsub).
Stackdriver is used for storing logs long-term in Google Cold Storage (GCS).
Cloud Pub/Sub is used to forward logs to an [Elastic cluster](https://gitlab.com/gitlab-com/runbooks/tree/master/logging/doc#elastic) using [`pubsubbeat`](https://gitlab.com/gitlab-com/runbooks/tree/master/logging/doc#pubsubbeat-vms).
2020-01-01 13:55:28 +05:30
You can view more information in our runbooks such as:
2020-07-28 23:09:34 +05:30
- A [detailed list of what we're logging](https://gitlab.com/gitlab-com/runbooks/-/tree/master/docs/logging#what-are-we-logging)
- Our [current log retention policies](https://gitlab.com/gitlab-com/runbooks/-/tree/master/docs/logging#retention)
- A [diagram of our logging infrastructure](https://gitlab.com/gitlab-com/runbooks/-/tree/master/docs/logging#logging-infrastructure-overview)
2020-01-01 13:55:28 +05:30
2021-09-30 23:02:18 +05:30
### Job logs
2021-01-29 00:20:46 +05:30
By default, GitLab does not expire job logs. Job logs are retained indefinitely,
and can't be configured on GitLab.com to expire. You can erase job logs
[manually with the Jobs API](../../api/jobs.md#erase-a-job) or by
[deleting a pipeline](../../ci/pipelines/index.md#delete-a-pipeline).
2018-05-09 12:01:36 +05:30
## GitLab.com at scale
In addition to the GitLab Enterprise Edition Omnibus install, GitLab.com uses
the following applications and settings to achieve scale. All settings are
2019-12-04 20:38:33 +05:30
publicly available at [chef cookbooks](https://gitlab.com/gitlab-cookbooks).
2018-05-09 12:01:36 +05:30
2021-09-30 23:02:18 +05:30
### Elastic cluster
2018-05-09 12:01:36 +05:30
2020-01-01 13:55:28 +05:30
We use Elasticsearch and Kibana for part of our monitoring solution:
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
- [`gitlab-cookbooks` / `gitlab-elk` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab-elk)
- [`gitlab-cookbooks` / `gitlab_elasticsearch` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab_elasticsearch)
2018-05-09 12:01:36 +05:30
2020-01-01 13:55:28 +05:30
### Fluentd
We use Fluentd to unify our GitLab logs:
- [`gitlab-cookbooks` / `gitlab_fluentd` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab_fluentd)
2018-05-09 12:01:36 +05:30
### Prometheus
Prometheus complete our monitoring stack:
2019-12-21 20:55:43 +05:30
- [`gitlab-cookbooks` / `gitlab-prometheus` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab-prometheus)
2018-05-09 12:01:36 +05:30
### Grafana
For the visualization of monitoring data:
2019-12-21 20:55:43 +05:30
- [`gitlab-cookbooks` / `gitlab-grafana` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab-grafana)
2018-05-09 12:01:36 +05:30
### Sentry
Open source error tracking:
2019-12-21 20:55:43 +05:30
- [`gitlab-cookbooks` / `gitlab-sentry` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab-sentry)
2018-05-09 12:01:36 +05:30
### Consul
Service discovery:
2019-12-21 20:55:43 +05:30
- [`gitlab-cookbooks` / `gitlab_consul` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab_consul)
2018-05-09 12:01:36 +05:30
2020-04-08 14:13:33 +05:30
### HAProxy
2018-05-09 12:01:36 +05:30
High Performance TCP/HTTP Load Balancer:
2019-12-21 20:55:43 +05:30
- [`gitlab-cookbooks` / `gitlab-haproxy` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab-haproxy)