debian-mirror-gitlab/doc/user/gitlab_com/index.md

702 lines
35 KiB
Markdown
Raw Normal View History

2021-01-29 00:20:46 +05:30
---
stage: none
group: unassigned
2021-02-22 17:27:13 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
2021-01-29 00:20:46 +05:30
---
2021-04-17 20:07:23 +05:30
# GitLab.com settings **(FREE SAAS)**
2018-05-09 12:01:36 +05:30
2021-02-22 17:27:13 +05:30
This page contains information about the settings that are used on
2019-09-30 21:07:59 +05:30
[GitLab.com](https://about.gitlab.com/pricing/).
2018-05-09 12:01:36 +05:30
## SSH host keys fingerprints
2020-04-22 19:07:51 +05:30
Below are the fingerprints for GitLab.com's SSH host keys. The first time you connect
2021-02-22 17:27:13 +05:30
to a GitLab.com repository, one of these keys is displayed in the output.
2018-05-09 12:01:36 +05:30
2020-04-22 19:07:51 +05:30
| Algorithm | MD5 (deprecated) | SHA256 |
2018-05-09 12:01:36 +05:30
| --------- | --- | ------- |
2020-04-22 19:07:51 +05:30
| DSA (deprecated) | `7a:47:81:3a:ee:89:89:64:33:ca:44:52:3d:30:d4:87` | `p8vZBUOR0XQz6sYiaWSMLmh0t9i8srqYKool/Xfdfqw` |
2018-05-09 12:01:36 +05:30
| ECDSA | `f1:d0:fb:46:73:7a:70:92:5a:ab:5d:ef:43:e2:1c:35` | `HbW3g8zUjNSksFbqTiUWPWg2Bq1x8xdGUrliXFzSnUw` |
| ED25519 | `2e:65:6a:c8:cf:bf:b2:8b:9a:bd:6d:9f:11:5c:12:16` | `eUXGGm1YGsMAS7vkcx6JOJdOGHPem5gQp4taiCfCLB8` |
| RSA | `b6:03:0e:39:97:9e:d0:e7:24:ce:a3:77:3e:01:42:09` | `ROQFvPThGrW4RuWLoL9tq9I9zJ42fK4XywyRtbOz/EQ` |
2020-01-01 13:55:28 +05:30
## SSH `known_hosts` entries
Add the following to `.ssh/known_hosts` to skip manual fingerprint
confirmation in SSH:
2020-03-13 15:44:24 +05:30
```plaintext
2020-01-01 13:55:28 +05:30
gitlab.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAfuCHKVTjquxvt6CM6tdG4SLp1Btn/nOeHHE5UOzRdf
gitlab.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsj2bNKTBSpIYDEGk9KxsGh3mySTRgMtXL583qmBpzeQ+jqCMRgBqB98u3z++J1sKlXHWfM9dyhSevkMwSbhoR8XIq/U0tCNyokEi/ueaBMCvbcTHhO7FcwzY92WK4Yt0aGROY5qX2UKSeOvuP4D6TPqKF1onrSzH9bx9XUf2lEdWT/ia1NEKjunUqu1xOB/StKDHMoX4/OKyIzuS0q/T1zOATthvasJFoPrAjkohTyaDUz2LN5JoH839hViyEG82yB+MjcFV5MU3N1l1QL3cVUCh93xSaua1N85qivl+siMkPGbO5xR/En4iEY6K2XPASUEMaieWVNTRCtJ4S8H+9
gitlab.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFSMqzJeV9rUzU4kWitGjeR4PWSa29SPqJ1fVkhtj3Hw9xjLVXVYrU9QlYWrOLXBpQ6KWjbjTDTdDkoohFzgbEY=
```
2018-05-09 12:01:36 +05:30
## Mail configuration
2020-05-24 23:13:21 +05:30
GitLab.com sends emails from the `mg.gitlab.com` domain via [Mailgun](https://www.mailgun.com/) and has
2020-10-24 23:57:45 +05:30
its own dedicated IP address (`192.237.158.143`).
2021-02-22 17:27:13 +05:30
NOTE:
2020-10-24 23:57:45 +05:30
The IP address for `mg.gitlab.com` is subject to change at any time.
2018-05-09 12:01:36 +05:30
2020-06-23 00:09:42 +05:30
## Backups
[See our backup strategy](https://about.gitlab.com/handbook/engineering/infrastructure/production/#backups).
2021-01-03 14:25:43 +05:30
There are several ways to perform backups of your content on GitLab.com.
Projects can be backed up in their entirety by exporting them either [through the UI](../project/settings/import_export.md) or [API](../../api/project_import_export.md#schedule-an-export), the latter of which can be used to programmatically upload exports to a storage platform such as AWS S3.
With exports, be sure to take note of [what is and is not](../project/settings/import_export.md#exported-contents), included in a project export.
2021-04-29 21:17:54 +05:30
Since GitLab is built on Git, you can back up **just** the repository of a project by [cloning](../../gitlab-basics/start-using-git.md#clone-a-repository) it to another machine. Similarly, if you need to back up just the wiki of a repository it can also be cloned and all files uploaded to that wiki are included [if they were uploaded after 2020-08-22](../project/wiki/index.md#create-a-new-wiki-page).
2021-01-03 14:25:43 +05:30
2018-05-09 12:01:36 +05:30
## Alternative SSH port
2020-05-24 23:13:21 +05:30
GitLab.com can be reached via a [different SSH port](https://about.gitlab.com/blog/2016/02/18/gitlab-dot-com-now-supports-an-alternate-git-plus-ssh-port/) for `git+ssh`.
2018-05-09 12:01:36 +05:30
| Setting | Value |
| --------- | ------------------- |
| `Hostname` | `altssh.gitlab.com` |
| `Port` | `443` |
An example `~/.ssh/config` is the following:
2020-03-13 15:44:24 +05:30
```plaintext
2018-05-09 12:01:36 +05:30
Host gitlab.com
Hostname altssh.gitlab.com
User git
Port 443
PreferredAuthentications publickey
IdentityFile ~/.ssh/gitlab
```
## GitLab Pages
2020-04-22 19:07:51 +05:30
Below are the settings for [GitLab Pages](https://about.gitlab.com/stages-devops-lifecycle/pages/).
2018-05-09 12:01:36 +05:30
2019-12-04 20:38:33 +05:30
| Setting | GitLab.com | Default |
| --------------------------- | ---------------- | ------------- |
| Domain name | `gitlab.io` | - |
| IP address | `35.185.44.232` | - |
| Custom domains support | yes | no |
| TLS certificates support | yes | no |
2020-11-24 15:15:51 +05:30
| Maximum size (compressed) | 1G | 100M |
2018-05-09 12:01:36 +05:30
2021-02-22 17:27:13 +05:30
NOTE:
2018-05-09 12:01:36 +05:30
The maximum size of your Pages site is regulated by the artifacts maximum size
2019-07-07 11:18:12 +05:30
which is part of [GitLab CI/CD](#gitlab-cicd).
2018-05-09 12:01:36 +05:30
## GitLab CI/CD
Below are the current settings regarding [GitLab CI/CD](../../ci/README.md).
2021-01-29 00:20:46 +05:30
Any settings or feature limits not listed here are using the defaults listed in the related documentation.
2018-05-09 12:01:36 +05:30
| Setting | GitLab.com | Default |
| ----------- | ----------------- | ------------- |
2020-11-24 15:15:51 +05:30
| Artifacts maximum size (compressed) | 1G | 100M |
2020-07-28 23:09:34 +05:30
| Artifacts [expiry time](../../ci/yaml/README.md#artifactsexpire_in) | From June 22, 2020, deleted after 30 days unless otherwise specified (artifacts created before that date have no expiry). | deleted after 30 days unless otherwise specified |
2021-03-11 19:13:27 +05:30
| Scheduled Pipeline Cron | `*/5 * * * *` | `3-59/10 * * * *` |
2021-06-08 01:23:25 +05:30
| [Max jobs in active pipelines](../../administration/instance_limits.md#number-of-jobs-in-active-pipelines) | `500` for Free tier, unlimited otherwise | Unlimited |
2020-10-24 23:57:45 +05:30
| [Max CI/CD subscriptions to a project](../../administration/instance_limits.md#number-of-cicd-subscriptions-to-a-project) | `2` | Unlimited |
2020-04-08 14:13:33 +05:30
| [Max pipeline schedules in projects](../../administration/instance_limits.md#number-of-pipeline-schedules) | `10` for Free tier, `50` for all paid tiers | Unlimited |
2020-11-24 15:15:51 +05:30
| [Scheduled Job Archival](../../user/admin_area/settings/continuous_integration.md#archive-jobs) | 3 months | Never |
2021-01-03 14:25:43 +05:30
| Max test cases per [unit test report](../../ci/unit_test_reports.md) | `500_000` | Unlimited |
2021-06-08 01:23:25 +05:30
| [Max registered runners](../../administration/instance_limits.md#number-of-registered-runners-per-scope) | `50` per-project and per-group for Free tier,<br/>`1_000` per-group for all paid tiers / `1_000` per-project for all paid tiers | `1_000` per-group / `1_000` per-project |
2018-05-09 12:01:36 +05:30
2020-11-24 15:15:51 +05:30
## Account and limit settings
2018-05-09 12:01:36 +05:30
2020-07-28 23:09:34 +05:30
GitLab.com has the following [account limits](../admin_area/settings/account_and_limit_settings.md) enabled. If a setting is not listed, it is set to the default value.
2018-05-09 12:01:36 +05:30
2020-07-28 23:09:34 +05:30
If you are near
or over the repository size limit, you can [reduce your repository size with Git](../project/repository/reducing_the_repo_size_using_git.md).
| Setting | GitLab.com | Default |
| ----------- | ----------- | ------------- |
2021-04-29 21:17:54 +05:30
| [Repository size including LFS](../admin_area/settings/account_and_limit_settings.md#repository-size-limit) | 10 GB | Unlimited |
2021-03-11 19:13:27 +05:30
| Maximum import size | 5 GB | Unlimited ([Modified](https://gitlab.com/gitlab-org/gitlab/-/issues/251106) from 50MB to unlimited in GitLab 13.8. |
2021-06-08 01:23:25 +05:30
| Maximum attachment size | 10 MB | 10 MB |
2018-05-09 12:01:36 +05:30
2021-02-22 17:27:13 +05:30
NOTE:
2020-07-28 23:09:34 +05:30
`git push` and GitLab project imports are limited to 5 GB per request through Cloudflare. Git LFS and imports other than a file upload are not affected by this limit.
2020-04-22 19:07:51 +05:30
2019-07-07 11:18:12 +05:30
## IP range
2021-04-29 21:17:54 +05:30
GitLab.com uses the IP ranges `34.74.90.64/28` and `34.74.226.0/24` for traffic from its Web/API
2020-04-22 19:07:51 +05:30
fleet. This whole range is solely allocated to GitLab. You can expect connections from webhooks or repository mirroring to come
2020-07-28 23:09:34 +05:30
from those IPs and allow them.
2020-04-08 14:13:33 +05:30
2020-07-28 23:09:34 +05:30
GitLab.com is fronted by Cloudflare. For incoming connections to GitLab.com you might need to allow CIDR blocks of Cloudflare ([IPv4](https://www.cloudflare.com/ips-v4) and [IPv6](https://www.cloudflare.com/ips-v6)).
2020-04-22 19:07:51 +05:30
For outgoing connections from CI/CD runners we are not providing static IP addresses.
2020-04-08 14:13:33 +05:30
All our runners are deployed into Google Cloud Platform (GCP) - any IP based
firewall can be configured by looking up all
2021-03-11 19:13:27 +05:30
[IP address ranges or CIDR blocks for GCP](https://cloud.google.com/compute/docs/faq#find_ip_range).
2019-07-07 11:18:12 +05:30
2021-03-08 18:12:59 +05:30
## Hostname list
To configure allow-lists in local HTTP(S) proxies, or other
web-blocking software that govern end-user machines,
pages on GitLab.com will attempt to load content from
the following hostnames:
- `gitlab.com`
- `*.gitlab.com`
- `*.gitlab-static.net`
- `*.gitlab.io`
- `*.gitlab.net`
Documentation and Company pages served over `docs.gitlab.com`
and `about.gitlab.com` will attempt to also load certain page
content directly from common public CDN hostnames.
2020-10-24 23:57:45 +05:30
## Webhooks
2020-04-08 14:13:33 +05:30
A limit of:
- 100 webhooks applies to projects.
- 50 webhooks applies to groups. **(BRONZE ONLY)**
2020-10-24 23:57:45 +05:30
- Payload is limited to 25MB
2019-07-07 11:18:12 +05:30
2020-11-24 15:15:51 +05:30
## Shared runners
2018-05-09 12:01:36 +05:30
2020-03-13 15:44:24 +05:30
GitLab offers Linux and Windows shared runners hosted on GitLab.com for executing your pipelines.
2021-02-22 17:27:13 +05:30
NOTE:
2020-11-24 15:15:51 +05:30
Shared runners provided by GitLab are **not** configurable. Consider [installing your own runner](https://docs.gitlab.com/runner/install/) if you have specific configuration needs.
2020-05-24 23:13:21 +05:30
2020-11-24 15:15:51 +05:30
### Linux shared runners
2020-03-13 15:44:24 +05:30
2021-02-22 17:27:13 +05:30
Linux shared runners on GitLab.com run in autoscale mode and are powered by Google Cloud Platform.
Autoscaling means reduced queue times to spin up CI/CD jobs, and isolated VMs for each project, thus maximizing security. These shared runners are available for users and customers on GitLab.com.
2021-03-11 19:13:27 +05:30
GitLab offers Ultimate tier capabilities and included CI/CD minutes per group per month for our [Open Source](https://about.gitlab.com/solutions/open-source/join/), [Education](https://about.gitlab.com/solutions/education/), and [Startups](https://about.gitlab.com/solutions/startups/) programs. For private projects, GitLab offers various [plans](https://about.gitlab.com/pricing/), starting with a Free tier.
2018-05-09 12:01:36 +05:30
2018-11-20 20:47:30 +05:30
All your CI/CD jobs run on [n1-standard-1 instances](https://cloud.google.com/compute/docs/machine-types) with 3.75GB of RAM, CoreOS and the latest Docker Engine
2018-05-09 12:01:36 +05:30
installed. Instances provide 1 vCPU and 25GB of HDD disk space. The default
region of the VMs is US East1.
2018-11-20 20:47:30 +05:30
Each instance is used only for one job, this ensures any sensitive data left on the system can't be accessed by other people their CI jobs.
2018-05-09 12:01:36 +05:30
2021-02-22 17:27:13 +05:30
The `gitlab-shared-runners-manager-X.gitlab.com` fleet of runners are dedicated for GitLab projects as well as community forks of them. They use a slightly larger machine type (n1-standard-2) and have a bigger SSD disk size. They don't run untagged jobs and unlike the general fleet of shared runners, the instances are re-used up to 40 times.
2020-01-01 13:55:28 +05:30
2020-11-24 15:15:51 +05:30
Jobs handled by the shared runners on GitLab.com (`shared-runners-manager-X.gitlab.com`),
2021-02-22 17:27:13 +05:30
**time out after 3 hours**, regardless of the timeout configured in a
2020-06-23 00:09:42 +05:30
project. Check the issues [4010](https://gitlab.com/gitlab-com/infrastructure/-/issues/4010) and [4070](https://gitlab.com/gitlab-com/infrastructure/-/issues/4070) for the reference.
2018-11-08 19:23:39 +05:30
2020-11-24 15:15:51 +05:30
Below are the shared runners settings.
2018-05-09 12:01:36 +05:30
| Setting | GitLab.com | Default |
| ----------- | ----------------- | ---------- |
2020-05-24 23:13:21 +05:30
| [GitLab Runner](https://gitlab.com/gitlab-org/gitlab-runner) | [Runner versions dashboard](https://dashboards.gitlab.com/d/000000159/ci?from=now-1h&to=now&refresh=5m&orgId=1&panelId=12&fullscreen&theme=light) | - |
2018-05-09 12:01:36 +05:30
| Executor | `docker+machine` | - |
| Default Docker image | `ruby:2.5` | - |
2020-05-24 23:13:21 +05:30
| `privileged` (run [Docker in Docker](https://hub.docker.com/_/docker/)) | `true` | `false` |
#### Pre-clone script
2020-11-24 15:15:51 +05:30
Linux shared runners on GitLab.com provide a way to run commands in a CI
job before the runner attempts to run `git init` and `git fetch` to
2020-05-24 23:13:21 +05:30
download a GitLab repository. The
2020-06-23 00:09:42 +05:30
[`pre_clone_script`](https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-runners-section)
2020-05-24 23:13:21 +05:30
can be used for:
- Seeding the build directory with repository data
- Sending a request to a server
- Downloading assets from a CDN
- Any other commands that must run before the `git init`
2021-04-29 21:17:54 +05:30
To use this feature, define a [CI/CD variable](../../ci/variables/README.md#custom-cicd-variables) called
2020-05-24 23:13:21 +05:30
`CI_PRE_CLONE_SCRIPT` that contains a bash script.
[This example](../../development/pipelines.md#pre-clone-step)
demonstrates how you might use a pre-clone step to seed the build
directory.
2018-05-09 12:01:36 +05:30
2020-03-13 15:44:24 +05:30
#### `config.toml`
2018-05-09 12:01:36 +05:30
The full contents of our `config.toml` are:
2021-02-22 17:27:13 +05:30
NOTE:
2020-03-13 15:44:24 +05:30
Settings that are not public are shown as `X`.
2018-05-09 12:01:36 +05:30
**Google Cloud Platform**
```toml
concurrent = X
check_interval = 1
metrics_server = "X"
sentry_dsn = "X"
[[runners]]
name = "docker-auto-scale"
request_concurrency = X
url = "https://gitlab.com/"
token = "SHARED_RUNNER_TOKEN"
2020-05-24 23:13:21 +05:30
pre_clone_script = "eval \"$CI_PRE_CLONE_SCRIPT\""
2018-05-09 12:01:36 +05:30
executor = "docker+machine"
environment = [
2019-10-12 21:52:04 +05:30
"DOCKER_DRIVER=overlay2",
"DOCKER_TLS_CERTDIR="
2018-05-09 12:01:36 +05:30
]
limit = X
[runners.docker]
image = "ruby:2.5"
privileged = true
2019-10-12 21:52:04 +05:30
volumes = [
"/certs/client",
"/dummy-sys-class-dmi-id:/sys/class/dmi/id:ro" # Make kaniko builds work on GCP.
]
2018-05-09 12:01:36 +05:30
[runners.machine]
2019-10-12 21:52:04 +05:30
IdleCount = 50
IdleTime = 3600
MaxBuilds = 1 # For security reasons we delete the VM after job has finished so it's not reused.
2018-05-09 12:01:36 +05:30
MachineName = "srm-%s"
MachineDriver = "google"
MachineOptions = [
"google-project=PROJECT",
"google-disk-size=25",
"google-machine-type=n1-standard-1",
"google-username=core",
"google-tags=gitlab-com,srm",
"google-use-internal-ip",
"google-zone=us-east1-d",
2020-06-23 00:09:42 +05:30
"engine-opt=mtu=1460", # Set MTU for container interface, for more information check https://gitlab.com/gitlab-org/gitlab-runner/-/issues/3214#note_82892928
2018-05-09 12:01:36 +05:30
"google-machine-image=PROJECT/global/images/IMAGE",
2019-10-12 21:52:04 +05:30
"engine-opt=ipv6", # This will create IPv6 interfaces in the containers.
"engine-opt=fixed-cidr-v6=fc00::/7",
"google-operation-backoff-initial-interval=2" # Custom flag from forked docker-machine, for more information check https://github.com/docker/machine/pull/4600
2018-05-09 12:01:36 +05:30
]
2020-10-24 23:57:45 +05:30
[[runners.machine.autoscaling]]
Periods = ["* * * * * sat,sun *"]
Timezone = "UTC"
IdleCount = 70
IdleTime = 3600
[[runners.machine.autoscaling]]
Periods = ["* 30-59 3 * * * *", "* 0-30 4 * * * *"]
Timezone = "UTC"
IdleCount = 700
IdleTime = 3600
2018-05-09 12:01:36 +05:30
[runners.cache]
2019-10-12 21:52:04 +05:30
Type = "gcs"
2018-05-09 12:01:36 +05:30
Shared = true
2019-10-12 21:52:04 +05:30
[runners.cache.gcs]
CredentialsFile = "/path/to/file"
BucketName = "bucket-name"
2018-05-09 12:01:36 +05:30
```
2020-11-24 15:15:51 +05:30
### Windows shared runners (beta)
2020-03-13 15:44:24 +05:30
2021-01-29 00:20:46 +05:30
The Windows shared runners are in [beta](https://about.gitlab.com/handbook/product/gitlab-the-product/#beta)
and shouldn't be used for production workloads.
2020-03-13 15:44:24 +05:30
2021-01-29 00:20:46 +05:30
During this beta period, the [shared runner pipeline quota](../admin_area/settings/continuous_integration.md#shared-runners-pipeline-minutes-quota)
applies for groups and projects in the same manner as Linux runners. This may
change when the beta period ends, as discussed in this [related issue](https://gitlab.com/gitlab-org/gitlab/-/issues/30834).
2020-03-13 15:44:24 +05:30
2021-01-29 00:20:46 +05:30
Windows shared runners on GitLab.com autoscale by launching virtual machines on
the Google Cloud Platform. This solution uses an
[autoscaling driver](https://gitlab.com/gitlab-org/ci-cd/custom-executor-drivers/autoscaler/tree/master/docs/readme.md)
2020-03-13 15:44:24 +05:30
developed by GitLab for the [custom executor](https://docs.gitlab.com/runner/executors/custom.html).
2021-01-29 00:20:46 +05:30
Windows shared runners execute your CI/CD jobs on `n1-standard-2` instances with
2 vCPUs and 7.5 GB RAM. You can find a full list of available Windows packages in
the [package documentation](https://gitlab.com/gitlab-org/ci-cd/shared-runners/images/gcp/windows-containers/blob/master/cookbooks/preinstalled-software/README.md).
2020-03-13 15:44:24 +05:30
2020-11-24 15:15:51 +05:30
We want to keep iterating to get Windows shared runners in a stable state and
2021-01-29 00:20:46 +05:30
[generally available](https://about.gitlab.com/handbook/product/gitlab-the-product/#generally-available-ga).
2020-03-13 15:44:24 +05:30
You can follow our work towards this goal in the
[related epic](https://gitlab.com/groups/gitlab-org/-/epics/2162).
#### Configuration
The full contents of our `config.toml` are:
2021-02-22 17:27:13 +05:30
NOTE:
2021-01-29 00:20:46 +05:30
Settings that aren't public are shown as `X`.
2020-03-13 15:44:24 +05:30
```toml
concurrent = X
check_interval = 3
[[runners]]
name = "windows-runner"
url = "https://gitlab.com/"
token = "TOKEN"
executor = "custom"
builds_dir = "C:\\GitLab-Runner\\builds"
cache_dir = "C:\\GitLab-Runner\\cache"
shell = "powershell"
[runners.custom]
config_exec = "C:\\GitLab-Runner\\autoscaler\\autoscaler.exe"
config_args = ["--config", "C:\\GitLab-Runner\\autoscaler\\config.toml", "custom", "config"]
prepare_exec = "C:\\GitLab-Runner\\autoscaler\\autoscaler.exe"
prepare_args = ["--config", "C:\\GitLab-Runner\\autoscaler\\config.toml", "custom", "prepare"]
run_exec = "C:\\GitLab-Runner\\autoscaler\\autoscaler.exe"
run_args = ["--config", "C:\\GitLab-Runner\\autoscaler\\config.toml", "custom", "run"]
cleanup_exec = "C:\\GitLab-Runner\\autoscaler\\autoscaler.exe"
cleanup_args = ["--config", "C:\\GitLab-Runner\\autoscaler\\config.toml", "custom", "cleanup"]
```
The full contents of our `autoscaler/config.toml` are:
```toml
Provider = "gcp"
Executor = "winrm"
OS = "windows"
LogLevel = "info"
LogFormat = "text"
LogFile = "C:\\GitLab-Runner\\autoscaler\\autoscaler.log"
VMTag = "windows"
[GCP]
ServiceAccountFile = "PATH"
Project = "some-project-df9323"
Zone = "us-east1-c"
MachineType = "n1-standard-2"
Image = "IMAGE"
DiskSize = 50
DiskType = "pd-standard"
Subnetwork = "default"
Network = "default"
Tags = ["TAGS"]
Username = "gitlab_runner"
[WinRM]
MaximumTimeout = 3600
ExecutionMaxRetries = 0
[ProviderCache]
Enabled = true
Directory = "C:\\GitLab-Runner\\autoscaler\\machines"
```
#### Example
Below is a simple `.gitlab-ci.yml` file to show how to start using the
2020-11-24 15:15:51 +05:30
Windows shared runners:
2020-03-13 15:44:24 +05:30
```yaml
.shared_windows_runners:
tags:
2020-07-28 23:09:34 +05:30
- shared-windows
- windows
- windows-1809
2020-03-13 15:44:24 +05:30
stages:
- build
- test
before_script:
- Set-Variable -Name "time" -Value (date -Format "%H:%m")
- echo ${time}
- echo "started by ${GITLAB_USER_NAME}"
build:
extends:
2020-07-28 23:09:34 +05:30
- .shared_windows_runners
2020-03-13 15:44:24 +05:30
stage: build
script:
2020-07-28 23:09:34 +05:30
- echo "running scripts in the build job"
2020-03-13 15:44:24 +05:30
test:
extends:
2020-07-28 23:09:34 +05:30
- .shared_windows_runners
2020-03-13 15:44:24 +05:30
stage: test
script:
2020-07-28 23:09:34 +05:30
- echo "running scripts in the test job"
2020-03-13 15:44:24 +05:30
```
#### Limitations and known issues
- All the limitations mentioned in our [beta
definition](https://about.gitlab.com/handbook/product/#beta).
- The average provisioning time for a new Windows VM is 5 minutes.
This means that you may notice slower build start times
2020-11-24 15:15:51 +05:30
on the Windows shared runner fleet during the beta. In a future
2021-02-22 17:27:13 +05:30
release we intend to update the autoscaler to enable
the pre-provisioning of virtual machines. This is intended to significantly reduce
2020-03-13 15:44:24 +05:30
the time it takes to provision a VM on the Windows fleet. You can
2020-06-23 00:09:42 +05:30
follow along in the [related issue](https://gitlab.com/gitlab-org/ci-cd/custom-executor-drivers/autoscaler/-/issues/32).
2020-11-24 15:15:51 +05:30
- The Windows shared runner fleet may be unavailable occasionally
2020-03-13 15:44:24 +05:30
for maintenance or updates.
2020-11-24 15:15:51 +05:30
- The Windows shared runner virtual machine instances do not use the
2021-02-22 17:27:13 +05:30
GitLab Docker executor. This means that you can't specify
2020-03-13 15:44:24 +05:30
[`image`](../../ci/yaml/README.md#image) or [`services`](../../ci/yaml/README.md#services) in
your pipeline configuration.
- For the beta release, we have included a set of software packages in
the base VM image. If your CI job requires additional software that's
2021-02-22 17:27:13 +05:30
not included in this list, then you must add installation
2021-01-29 00:20:46 +05:30
commands to [`before_script`](../../ci/yaml/README.md#before_script) or [`script`](../../ci/yaml/README.md#script) to install the required
2020-03-13 15:44:24 +05:30
software. Note that each job runs on a new VM instance, so the
installation of additional software packages needs to be repeated for
each job in your pipeline.
- The job may stay in a pending state for longer than the
2020-11-24 15:15:51 +05:30
Linux shared runners.
2020-03-13 15:44:24 +05:30
- There is the possibility that we introduce breaking changes which will
2020-11-24 15:15:51 +05:30
require updates to pipelines that are using the Windows shared runner
2020-03-13 15:44:24 +05:30
fleet.
2018-05-09 12:01:36 +05:30
## Sidekiq
2019-12-21 20:55:43 +05:30
GitLab.com runs [Sidekiq](https://sidekiq.org) with arguments `--timeout=4 --concurrency=4`
2018-05-09 12:01:36 +05:30
and the following environment variables:
2019-12-21 20:55:43 +05:30
| Setting | GitLab.com | Default |
|-------- |----------- |-------- |
2020-11-24 15:15:51 +05:30
| `SIDEKIQ_DAEMON_MEMORY_KILLER` | - | `1` |
2019-12-21 20:55:43 +05:30
| `SIDEKIQ_MEMORY_KILLER_MAX_RSS` | `2000000` | `2000000` |
| `SIDEKIQ_MEMORY_KILLER_HARD_LIMIT_RSS` | - | - |
| `SIDEKIQ_MEMORY_KILLER_CHECK_INTERVAL` | - | `3` |
| `SIDEKIQ_MEMORY_KILLER_GRACE_TIME` | - | `900` |
| `SIDEKIQ_MEMORY_KILLER_SHUTDOWN_WAIT` | - | `30` |
2021-01-29 00:20:46 +05:30
| `SIDEKIQ_LOG_ARGUMENTS` | `1` | `1` |
2019-12-21 20:55:43 +05:30
2021-02-22 17:27:13 +05:30
NOTE:
2019-12-21 20:55:43 +05:30
The `SIDEKIQ_MEMORY_KILLER_MAX_RSS` setting is `16000000` on Sidekiq import
nodes and Sidekiq export nodes.
2018-05-09 12:01:36 +05:30
## PostgreSQL
GitLab.com being a fairly large installation of GitLab means we have changed
various PostgreSQL settings to better suit our needs. For example, we use
streaming replication and servers in hot-standby mode to balance queries across
different database servers.
The list of GitLab.com specific settings (and their defaults) is as follows:
2020-06-23 00:09:42 +05:30
| Setting | GitLab.com | Default |
|:--------------------------------------|:--------------------------------------------------------------------|:--------------------------------------|
| `archive_command` | `/usr/bin/envdir /etc/wal-e.d/env /opt/wal-e/bin/wal-e wal-push %p` | empty |
| `archive_mode` | on | off |
| `autovacuum_analyze_scale_factor` | 0.01 | 0.01 |
| `autovacuum_max_workers` | 6 | 3 |
| `autovacuum_vacuum_cost_limit` | 1000 | -1 |
| `autovacuum_vacuum_scale_factor` | 0.01 | 0.02 |
| `checkpoint_completion_target` | 0.7 | 0.9 |
| `checkpoint_segments` | 32 | 10 |
| `effective_cache_size` | 338688MB | Based on how much memory is available |
| `hot_standby` | on | off |
| `hot_standby_feedback` | on | off |
| `log_autovacuum_min_duration` | 0 | -1 |
| `log_checkpoints` | on | off |
| `log_line_prefix` | `%t [%p]: [%l-1]` | empty |
| `log_min_duration_statement` | 1000 | -1 |
| `log_temp_files` | 0 | -1 |
| `maintenance_work_mem` | 2048MB | 16 MB |
| `max_replication_slots` | 5 | 0 |
| `max_wal_senders` | 32 | 0 |
| `max_wal_size` | 5GB | 1GB |
| `shared_buffers` | 112896MB | Based on how much memory is available |
| `shared_preload_libraries` | pg_stat_statements | empty |
| `shmall` | 30146560 | Based on the server's capabilities |
| `shmmax` | 123480309760 | Based on the server's capabilities |
| `wal_buffers` | 16MB | -1 |
| `wal_keep_segments` | 512 | 10 |
| `wal_level` | replica | minimal |
| `statement_timeout` | 15s | 60s |
| `idle_in_transaction_session_timeout` | 60s | 60s |
2018-05-09 12:01:36 +05:30
Some of these settings are in the process being adjusted. For example, the value
for `shared_buffers` is quite high and as such we are looking into adjusting it.
More information on this particular change can be found at
2020-06-23 00:09:42 +05:30
<https://gitlab.com/gitlab-com/infrastructure/-/issues/1555>. An up to date list
2018-05-09 12:01:36 +05:30
of proposed changes can be found at
2020-06-23 00:09:42 +05:30
<https://gitlab.com/gitlab-com/infrastructure/-/issues?scope=all&utf8=%E2%9C%93&state=opened&label_name[]=database&label_name[]=change>.
2018-05-09 12:01:36 +05:30
2021-01-03 14:25:43 +05:30
## Puma
GitLab.com uses the default of 60 seconds for [Puma request timeouts](https://docs.gitlab.com/omnibus/settings/puma.html#worker-timeout).
2018-05-09 12:01:36 +05:30
## Unicorn
2020-05-24 23:13:21 +05:30
GitLab.com adjusts the memory limits for the [unicorn-worker-killer](https://rubygems.org/gems/unicorn-worker-killer) gem.
2018-05-09 12:01:36 +05:30
Base default:
2019-03-02 22:35:43 +05:30
- `memory_limit_min` = 750MiB
- `memory_limit_max` = 1024MiB
2018-05-09 12:01:36 +05:30
Web front-ends:
2019-03-02 22:35:43 +05:30
- `memory_limit_min` = 1024MiB
- `memory_limit_max` = 1280MiB
2018-05-09 12:01:36 +05:30
2019-10-12 21:52:04 +05:30
## GitLab.com-specific rate limits
2021-02-22 17:27:13 +05:30
NOTE:
2019-10-12 21:52:04 +05:30
See [Rate limits](../../security/rate_limits.md) for administrator
documentation.
2021-02-22 17:27:13 +05:30
When a request is rate limited, GitLab responds with a `429` status
code. The client should wait before attempting the request again. There
are also informational headers with this response detailed in [rate
limiting responses](#rate-limiting-responses).
2019-10-12 21:52:04 +05:30
2021-02-22 17:27:13 +05:30
The following table describes the rate limits for GitLab.com, both before and
after the limits change in January, 2021:
2019-10-12 21:52:04 +05:30
2021-03-11 19:13:27 +05:30
| Rate limit | Before 2021-01-18 | From 2021-01-18 | From 2021-02-12 |
|:--------------------------------------------------------------------------|:----------------------------|:------------------------------|:------------------------------|
| **Protected paths** (for a given **IP address**) | **10** requests per minute | **10** requests per minute | **10** requests per minute |
| **Raw endpoint** traffic (for a given **project, commit, and file path**) | **300** requests per minute | **300** requests per minute | **300** requests per minute |
| **Unauthenticated** traffic (from a given **IP address**) | No specific limit | **500** requests per minute | **500** requests per minute |
| **Authenticated** API traffic (for a given **user**) | No specific limit | **2,000** requests per minute | **2,000** requests per minute |
| **Authenticated** non-API HTTP traffic (for a given **user**) | No specific limit | **1,000** requests per minute | **1,000** requests per minute |
| **All** traffic (from a given **IP address**) | **600** requests per minute | **2,000** requests per minute | **2,000** requests per minute |
| **Issue creation** | | **300** requests per minute | **300** requests per minute |
| **Note creation** (on issues and merge requests) | | **300** requests per minute | **60** requests per minute |
2019-10-12 21:52:04 +05:30
2021-02-22 17:27:13 +05:30
More details are available on the rate limits for [protected
paths](#protected-paths-throttle) and [raw
endpoints](../../user/admin_area/settings/rate_limits_on_raw_endpoints.md).
2019-10-12 21:52:04 +05:30
2021-02-22 17:27:13 +05:30
### Rate limiting responses
2019-10-12 21:52:04 +05:30
2021-03-08 18:12:59 +05:30
For information on rate limiting responses, see:
2019-10-12 21:52:04 +05:30
2021-03-08 18:12:59 +05:30
- [List of headers on responses to blocked requests](../admin_area/settings/user_and_ip_rate_limits.md#response-headers).
- [Customizable response text](../admin_area/settings/user_and_ip_rate_limits.md#response-text).
2020-11-24 15:15:51 +05:30
2021-02-22 17:27:13 +05:30
### Protected paths throttle
2019-10-12 21:52:04 +05:30
GitLab.com responds with HTTP status code `429` to POST requests at protected
paths that exceed 10 requests per **minute** per IP address.
See the source below for which paths are protected. This includes user creation,
user confirmation, user sign in, and password reset.
2021-03-08 18:12:59 +05:30
[User and IP rate limits](../admin_area/settings/user_and_ip_rate_limits.md#response-headers) includes a list of the headers responded to blocked requests.
2019-10-12 21:52:04 +05:30
2019-12-21 20:55:43 +05:30
See [Protected Paths](../admin_area/settings/protected_paths.md) for more details.
2019-10-12 21:52:04 +05:30
2021-02-22 17:27:13 +05:30
### IP blocks
IP blocks can occur when GitLab.com receives unusual traffic from a single
IP address that the system views as potentially malicious, based on rate limit
settings. After the unusual traffic ceases, the IP address is automatically
released depending on the type of block, as described in a following section.
If you receive a `403 Forbidden` error for all requests to GitLab.com,
check for any automated processes that may be triggering a block. For
assistance, contact [GitLab Support](https://support.gitlab.com/hc/en-us)
with details, such as the affected IP address.
2019-10-12 21:52:04 +05:30
#### Git and container registry failed authentication ban
2019-12-04 20:38:33 +05:30
GitLab.com responds with HTTP status code `403` for 1 hour, if 30 failed
2019-10-12 21:52:04 +05:30
authentication requests were received in a 3-minute period from a single IP address.
This applies only to Git requests and container registry (`/jwt/auth`) requests
(combined).
2019-12-04 20:38:33 +05:30
This limit:
- Is reset by requests that authenticate successfully. For example, 29
failed authentication requests followed by 1 successful request, followed by 29
more failed authentication requests would not trigger a ban.
- Does not apply to JWT requests authenticated by `gitlab-ci-token`.
2019-10-12 21:52:04 +05:30
No response headers are provided.
2021-02-22 17:27:13 +05:30
### Pagination response headers
2019-10-12 21:52:04 +05:30
2021-02-22 17:27:13 +05:30
For performance reasons, if a query returns more than 10,000 records, GitLab
doesn't return the following headers:
2019-12-04 20:38:33 +05:30
2021-02-22 17:27:13 +05:30
- `x-total`.
- `x-total-pages`.
- `rel="last"` `link`.
2019-10-12 21:52:04 +05:30
2020-01-01 13:55:28 +05:30
### Visibility settings
On GitLab.com, projects, groups, and snippets created
As of GitLab 12.2 (July 2019), projects, groups, and snippets have the
2020-06-23 00:09:42 +05:30
[**Internal** visibility](../../public_access/public_access.md#internal-projects) setting [disabled on GitLab.com](https://gitlab.com/gitlab-org/gitlab/-/issues/12388).
2020-01-01 13:55:28 +05:30
2020-04-08 14:13:33 +05:30
### SSH maximum number of connections
GitLab.com defines the maximum number of concurrent, unauthenticated SSH connections by
using the [MaxStartups setting](http://man.openbsd.org/sshd_config.5#MaxStartups).
If more than the maximum number of allowed connections occur concurrently, they are
dropped and users get
[an `ssh_exchange_identification` error](../../topics/git/troubleshooting_git.md#ssh_exchange_identification-error).
2020-06-23 00:09:42 +05:30
### Import/export
To help avoid abuse, project and group imports, exports, and export downloads are rate limited. See [Project import/export rate limits](../../user/project/settings/import_export.md#rate-limits) and [Group import/export rate limits](../../user/group/settings/import_export.md#rate-limits) for details.
2021-01-03 14:25:43 +05:30
### Non-configurable limits
See [non-configurable limits](../../security/rate_limits.md#non-configurable-limits) for information on
rate limits that are not configurable, and therefore also used on GitLab.com.
2020-01-01 13:55:28 +05:30
## GitLab.com Logging
We use [Fluentd](https://gitlab.com/gitlab-com/runbooks/tree/master/logging/doc#fluentd) to parse our logs. Fluentd sends our logs to
[Stackdriver Logging](https://gitlab.com/gitlab-com/runbooks/tree/master/logging/doc#stackdriver) and [Cloud Pub/Sub](https://gitlab.com/gitlab-com/runbooks/tree/master/logging/doc#cloud-pubsub).
Stackdriver is used for storing logs long-term in Google Cold Storage (GCS). Cloud Pub/Sub
2021-03-11 19:13:27 +05:30
is used to forward logs to an [Elastic cluster](https://gitlab.com/gitlab-com/runbooks/tree/master/logging/doc#elastic) using [`pubsubbeat`](https://gitlab.com/gitlab-com/runbooks/tree/master/logging/doc#pubsubbeat-vms).
2020-01-01 13:55:28 +05:30
You can view more information in our runbooks such as:
2020-07-28 23:09:34 +05:30
- A [detailed list of what we're logging](https://gitlab.com/gitlab-com/runbooks/-/tree/master/docs/logging#what-are-we-logging)
- Our [current log retention policies](https://gitlab.com/gitlab-com/runbooks/-/tree/master/docs/logging#retention)
- A [diagram of our logging infrastructure](https://gitlab.com/gitlab-com/runbooks/-/tree/master/docs/logging#logging-infrastructure-overview)
2020-01-01 13:55:28 +05:30
2021-01-29 00:20:46 +05:30
### Job Logs
By default, GitLab does not expire job logs. Job logs are retained indefinitely,
and can't be configured on GitLab.com to expire. You can erase job logs
[manually with the Jobs API](../../api/jobs.md#erase-a-job) or by
[deleting a pipeline](../../ci/pipelines/index.md#delete-a-pipeline).
2018-05-09 12:01:36 +05:30
## GitLab.com at scale
In addition to the GitLab Enterprise Edition Omnibus install, GitLab.com uses
the following applications and settings to achieve scale. All settings are
2019-12-04 20:38:33 +05:30
publicly available at [chef cookbooks](https://gitlab.com/gitlab-cookbooks).
2018-05-09 12:01:36 +05:30
2020-01-01 13:55:28 +05:30
### Elastic Cluster
2018-05-09 12:01:36 +05:30
2020-01-01 13:55:28 +05:30
We use Elasticsearch and Kibana for part of our monitoring solution:
2018-05-09 12:01:36 +05:30
2019-12-21 20:55:43 +05:30
- [`gitlab-cookbooks` / `gitlab-elk` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab-elk)
- [`gitlab-cookbooks` / `gitlab_elasticsearch` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab_elasticsearch)
2018-05-09 12:01:36 +05:30
2020-01-01 13:55:28 +05:30
### Fluentd
We use Fluentd to unify our GitLab logs:
- [`gitlab-cookbooks` / `gitlab_fluentd` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab_fluentd)
2018-05-09 12:01:36 +05:30
### Prometheus
Prometheus complete our monitoring stack:
2019-12-21 20:55:43 +05:30
- [`gitlab-cookbooks` / `gitlab-prometheus` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab-prometheus)
2018-05-09 12:01:36 +05:30
### Grafana
For the visualization of monitoring data:
2019-12-21 20:55:43 +05:30
- [`gitlab-cookbooks` / `gitlab-grafana` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab-grafana)
2018-05-09 12:01:36 +05:30
### Sentry
Open source error tracking:
2019-12-21 20:55:43 +05:30
- [`gitlab-cookbooks` / `gitlab-sentry` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab-sentry)
2018-05-09 12:01:36 +05:30
### Consul
Service discovery:
2019-12-21 20:55:43 +05:30
- [`gitlab-cookbooks` / `gitlab_consul` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab_consul)
2018-05-09 12:01:36 +05:30
2020-04-08 14:13:33 +05:30
### HAProxy
2018-05-09 12:01:36 +05:30
High Performance TCP/HTTP Load Balancer:
2019-12-21 20:55:43 +05:30
- [`gitlab-cookbooks` / `gitlab-haproxy` · GitLab](https://gitlab.com/gitlab-cookbooks/gitlab-haproxy)