Shortcuts: My Privacy DNS - Project index | Matrix | Porn Records (merged with Matrix) | WOT | Domain Reporter | L.O.N. | Committer | Addons | Support

GitLab.com settings (FREE SAAS)

This page contains information about the settings that are used on GitLab.com, available to GitLab SaaS customers.

See some of these settings on the instance configuration page of GitLab.com.

Password requirements

GitLab.com has the following requirements for passwords on new accounts and password changes:

  • Minimum character length 8 characters.
  • Maximum character length 128 characters.
  • All characters are accepted. For example, ~, !, @, #, $, %, ^, &, *, (), [], _, +, =, and -.

SSH key restrictions

GitLab.com uses the default SSH key restrictions.

SSH host keys fingerprints

Below are the fingerprints for SSH host keys on GitLab.com. The first time you connect to a GitLab.com repository, one of these keys is displayed in the output.

Algorithm MD5 (deprecated) SHA256
ED25519 2e:65:6a:c8:cf:bf:b2:8b:9a:bd:6d:9f:11:5c:12:16 eUXGGm1YGsMAS7vkcx6JOJdOGHPem5gQp4taiCfCLB8
RSA b6:03:0e:39:97:9e:d0:e7:24:ce:a3:77:3e:01:42:09 ROQFvPThGrW4RuWLoL9tq9I9zJ42fK4XywyRtbOz/EQ
DSA (deprecated) 7a:47:81:3a:ee:89:89:64:33:ca:44:52:3d:30:d4:87 p8vZBUOR0XQz6sYiaWSMLmh0t9i8srqYKool/Xfdfqw
ECDSA f1:d0:fb:46:73:7a:70:92:5a:ab:5d:ef:43:e2:1c:35 HbW3g8zUjNSksFbqTiUWPWg2Bq1x8xdGUrliXFzSnUw

SSH known_hosts entries

Add the following to .ssh/known_hosts to skip manual fingerprint confirmation in SSH:

gitlab.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAfuCHKVTjquxvt6CM6tdG4SLp1Btn/nOeHHE5UOzRdf
gitlab.com ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsj2bNKTBSpIYDEGk9KxsGh3mySTRgMtXL583qmBpzeQ+jqCMRgBqB98u3z++J1sKlXHWfM9dyhSevkMwSbhoR8XIq/U0tCNyokEi/ueaBMCvbcTHhO7FcwzY92WK4Yt0aGROY5qX2UKSeOvuP4D6TPqKF1onrSzH9bx9XUf2lEdWT/ia1NEKjunUqu1xOB/StKDHMoX4/OKyIzuS0q/T1zOATthvasJFoPrAjkohTyaDUz2LN5JoH839hViyEG82yB+MjcFV5MU3N1l1QL3cVUCh93xSaua1N85qivl+siMkPGbO5xR/En4iEY6K2XPASUEMaieWVNTRCtJ4S8H+9
gitlab.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFSMqzJeV9rUzU4kWitGjeR4PWSa29SPqJ1fVkhtj3Hw9xjLVXVYrU9QlYWrOLXBpQ6KWjbjTDTdDkoohFzgbEY=

Mail configuration

GitLab.com sends emails from the mg.gitlab.com domain by using Mailgun, and has its own dedicated IP addresses:

  • 161.38.202.219
  • 159.135.226.146
  • 192.237.158.143
  • 198.61.254.136
  • 23.253.183.236
  • 69.72.35.190

The IP addresses for mg.gitlab.com are subject to change at any time.

Service Desk custom mailbox

On GitLab.com, there's a mailbox configured for Service Desk with the email address: contact-project+%{key}@incoming.gitlab.com. To use this mailbox, configure the custom suffix in project settings.

Backups

See our backup strategy.

To back up an entire project on GitLab.com, you can export it either:

With exports, be aware of what is and is not included in a project export.

GitLab is built on Git, so you can back up just the repository of a project by cloning it to another computer. Similarly, you can clone a project's wiki to back it up. All files uploaded after August 22, 2020 are included when cloning.

Delayed project deletion (PREMIUM SAAS)

Top-level groups created after August 12, 2021 have delayed project deletion enabled by default. Projects are permanently deleted after a seven-day delay.

If you are on:

  • Premium tier and above, you can disable this by changing the group setting.
  • Free tier, you cannot disable this setting or restore projects.

Inactive project deletion

Inactive project deletion is disabled on GitLab.com.

Alternative SSH port

GitLab.com can be reached by using a different SSH port for git+ssh.

Setting Value
Hostname altssh.gitlab.com
Port 443

An example ~/.ssh/config is the following:

Host gitlab.com
  Hostname altssh.gitlab.com
  User git
  Port 443
  PreferredAuthentications publickey
  IdentityFile ~/.ssh/gitlab

GitLab Pages

Below are the settings for GitLab Pages.

Setting GitLab.com Default
Domain name gitlab.io -
IP address 35.185.44.232 -
Custom domains support {check-circle} Yes {dotted-circle} No
TLS certificates support {check-circle} Yes {dotted-circle} No
Maximum size (compressed) 1 GB 100 MB

The maximum size of your Pages site is also regulated by the artifacts maximum size, which is part of GitLab CI/CD.

There are also rate limits set for GitLab Pages.

GitLab CI/CD

Below are the current settings regarding GitLab CI/CD. Any settings or feature limits not listed here are using the defaults listed in the related documentation.

Setting GitLab.com Default (self-managed)
Artifacts maximum size (compressed) 1 GB See Maximum artifacts size
Artifacts expiry time From June 22, 2020, deleted after 30 days unless otherwise specified (artifacts created before that date have no expiry). See Default artifacts expiration
Scheduled Pipeline Cron */5 * * * * See Pipeline schedules advanced configuration
Maximum jobs in active pipelines 500 for Free tier, 1000 for all trial tiers, and unlimited otherwise. See Number of jobs in active pipelines
Maximum CI/CD subscriptions to a project 2 See Number of CI/CD subscriptions to a project
Maximum number of pipeline triggers in a project 25000 for Free tier, Unlimited for all paid tiers See Limit the number of pipeline triggers
Maximum pipeline schedules in projects 10 for Free tier, 50 for all paid tiers See Number of pipeline schedules
Maximum pipelines per schedule 24 for Free tier, 288 for all paid tiers See Limit the number of pipelines created by a pipeline schedule per day
Maximum number of schedule rules defined for each security policy project Unlimited for all paid tiers See Number of schedule rules defined for each security policy project
Scheduled job archiving 3 months (from June 22, 2020). Jobs created before that date were archived after September 22, 2020. Never
Maximum test cases per unit test report 500000 Unlimited
Maximum registered runners Free tier: 50 per-group / 50 per-project
All paid tiers: 1000 per-group / 1000 per-project
See Number of registered runners per scope
Limit of dotenv variables Free tier: 50 / Premium tier: 100 / Ultimate tier: 150 See Limit dotenv variables
Authorization token duration (minutes) 15 To set a custom value, in the Rails console, run ApplicationSetting.last.update(container_registry_token_expire_delay: <integer>), where <integer> is the desired number of minutes.

Package registry limits

The maximum file size for a package uploaded to the GitLab Package Registry varies by format:

Package type GitLab.com
Conan 5 GB
Generic 5 GB
Helm 5 MB
Maven 5 GB
npm: 5 GB
NuGet 5 GB
PyPI 5 GB
Terraform 1 GB

Account and limit settings

GitLab.com has the following account limits enabled. If a setting is not listed, the default value is the same as for self-managed instances:

Setting GitLab.com default
Repository size including LFS 10 GB
Maximum import size 5 GB
Maximum attachment size 10 MB

If you are near or over the repository size limit, you can either reduce your repository size with Git or purchase additional storage.

NOTE: git push and GitLab project imports are limited to 5 GB per request through Cloudflare. Git LFS and imports other than a file upload are not affected by this limit. Repository limits apply to both public and private projects.

IP range

GitLab.com uses the IP ranges 34.74.90.64/28 and 34.74.226.0/24 for traffic from its Web/API fleet. This whole range is solely allocated to GitLab. You can expect connections from webhooks or repository mirroring to come from those IPs and allow them.

GitLab.com is fronted by Cloudflare. For incoming connections to GitLab.com, you might need to allow CIDR blocks of Cloudflare (IPv4 and IPv6).

For outgoing connections from CI/CD runners, we are not providing static IP addresses. All GitLab.com shared runners are deployed into Google Cloud Platform (GCP). Any IP-based firewall can be configured by looking up all IP address ranges or CIDR blocks for GCP.

Hostname list

Add these hostnames when you configure allow-lists in local HTTP(S) proxies, or other web-blocking software that governs end-user computers. Pages on GitLab.com load content from these hostnames:

  • gitlab.com
  • *.gitlab.com
  • *.gitlab-static.net
  • *.gitlab.io
  • *.gitlab.net

Documentation and Company pages served over docs.gitlab.com and about.gitlab.com also load certain page content directly from common public CDN hostnames.

Webhooks

The following limits apply for webhooks.

Rate limits

The number of times a webhook can be called per minute, per top-level namespace. The limit varies depending on your plan and the number of seats in your subscription.

Plan Default for GitLab.com
Free 500
Premium 99 seats or fewer: 1,600
100-399 seats: 2,800
400 seats or more: 4,000
Ultimate and open source 999 seats or fewer: 6,000
1,000-4,999 seats: 9,000
5,000 seats or more: 13,000

Other limits

Setting Default for GitLab.com
Number of webhooks 100 per project, 50 per group
Maximum payload size 25 MB

For self-managed instance limits, see Webhook rate limit and Number of webhooks.

Runner SaaS

Runner SaaS is the hosted, secure, and managed build environment you can use to run CI/CD jobs for your GitLab.com hosted project.

For more information, see Runner SaaS.

Sidekiq

GitLab.com runs Sidekiq with arguments --timeout=4 --concurrency=4 and the following environment variables:

Setting GitLab.com Default
SIDEKIQ_DAEMON_MEMORY_KILLER - 1
SIDEKIQ_MEMORY_KILLER_MAX_RSS 2000000 2000000
SIDEKIQ_MEMORY_KILLER_HARD_LIMIT_RSS - -
SIDEKIQ_MEMORY_KILLER_CHECK_INTERVAL - 3
SIDEKIQ_MEMORY_KILLER_GRACE_TIME - 900
SIDEKIQ_MEMORY_KILLER_SHUTDOWN_WAIT - 30
SIDEKIQ_LOG_ARGUMENTS 1 1

NOTE: The SIDEKIQ_MEMORY_KILLER_MAX_RSS setting is 16000000 on Sidekiq import nodes and Sidekiq export nodes.

PostgreSQL

GitLab.com being a fairly large installation of GitLab means we have changed various PostgreSQL settings to better suit our needs. For example, we use streaming replication and servers in hot-standby mode to balance queries across different database servers.

The list of GitLab.com specific settings (and their defaults) is as follows:

Setting GitLab.com Default
archive_command /usr/bin/envdir /etc/wal-e.d/env /opt/wal-e/bin/wal-e wal-push %p empty
archive_mode on off
autovacuum_analyze_scale_factor 0.01 0.01
autovacuum_max_workers 6 3
autovacuum_vacuum_cost_limit 1000 -1
autovacuum_vacuum_scale_factor 0.01 0.02
checkpoint_completion_target 0.7 0.9
checkpoint_segments 32 10
effective_cache_size 338688MB Based on how much memory is available
hot_standby on off
hot_standby_feedback on off
log_autovacuum_min_duration 0 -1
log_checkpoints on off
log_line_prefix %t [%p]: [%l-1] empty
log_min_duration_statement 1000 -1
log_temp_files 0 -1
maintenance_work_mem 2048MB 16 MB
max_replication_slots 5 0
max_wal_senders 32 0
max_wal_size 5GB 1GB
shared_buffers 112896MB Based on how much memory is available
shared_preload_libraries pg_stat_statements empty
shmall 30146560 Based on the server's capabilities
shmmax 123480309760 Based on the server's capabilities
wal_buffers 16MB -1
wal_keep_segments 512 10
wal_level replica minimal
statement_timeout 15s 60s
idle_in_transaction_session_timeout 60s 60s

Some of these settings are in the process being adjusted. For example, the value for shared_buffers is quite high, and we are considering adjusting it.

Puma

GitLab.com uses the default of 60 seconds for Puma request timeouts.

GitLab.com-specific rate limits

NOTE: See Rate limits for administrator documentation.

When a request is rate limited, GitLab responds with a 429 status code. The client should wait before attempting the request again. There are also informational headers with this response detailed in rate limiting responses.

The following table describes the rate limits for GitLab.com, both before and after the limits change in January, 2021:

Rate limit From 2021-02-12 From 2022-02-03
Protected paths (for a given IP address) 10 requests per minute 10 requests per minute
Raw endpoint traffic (for a given project, commit, and file path) 300 requests per minute 300 requests per minute
Unauthenticated traffic (from a given IP address) 500 requests per minute 500 requests per minute
Authenticated API traffic (for a given user) 2,000 requests per minute 2,000 requests per minute
Authenticated non-API HTTP traffic (for a given user) 1,000 requests per minute 1,000 requests per minute
All traffic (from a given IP address) 2,000 requests per minute 2,000 requests per minute
Issue creation 300 requests per minute 200 requests per minute
Note creation (on issues and merge requests) 60 requests per minute 60 requests per minute
Advanced, project, and group search API (for a given IP address) 10 requests per minute 10 requests per minute
GitLab Pages requests (for a given IP address) 1000 requests per 50 seconds
GitLab Pages requests (for a given GitLab Pages domain) 5000 requests per 10 seconds
Pipeline creation requests (for a given project, user, and commit) 25 requests per minute
Alert integration endpoint requests (for a given project) 3600 requests per hour

More details are available on the rate limits for protected paths and raw endpoints.

GitLab can rate-limit requests at several layers. The rate limits listed here are configured in the application. These limits are the most restrictive per IP address. To learn more about the rate limiting for GitLab.com, read our runbook page Overview of rate limits for GitLab.com.

Rate limiting responses

For information on rate limiting responses, see:

Protected paths throttle

GitLab.com responds with HTTP status code 429 to POST requests at protected paths that exceed 10 requests per minute per IP address.

See the source below for which paths are protected. This includes user creation, user confirmation, user sign in, and password reset.

User and IP rate limits includes a list of the headers responded to blocked requests.

See Protected Paths for more details.

IP blocks

IP blocks can occur when GitLab.com receives unusual traffic from a single IP address that the system views as potentially malicious. This can be based on rate limit settings. After the unusual traffic ceases, the IP address is automatically released depending on the type of block, as described in a following section.

If you receive a 403 Forbidden error for all requests to GitLab.com, check for any automated processes that may be triggering a block. For assistance, contact GitLab Support with details, such as the affected IP address.

Git and container registry failed authentication ban

GitLab.com responds with HTTP status code 403 for 1 hour, if 30 failed authentication requests were received in a 3-minute period from a single IP address.

This applies only to Git requests and container registry (/jwt/auth) requests (combined).

This limit:

  • Is reset by requests that authenticate successfully. For example, 29 failed authentication requests followed by 1 successful request, followed by 29 more failed authentication requests would not trigger a ban.
  • Does not apply to JWT requests authenticated by gitlab-ci-token.

No response headers are provided.

Pagination response headers

For performance reasons, if a query returns more than 10,000 records, GitLab excludes some headers.

Visibility settings

Projects, groups, and snippets have the Internal visibility setting disabled on GitLab.com.

SSH maximum number of connections

GitLab.com defines the maximum number of concurrent, unauthenticated SSH connections by using the MaxStartups setting. If more than the maximum number of allowed connections occur concurrently, they are dropped and users get an ssh_exchange_identification error.

Import/export

To help avoid abuse, project and group imports, exports, and export downloads are rate limited. See Project import/export rate limits and Group import/export rate limits for details.

Non-configurable limits

See non-configurable limits for information on rate limits that are not configurable, and therefore also used on GitLab.com.

GitLab.com logging

We use Fluentd to parse our logs. Fluentd sends our logs to Stackdriver Logging and Cloud Pub/Sub. Stackdriver is used for storing logs long-term in Google Cold Storage (GCS). Cloud Pub/Sub is used to forward logs to an Elastic cluster using pubsubbeat.

You can view more information in our runbooks such as:

Job logs

By default, GitLab does not expire job logs. Job logs are retained indefinitely, and can't be configured on GitLab.com to expire. You can erase job logs manually with the Jobs API or by deleting a pipeline.

GitLab.com at scale

In addition to the GitLab Enterprise Edition Omnibus install, GitLab.com uses the following applications and settings to achieve scale. All settings are publicly available at chef cookbooks.

Elastic cluster

We use Elasticsearch and Kibana for part of our monitoring solution:

Fluentd

We use Fluentd to unify our GitLab logs:

Prometheus

Prometheus complete our monitoring stack:

Grafana

For the visualization of monitoring data:

Sentry

Open source error tracking:

Consul

Service discovery:

HAProxy

High Performance TCP/HTTP Load Balancer: