diff options
author | Michael Kozono <mkozono@gmail.com> | 2019-08-02 02:41:52 +0000 |
---|---|---|
committer | Evan Read <eread@gitlab.com> | 2019-08-02 02:41:52 +0000 |
commit | 7cfbeaac506b346f65f0549770f59c127ca1b6db (patch) | |
tree | 0ccd7ab00d77ab9d6c98276b7f4237aa2bf28c73 /doc/security/rate_limits.md | |
parent | 3077c3569bc8569d7875b8fa6eda3346016334ed (diff) | |
download | gitlab-ce-7cfbeaac506b346f65f0549770f59c127ca1b6db.tar.gz |
Add rate limit docs
Diffstat (limited to 'doc/security/rate_limits.md')
-rw-r--r-- | doc/security/rate_limits.md | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/doc/security/rate_limits.md b/doc/security/rate_limits.md new file mode 100644 index 00000000000..0e5bdcd9c79 --- /dev/null +++ b/doc/security/rate_limits.md @@ -0,0 +1,32 @@ +--- +type: reference, howto +--- + +# Rate limits + +NOTE: **Note:** +For GitLab.com, please see +[GitLab.com-specific rate limits](../user/gitlab_com/index.md#gitlabcom-specific-rate-limits). + +Rate limiting is a common technique used to improve the security and durability +of a web application. + +For example, a simple script can make thousands of web requests per second. +Whether malicious, apathetic, or just a bug, your application and infrastructure +may not be able to cope with the load. For more details, see +[Denial-of-service attack](https://en.wikipedia.org/wiki/Denial-of-service_attack). +Most cases can be mitigated by limiting the rate of requests from a single IP address. + +Most [brute-force attacks](https://en.wikipedia.org/wiki/Brute-force_attack) are +similarly mitigated by a rate limit. + +## Admin Area settings + +See +[User and IP rate limits](../user/admin_area/settings/user_and_ip_rate_limits.md). + +## Rack Attack initializer + +This method of rate limiting is cumbersome, but has some advantages. It allows +throttling of specific paths, and is also integrated into Git and container +registry requests. See [Rack Attack initializer](rack_attack.md). |