summaryrefslogtreecommitdiff
path: root/doc/security/rate_limits.md
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2021-11-04 03:13:32 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2021-11-04 03:13:32 +0000
commit96e9edba8a8898045daca33ae7dc3f03aa5b0677 (patch)
tree282e0acccde9ba825e873cc865b2b9966aa91eaa /doc/security/rate_limits.md
parent4e86ca506d67f27cb4ca93b47efc53adc1c237a6 (diff)
downloadgitlab-ce-96e9edba8a8898045daca33ae7dc3f03aa5b0677.tar.gz
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'doc/security/rate_limits.md')
-rw-r--r--doc/security/rate_limits.md6
1 files changed, 5 insertions, 1 deletions
diff --git a/doc/security/rate_limits.md b/doc/security/rate_limits.md
index 3826c02a201..9d49297c9de 100644
--- a/doc/security/rate_limits.md
+++ b/doc/security/rate_limits.md
@@ -27,7 +27,7 @@ Most cases can be mitigated by limiting the rate of requests from a single IP ad
Most [brute-force attacks](https://en.wikipedia.org/wiki/Brute-force_attack) are
similarly mitigated by a rate limit.
-## Admin Area settings
+## Configurable limits
You can set these rate limits in the Admin Area of your instance:
@@ -42,6 +42,10 @@ You can set these rate limits in the Admin Area of your instance:
- [Files API rate limits](../user/admin_area/settings/files_api_rate_limits.md)
- [Deprecated API rate limits](../user/admin_area/settings/deprecated_api_rate_limits.md)
+You can set these rate limits using the Rails console:
+
+- [Webhook rate limit](../administration/instance_limits.md#webhook-rate-limit)
+
## Failed authentication ban for Git and container registry
GitLab returns HTTP status code `403` for 1 hour, if 30 failed authentication requests were received