diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2023-07-12 21:08:58 +0300 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2023-07-12 21:08:58 +0300 |
commit | 31f59b55c63f6a7add79c5987731387ae3a4f7ab (patch) | |
tree | 3786af9493ae5634b35098a184993b2f134a5286 /doc/user/admin_area | |
parent | 8562dfae56800770e729dcb8215ebf7e1e29a55f (diff) |
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'doc/user/admin_area')
6 files changed, 42 insertions, 206 deletions
diff --git a/doc/user/admin_area/merge_requests_approvals.md b/doc/user/admin_area/merge_requests_approvals.md index 58f54c399df..de079d08d3a 100644 --- a/doc/user/admin_area/merge_requests_approvals.md +++ b/doc/user/admin_area/merge_requests_approvals.md @@ -1,43 +1,11 @@ --- -stage: Create -group: Source Code -info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments -type: reference, concepts +redirect_to: '../../administration/merge_requests_approvals.md' +remove_date: '2023-10-12' --- -# Merge request approvals **(PREMIUM SELF)** +This document was moved to [another location](../../administration/merge_requests_approvals.md). -> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/39060) in GitLab 12.8. - -Merge request approval rules prevent users from overriding certain settings on the project level. -When enabled at the instance level, these settings [cascade](../project/merge_requests/approvals/settings.md#settings-cascading) -and can no longer be changed: - -- In projects. -- In groups. Cascading to groups was [enabled by default](https://gitlab.com/gitlab-org/gitlab/-/issues/285410) - in GitLab 14.5. - -To enable merge request approval settings for an instance: - -1. On the left sidebar, expand the top-most chevron (**{chevron-down}**). -1. Select **Admin Area**. -1. Select **Push Rules**. -1. Expand **Merge request approvals**. -1. Choose the required options. -1. Select **Save changes**. - -## Available rules - -Merge request approval settings that can be set at an instance level are: - -- **Prevent approval by author**. Prevents project maintainers from allowing request authors to - merge their own merge requests. -- **Prevent approvals by users who add commits**. Prevents project maintainers from allowing users - to approve merge requests if they have submitted any commits to the source branch. -- **Prevent editing approval rules in projects and merge requests**. Prevents users from modifying - the approvers list in project settings or in individual merge requests. - -See also the following, which are affected by instance-level rules: - -- [Project merge request approval rules](../project/merge_requests/approvals/index.md). -- [Group merge request approval settings](../group/manage.md#group-merge-request-approval-settings) available in GitLab 13.9 and later. +<!-- This redirect file can be deleted after <2023-10-12>. --> +<!-- Redirects that point to other docs in the same project expire in three months. --> +<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. --> +<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html --> diff --git a/doc/user/admin_area/settings/protected_paths.md b/doc/user/admin_area/settings/protected_paths.md index 4080ee6a540..519d035244a 100644 --- a/doc/user/admin_area/settings/protected_paths.md +++ b/doc/user/admin_area/settings/protected_paths.md @@ -1,43 +1,11 @@ --- -stage: none -group: unassigned -info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments -type: reference +redirect_to: '../../../administration/settings/protected_paths.md' +remove_date: '2023-10-12' --- -# Protected paths **(FREE SELF)** +This document was moved to [another location](../../../administration/settings/protected_paths.md). -Rate limiting is a technique that improves the security and durability of a web -application. For more details, see [Rate limits](../../../security/rate_limits.md). - -You can rate limit (protect) specified paths. For these paths, GitLab responds with HTTP status -code `429` to POST requests at protected paths that exceed 10 requests per minute per IP address. - -For example, the following are limited to a maximum 10 requests per minute: - -- User sign-in -- User sign-up (if enabled) -- User password reset - -After 10 requests, the client must wait 60 seconds before it can try again. - -See also: - -- List of paths [protected by default](../../../administration/instance_limits.md#by-protected-path). -- [User and IP rate limits](../../admin_area/settings/user_and_ip_rate_limits.md#response-headers) - for the headers returned to blocked requests. - -## Configure protected paths - -> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/merge_requests/31246) in GitLab 12.4. - -Throttling of protected paths is enabled by default and can be disabled or -customized on **Admin > Network > Protected Paths**, along with these options: - -- Maximum number of requests per period per user. -- Rate limit period in seconds. -- Paths to be protected. - -![protected-paths](img/protected_paths.png) - -Requests over the rate limit are logged into `auth.log`. +<!-- This redirect file can be deleted after <2023-10-12>. --> +<!-- Redirects that point to other docs in the same project expire in three months. --> +<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. --> +<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html --> diff --git a/doc/user/admin_area/settings/push_event_activities_limit.md b/doc/user/admin_area/settings/push_event_activities_limit.md index 56a2902f2d9..b7e059cf820 100644 --- a/doc/user/admin_area/settings/push_event_activities_limit.md +++ b/doc/user/admin_area/settings/push_event_activities_limit.md @@ -1,38 +1,11 @@ --- -stage: Create -group: Source Code -info: "To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments" -type: reference +redirect_to: '../../../administration/settings/push_event_activities_limit.md' +remove_date: '2023-10-12' --- -# Push event activities limit and bulk push events **(FREE)** +This document was moved to [another location](../../../administration/settings/push_event_activities_limit.md). -> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/31007) in GitLab 12.4. - -Set the number of branches or tags to limit the number of single push events -allowed at once. If the number of events is greater than this, GitLab creates -bulk push event instead. - -For example, if 4 branches are pushed and the limit is currently set to 3, -the activity feed displays: - -![Bulk push event](img/bulk_push_event_v12_4.png) - -With this feature, when a single push includes a lot of changes (for example, 1,000 -branches), only 1 bulk push event is created instead of 1,000 push -events. This helps in maintaining good system performance and preventing spam on -the activity feed. - -To modify this setting: - -- In the Admin Area: - 1. On the left sidebar, expand the top-most chevron (**{chevron-down}**). - 1. Select **Admin Area**. - 1. Select **Settings > Network**. - 1. Expand **Performance optimization**. -- Through the [Application settings API](../../../api/settings.md#list-of-settings-that-can-be-accessed-via-api-calls) - as `push_event_activities_limit`. - -The default value is `3`, but the value can be greater than or equal to `0`. Setting this value to `0` does not disable throttling. - -![Push event activities limit](img/push_event_activities_limit_v12_4.png) +<!-- This redirect file can be deleted after <2023-10-12>. --> +<!-- Redirects that point to other docs in the same project expire in three months. --> +<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. --> +<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html --> diff --git a/doc/user/admin_area/settings/rate_limit_on_issues_creation.md b/doc/user/admin_area/settings/rate_limit_on_issues_creation.md index 09a1e023c2b..aca30177c54 100644 --- a/doc/user/admin_area/settings/rate_limit_on_issues_creation.md +++ b/doc/user/admin_area/settings/rate_limit_on_issues_creation.md @@ -1,36 +1,11 @@ --- -type: reference -stage: Plan -group: Project Management -info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments +redirect_to: '../../../administration/settings/rate_limit_on_issues_creation.md' +remove_date: '2023-10-12' --- -# Rate limits on issue creation **(FREE SELF)** +This document was moved to [another location](../../../administration/settings/rate_limit_on_issues_creation.md). -> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/28129) in GitLab 12.10. - -This setting allows you to rate limit the requests to the issue and epic creation endpoints. -To can change its value: - -1. On the left sidebar, expand the top-most chevron (**{chevron-down}**). -1. Select **Admin Area**. -1. Select **Settings > Network**. -1. Expand **Issues Rate Limits**. -1. Under **Max requests per minute**, enter the new value. -1. Select **Save changes**. - -For example, if you set a limit of 300, requests using the -[Projects::IssuesController#create](https://gitlab.com/gitlab-org/gitlab/blob/master/app/controllers/projects/issues_controller.rb) -action exceeding a rate of 300 per minute are blocked. Access to the endpoint is allowed after one minute. - -When using [epics](../../group/epics/index.md), epic creation shares this rate limit with issues. - -![Rate limits on issues creation](img/rate_limit_on_issues_creation_v14_2.png) - -This limit is: - -- Applied independently per project and per user. -- Not applied per IP address. -- Disabled by default. To enable it, set the option to any value other than `0`. - -Requests over the rate limit are logged into the `auth.log` file. +<!-- This redirect file can be deleted after <2023-10-12>. --> +<!-- Redirects that point to other docs in the same project expire in three months. --> +<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. --> +<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html --> diff --git a/doc/user/admin_area/settings/rate_limit_on_notes_creation.md b/doc/user/admin_area/settings/rate_limit_on_notes_creation.md index 59548836e78..6d5c93f8554 100644 --- a/doc/user/admin_area/settings/rate_limit_on_notes_creation.md +++ b/doc/user/admin_area/settings/rate_limit_on_notes_creation.md @@ -1,35 +1,11 @@ --- -type: reference -stage: Plan -group: Project Management -info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments +redirect_to: '../../../administration/settings/rate_limit_on_notes_creation.md' +remove_date: '2023-10-12' --- -# Rate limits on note creation **(FREE SELF)** +This document was moved to [another location](../../../administration/settings/rate_limit_on_notes_creation.md). -> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/53637) in GitLab 13.9. - -You can configure the per-user rate limit for requests to the note creation endpoint. - -To change the note creation rate limit: - -1. On the left sidebar, expand the top-most chevron (**{chevron-down}**). -1. Select **Admin Area**. -1. Select **Settings > Network**. -1. Expand **Notes rate limit**. -1. In the **Maximum requests per minute** box, enter the new value. -1. Optional. In the **Users to exclude from the rate limit** box, list users allowed to exceed the limit. -1. Select **Save changes**. - -This limit is: - -- Applied independently per user. -- Not applied per IP address. - -The default value is `300`. - -Requests over the rate limit are logged into the `auth.log` file. - -For example, if you set a limit of 300, requests using the -[Projects::NotesController#create](https://gitlab.com/gitlab-org/gitlab/-/blob/master/app/controllers/projects/notes_controller.rb) -action exceeding a rate of 300 per minute are blocked. Access to the endpoint is allowed after one minute. +<!-- This redirect file can be deleted after <2023-10-12>. --> +<!-- Redirects that point to other docs in the same project expire in three months. --> +<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. --> +<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html --> diff --git a/doc/user/admin_area/settings/rate_limit_on_pipelines_creation.md b/doc/user/admin_area/settings/rate_limit_on_pipelines_creation.md index 2d0c4405211..c469a77f7d2 100644 --- a/doc/user/admin_area/settings/rate_limit_on_pipelines_creation.md +++ b/doc/user/admin_area/settings/rate_limit_on_pipelines_creation.md @@ -1,35 +1,11 @@ --- -type: reference -stage: Verify -group: Pipeline Execution -info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments +redirect_to: '../../../administration/settings/rate_limit_on_pipelines_creation.md' +remove_date: '2023-10-12' --- -# Rate limits on pipeline creation **(FREE SELF)** +This document was moved to [another location](../../../administration/settings/rate_limit_on_pipelines_creation.md). -> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/362475) in GitLab 15.0. - -You can set a limit so that users and processes can't request more than a certain number of pipelines each minute. This limit can help save resources and improve stability. - -For example, if you set a limit of `10`, and `11` requests are sent to the [trigger API](../../../ci/triggers/index.md) within one minute, -the eleventh request is blocked. Access to the endpoint is allowed again after one minute. - -This limit is: - -- Applied to the number of pipelines created for the same combination of project, commit, and user. -- Not applied per IP address. -- Disabled by default. - -Requests that exceed the limit are logged in the `application_json.log` file. - -## Set a pipeline request limit - -To limit the number of pipeline requests: - -1. On the left sidebar, expand the top-most chevron (**{chevron-down}**). -1. Select **Admin Area**. -1. Select **Settings > Network**. -1. Expand **Pipelines Rate Limits**. -1. Under **Max requests per minute**, enter a value greater than `0`. -1. Select **Save changes**. -1. Enable `ci_enforce_throttle_pipelines_creation` feature flag to enable the rate limit. +<!-- This redirect file can be deleted after <2023-10-12>. --> +<!-- Redirects that point to other docs in the same project expire in three months. --> +<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. --> +<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html --> |