Skip to content
GitLab
Next
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • GitLab GitLab
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Locked Files
  • Issues 44,763
    • Issues 44,763
    • List
    • Boards
    • Service Desk
    • Milestones
    • Iterations
    • Requirements
  • Merge requests 1,329
    • Merge requests 1,329
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
    • Test Cases
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Packages and registries
    • Packages and registries
    • Package Registry
    • Container Registry
    • Infrastructure Registry
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Code review
    • Insights
    • Issue
    • Repository
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • GitLab.orgGitLab.org
  • GitLabGitLab
  • Issues
  • #295472
Closed
Open
Issue created Dec 23, 2020 by Bob Van Landuyt@reprazentMaintainer

Optimize Rate Limiting for Unleash feature flags API

Summary and Background

In gitlab-com/gl-infra/scalability#752 (closed) we've noticed that the feature flag API hits the unauthenticated rate limit in Rack::Attack.

Though this traffic isn't really "unauthenticated", we might want to consider adding a new Throttle for this type of request.

We've also noticed that some of these requests already get throttled in HAProxy. Should we look into which clients libaries are being used and see if they aren't misbehaving.

As part of gitlab-com/gl-infra&379 (closed) we'll be tightening rate limits on GitLab.com, so we'll be returning 429s for these requests slightly more often.

Problem to solve

Feature flag API calls, even though they are authenticated, are considered unauthenticated and run into the lower unauthenticated rate limits. Users have the need for higher rate limits so they can ensure their feature flags API calls they integrate into their applicatoins are serviced properly.

Proposal

The rate limit for the feature flag API was recently discussed in this issue. In short, what we can do today is to fix the rate limit to be taken into account as Authenticated Requests instead of Unauthenticated Requests. This gives 4x more capacity until users hit the limit, thus they can be more relaxed that it should be sufficient for small and medium sized infrastructure.

Documentation

Update rate limits documentation as needed

Available Tier

GitLab Free

What does success look like, and how can we measure that?

Success is that users are able to make more Feature Flags beyond the existing unauthenticated limits. This can be measure by looking at feature flag API call rates after the feature is launched.

What is the type of buyer?

  • Dakota - the Application Development Director
  • Kennedy - the Infrastructure Engineering Director

Is this a cross-stage feature?

No

Links / references

Edited Mar 11, 2022 by Chris Balane
Assignee
Assign to
Time tracking