Skip to content

Enforce rate limits on webhook executions for customers per plan

Release notes

Introduced in %15.2 for GitLab.com users, rate limits will be enforced to protect the performance and availability of the GitLab application (and in return it protects performance for all tenants). Limits are applied per plan and namespace, and are based on the number of seats in your subscription.

Rate limits

The number of times a webhook can be called per minute, per top-level namespace. The limit varies depending on your plan and the number of seats in your subscription.

Plan Default for GitLab.com
Free 500
Premium 99 seats or fewer: 1,600
100-399 seats: 2,800
400 seats or more: 4,000
Ultimate and open source 999 seats or fewer: 6,000
1,000-4,999 seats: 9,000
5,000 seats or more: 13,000

Learn more by visiting our documentation on webhook rate limits.

Description

After we've added soft limits with logging in #337228 (closed), this issue will follow up to enforce the limits. Below are the required steps:

  1. Reviewing the logs and discussing
  2. Implementing the hard limit
  3. Working out what to do with the single Premium customer who is the outlier #337228 (comment 992723695) (either working with them to change or else perhaps making them exempt at least in the medium term)

See discussion in https://gitlab.com/gitlab-org/ecosystem-stage/team-tasks/-/issues/146#note_993254234.

This page may contain information related to upcoming products, features and functionality. It is important to note that the information presented is for informational purposes only, so please do not rely on the information for purchasing or planning purposes. Just like with all projects, the items mentioned on the page are subject to change or delay, and the development, release, and timing of any products, features, or functionality remain at the sole discretion of GitLab Inc.

Edited by Grant Hickman