GitLab CI/CD · Rate Limits

Gitlab Ci Rate Limits

GitLab.com SaaS enforces general request, search, autocomplete and raw-file rate limits per IP / user / project, plus per-project pipeline and CI resource limits. Self-managed instances expose the same configuration via Application Settings.

10 Limits Throttle: 429
DevOpsCI/CDPipelinesGitLabDevSecOpsRate LimitingQuotasThrottling

Limits

Search API (authenticated) user
requests · 1m
30
Search API (unauthenticated) ip
requests · 1m
10
Autocomplete users (authenticated) user
requests · 1m
300
Autocomplete users (unauthenticated) ip
requests · 1m
100
Raw blob endpoint (per project & path) project+path
requests · 1m
300
Raw blob endpoint (unauthenticated, per project) project
requests · 1m
800
Default API (unauthenticated) ip
requests · 1m
500
Default global API throttle on GitLab.com.
Default API (authenticated) user
requests · 1m
2000
Default global API throttle on GitLab.com.
Pipeline jobs in active pipelines project
jobs
tier-dependent
Tier-dependent ceiling on jobs across active pipelines.
Maximum deployment jobs pipeline
jobs
500
Default maximum deployment jobs per pipeline.

Policies

Backoff Strategy
Honor Retry-After on 429; use exponential backoff with jitter.
Tokens
Use personal/project/group access tokens or CI job tokens; OAuth supported.

Sources