3. You can remove the block using the following syntax, replacing `<ip>` with
the actual IP that is blacklisted:
```
del cache:gitlab:rack::attack:allow2ban:ban:<ip>
```
4. Confirm that the key with the IP no longer shows up:
```
keys *rack::attack*
```
1. Rename `config/initializers/rack_attack.rb.example` to `config/initializers/rack_attack.rb`.
5. Optionally, add the IP to the whitelist to prevent it from being blacklisted
again (see [settings](#settings)).
1. Review the `paths_to_be_protected` and add any other path you need protecting.
## Troubleshooting
1. Restart GitLab instance.
### Rack attack is blacklisting the load balancer
By default, user sign-in, user sign-up(if enabled) and user password reset is limited to 6 requests per minute. After trying for 6 times, client will have to wait for the next minute to be able to try again. These settings can be found in `config/initializers/rack_attack.rb`
Rack Attack may block your load balancer if all traffic appears to come from
the load balancer. In that case, you will need to:
If you want more restrictive/relaxed throttle rule change the `limit` or `period` values. For example, more relaxed throttle rule will be if you set limit: 3 and period: 1.second(this will allow 3 requests per second). You can also add other paths to the protected list by adding to `paths_to_be_protected` variable. If you change any of these settings do not forget to restart your GitLab instance.
This will keep users' IPs from being listed as the load balancer IPs.
2. Whitelist the load balancer's IP address(es) in the Rack Attack [settings](#settings).
3. Reconfigure GitLab:
In case you find throttling is not enough to protect you against abusive clients, rack-attack gem offers IP whitelisting, blacklisting, Fail2ban style filter and tracking.
```
sudo gitlab-ctl reconfigure
```
For more information on how to use these options check out [rack-attack README](https://github.com/kickstarter/rack-attack/blob/master/README.md).
4.[Remove the block via Redis.](#remove-blocked-ips-from-rack-attack-via-redis)