Skip to content

Commit e77774e

Browse files
committed
Undo the 'AOP' sub-section
1 parent 0198c8f commit e77774e

File tree

1 file changed

+0
-30
lines changed

1 file changed

+0
-30
lines changed

website/content/docs/concepts/resource-quotas.mdx

Lines changed: 0 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -58,36 +58,6 @@ and through enabling optional audit logging.
5858
| [Lease count quotas](/vault/docs/configuration/create-lease-count-quota) | Cap number of leases generated in a system or mount to protect system stability and storage performance at scale | ❌ | ✅ |
5959

6060

61-
## Adaptive overload protection
62-
63-
@include 'alerts/enterprise-only.mdx'
64-
65-
Adaptive overload protection protects against Vault outages caused by
66-
write-intensive overloads which most likely to cause service degradation or
67-
outages. Upon detecting significant service degradation, adaptive overload
68-
protection throttles “write” requests, returning retryable error response codes
69-
to clients while continuing to serve “read” requests. Once the cluster’s
70-
performance returns to normal levels, “write” requests become automatically
71-
accepted once again.
72-
73-
In effect, adaptive overload protection serves as a last layer of defense
74-
against a full Vault outage, preserving availability for read requests and some
75-
write requests. **Adaptive overload protection is enabled by default in Vault
76-
Enterprise 1.18 and later.**
77-
78-
The best practice is to define quality-of-service (QoS) standards and enforce
79-
tenant fairness, ensuring that each tenant (namespace) has resource allocated
80-
appropriately to its usage. No one tenant should cause service degradation for
81-
other tenants.
82-
83-
Resource quotas work in tandem with adaptive overload protection to protect the
84-
Vault service from denial of service attacks and unfair resource allocation.
85-
86-
Refer to the [identity-based rate limit
87-
quotas](/vault/docs/configuration/identity-based-rate-limit) page to learn about
88-
defining more fine-grained control over how traffic enters their Vault.
89-
90-
9161
## Exempt routes
9262

9363
By default, the following paths are exempt from rate limiting. However, Vault

0 commit comments

Comments
 (0)