Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Managed Service for GitLab
  • Getting started
    • Resource relationships
    • Advantages over a custom GitLab installation
    • Migration from a custom GitLab installation
    • Approval rules
    • Backups
    • Security in GitLab
    • Quotas and limits
    • Integration with Object Storage
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes
  • FAQ

In this article:

  • Use cases
  • GitLab token
  • Use cases
  • Available configurations
  1. Concepts
  2. Approval rules

Approval rules in Managed Service for GitLab

Written by
Yandex Cloud
Updated at May 6, 2026
  • Use cases
  • GitLab token
    • Use cases
  • Available configurations

With Managed Service for GitLab, you can flexibly set up mandatory approval rules before merging code into the target branch of the project. This feature is an alternative to the GitLab Enterprise Edition’s Approval Rules tool and is available regardless of the GitLab version.

If approval rules are enabled in your GitLab instance, Managed Service for GitLab analyzes obtained approvals for compliance with the specified rules. If there are not enough approvals, a blocking thread is created in the merge request, preventing it from being merged into the target branch. When the merge request is updated, a comment with the current compliance status is created or updated in the thread. Once all required approvals are obtained, the thread is resolved.

If you manually resolve the thread, it will be recreated. If the merge request is approved regardless of the existing rules, users with the Maintainer role or higher will receive an email notification about the violated approval workflow.

For more information about working with approval rules, see Setting up approval rules.

Use casesUse cases

  • Secure storage of GitLab CI passwords as Yandex Lockbox secrets

GitLab tokenGitLab token

You need a GitLab token to set up approval rules. When accessing a repository, a token is required for authentication, allowing GitLab API calls.

A GitLab token has a lifetime, which is set when creating the token. The token expires at 00:00 UTC on the specified date. The maximum lifetime is one year from the token creation date.

The day before the expiration date, GitLab sends a notification that the token is about to expire to the email address of the account that created the token.

Issue a new token and add it to the GitLab instance settings before the current token expires Otherwise, Managed Service for GitLab will not work correctly.

Use casesUse cases

  • Deploying GitLab Runner on a Yandex Compute Cloud virtual machine

Available configurationsAvailable configurations

Note

The configuration you select affects the cost of using the instance computing resources.

You can choose a suitable configuration based on your team's objectives:

  • Basic: Allows you to create a single rule for each project with no additional conditions. This option is best suited for smaller teams (up to 10 people).
  • Standard: Allows you to configure multiple rules for each project and assign code owners to specific files or directories (up to 10 entries). It work best for medium-sized teams (10 to 30 people).
  • Advanced: Includes all features of the standard configuration with no limit on the number of code ownership entries, and allows setting up different approval rules for different project branches. This configuration is a fit for for large teams (over 30 people).

See the table below for a more detailed comparison of what different configurations provide:

Features Description Basic
configuration
Standard
configuration
Advanced
configuration
One approval rule per project You can assign a user group, with at least one member required to approve the merge request before merging.
Protected branches You can select branches the approval rules will apply to.
Code Ownership You can assign specific files and directories (including using patterns) to particular users. These users become code owners and can participate in code approval if commits in the merge request affect their files.
Multiple approval rules You can set more than one approval rule per project.
Branch-specific rules You can specify different approval rules for different branches, e.g., release and master.

Was the article helpful?

Previous
Migration from a custom GitLab installation
Next
Backups
© 2026 Direct Cursus Technology L.L.C.