| About the Author |
|
xvii | |
| About the Technical Reviewer |
|
xix | |
| Acknowledgments |
|
xxi | |
|
|
|
1 | (30) |
|
|
|
1 | (1) |
|
Differences to "traditional databases" |
|
|
2 | (5) |
|
|
|
2 | (1) |
|
|
|
3 | (1) |
|
|
|
4 | (1) |
|
|
|
5 | (2) |
|
|
|
7 | (3) |
|
|
|
7 | (1) |
|
|
|
8 | (1) |
|
|
|
8 | (2) |
|
|
|
10 | (1) |
|
|
|
10 | (2) |
|
|
|
12 | (5) |
|
|
|
12 | (1) |
|
|
|
13 | (1) |
|
|
|
13 | (1) |
|
|
|
14 | (1) |
|
|
|
14 | (1) |
|
|
|
15 | (2) |
|
|
|
17 | (6) |
|
|
|
18 | (1) |
|
|
|
19 | (1) |
|
|
|
20 | (1) |
|
|
|
20 | (1) |
|
|
|
21 | (1) |
|
Ascending shard keys and hot shards |
|
|
22 | (1) |
|
|
|
23 | (5) |
|
|
|
24 | (1) |
|
|
|
25 | (2) |
|
|
|
27 | (1) |
|
|
|
28 | (1) |
|
|
|
28 | (3) |
|
Chapter 2 Fault-Tolerant Design |
|
|
31 | (24) |
|
|
|
31 | (5) |
|
|
|
31 | (1) |
|
|
|
32 | (1) |
|
|
|
33 | (1) |
|
|
|
34 | (2) |
|
|
|
36 | (8) |
|
|
|
37 | (1) |
|
|
|
37 | (1) |
|
|
|
37 | (1) |
|
Designing for flexibility |
|
|
38 | (2) |
|
|
|
40 | (1) |
|
|
|
40 | (1) |
|
|
|
40 | (2) |
|
|
|
42 | (1) |
|
|
|
43 | (1) |
|
|
|
44 | (6) |
|
|
|
44 | (2) |
|
|
|
46 | (1) |
|
|
|
46 | (1) |
|
|
|
47 | (1) |
|
|
|
48 | (1) |
|
|
|
49 | (1) |
|
Shared storage area network |
|
|
50 | (1) |
|
|
|
50 | (2) |
|
|
|
52 | (3) |
|
|
|
55 | (20) |
|
|
|
55 | (1) |
|
|
|
56 | (3) |
|
|
|
56 | (2) |
|
Limit interfaces with bindlp |
|
|
58 | (1) |
|
|
|
58 | (1) |
|
|
|
59 | (1) |
|
|
|
59 | (5) |
|
|
|
59 | (1) |
|
|
|
60 | (1) |
|
|
|
61 | (1) |
|
|
|
61 | (3) |
|
|
|
64 | (1) |
|
|
|
65 | (1) |
|
|
|
65 | (2) |
|
|
|
66 | (1) |
|
Auditing, obfuscation of logs |
|
|
67 | (2) |
|
|
|
69 | (1) |
|
|
|
69 | (2) |
|
Input validation and injection attacks |
|
|
69 | (1) |
|
|
|
70 | (1) |
|
|
|
71 | (1) |
|
|
|
72 | (1) |
|
|
|
73 | (1) |
|
|
|
73 | (2) |
|
Chapter 4 Compliance and GDPR |
|
|
75 | (24) |
|
General Data Protection Regulation |
|
|
76 | (1) |
|
|
|
76 | (1) |
|
|
|
76 | (1) |
|
|
|
77 | (2) |
|
|
|
77 | (1) |
|
Personally identifiable information |
|
|
77 | (1) |
|
|
|
78 | (1) |
|
|
|
79 | (1) |
|
|
|
79 | (1) |
|
|
|
80 | (1) |
|
Retention of personal data |
|
|
80 | (3) |
|
|
|
81 | (1) |
|
|
|
81 | (1) |
|
|
|
82 | (1) |
|
|
|
83 | (2) |
|
|
|
84 | (1) |
|
End-to-end data encryption |
|
|
85 | (1) |
|
|
|
85 | (4) |
|
|
|
85 | (1) |
|
|
|
86 | (1) |
|
|
|
86 | (1) |
|
|
|
86 | (2) |
|
|
|
88 | (1) |
|
|
|
88 | (1) |
|
|
|
88 | (1) |
|
Regulations around the world |
|
|
89 | (3) |
|
|
|
90 | (1) |
|
|
|
90 | (1) |
|
|
|
90 | (1) |
|
|
|
91 | (1) |
|
|
|
91 | (1) |
|
|
|
91 | (1) |
|
|
|
92 | (5) |
|
|
|
92 | (1) |
|
|
|
93 | (1) |
|
|
|
94 | (1) |
|
|
|
95 | (1) |
|
|
|
96 | (1) |
|
|
|
97 | (2) |
|
Chapter 5 Basic Topologies |
|
|
99 | (26) |
|
|
|
99 | (1) |
|
|
|
100 | (1) |
|
Communications between components |
|
|
101 | (7) |
|
Connections and heartbeats |
|
|
101 | (1) |
|
|
|
101 | (4) |
|
|
|
105 | (3) |
|
|
|
108 | (1) |
|
|
|
109 | (1) |
|
Two data centers (plus cloud arbiter) |
|
|
110 | (6) |
|
|
|
112 | (2) |
|
|
|
114 | (2) |
|
Three data center scenarios |
|
|
116 | (2) |
|
Load and performance testing |
|
|
118 | (2) |
|
|
|
118 | (1) |
|
|
|
119 | (1) |
|
Application back-off logic |
|
|
119 | (1) |
|
Retryable writes and reads |
|
|
119 | (1) |
|
|
|
120 | (3) |
|
|
|
120 | (1) |
|
Common causes of packet loss |
|
|
121 | (2) |
|
|
|
123 | (1) |
|
|
|
123 | (1) |
|
|
|
124 | (1) |
|
|
|
124 | (1) |
|
Chapter 6 Global Topologies |
|
|
125 | (26) |
|
|
|
125 | (1) |
|
Chunks, splitting, and migration |
|
|
125 | (1) |
|
|
|
126 | (1) |
|
|
|
126 | (2) |
|
|
|
126 | (2) |
|
|
|
128 | (1) |
|
Setting up a zoned cluster |
|
|
128 | (15) |
|
|
|
128 | (2) |
|
|
|
130 | (1) |
|
|
|
131 | (1) |
|
|
|
131 | (1) |
|
|
|
132 | (1) |
|
|
|
133 | (1) |
|
|
|
133 | (2) |
|
|
|
135 | (1) |
|
|
|
136 | (5) |
|
|
|
141 | (1) |
|
|
|
142 | (1) |
|
|
|
142 | (1) |
|
|
|
143 | (1) |
|
|
|
143 | (4) |
|
|
|
143 | (3) |
|
|
|
146 | (1) |
|
Reading and scatter-gather |
|
|
147 | (1) |
|
|
|
148 | (1) |
|
|
|
149 | (1) |
|
|
|
150 | (1) |
|
Chapter 7 Deployment and Monitoring |
|
|
151 | (22) |
|
|
|
151 | (11) |
|
|
|
151 | (1) |
|
|
|
151 | (2) |
|
|
|
153 | (1) |
|
|
|
154 | (1) |
|
|
|
155 | (1) |
|
|
|
156 | (1) |
|
|
|
157 | (1) |
|
|
|
158 | (1) |
|
Cloud-based container services |
|
|
159 | (1) |
|
Hyperconverged infrastructure |
|
|
159 | (1) |
|
|
|
160 | (1) |
|
|
|
161 | (1) |
|
|
|
161 | (1) |
|
|
|
162 | (1) |
|
|
|
162 | (4) |
|
|
|
163 | (1) |
|
|
|
163 | (1) |
|
|
|
163 | (1) |
|
|
|
164 | (1) |
|
|
|
164 | (1) |
|
|
|
165 | (1) |
|
Provisioning and orchestration |
|
|
166 | (2) |
|
|
|
166 | (1) |
|
|
|
167 | (1) |
|
|
|
168 | (1) |
|
Kubernetes for MongoDB Atlas |
|
|
168 | (1) |
|
|
|
168 | (3) |
|
|
|
168 | (1) |
|
|
|
168 | (2) |
|
|
|
170 | (1) |
|
|
|
170 | (1) |
|
|
|
170 | (1) |
|
|
|
171 | (2) |
|
Chapter 8 Special Use Cases and Configurations |
|
|
173 | (28) |
|
Scaling with secondary reads |
|
|
173 | (3) |
|
|
|
174 | (1) |
|
|
|
175 | (1) |
|
|
|
175 | (1) |
|
|
|
176 | (4) |
|
|
|
176 | (1) |
|
|
|
177 | (2) |
|
|
|
179 | (1) |
|
|
|
180 | (2) |
|
|
|
181 | (1) |
|
|
|
181 | (1) |
|
|
|
182 | (11) |
|
|
|
182 | (1) |
|
|
|
183 | (3) |
|
|
|
186 | (6) |
|
|
|
192 | (1) |
|
|
|
193 | (2) |
|
|
|
194 | (1) |
|
|
|
194 | (1) |
|
|
|
195 | (1) |
|
|
|
195 | (1) |
|
Mobile data-bearing nodes |
|
|
196 | (4) |
|
|
|
196 | (1) |
|
|
|
197 | (3) |
|
|
|
200 | (1) |
|
Chapter 9 Backups and Restores |
|
|
201 | (18) |
|
|
|
201 | (1) |
|
|
|
202 | (2) |
|
|
|
202 | (1) |
|
Catching application errors |
|
|
203 | (1) |
|
Catching configuration errors |
|
|
203 | (1) |
|
|
|
204 | (7) |
|
|
|
204 | (1) |
|
|
|
205 | (1) |
|
|
|
206 | (2) |
|
|
|
208 | (1) |
|
|
|
208 | (1) |
|
|
|
209 | (2) |
|
|
|
211 | (6) |
|
|
|
211 | (1) |
|
|
|
212 | (1) |
|
|
|
212 | (1) |
|
|
|
212 | (1) |
|
Backup steps for snapshots |
|
|
213 | (2) |
|
Restore steps from snapshots |
|
|
215 | (2) |
|
|
|
217 | (1) |
|
|
|
217 | (1) |
|
|
|
217 | (1) |
|
|
|
217 | (1) |
|
|
|
218 | (1) |
|
Chapter 10 Advanced Sharding |
|
|
219 | (20) |
|
|
|
219 | (1) |
|
|
|
219 | (6) |
|
|
|
220 | (2) |
|
|
|
222 | (1) |
|
Shard keys and unique fields |
|
|
223 | (1) |
|
|
|
224 | (1) |
|
|
|
224 | (1) |
|
|
|
225 | (1) |
|
|
|
225 | (5) |
|
|
|
225 | (4) |
|
Bulk loading without pre-splitting |
|
|
229 | (1) |
|
|
|
230 | (1) |
|
|
|
230 | (1) |
|
|
|
231 | (1) |
|
|
|
231 | (1) |
|
|
|
231 | (5) |
|
|
|
231 | (1) |
|
|
|
232 | (2) |
|
Throttling balancing impact |
|
|
234 | (1) |
|
|
|
235 | (1) |
|
|
|
236 | (1) |
|
|
|
236 | (1) |
|
Determining actual storage size |
|
|
236 | (1) |
|
|
|
237 | (2) |
|
Chapter 11 Extreme Sharding |
|
|
239 | (20) |
|
|
|
239 | (2) |
|
|
|
239 | (1) |
|
|
|
239 | (2) |
|
|
|
241 | (7) |
|
|
|
241 | (4) |
|
|
|
245 | (3) |
|
Multi-tenant architectures |
|
|
248 | (2) |
|
|
|
248 | (1) |
|
|
|
249 | (1) |
|
|
|
250 | (3) |
|
|
|
250 | (1) |
|
|
|
250 | (1) |
|
|
|
250 | (2) |
|
|
|
252 | (1) |
|
Scaling back a sharded cluster |
|
|
253 | (3) |
|
|
|
253 | (2) |
|
|
|
255 | (1) |
|
|
|
256 | (1) |
|
|
|
256 | (1) |
|
|
|
256 | (1) |
|
|
|
256 | (3) |
| Index |
|
259 | |