MongoDB topology design : scalability, security, and compliance on a global scale /: scalability, security, and compliance on a global scale. ([2020])
- Record Type:
- Book
- Title:
- MongoDB topology design : scalability, security, and compliance on a global scale /: scalability, security, and compliance on a global scale. ([2020])
- Main Title:
- MongoDB topology design : scalability, security, and compliance on a global scale
- Further Information:
- Note: Nicholas Cottrell.
- Authors:
- Cottrell, Nicholas
- Contents:
- Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Chapter 1: Core Concepts -- Key features of MongoDB -- Differences to "traditional databases" -- Terminology -- Storage engines -- Binary JSON -- Data files -- Concurrency -- Relationships -- Referential integrity -- ACID compliance -- Atomicity -- Consistency -- Isolation -- Bulk operations -- Durability -- Journal and flushing -- Scaling -- Replication -- Syncing -- Elections -- Lag/staleness -- Oplog window -- Read preference -- States -- Sharding -- Chunks -- Choice of shard key Balancer -- Shard distribution -- Pre-splitting -- Ascending shard keys and hot shards -- Architecture choices -- Computing resources -- Memory -- Storage -- Bandwidth and latency -- Horizontal scaling -- Round-trip latency -- Private vs. cloud -- Logical databases -- Key takeaways -- Chapter 2: Fault-Tolerant Design -- Special nodes -- Arbiters -- Hidden secondary -- Delayed secondary -- Partial restores -- Nonvoting secondary -- Avoiding failure -- Points of failure -- Reserve capacity -- Automatic failover -- Designing for flexibility -- DNS not IP -- Auto-discovery -- Planned downtime Multiple routers -- Rolling maintenance -- Clean step-down -- Tooling failover -- Failure scenarios -- Network partition -- Hardware failure -- Remote DC failure -- Storage volume failure -- Network degradation -- Shared VM hosts -- Shared storage area network -- Unbalanced hardware -- Key takeaways -- Chapter 3:Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Chapter 1: Core Concepts -- Key features of MongoDB -- Differences to "traditional databases" -- Terminology -- Storage engines -- Binary JSON -- Data files -- Concurrency -- Relationships -- Referential integrity -- ACID compliance -- Atomicity -- Consistency -- Isolation -- Bulk operations -- Durability -- Journal and flushing -- Scaling -- Replication -- Syncing -- Elections -- Lag/staleness -- Oplog window -- Read preference -- States -- Sharding -- Chunks -- Choice of shard key Balancer -- Shard distribution -- Pre-splitting -- Ascending shard keys and hot shards -- Architecture choices -- Computing resources -- Memory -- Storage -- Bandwidth and latency -- Horizontal scaling -- Round-trip latency -- Private vs. cloud -- Logical databases -- Key takeaways -- Chapter 2: Fault-Tolerant Design -- Special nodes -- Arbiters -- Hidden secondary -- Delayed secondary -- Partial restores -- Nonvoting secondary -- Avoiding failure -- Points of failure -- Reserve capacity -- Automatic failover -- Designing for flexibility -- DNS not IP -- Auto-discovery -- Planned downtime Multiple routers -- Rolling maintenance -- Clean step-down -- Tooling failover -- Failure scenarios -- Network partition -- Hardware failure -- Remote DC failure -- Storage volume failure -- Network degradation -- Shared VM hosts -- Shared storage area network -- Unbalanced hardware -- Key takeaways -- Chapter 3: Security -- Local access -- Network hardening -- Firewalls with iptables -- Limit interfaces with bindIp -- Customize ports -- Filesystem -- Authentication -- Passwords vs. keyfiles -- Connecting with passwords -- Keyfiles -- x.509 certificates -- Client authentication External authentication -- Encrypted connections -- TLS 1.2 -- Encryption at rest -- Backups -- Auditing, obfuscation of logs -- Proactive security -- Server-side JavaScript -- Input validation and injection attacks -- where operator -- SELinux -- Binary monitoring -- Certification -- Checklist -- Chapter 4: Compliance and GDPR -- General Data Protection Regulation -- Privacy by design -- Caveats -- Data protection -- Key concepts -- Personally identifiable information -- Definitions -- Representatives -- Data portability -- Data size -- Retention of personal data -- Automatic removal Custom redaction -- Right to be forgotten -- Product guarantees -- Avoid dated collections -- Data flows -- Processing data -- End-to-end data encryption -- Data storage -- Data mapping -- Auditing changes -- Validation -- Pseudonymization -- Generalizing data -- Encryption at rest -- Backups -- Regulations around the world -- US healthcare -- California -- India -- Canada -- China -- Russia -- Design recommendations -- Field-level encryption -- Views -- Separate permissions -- Data leaks -- Sharding -- Logging -- Minimize vulnerabilities -- Summary -- Chapter 5: Basic Topologies -- Introduction … (more)
- Publisher Details:
- California : Apress
- Publication Date:
- 2020
- Extent:
- 1 online resource
- Subjects:
- 005.757
Database management
Object-oriented databases
Open source software
Database management
Object-oriented databases
Open source software
Electronic books - Languages:
- English
- ISBNs:
- 9781484258170
1484258177 - Related ISBNs:
- 1484258169
9781484258163 - Notes:
- Note: Description based on online resource; title from digital title page (viewed on October 29, 2020).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.551811
- Ingest File:
- 03_170.xml