MongoDB topology design : scalability, security, and compliance on a global scale / Nicholas Cottrell.

Create a world-class MongoDB cluster that is scalable, reliable, and secure. Comply with mission-critical regulatory regimes such as the European Unions General Data Protection Regulation (GDPR). Whether you are thinking of migrating to MongoDB or need to meet legal requirements for an existing self...

Full description

Saved in:
Bibliographic Details
Main Author: Cottrell, Nicholas (Author)
Format: eBook
Language:English
Published: [California] : Apress, [2020]
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 i 4500
001 on1195493884
003 OCoLC
005 20240808213014.0
006 m o d
007 cr cnu---unuuu
008 200915s2020 cau o 001 0 eng d
040 |a YDX  |b eng  |e rda  |e pn  |c YDX  |d EBLCP  |d LQU  |d UPM  |d YDXIT  |d GW5XE  |d OCLCF  |d NLW  |d UKMGB  |d UMI  |d UKAHL  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ  |d OCLCO  |d OCLCL 
015 |a GBC0H5287  |2 bnb 
016 7 |a 019940764  |2 Uk 
019 |a 1197561863  |a 1197837119  |a 1198382780  |a 1206388711 
020 |a 9781484258170  |q (electronic bk.) 
020 |a 1484258177  |q (electronic bk.) 
020 |z 1484258169 
020 |z 9781484258163 
024 8 |a 10.1007/978-1-4842-5 
035 |a (OCoLC)1195493884  |z (OCoLC)1197561863  |z (OCoLC)1197837119  |z (OCoLC)1198382780  |z (OCoLC)1206388711 
037 |a com.springer.onix.9781484258170  |b Springer Nature 
050 4 |a QA76.9.D3  |b C68 2020 
049 |a HCDD 
100 1 |a Cottrell, Nicholas,  |e author. 
245 1 0 |a MongoDB topology design :  |b scalability, security, and compliance on a global scale /  |c Nicholas Cottrell. 
264 1 |a [California] :  |b Apress,  |c [2020] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
520 |a Create a world-class MongoDB cluster that is scalable, reliable, and secure. Comply with mission-critical regulatory regimes such as the European Unions General Data Protection Regulation (GDPR). Whether you are thinking of migrating to MongoDB or need to meet legal requirements for an existing self-managed cluster, this book has you covered. It begins with the basics of replication and sharding, and quickly scales up to cover everything you need to know to control your data and keep it safe from unexpected data loss or downtime. This book covers best practices for stable MongoDB deployments. For example, a well-designed MongoDB cluster should have no single point of failure. The book covers common use cases when only one or two data centers are available. It goes into detail about creating geopolitical sharding configurations to cover the most stringent data protection regulation compliance. The book also covers different tools and approaches for automating and monitoring a cluster with Kubernetes, Docker, and popular cloud provider containers. You will: Get started with the basics of MongoDB clusters Protect and monitor a MongoDB deployment Deepen your expertise around replication and sharding Keep effective backups and plan ahead for disaster recovery Recognize and avoid problems that can occur in distributed databases Build optimal MongoDB deployments within hardware and data center limitations. 
588 0 |a Online resource; title from digital title page (viewed on October 29, 2020). 
505 0 |a Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Chapter 1: Core Concepts -- Key features of MongoDB -- Differences to "traditional databases" -- Terminology -- Storage engines -- Binary JSON -- Data files -- Concurrency -- Relationships -- Referential integrity -- ACID compliance -- Atomicity -- Consistency -- Isolation -- Bulk operations -- Durability -- Journal and flushing -- Scaling -- Replication -- Syncing -- Elections -- Lag/staleness -- Oplog window -- Read preference -- States -- Sharding -- Chunks -- Choice of shard key 
505 8 |a Balancer -- Shard distribution -- Pre-splitting -- Ascending shard keys and hot shards -- Architecture choices -- Computing resources -- Memory -- Storage -- Bandwidth and latency -- Horizontal scaling -- Round-trip latency -- Private vs. cloud -- Logical databases -- Key takeaways -- Chapter 2: Fault-Tolerant Design -- Special nodes -- Arbiters -- Hidden secondary -- Delayed secondary -- Partial restores -- Nonvoting secondary -- Avoiding failure -- Points of failure -- Reserve capacity -- Automatic failover -- Designing for flexibility -- DNS not IP -- Auto-discovery -- Planned downtime 
505 8 |a Multiple routers -- Rolling maintenance -- Clean step-down -- Tooling failover -- Failure scenarios -- Network partition -- Hardware failure -- Remote DC failure -- Storage volume failure -- Network degradation -- Shared VM hosts -- Shared storage area network -- Unbalanced hardware -- Key takeaways -- Chapter 3: Security -- Local access -- Network hardening -- Firewalls with iptables -- Limit interfaces with bindIp -- Customize ports -- Filesystem -- Authentication -- Passwords vs. keyfiles -- Connecting with passwords -- Keyfiles -- x.509 certificates -- Client authentication 
505 8 |a External authentication -- Encrypted connections -- TLS 1.2 -- Encryption at rest -- Backups -- Auditing, obfuscation of logs -- Proactive security -- Server-side JavaScript -- Input validation and injection attacks -- where operator -- SELinux -- Binary monitoring -- Certification -- Checklist -- Chapter 4: Compliance and GDPR -- General Data Protection Regulation -- Privacy by design -- Caveats -- Data protection -- Key concepts -- Personally identifiable information -- Definitions -- Representatives -- Data portability -- Data size -- Retention of personal data -- Automatic removal 
505 8 |a Custom redaction -- Right to be forgotten -- Product guarantees -- Avoid dated collections -- Data flows -- Processing data -- End-to-end data encryption -- Data storage -- Data mapping -- Auditing changes -- Validation -- Pseudonymization -- Generalizing data -- Encryption at rest -- Backups -- Regulations around the world -- US healthcare -- California -- India -- Canada -- China -- Russia -- Design recommendations -- Field-level encryption -- Views -- Separate permissions -- Data leaks -- Sharding -- Logging -- Minimize vulnerabilities -- Summary -- Chapter 5: Basic Topologies -- Introduction 
630 0 0 |a MongoDB. 
630 0 7 |a MongoDB  |2 fast 
650 0 |a Database management. 
650 0 |a Object-oriented databases. 
650 0 |a Open source software. 
650 7 |a Databases.  |2 bicssc 
650 7 |a Computers  |x Database Management  |x General.  |2 bisacsh 
650 7 |a Database management  |2 fast 
650 7 |a Object-oriented databases  |2 fast 
650 7 |a Open source software  |2 fast 
758 |i has work:  |a MongoDB Topology Design (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCXh6R9CqVVYm333F6wJ66q  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Cottrell, Nicholas.  |t MongoDB topology design.  |d [California] : Apress, [2020]  |z 1484258169  |z 9781484258163  |w (OCoLC)1138673546 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-1-4842-5817-0  |y Click for online access 
903 |a SPRING-COMPUTING2020 
994 |a 92  |b HCD