Atlas
- A brief description of what you are looking to do
- How you think this will help
- Why this matters to you
151 results found
-
killop
I have read the other two suggestions on providing more killOp() and read Andrew's comment on the difficulties in the medium term.
I just watched a situation where a primary became unresponsive and the queues piled up. The solution was to cause an election, but the dba wanted to kill operations by user (the application user) and couldn't.
It would be nice to have something more than the real-time panel, which in this situation had become unresponsive as well so it was no use, such as a DBA console where an authorized dba could kill operations started by other users.
7 votes -
Support multi-cloud
Support multi-cloud as available in the Atlas UI
7 votesThis has been released in the latest Terraform MongoDB Atlas Provider, https://registry.terraform.io/providers/mongodb/mongodbatlas/latest/docs/resources/advanced_cluster Thank you!
-
Allow Realm to stream application logs to Splunk (or other third party services)
It would be ideal if there was some native way to send Realm application logs to Splunk (and other third-party log aggregation services), instead of having to build an application in a separate environment to poll this API endpoint (https://docs.mongodb.com/realm/admin/api/v3/#logging-apis) and push logs to Splunk from there.
7 votes -
Backup Policy change approvals
The Backup Policy configuration shows a checkbox allowing the altered backup policy to affect all prior backups. The problem with this is that someone could accidentally (or maliciously) delete all prior backups.
This feature request would include implementing some sort of multi level approval prior to enacting said recursive backup policy changes (affecting prior backup snapshots).
6 votesHello,
I am pleased to announce that we have addressed your concern of accidental or malicious deletion of all backups in a cluster. We have released our backup feature called Backup Compliance Policy, that protects your backups from being deleted by any user, ensuring WORM and full immutability (can not be edited/modified or deleted) for backups automatically in Atlas.
Backup Compliance Policy allows organizations to configure a project-level policy to prevent the deletion of backups before a predefined period, guarantee all clusters have backup enabled, ensure that all clusters have a minimum backup retention and schedule policy in place, and more.
With these controls, you can more easily satisfy data protection requirements (e.g., AppJ, DORA, immutable / WORM backups, etc.) without the need for manual processes.
Please note that the Backup Compliance Policy can not be disabled without MongoDB support once enabled so please make sure to read our…
-
Allow editing default project alerts via terraform
For instance, the default Query Targeting alert is set at a 1000:1 ratio. I would like to have the default alert set to 5000:1 for a project via terraform.
6 votes -
write concern terraform
Allow configuring "defaultWriteConcern" using the terraform plugin.
6 votesAvailable as of provider version 1.0.2. Thank you!
-
Recovery after cluster delete
Cloud Backups should be recoverable even after a cluster delete otherwise they can't really be considered backups. One way to do this would be to allow for automated backup downloads to customer specified cloud provider storage.
6 votesHello,
I am pleased to announce that in Atlas you now have an option to retain all backups when terminating an M10+ cluster.
When you terminated a cluster through the Atlas Ui, on the termination confirmation pop up, you will now see an additional toggle labeled "Keep existing snapshots after termination". If you select this option when terminating your cluster, all of your backups for that cluster will be retained.
You can also choose to retain you backups for a cluster when deleting a cluster through the Atlas Administration API. When deleting a cluster through the API, you can include the retainBackups parameter and this will retain all of your backups after termination as well.
You can view or use the backups from a terminated (or other active) M10+ cluster by selecting the "Backup" tab in the left side navigation of the Atlas UI.
As I mentioned…
-
Add a resource to configure the backup policy for Cloud Provider Snapshots
Please add support to change the backup policy for Cloud Provider Snapshots.
This is the API I am referring to:
https://docs.atlas.mongodb.com/reference/api/cloud-provider-snapshot-schedule-modify-one/Thanks.
6 votesThis is now out in version 0.5.1 of the provider. Once CPS in enabled the Atlas default schedule is imported and can be modified via terraform configuration (however if you chose to use the default no modification is needed). https://www.terraform.io/docs/providers/mongodbatlas/r/cloud_provider_snapshot_backup_policy.html
-
Define Default Backup Policy
The ability to save a custom backup policy as the default, so all new clusters don't have to be customized to meet the backup policy requirements.
6 votesHello,
I am pleased to announce that we have released our backup feature called Backup Compliance Policy, that enables the ability to define a default backup policy.
Backup Compliance Policy allows organizations to configure a project-level policy to prevent the deletion of backups before a predefined period, guarantee all clusters have backup enabled, ensure that all clusters have a minimum backup retention and schedule policy in place, and more.
With these controls, you can more easily satisfy data protection requirements (e.g., AppJ, DORA, immutable / WORM backups, etc.) without the need for manual processes.
Please note that the Backup Compliance Policy can not be disabled without MongoDB support once enabled so please make sure to read our documentation thoroughly before enabling.
-
Add Terraform resource for custom database roles
Could we have a Terraform resource for creating custom database roles?
6 votesThis has been released in version 0.4.0
https://www.terraform.io/docs/providers/mongodbatlas/r/custom_db_role.htmlMore info on 0.4.0:
https://www.mongodb.com/blog/post/new-major-version-of-terraform-mongodb-atlas-providerThank you to community member Michał Paluchowski (https://github.com/mpaluchowski) for contributing to this resource!
-
Terraforming IP access list for project API key
The Terraform provider supports setting up IP access lists for organization API keys with "mongodbatlasaccesslistapikey". For project API keys, however, there is no way of managing IP access lists with Terraform, and we have to do it manually using the MongoDB Atlas UI.
Terraforming this is valuable because it would allow us to document the why and the what for each IP address or CIDR block. Having it in code will also increase the visibility of these access lists to the rest of the team, as changes to project API key access lists will be code-reviewed…
5 votes -
Allow to add tags to Atlas Project Clusters
Tagging resources is not a new idea and it is widely used across cloud/service providers, that allow the operators to use tags to better identify deployed business resources.
Today, this is not available, making it harder to create processes that allow operators to identify deployed resources, in particular deployed clusters. Leading operators to use the cluster name or project name to build strict hierarchies, to distinguish, as an example, which projects or clusters are development or production by providing a prefix or suffix. This approach is brittle, since you cannot change the name of a cluster (or want to) needing…5 votes -
Having tag/label in the Atlas UI
Hello,
The ATLAS portal used to view our organizations, projects, deployments, etc... does not offer a tag/label functionality at the visual interface level.
This is problematic because when managing multiple organizations, projects, and deployments. We need to be able to put metadata on these objects/components (organization, project, deployment, user, custom group, API Key, Network address) in order to properly manage our inventory.
In Azure, this notion of "tag" is very useful and can be used on all types of components (See attached image which presents tags that we have on an Azure component used for encryption at rest).
We would…
5 votesI'm excited to announce that we recently released tags on database deployments. Check it out today.
https://www.mongodb.com/docs/atlas/tags/
Tags on projects is coming soon! If you want to be one of the first to test out tags on projects, let me know!
-
Support tags on Mongo databases
I have been supporting multiple projects/clusters with databases from different business units.
I'd like the ability to tag databases using a key value pair - similar to GCP, Azure, AWS. Tags will help us organise and understand what's running in our clusters and ensuring a more efficient/granular billing process.
5 votesI'm excited to announce that we recently released tags on database deployments. You can now better organize and manage Atlas resources by applying tags to categorize database deployments based on your unique business needs.
https://www.mongodb.com/docs/atlas/tags/
Check it out today! You can apply tags to new or existing clusters or serverless instances.
-
Webhook From Atlas alerting to Teams
Hi there,
Is there a easy way to integrate Microsoft Teams Webhook?complicated : https://www.clearpeople.com/blog/sending-mongodb-atlas-webhooks-notifications-to-microsoft-teams
5 votes -
Automatic backup outside Atlas
For DR strategy, one need to have its backups outside Atlas.
This can be achieved in several ways. Some are:
- Provide APIs to download the current backups and let the customers automate this on their side
- Write backups in the customer provided cloud account (aws s3, azure blob stroage...) My favorite optionI found many ideas related to my needs, but they were too specific. This need is more general: just provide a way to have backups automatically outside of atlas.
5 votesThis feature has been released, you can see how to utilize it here —> https://docs.atlas.mongodb.com/backup/cloud-backup/export/
-
Ability to delete account
I really need to delete my account as this is not what I am looking for.
5 votesHello,
I just want to update this ticket that self-serve account deletion is supported since August 2021. Please note that once you delete your Atlas account, you cannot use the same email to create a new Atlas account.
-
Allow user to specify either more date types, or arbitrary archive criteria
Currently to configure the online archive service, you specify which column you want to use, which must be a Date type. Our collections often use integer fields holding the offset from the epoch, and there are other fields people might reasonably used.
My suggsetion would be to allow for a diverse set of date types, or ideally, allow the user to specify the criteria themselves with a mongo query.
5 votes -
Atlas backup to second region in a Terraform Module
Feature for selecting "Atlas backup to second region" in Terraform Module.
Currently, this option is only supported by the UI and the API.4 votes -
MS Teams alert support in terraform provider
It is possible to configure MS Teams alerts in the atlas UI, however terraform support is still missing. It would be great to have that option
4 votesThis is now out in version 1.4.2.
- Don't see your idea?