Atlas
- A brief description of what you are looking to do
- How you think this will help
- Why this matters to you
69 results found
-
Add editable description to a snapshot
After an incident I may single out a snapshot and decide it is important. At this point I am able to change the retention policy to keep it for a longer time.
It would be useful to also be able to add a note or a description to that snapshot so that I may tell future me why that snapshot was important and what incident it is tied to.
4 votes -
Allow "Project Data Access Read Only" to retrieve restore links.
Allow "Project Data Access Read Only" to retrieve restore links. Currently, to retrieve a restore link from an Atlas cluster you must be a Project Owner.
In the current version to take the link to the snapshot we need to use Restore Jobs part of the API. Problem is that the same POST endpoint is used for the restore job which can do changes in the system and needs Owner level of the access and to generate link to the stream with the snapshot data. This second type of the job should not need so big access level as should…
4 votes -
Backup Compliance Policy to enforce "Snapshot Distribution"
Backup Compliance policy currently can help with protecting snapshots in other regions using "Keep all snapshots when removing additional snapshot regions" option to prevent users from deleting backups copied to other regions. However we do not have a way to enforce that snapshot backups are copied to all regions where a primary could be elected.
In order to achieve faster RTO having backup snapshots in all regions where a primary can be elected is important. Hence the feature to enforce copying backup snapshots and oplog backups to other regions via backup compliance policy is very important to compliance mandates and…
3 votes -
API to list clusters that has snapshots on it- even deleted clusters
Today we use the API below to list the clusters that exists in a project
GET https://cloud.mongodb.com/api/atlas/v1.0/groups/{GROUP-ID}/clusters?pretty=true
After having the clusters list, we can list the snapshots from one specific clusters using the API:
https://www.mongodb.com/docs/atlas/reference/api/cloud-backup/backup/get-all-backups/
GET https://cloud.mongodb.com/api/atlas/v1.0/groups/{GROUP-ID}/clusters/{CLUSTER-NAME}/backup/snapshots
Now on Mongo Atlas I can delete a cluster and ask not to delete their snapshots. So if I want to use the same functions I can't, because the list of the clusters do not show the clusters that have been deleted but still has snapshots on atlas.
It would be great if the API that lists the cluster also give us…
3 votes -
Restore protection similar to termination protection
A restore protection option similar to the termination protection for clusters.
When a cluster has restore protection enabled, it can't be the target cluster for a restore operation. This will prevent accidental restores to the wrong target cluster from affecting the protected cluster.The motivation is preventing mishaps from affecting critical production clusters.
The UI for selecting the target cluster of a restore operation has you select the cluster from a dropdown and then type in "I Agree". That still leaves you open to mistakenly select the wrong cluster if you aren't paying good enough attention.
The restore protection feature…3 votes -
Provide option to remove hidden node in NVMe clusters
NVMe clusters default to add a hidden node where backups are pulled from. This is due to the reduced durability of NVMe volumes. In cases where durability isn't a concern, I would like to disable backups and remove the hidden node altogether.
The UI currently provides the ability to stop backups by modifying the backup policies (see attachment). However, I cannot remove the hidden node which is simply incurring extra cost.
Obviously there would need to be a major warning provided to the user, but this is not unprecedented in industry. AWS has spot instances that are quite successful.
My…
3 votes -
disabling snapshots
When we disable de snapshot from one cluster, the following message is shown in the same page but it does not appear at the page that shows the changes that are being made
It would be better if this message were also at the second page (as image uploaded)
Please Note: This action is irreversible. Turning off or altering your type of backup will delete all of your existing snapshots immediately. If you want to keep old versions of your data, visit the backup dashboard and download your snapshots
3 votes -
Copy/move snapshots from a source to a target cluster
It is recommended that restoring a cluster must either:
1) Restore to a new Atlas cluster and reconfigure your application to use that new cluster once the new deployment is running, or,
2) Ensure that the target Atlas cluster cannot receive client requests while you restore data.
(src https://www.mongodb.com/docs/atlas/backup/cloud-backup/restore/#prerequisites)While doing a PIT restore with the source and target cluster being the same, our clusters have gone into a "down" state 3 times due to obscure errors, opslog not being large enough, or writes happening to the cluster during restore.
We would like to take the safer route of…
3 votes -
Allow instant backup on every type of cluster
Allow to create a backup when we want, on every type of cluster (like we could do with mLab plans)
3 votes -
Permission level to query snapshots
Right now I have to give an admin permission to allow someone on my team to query snapshots from a backup (i.e. downloading the tunnel file).
I don't want to give an admin permission just to allow our data analysts or a developer trying to understand data corruptions to view the database at an older date.3 votes -
Provide a granular mechanism to disconnect and disable all active sessions during a planned maintenance.
Provide a per cluster mechanism to shut off client access for restore operations.
3 votes -
Smart backup scheduler (deferring snapshot backups X minutes based on load metrics)
seems like a potential enhancement for the snapshot schedule to consider cpu/connection/etc load metrics before deciding to run or not
3 votes -
Use the User's Profile Time Zone for PIT Restore
When viewing Cloud Provider Snapshot information, all dates are listed in the time zone on the User's profile. However, the date/time to be entered when trying to perform a PIT restore has to be entered in UTC time. This is asking a lot of someone who is probably already really nervous to be able to correctly calculate the difference between their time zone and UTC time.
3 votes -
Provide size (in bytes) in `GET /groups/{GROUP-ID}/clusters/{CLUSTER-NAME}/backup/snapshots` Public API call for each `snapshotId`
What is the problem that needs to be solved? Provide size (in bytes) in
GET /groups/{GROUP-ID}/clusters/{CLUSTER-NAME}/backup/snapshots
Public API call for eachsnapshotId
Why is it a problem? (the pain) You're doing your own automation with manual restore, and you can't programmatically know the actual filesize of
.tar.gz
file you'll be downloading for eachsnapshotId
listed inGET /groups/{GROUP-ID}/clusters/{CLUSTER-NAME}/backup/snapshots
Public API call until you actually download.tar.gz
file for eachsnapshotId
.3 votes -
Support hourly backup every 24 hours, or support Point-In-Time restore without an hourly backup
To have Point-In-Time restore, an hourly backup policy is required.
However, the maximal interval for an hourly backup is every 12 hours.
I would like to take a backup only once every 24 hours, but still have Point-In-Time restore possible.So, please support either PIT-restore without an hourly backup policy in place, or support an hourly backup policy with an interval of 24 hours.
2 votes -
Allow to change defaultWriteConcernSource to global to avoid flipping the flag
Customers experience following error messages due to the defaultWriteConcernSource mismatch between the source and target cluster when restore the snapshot.
Error: Can not restore a snapshot with custom default write concern 1 to a cluster that does not have a custom default write concern.
Error: Can not restore a snapshot with custom default write concern majority to a cluster that does not have a custom default write concern.
Ability to directly change the defaultWriteConcernSource without flipping between w:1 and w:majority will be convenient for the users.
Option location:
Cluster > configuration > Additional Settings >
More Configuration Options > Default…2 votes -
Permit downloading of serverless instance snapshots.
Currently this is not supported. The consequence is that there is no way to restore just a single database or collection from a snapshot. This obviously greatly reduces the value of snapshots.
2 votes -
Allow turning off backups on serverless and free instances
We have a use case where we would have liked to use a serverless instance but cannot since we cannot disable backups on serverless instances.
We can't enable backups on this specific instance because of data retention restrictions so being able to turn them off completely on serverless and free instances would be ideal.
2 votes -
Select exclusive copy snapshot from different region to restore for testing DR from copy snapshot.
We have "Additional backup policy" feature enabled which will copy our snapshot to other region.As part of DR testing we want to exlusively select copy snapshot in other region to restore to perform DR.In the current cluster I don't see an option specifically to select snapshot from other region.
2 votes -
Restore indexes from AWS S3 snapshot.
While working with export snapshot to AWS S3, I found there is no way to restore indexes from metadata.json, along with data there must be opportunity to restore indexes as well otherwise have to rely on custom solutions and this may include external dependencies.
2 votes
- Don't see your idea?