Author - Corrado Pandiani

MongoDB 4.0: Using ACID Multi-Document Transactions

mongodb 4.0 acid compliant transactions

MongoDB 4.0 is around, and there are a lot of new features and improvements. In this article we’re going to focus on the major feature which is, undoubtedly, the support for multi-document ACID transactions. This novelty for a NoSQL database could be seen as a way to get closer to the relational world. Well, […]

Read more

MongoDB: Investigate Queries with explain() and Index Usage (part 2)

MongoDB explain() method optimization tool

This is the second part of a two parts series. In MongoDB: index usage and MongoDB explain() we introduced the main index types supported by MongoDB, and how to create and use them. In this second article, we are going to see some examples on how to use explain() method to investigate queries. Do […]

Read more

MongoDB: index usage and MongoDB explain() (part 1)

MongoDB index types

In this two part series, I’m going to explain explain. No, the repetition is not a pun or a typo. I’m talking about explain(), the most useful MongoDB feature to investigate a query. Here, I’ll introduce the index types available in MongoDB, their properties and how to create and use them. In the next article […]

Read more

MongoDB: how to use the JSON Schema Validator

JSON Schema Validator for MongoDB

The flexibility of MongoDB as a schemaless database is one of its strengths. In early versions, it was left to application developers to ensure that any necessary data validation is implemented. With the introduction of JSON Schema Validator there are new techniques to enforce data integrity for MongoDB. In this article, we use examples to show you […]

Read more

MongoDB: deploy a replica set with transport encryption (part 3/3)

MongoDB Encryption Replica Sets

In this third and final post of the series, we look at how to configure transport encryption on a deployed MongoDB replica set. Security vulnerabilities can arise when internal personnel have legitimate access to the private network, but should not have access to the data. Encrypting intra-node traffic ensures that no one can “sniff” sensitive […]

Read more

Deploy a MongoDB Replica Set with Transport Encryption (Part 2)

document-replication

In this article series, we will talk about the basic high availability architecture of a MongoDB: the MongoDB replica set.

Part 1 : We introduced basic replica set concepts, how it works and what its main features
Part 2 (this post): We’ll provide a step-by-step guide to configure a three-node replica set
Part 3: We’ll talk about […]

Read more

Deploy a MongoDB Replica Set with Transport Encryption (Part 1)

MongoDB Replica Set

In this article series, we will talk about the basic high availability architecture of a MongoDB: the MongoDB replica set.
We’ll cover it in three parts:

Part 1 (this post): We’ll introduce basic replica set concepts, how it works and what its main features
Part 2: We’ll provide a step-by-step guide to configure a three-node replica set
Part […]

Read more

MongoDB Data at Rest Encryption Using eCryptFS

In this post, we’ll look at MongoDB data at rest encryption using eCryptFS, and how to deploy a MongoDB server using encrypted data files.
When dealing with data, a good security policy should enforce the use of “no trivial” passwords, the use of encrypted connections and hopefully encrypted files on the disks.
Only the MongoDB Enterprise […]

Read more

Using ProxySQL and VIRTUAL Columns to Solve ORM Issues

ProxySQL 1.4.12

In this blog post, we’ll look at using ProxySQL and VIRTUAL columns to solve object-relational mapping (ORM) issues.
There are a lot of web frameworks all around. Programmers and web designers are using them to develop and deploy any website and web application. Just to cite some of the most famous names: Drupal, Ruby on […]

Read more