MongoDB Certified DBA supporting the next-generation of database solutions in both MySQL and MongoDB. With a masters degree in Software Engineering, Igor enjoys the variety of challenges he faces while working at Pythian, rather than working on the same thing every day. When he's not working, he can be found biking.
In this day and age, maintaining privacy throughout our electronic communications is absolutely necessary. Creating user accounts and not exposing your MongoDB environment to the wider internet are basic concepts that have been missed in the past. Once that has been addressed, individuals and organizations interested in becoming PCI compliant must turn to securing their data through encryption. With MongoDB, we have two options for encryption: at rest (only available as enterprise feature with MongoDB) and transport encryption. In this session, we will review
-Why encryption is important
-What are the prerequisites to set up encryption
-Step by step for encryption at rest and in transit
-Encrypting data with volume encryption in the cloud
-Percona for MongoDB encryption features
Redundancy and high availability are the basis for all production deployments. With MongoDB this can be achieved by deploying replica set. In this talk we'll explore how MongoDB replication works and what are the components of a replica set. Using examples of wrong deployment configurations, we will highlight how to properly run replica sets in production, whether it comes to on-premise deployment or in the cloud.
-How MongoDB replication works
-Replica sets components/deployment typologies
-Practices for wrong deployment configuration
-Hidden nodes, Arbiter nodes, Priority 0 nodes
-Availability zones and HA in single region
-Monitoring replica sets status