Cloud Database MongoDB

Cloud database MongoDB version supports two deployment architectures, i.e., ReplicaSet and Sharding, and comes with multiple enterprise capabilities including security auditing and time point backup. It has been widely applied in the Internet, Internet of things, gaming, finance and other fields.

Product Advantages

Special performance optimization
Ultra-large memory, brand new PCI-E SSD storage medium, and new generation storage engine are adapted to optimize the native Mongo kernel. QPS can reach 3W+ (number of visits per second), which can help you withstand the high concurrent requests during peak hours without the need to design a complex back-end system to help achieve this, and much simplify the development process of your system
Sharding function
Supporting distributed cluster construction, with which data can be stored on multiple physical servers through shard keys, and no-upper-limit of storage capacity can be realized. Meanwhile, the load can be shared and be compatible with the vast majority of native protocols. One-click construction and expansion, with which the efficiency of building a massively distributed storage system is greatly improved
Integrated monitoring
Providing monitoring on three-dimensional indicators including single instance, Primary node and Secondary node, and also on professional data indicators, such as disk usage, CPU load, and QPS. Visual data are displayed and made clear at a glance. The self-defined alarm enables you to know risks in advance, and further reduce the unexpected losses
Reliable storage
Reliable system, hardware, and architecture; based on SpeedyCloud distributed system and SSD high-performance storage; three-node replica set architecture is adopted to ensure the reliability of data backup
Elastic expansion of capacity
In a cluster architecture, when database capacity meets a bottleneck, it can be expanded horizontally by adding agent services and sharding services, and there is no upper limit for such expansion in theory

Core Functions and Services

Flexible architecture
Physical separation of three-node replicas; automatic fault migration; services to be provided by the Primary node and Secondary node. When the Primary node fails, the system would automatically select a new Primary node from the three nodes. When the Secondary node is not available, the Hidden node will take over the service so that the availability of service is guaranteed by multiple measures
Cluster architecture
Sharding service (Shard) and configuration service (configserver) are adopted with a three-node replica set architecture, which is stable and reliable. Agent service (mongos) and shard service (mongos) are supported for flexible configuration of number, and to extend the storage space and read-write performance of database system linearly
Data security
Automatic backup, one-key recovery, and multi-layer network security. Backup is stored in OSS and protected by multi-layer network protection mechanism to resist against 90% malicious data damages
Convenient operation and maintenance
Visual management and maintenance platform, which is comfortable to use and supportive of automatic upgrading of the system to the latest reliable version
Elastic expansion
A single shard can support a maximum of 25600 IOPS, store a maximum of 2T data, and bear a maximum of nearly 100,000 QPS application pressure. Moreover, the Sharding mode can also support infinite horizontal expansion
Backup mechanism and recovery
Automatic data backup on a daily basis, strong data disaster recovery ability, and free support for the recovery of data at any time within seven days work together to prevent data misoperation and minimize business losses
Virtual private cloud (VPC)
Instances are deployed on VPC constructed by physical network by OverLay technology and protected by network isolation directly on the TCP layer
DDOS protection
DDOS conducts monitoring in real time at the entrance of network. Once ultra-large traffic attack is discovered, it will clean up the source IP, and pull the malicious IP into a black hole if cleanup is invalid
Configuration of IP whitelist
More than 1000 whitelist rules can be configured at most, and risk control is realized directly from the access source

Application Scenarios

Internet applications
Internet applications are characterized by fast business growth, a significant amount of data, and rapid traffic growth. Internet applications require that data storage be equipped with the ability of horizontal expansion, being able to support storage expansion (large data storage, horizontal expansion of storage capacity) and throughput expansion (horizontal expansion of throughput capacity online).
Server-split applications
Satisfying the elastic expansion of server-split applications. For example, the game server-split scenarios would require rollback or merger of servers. In case of sever-rollback, database shall have the ability of fast mirroring. In case of server-merger, database shall have the capability of incremental backup and shall be restored according to time points. Being able to resolve database backup (backup of incremental database), instance cloning (based on backup created new database), and backup recovery (database recovery based on time points)
Big data applications
Supporting seamless connection of big data processing. In big data business scenarios, the online data are written into the back-end database in real time, and computed and analyzed by a dedicated computing engine. Then the analysis results are written back to the source database so that the business can access the computed results as soon as possible. Being able to resolve data source access (access of source data of database), computational analysis (computation and analysis of big data), and heterogeneous data intercommunication (data flow between heterogeneous database products)