Docs Menu
Docs Home
/
MongoDB Ops Manager
/ /

Query a Backup Snapshot

On this page

  • Considerations
  • Prerequisites
  • Query Backup (Use Tunnel to Connect)
  • Query Backup (Handle TLS Authentication Manually)
  • Next Steps

Ops Manager provides queryable backups. This functionality allows you to more quickly query specific backup snapsnots. You can use the queryable backups to:

  • Restore a subset of data within the MongoDB deployment.

  • Compare previous versions of data against the current data.

  • Identify the best point in time to restore a system by comparing data from multiple snapshots.

Ops Manager provisions these queryable snapshots as read-only MongoDB instances. Specifically, Ops Manager spins up a mongod with data from the selected snapshot store.

Important

By default, these instances are available for up to 24 hours. You can configure the duration using Expiration (Hours). For other queryable backup settings, see Queryable Snapshot Configuration.

You cannot perform the following operations on queryable snapshots:

If snapshots are compressed in a file system store, the snapshot contents cannot be queried.

If you want to be able to query snapshots on a file system store, you need to create a new file system store with compression disabled.

Connections to these instances are over TLS/SSL and require x.509 authentication. Ops Manager provides:

  • An executable that creates a tunnel which handles the connection, including the client TLS/SSL and the x.509 authentication.

    Requests are routed through the tunnel. The tunnel ensures that the request is speaking to the correct mongod instance.

  • x.509 certificates if you want to handle the connection details manually, including the TLS/SSL and the x.509 authentication.

    Requests come in through the web server, which acts as a proxy to the mongod.

You can query encrypted snapshot using Ops Manager local mode if you run MongoDB Enterprise 4.2.9 or later.

You can query snapshots made from replica sets or sharded clusters with CSRS running MongoDB 3.2 or later.

For a queryable backup to succeed, the MongoDB instance that is the target of a restore must run a compatible MongoDB version. The following table lists the compatibility requirements for each deployment type and MongoDB version.

Snapshot Data MongoDB Version
Compatible MongoDB Version for Target Database
Platform
4.4.x
4.4.0 Enterprise or later
Any
4.2.x
4.2.0 Enterprise or later
Any
4.0.x
4.0.0 Enterprise or later
Any
3.6.x
3.6.5 Enterprise or later
Any
3.4.x
3.4.11 Enterprise or later
Windows
3.4.x
3.4.2 Enterprise or later
Linux
Snapshot Data MongoDB Version
Compatible MongoDB Version for Target Database
Platform
4.4.x
4.4.0 Enterprise or later
Any
4.2.x
4.2.0 Enterprise or later
Any
4.0.x
4.0.0 Enterprise or later
Any
3.6.x
3.4.11 Enterprise or later
Windows
3.6.x
3.4.2 Enterprise or later
Linux
3.4.x
3.4.11 Enterprise or later
Windows
3.4.x
3.4.2 Enterprise or later
Linux
3.2
3.4.11 Enterprise or later
Windows
3.2.x
3.4.2 Enterprise or later
Linux

Important

A full description of Transport Layer Security, public key infrastructure, X.509 certificates, and Certificate Authorities exceeds the scope of this tutorial. This tutorial assumes prior knowledge of TLS and access to valid X.509 certificates.

Ops Manager needs a separate PEM file to authenticate and authorize use of Queryable Backup. This PEM file:

  • Must belong to the same platform user and group that owns the Ops Manager process. On Linux, the mongodb-mms:mongodb-mms user and group owns this PEM file. On Windows, use the SYSTEM user.

  • Must be readable by the platform user only.

  • Must be saved in the same location on every Ops Manager host if your deployment uses high availability.

  • Must be different than the one used for HTTPS connections to Ops Manager (HTTPS PEM Key File).

  • Should use a key length greater than 512-bit. Using a 2048-bit RSA key is recommended.

  • Should use a message digest stronger than sha1, such as sha256.

At minimum, the PEM file consists of:

  • A server certificate / key pair and

  • A Certificate Authority certificate

These pairs are merged to create a PEM file that Queryable Backup can use. The pairs have the following requirements:

The Certificate Authority must sign any other certs and keys to be used in the PEM file. The Certificate Authority can be one of the following:

  • A private Certificate Authority (self signed; recommended for test purposes).

  • An intermediate Certificate Authority certificate from a certificate provider.

  • A Certificate Authority that your company security team issued.

The Certificate Authority that you selected must sign this server certificate.

The Common Name setting of the server certificate/key pair depends on how many hosts your Ops Manager deployment uses:

  • For a single Ops Manager host, the Subject Alternative Name (or, absent the SAN, the Common Name) in the pair must match the FQDN of the Ops Manager host.

  • For high availability, the SAN (or, absent the SAN, the Common Name) in the pair must match the FQDN of the load balancer URL.

Concatenate the server certificate / key pair and the certificate chain to create the Proxy Server PEM Key.

For the queryable backup host, you must specify the location of the PEM file (which contains both a public key certificate and its associated private key) using the Proxy Server PEM File setting. If you have not already set up the queryable backup settings:

  1. Click on Admin on the upper-right hand corner. From the Admin screen, click on General Ops Manager Config Backup.

  2. Scroll to the Queryable Snapshot Configuration and specify the Proxy Server PEM File that the tunnel or clients can use to connect to the queryable mongod instance.

    If the file is encrypted, specify the Proxy Server PEM File Password.

  3. Optional. Update other queryable snapshot settings as appropriate. For description of the settings, see Queryable Snapshot Configuration.

    Note

    You must restart the Web Server if you change any of the following settings:

The app server requires that ports 27700-27719 be open for communication with queryable backup snapshots.

If you use a load balancer, it must pass the TCP connection through the value in the Proxy Server Port.

To learn more about port requirements, see Firewall Configuration.

To query a snapshot of a sharded cluster, the Backup Daemon requires at least one worker for the config server, one worker for each shard, and one worker for the mongos instance.

To query a snapshot of a replica set, the Backup Daemon requires at least one worker for the replica set.

For example, if you restore a queryable backup from a 3-shard cluster with 1 shard router (mongos), you need this value to be at least 5:

  • 1 per shard (3) +

  • 1 for the config server (1) +

  • 1 for the mongos

When the queryable backup begins, the Backup Daemon spins up 5 or more workers to manage these components.

The FQDN that hosts the mongod for the queryable backup must match the one found the Daemons page. To find that hostname, click the Admin link, then click Backup, and then click Daemons.

If Ops Manager can connect to the internet, set Backup Versions Auto Download Enterprise Builds to TRUE. Queryable Backups require MongoDB Enterprise.

Note

The tunnel handles the security (TLS/SSL and x.509 authentication) for connecting to the instance.

1

For the deployment whose backup you want to query, click the ellipsis button under Options column and select Query.

You can also click the deployment to view its snapshots and click the Query button under the Actions column.

2
  1. Select the snapshot to query and click Next.

  2. Start the process to query a snapshot. You will be prompted for 2-factor verification.

  3. Select Backup Tunnel as the connection method to the queryable snapshot.

  4. Select your Platform and download.

  5. Uncompress the downloaded file.

    Note

    Wait for the Queryable Snapshot to mount before you continue. Snapshot mount time depends on the size of the snapshot. Verify the snapshot is mounted by navigating to Continuous Backup and selecting the Restore History tab. When the snapshot is mounted, the Status column reports the date and time of the mount operation.

  6. Open a terminal or command prompt and go to the uncompressed <tunnel> directory. Run the executable to start the tunnel.

    The default port for the tunnel is 27017. To change the port, use the --local flag, as in the following example:

    ./<tunnel executable> --local localhost:27020

    Note

    If you change the port, you must include the port information when connecting.

    For the full list of options you can pass to the tunnel, run the tunnel exectuable with the -h option:

    ./<tunnel executable> -h
  7. Use mongosh or a MongoDB driver to connect to the backup via the tunnel.

    • If connecting locally from the same machine as where the tunnel is running, you do not need to specify a connection string or host information. Otherwise, specify a connection string or host information for the machine where the tunnel is running.

    • If you have changed the port that the tunnel is listening on, you must specify the port information when connecting.

Tip

Once you have finished querying this snapshot, you can terminate the queryable instance:

  1. Go to the Restore History and hover over the Status column for the deployment item.

  2. Click Cancel.

Note

To find the log file for the queryable backup mongod instance, navigate to the following path in the head directory of the Backup Daemon host:

<daemon-hostname>:/<headDirectory>/queryable/<backupId>/mongod.log

Important

Rotate Master Key after Restoring Snapshots Encrypted with AES256-GCM

If you restore an encrypted snapshot that Ops Manager encrypted with AES256-GCM, rotate your master key after completing the restore.

Note

The client X.509 certificate is valid for the same length of time as the queryable instance Expiration (Hours), which is 24 hours by default.

1

For the deployment whose backup you want to query, click under Options column then select Query.

You can also click the deployment to view its snapshots and click the Query button under the Actions column.

2
  1. Select the snapshot to query and click Next.

  2. Start the process to query a snapshot. If prompted for your password, enter your password to verify.

  3. Select Connect Manually as the connection method to the queryable snapshot.

  4. Download the X.509 client PEM file.

  5. Download the Certificate Authority PEM file.

    Note

    Wait for the Queryable Snapshot to mount before you continue. Snapshot mount time depends on the size of the snapshot. Verify the snapshot is mounted by navigating to Continuous Backup and selecting the Restore History tab. When the snapshot is mounted, the Status column reports the date and time of the mount operation.

  6. Use mongosh or a MongoDB driver to connect to the queryable backup host. To connect, you must specify the hostname and port, the TLS option, and the X.509 certificates.

    Example

    If using mongosh to connect to the instance:

    mongosh my-queryable-backup-host.mongodb.com:27217 \
    --tls --tlsCertificateKeyFile <client certificate> \
    --tlsCAFile mms-backup-ca.pem

Tip

Once you have finished querying this snapshot, you can terminate the queryable instance:

  1. Go to the Restore History and hover over the Status column for the deployment item.

  2. Click Cancel.

Important

Rotate Master Key after Restoring Snapshots Encrypted with AES256-GCM

If you restore an encrypted snapshot that Ops Manager encrypted with AES256-GCM, rotate your master key after completing the restore.

To restore a database or a collection using the queryable backup MongoDB instance, see Restore a Database or Collection from Queryable Backup.

Back

Restore Replica Set