mirror of https://github.com/mongodb/mongo
SERVER-75244 Updated man pages for 7.0
This commit is contained in:
parent
ff04da577b
commit
171c2ecf53
|
|
@ -13,12 +13,18 @@ your database.
|
|||
.PP
|
||||
\fBConfiguration File Settings and Command\-Line Options Mapping\f1
|
||||
.PP
|
||||
Starting in version 4.0, MongoDB disables support for TLS 1.0
|
||||
MongoDB disables support for TLS 1.0
|
||||
encryption on systems where TLS 1.1+ is available. For
|
||||
more details, see \fBDisable TLS 1.0\f1\&.
|
||||
.SH OPTIONS
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
MongoDB always enables journaling. As a result, MongoDB removes the
|
||||
\fBstorage.journal.enabled\f1 option and the corresponding \fB\-\-journal\f1 and
|
||||
\fB\-\-nojournal\f1 command\-line options.
|
||||
.RE
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
MongoDB removes the \fB\-\-cpu\f1 command\-line option.
|
||||
.RE
|
||||
.RS
|
||||
|
|
@ -37,8 +43,7 @@ MongoDB deprecates the SSL options and instead adds new
|
|||
corresponding TLS options.
|
||||
.IP \(bu 2
|
||||
MongoDB adds
|
||||
\fB\-\-tlsClusterCAFile\f1\f1/\fBnet.tls.clusterCAFile\f1\f1\&. (Also available
|
||||
in 3.4.18+, 3.6.9+, 4.0.3+)
|
||||
\fB\-\-tlsClusterCAFile\f1\f1/\fBnet.tls.clusterCAFile\f1\f1\&.
|
||||
.RE
|
||||
.SS CORE OPTIONS
|
||||
.PP
|
||||
|
|
@ -176,9 +181,6 @@ client connections.
|
|||
.PP
|
||||
\fIDefault\f1: localhost
|
||||
.PP
|
||||
Starting in MongoDB 3.6, \fBmongod\f1\f1 bind to localhost
|
||||
by default. See \fBDefault Bind to Localhost\f1\&.
|
||||
.PP
|
||||
The hostnames and/or IP addresses and/or full Unix domain socket
|
||||
paths on which \fBmongod\f1\f1 should listen for client connections. You
|
||||
may attach \fBmongod\f1\f1 to any interface. To bind to multiple
|
||||
|
|
@ -208,12 +210,12 @@ split network horizon. Starting in MongoDB 5.0, nodes that are only
|
|||
configured with an IP address will fail startup validation and will
|
||||
not start.
|
||||
.PP
|
||||
Before binding to a non\-localhost (e.g. publicly accessible)
|
||||
IP address, ensure you have secured your cluster from unauthorized
|
||||
access. For a complete list of security recommendations, see
|
||||
Before you bind your instance to a publicly\-accessible IP address,
|
||||
you must secure your cluster from unauthorized access. For a complete
|
||||
list of security recommendations, see
|
||||
\fBSecurity Checklist\f1\&. At minimum, consider
|
||||
\fBenabling authentication\f1 and
|
||||
\fBhardening network infrastructure\f1\&.
|
||||
\fBenabling authentication\f1 and \fBhardening
|
||||
network infrastructure\f1\&.
|
||||
.PP
|
||||
For more information about IP Binding, refer to the
|
||||
\fBIP Binding\f1 documentation.
|
||||
|
|
@ -246,12 +248,12 @@ addresses (i.e. \fB0.0.0.0\f1). If \fBmongod\f1\f1 starts with
|
|||
\fBmongod\f1\f1 only supports IPv6 if started with \fB\-\-ipv6\f1\f1\&. Specifying
|
||||
\fB\-\-bind_ip_all\f1\f1 alone does not enable IPv6 support.
|
||||
.PP
|
||||
Before binding to a non\-localhost (e.g. publicly accessible)
|
||||
IP address, ensure you have secured your cluster from unauthorized
|
||||
access. For a complete list of security recommendations, see
|
||||
Before you bind your instance to a publicly\-accessible IP address,
|
||||
you must secure your cluster from unauthorized access. For a complete
|
||||
list of security recommendations, see
|
||||
\fBSecurity Checklist\f1\&. At minimum, consider
|
||||
\fBenabling authentication\f1 and
|
||||
\fBhardening network infrastructure\f1\&.
|
||||
\fBenabling authentication\f1 and \fBhardening
|
||||
network infrastructure\f1\&.
|
||||
.PP
|
||||
For more information about IP Binding, refer to the
|
||||
\fBIP Binding\f1 documentation.
|
||||
|
|
@ -523,8 +525,8 @@ systems. For more information, please see the respective
|
|||
.PP
|
||||
On macOS, PID file management is generally handled by \fBbrew\f1\&. Only use
|
||||
the \fB\-\-pidfilepath\f1\f1 option if you are not using \fBbrew\f1 on your macOS system.
|
||||
For more information, please see the respective
|
||||
\fBInstallation Guide\f1 for your operating system.
|
||||
For more information, please see the respective Installation
|
||||
Guide for your operating system.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongod \-\-keyFile\f1
|
||||
|
|
@ -538,14 +540,12 @@ information.
|
|||
.PP
|
||||
Starting in MongoDB 4.2, \fBkeyfiles for internal membership
|
||||
authentication\f1 use YAML format to allow for
|
||||
multiple keys in a keyfile. The YAML format accepts content of:
|
||||
multiple keys in a keyfile. The YAML format accepts either:
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
a single key string (same as in earlier versions),
|
||||
A single key string (same as in earlier versions)
|
||||
.IP \(bu 2
|
||||
multiple key strings (each string must be enclosed in quotes), or
|
||||
.IP \(bu 2
|
||||
sequence of key strings.
|
||||
A sequence of key strings
|
||||
.RE
|
||||
.PP
|
||||
The YAML format is compatible with the existing single\-key
|
||||
|
|
@ -644,9 +644,9 @@ and operations. When authorization is enabled, MongoDB requires all
|
|||
clients to authenticate themselves first in order to determine the
|
||||
access for the client.
|
||||
.PP
|
||||
Configure users via the \fBmongo shell\f1\&. If no users exist, the localhost interface
|
||||
will continue to have access to the database until you create
|
||||
the first user.
|
||||
To configure users, use the \fBmongosh\f1\f1 client. If no users
|
||||
exist, the localhost interface will continue to have access to the
|
||||
database until you create the first user.
|
||||
.PP
|
||||
See \fBSecurity\f1
|
||||
for more information.
|
||||
|
|
@ -774,17 +774,13 @@ MongoDB supports the following compressors:
|
|||
.IP \(bu 2
|
||||
\fBsnappy\f1
|
||||
.IP \(bu 2
|
||||
\fBzlib\f1 (Available starting in MongoDB 3.6)
|
||||
\fBzlib\f1
|
||||
.IP \(bu 2
|
||||
\fBzstd\f1 (Available starting in MongoDB 4.2)
|
||||
\fBzstd\f1
|
||||
.RE
|
||||
.PP
|
||||
\fBIn versions 3.6 and 4.0\f1, \fBmongod\f1\f1 and
|
||||
\fBmongos\f1\f1 enable network compression by default with
|
||||
\fBsnappy\f1 as the compressor.
|
||||
.PP
|
||||
\fBStarting in version 4.2\f1, \fBmongod\f1\f1 and
|
||||
\fBmongos\f1\f1 instances default to both \fBsnappy,zstd,zlib\f1
|
||||
Both \fBmongod\f1\f1 and
|
||||
\fBmongos\f1\f1 instances default to \fBsnappy,zstd,zlib\f1
|
||||
compressors, in that order.
|
||||
.PP
|
||||
To disable network compression, set the value to \fBdisabled\f1\&.
|
||||
|
|
@ -835,7 +831,7 @@ could create inaccurate time zone conversions in older versions of
|
|||
MongoDB.
|
||||
.PP
|
||||
To explicitly link to the time zone database in versions of MongoDB
|
||||
prior to 5.0, 4.4.7, 4.2.14, and 4.0.25, download the time zone
|
||||
prior to 5.0, 4.4.7, and 4.2.14, download the time zone
|
||||
database (https://downloads.mongodb.org/olson_tz_db/timezonedb\-latest.zip)\&.
|
||||
and use the \fBtimeZoneInfo\f1\f1 parameter.
|
||||
.PP
|
||||
|
|
@ -866,8 +862,6 @@ For usage examples, see:
|
|||
\fBmongod \-\-enableFreeMonitoring\f1
|
||||
.RS
|
||||
.PP
|
||||
Available for MongoDB Community Edition.
|
||||
.PP
|
||||
Enables or disables \fBfree MongoDB Cloud monitoring\f1\&. \fB\-\-enableFreeMonitoring\f1\f1 accepts the following
|
||||
values:
|
||||
.RS
|
||||
|
|
@ -926,8 +920,6 @@ For the corresponding configuration file setting, see
|
|||
\fBmongod \-\-freeMonitoringTag\f1
|
||||
.RS
|
||||
.PP
|
||||
Available for MongoDB Community Edition.
|
||||
.PP
|
||||
Optional tag to describe environment context. The tag can be sent as
|
||||
part of the \fBfree MongoDB Cloud monitoring\f1 registration at start up.
|
||||
.PP
|
||||
|
|
@ -1200,6 +1192,17 @@ This setting can be configured on a running \fBmongod\f1\f1 using
|
|||
\fBsetParameter\f1\f1\&.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongod \-\-ldapRetryCount\f1
|
||||
.RS
|
||||
.PP
|
||||
\fIDefault\f1: 0
|
||||
.PP
|
||||
\fIAvailable in MongoDB Enterprise only.\f1
|
||||
.PP
|
||||
Number of operation retries by the server LDAP manager after a
|
||||
network error.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongod \-\-ldapUserToDNMapping\f1
|
||||
.RS
|
||||
.PP
|
||||
|
|
@ -1292,7 +1295,7 @@ dc=com??one?(user={0})"\f1
|
|||
.RE
|
||||
.PP
|
||||
An explanation of RFC4514 (https://www.ietf.org/rfc/rfc4514.txt),
|
||||
RFC4515 (https://tools.ietf.org/search/rfc4515),
|
||||
RFC4515 (https://tools.ietf.org/html/rfc4515),
|
||||
RFC4516 (https://tools.ietf.org/html/rfc4516), or LDAP queries is out
|
||||
of scope for the MongoDB Documentation. Please review the RFC directly or
|
||||
use your preferred LDAP resource.
|
||||
|
|
@ -1371,7 +1374,7 @@ This setting can be configured on a running \fBmongod\f1\f1 using the
|
|||
.PP
|
||||
\fIAvailable in MongoDB Enterprise only.\f1
|
||||
.PP
|
||||
A relative LDAP query URL formatted conforming to RFC4515 (https://tools.ietf.org/search/rfc4515) and RFC4516 (https://tools.ietf.org/html/rfc4516) that \fBmongod\f1\f1 executes to obtain
|
||||
A relative LDAP query URL formatted conforming to RFC4515 (https://tools.ietf.org/html/rfc4515) and RFC4516 (https://tools.ietf.org/html/rfc4516) that \fBmongod\f1\f1 executes to obtain
|
||||
the LDAP groups to which the authenticated user belongs to. The query is
|
||||
relative to the host or hosts specified in \fB\-\-ldapServers\f1\f1\&.
|
||||
.PP
|
||||
|
|
@ -1439,7 +1442,7 @@ If unset, \fBmongod\f1\f1 cannot authorize users using LDAP.
|
|||
This setting can be configured on a running \fBmongod\f1\f1 using the
|
||||
\fBsetParameter\f1\f1 database command.
|
||||
.PP
|
||||
An explanation of RFC4515 (https://tools.ietf.org/search/rfc4515),
|
||||
An explanation of RFC4515 (https://tools.ietf.org/html/rfc4515),
|
||||
RFC4516 (https://tools.ietf.org/html/rfc4516) or LDAP queries is out
|
||||
of scope for the MongoDB Documentation. Please review the RFC directly or
|
||||
use your preferred LDAP resource.
|
||||
|
|
@ -1496,7 +1499,7 @@ will refuse to start.
|
|||
The directory where the \fBmongod\f1\f1 instance stores its data.
|
||||
.PP
|
||||
If using the default
|
||||
\fBconfiguration file\f1
|
||||
\fBConfiguration File\f1
|
||||
included with a package manager installation of MongoDB, the
|
||||
corresponding \fBstorage.dbPath\f1\f1 setting uses a different
|
||||
default.
|
||||
|
|
@ -1579,12 +1582,10 @@ If you set \fB\-\-syncdelay\f1\f1 to \fB0\f1, MongoDB will not sync the
|
|||
memory mapped files to disk.
|
||||
.PP
|
||||
The \fBmongod\f1\f1 process writes data very quickly to the journal and
|
||||
lazily to the data files. \fB\-\-syncdelay\f1\f1 has no effect on the
|
||||
\fBjournal\f1\f1 files or \fBjournaling\f1,
|
||||
but if \fB\-\-syncdelay\f1\f1 is set to \fB0\f1 the journal will eventually consume
|
||||
all available disk space. If you set \fB\-\-syncdelay\f1\f1 to \fB0\f1 for testing
|
||||
purposes, you should also set \fB\-\-nojournal\f1\f1
|
||||
to \fBtrue\f1\&.
|
||||
lazily to the data files. \fB\-\-syncdelay\f1\f1 has no effect on
|
||||
\fBjournaling\f1, but if \fB\-\-syncdelay\f1\f1 is set to
|
||||
\fB0\f1 the journal will eventually consume
|
||||
all available disk space.
|
||||
.PP
|
||||
Not available for \fBmongod\f1\f1 instances that use the
|
||||
\fBin\-memory storage engine\f1\&.
|
||||
|
|
@ -1670,41 +1671,6 @@ instance using the \fB\-\-repair\f1\f1 option.
|
|||
.RE
|
||||
.RE
|
||||
.PP
|
||||
\fBmongod \-\-journal\f1
|
||||
.RS
|
||||
.PP
|
||||
Enables the durability \fBjournal\f1 to ensure data files remain valid
|
||||
and recoverable. This option applies only when you specify the
|
||||
\fB\-\-dbpath\f1\f1 option. \fBmongod\f1\f1 enables journaling by default.
|
||||
.PP
|
||||
Not available for \fBmongod\f1\f1 instances that use the
|
||||
\fBin\-memory storage engine\f1\&.
|
||||
.PP
|
||||
If any voting member of a replica set uses the \fBin\-memory
|
||||
storage engine\f1, you must set
|
||||
\fBwriteConcernMajorityJournalDefault\f1\f1 to \fBfalse\f1\&.
|
||||
.PP
|
||||
Starting in version 4.2 (and 4.0.13 and 3.6.14 ), if a replica set
|
||||
member uses the \fBin\-memory storage engine\f1
|
||||
(voting or non\-voting) but the replica set has
|
||||
\fBwriteConcernMajorityJournalDefault\f1\f1 set to true, the
|
||||
replica set member logs a startup warning.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongod \-\-nojournal\f1
|
||||
.RS
|
||||
.PP
|
||||
Disables \fBjournaling\f1\&. \fBmongod\f1\f1
|
||||
enables journaling by default.
|
||||
.PP
|
||||
Not available for \fBmongod\f1\f1 instances that use the
|
||||
\fBin\-memory storage engine\f1\&.
|
||||
.PP
|
||||
Starting in MongoDB 4.0, you cannot specify \fB\-\-nojournal\f1\f1 option or \fBstorage.journal.enabled:
|
||||
false\f1\f1 for replica set members that use the
|
||||
WiredTiger storage engine.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongod \-\-journalCommitInterval\f1
|
||||
.RS
|
||||
.PP
|
||||
|
|
@ -1802,7 +1768,7 @@ option. The option has no effect starting in MongoDB 4.4.
|
|||
.PP
|
||||
Specifies the maximum size (in GB) for the "lookaside (or cache
|
||||
overflow) table" file WiredTigerLAS.wt for MongoDB
|
||||
4.2.1\-4.2.x and 4.0.12\-4.0.x. The file no longer exists starting in
|
||||
4.2.1\-4.2.x. The file no longer exists starting in
|
||||
version 4.4.
|
||||
.PP
|
||||
The setting can accept the following values:
|
||||
|
|
@ -1836,8 +1802,6 @@ file and restart \fBmongod\f1\f1\&.
|
|||
.PP
|
||||
To change the maximum size during runtime, use the
|
||||
\fBwiredTigerMaxCacheOverflowSizeGB\f1\f1 parameter.
|
||||
.PP
|
||||
\fIAvailable starting in MongoDB 4.2.1 (and 4.0.12)\f1
|
||||
.RE
|
||||
.PP
|
||||
\fBmongod \-\-wiredTigerJournalCompressor\f1
|
||||
|
|
@ -1927,13 +1891,6 @@ are not affected.
|
|||
Configures replication. Specify a replica set name as an argument to
|
||||
this set. All hosts in the replica set must have the same set name.
|
||||
.PP
|
||||
Starting in MongoDB 4.0,
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
For the WiredTiger storage engine, \fB\-\-replSet\f1\f1 cannot be used in
|
||||
conjunction with \fB\-\-nojournal\f1\f1\&.
|
||||
.RE
|
||||
.PP
|
||||
If your application connects to more than one replica set, each set must
|
||||
have a distinct name. Some drivers group replica set connections by
|
||||
replica set name.
|
||||
|
|
@ -1945,7 +1902,7 @@ replica set name.
|
|||
Specifies a maximum size in megabytes for the replication operation log
|
||||
(i.e., the \fBoplog\f1).
|
||||
.PP
|
||||
Starting in MongoDB 4.0, the oplog can grow past its configured size
|
||||
The oplog can grow past its configured size
|
||||
limit to avoid deleting the \fBmajority commit point\f1\f1\&.
|
||||
.PP
|
||||
By default, the \fBmongod\f1\f1 process creates an \fBoplog\f1 based on
|
||||
|
|
@ -2086,21 +2043,6 @@ Once maintenance has completed, remove the
|
|||
with \fB\-\-configsvr\f1\f1\&.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongod \-\-configsvrMode\f1
|
||||
.RS
|
||||
.PP
|
||||
\fBAvailable in MongoDB 3.2 version only\f1
|
||||
.PP
|
||||
If set to \fBsccc\f1, indicates that the config servers are deployed
|
||||
as three mirrored \fBmongod\f1\f1 instances, even if one or more
|
||||
config servers is also a member of a replica set. \fBconfigsvrMode\f1
|
||||
only accepts the value \fBsccc\f1\&.
|
||||
.PP
|
||||
If unset, config servers running as replica sets expect to use the
|
||||
"config server replica set" protocol for writing to config servers,
|
||||
rather than the "mirrored mongod" write protocol.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongod \-\-shardsvr\f1
|
||||
.RS
|
||||
.PP
|
||||
|
|
@ -2137,10 +2079,10 @@ MongoDB does not automatically delete the data saved in the
|
|||
\fBmongod \-\-noMoveParanoia\f1
|
||||
.RS
|
||||
.PP
|
||||
Starting in 3.2, MongoDB uses \fB\-\-noMoveParanoia\f1 as the default.
|
||||
.PP
|
||||
During chunk migration, a shard does not save documents migrated from
|
||||
the shard.
|
||||
.PP
|
||||
This is the default behavior.
|
||||
.RE
|
||||
.SS TLS OPTIONS
|
||||
.PP
|
||||
|
|
@ -2211,7 +2153,7 @@ For more information about TLS and MongoDB, see
|
|||
Specifies the \&.pem file that contains both the TLS
|
||||
certificate and key.
|
||||
.PP
|
||||
Starting with MongoDB 4.0 on macOS or Windows, you can use the
|
||||
On macOS or Windows, you can use the
|
||||
\fB\-\-tlsCertificateSelector\f1\f1 option to specify a
|
||||
certificate from the operating system\(aqs secure certificate store
|
||||
instead of a PEM key file. \fB\-\-tlsCertificateKeyFile\f1\f1 and
|
||||
|
|
@ -2226,7 +2168,7 @@ On Windows or macOS, you must specify either
|
|||
\fB\-\-tlsCertificateKeyFile\f1\f1 or
|
||||
\fB\-\-tlsCertificateSelector\f1\f1 when TLS/SSL is enabled.
|
||||
.IP
|
||||
For Windows \fBonly\f1, MongoDB 4.0 and later do not support
|
||||
For Windows \fBonly\f1, MongoDB does not support
|
||||
encrypted PEM files. The \fBmongod\f1\f1 fails to start if
|
||||
it encounters an encrypted PEM file. To securely store and
|
||||
access a certificate for use with TLS on Windows,
|
||||
|
|
@ -2241,14 +2183,12 @@ For more information about TLS and MongoDB, see
|
|||
\fBmongod \-\-tlsCertificateKeyFilePassword\f1
|
||||
.RS
|
||||
.PP
|
||||
Specifies the password to de\-crypt the certificate\-key file (i.e.
|
||||
Specifies the password to decrypt the certificate\-key file (i.e.
|
||||
\fB\-\-tlsCertificateKeyFile\f1\f1). Use the
|
||||
\fB\-\-tlsCertificateKeyFilePassword\f1\f1 option only if the
|
||||
certificate\-key file is encrypted. In all cases, the
|
||||
\fBmongod\f1\f1 will redact the password from all logging and
|
||||
reporting output.
|
||||
.PP
|
||||
Starting in MongoDB 4.0:
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
On Linux/BSD, if the private key in the PEM file is encrypted and
|
||||
|
|
@ -2343,7 +2283,7 @@ For more information about TLS and MongoDB, see
|
|||
Specifies the \&.pem file that contains the x.509
|
||||
certificate\-key file for \fBmembership authentication\f1 for the cluster or replica set.
|
||||
.PP
|
||||
Starting with MongoDB 4.0 on macOS or Windows, you can use the
|
||||
On macOS or Windows, you can use the
|
||||
\fB\-\-tlsClusterCertificateSelector\f1\f1 option to specify a
|
||||
certificate from the operating system\(aqs secure certificate store
|
||||
instead of a PEM key file. \fB\-\-tlsClusterFile\f1\f1 and
|
||||
|
|
@ -2370,7 +2310,7 @@ For more information about TLS and MongoDB, see
|
|||
\fBConfigure mongod\f1 and mongos\f1 for TLS/SSL\f1 and
|
||||
\fBTLS/SSL Configuration for Clients\f1 .
|
||||
.PP
|
||||
For Windows \fBonly\f1, MongoDB 4.0 and later do not support
|
||||
For Windows \fBonly\f1, MongoDB does not support
|
||||
encrypted PEM files. The \fBmongod\f1\f1 fails to start if
|
||||
it encounters an encrypted PEM file. To securely store and
|
||||
access a certificate for use with membership authentication on
|
||||
|
|
@ -2381,8 +2321,7 @@ Windows, use \fB\-\-tlsClusterCertificateSelector\f1\f1\&.
|
|||
.RS
|
||||
.PP
|
||||
Available on Windows and macOS as an alternative to
|
||||
\fB\-\-tlsCertificateKeyFile\f1\f1\&. In version 4.0, see
|
||||
\fB\-\-sslCertificateSelector\f1\f1\&.
|
||||
\fB\-\-tlsCertificateKeyFile\f1\f1\&.
|
||||
.PP
|
||||
Specifies a certificate property in order to select a matching
|
||||
certificate from the operating system\(aqs certificate store to use for
|
||||
|
|
@ -2531,13 +2470,11 @@ information.
|
|||
\fBmongod \-\-tlsClusterPassword\f1
|
||||
.RS
|
||||
.PP
|
||||
Specifies the password to de\-crypt the x.509 certificate\-key file
|
||||
Specifies the password to decrypt the x.509 certificate\-key file
|
||||
specified with \fB\-\-tlsClusterFile\f1\f1\&. Use the
|
||||
\fB\-\-tlsClusterPassword\f1\f1 option only if the certificate\-key
|
||||
file is encrypted. In all cases, the \fBmongod\f1\f1 will redact
|
||||
the password from all logging and reporting output.
|
||||
.PP
|
||||
Starting in MongoDB 4.0:
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
On Linux/BSD, if the private key in the x.509 file is encrypted and
|
||||
|
|
@ -2626,19 +2563,16 @@ For more information about TLS and MongoDB, see
|
|||
\fBmongod \-\-tlsCRLFile\f1
|
||||
.RS
|
||||
.PP
|
||||
For MongoDB 4.0 and earlier, see \fB\-\-sslCRLFile\f1\f1\&.
|
||||
.PP
|
||||
Specifies the \&.pem file that contains the Certificate Revocation
|
||||
List. Specify the file name of the \&.pem file using relative or
|
||||
absolute paths.
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
Starting in MongoDB 4.0, you cannot specify a CRL file on
|
||||
You cannot specify a CRL file on
|
||||
macOS. Instead, you can use the system SSL certificate store,
|
||||
which uses OCSP (Online Certificate Status Protocol) to
|
||||
validate the revocation status of certificates. See
|
||||
\fB\-\-sslCertificateSelector\f1\f1 in MongoDB 4.0 and
|
||||
\fB\-\-tlsCertificateSelector\f1\f1 in MongoDB 4.2+ to use the
|
||||
\fB\-\-tlsCertificateSelector\f1\f1 to use the
|
||||
system SSL certificate store.
|
||||
.IP \(bu 2
|
||||
Starting in version 4.4, to check for certificate revocation,
|
||||
|
|
@ -2692,8 +2626,9 @@ For more information about TLS and MongoDB, see
|
|||
\fBmongod \-\-tlsAllowConnectionsWithoutCertificates\f1
|
||||
.RS
|
||||
.PP
|
||||
For clients that do not present certificates, \fBmongod\f1\f1 bypasses
|
||||
TLS/SSL certificate validation when establishing the connection.
|
||||
For clients that don\(aqt provide certificates, \fBmongod\f1\f1 or
|
||||
\fBmongos\f1\f1 encrypts the TLS/SSL connection, assuming the
|
||||
connection is successfully made.
|
||||
.PP
|
||||
For clients that present a certificate, however, \fBmongod\f1\f1 performs
|
||||
certificate validation using the root certificate chain specified by
|
||||
|
|
@ -2732,7 +2667,7 @@ The specified disabled protocols overrides any default disabled
|
|||
protocols.
|
||||
.RE
|
||||
.PP
|
||||
Starting in version 4.0, MongoDB disables the use of TLS 1.0 if TLS
|
||||
MongoDB disables the use of TLS 1.0 if TLS
|
||||
1.1+ is available on the system. To enable the disabled TLS 1.0,
|
||||
specify \fBnone\f1 to \fB\-\-tlsDisabledProtocols\f1\f1\&. See \fBDisable TLS 1.0\f1\&.
|
||||
.PP
|
||||
|
|
@ -2826,7 +2761,7 @@ The server uses and accepts only TLS/SSL encrypted connections.
|
|||
.RE
|
||||
.RE
|
||||
.PP
|
||||
Starting in version 3.4, if \fB\-\-tlsCAFile\f1/\fBnet.tls.CAFile\f1 (or
|
||||
If \fB\-\-tlsCAFile\f1/\fBnet.tls.CAFile\f1 (or
|
||||
their aliases \fB\-\-sslCAFile\f1/\fBnet.ssl.CAFile\f1) is not specified
|
||||
and you are not using x.509 authentication, the system\-wide CA
|
||||
certificate store will be used when connecting to an TLS/SSL\-enabled
|
||||
|
|
@ -2849,7 +2784,7 @@ Use \fB\-\-tlsCertificateKeyFile\f1\f1 instead.
|
|||
Specifies the \&.pem file that contains both the TLS/SSL
|
||||
certificate and key.
|
||||
.PP
|
||||
Starting with MongoDB 4.0 on macOS or Windows, you can use the
|
||||
On macOS or Windows, you can use the
|
||||
\fB\-\-sslCertificateSelector\f1\f1 option to specify a
|
||||
certificate from the operating system\(aqs secure certificate store
|
||||
instead of a PEM key file. \fB\-\-sslPEMKeyFile\f1\f1 and
|
||||
|
|
@ -2864,7 +2799,7 @@ On Windows or macOS, you must specify either
|
|||
\fB\-\-sslPEMKeyFile\f1\f1 or \fB\-\-sslCertificateSelector\f1\f1
|
||||
when TLS/SSL is enabled.
|
||||
.IP
|
||||
For Windows \fBonly\f1, MongoDB 4.0 and later do not support
|
||||
For Windows \fBonly\f1, MongoDB does not support
|
||||
encrypted PEM files. The \fBmongod\f1\f1 fails to start if
|
||||
it encounters an encrypted PEM file. To securely store and
|
||||
access a certificate for use with TLS/SSL on Windows,
|
||||
|
|
@ -2881,12 +2816,10 @@ For more information about TLS/SSL and MongoDB, see
|
|||
.PP
|
||||
Use \fB\-\-tlsCertificateKeyFilePassword\f1\f1 instead.
|
||||
.PP
|
||||
Specifies the password to de\-crypt the certificate\-key file (i.e.
|
||||
Specifies the password to decrypt the certificate\-key file (i.e.
|
||||
\fB\-\-sslPEMKeyFile\f1\f1). Use the \fB\-\-sslPEMKeyPassword\f1\f1 option only if the
|
||||
certificate\-key file is encrypted. In all cases, the \fBmongod\f1\f1 will
|
||||
redact the password from all logging and reporting output.
|
||||
.PP
|
||||
Starting in MongoDB 4.0:
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
On Linux/BSD, if the private key in the PEM file is encrypted and
|
||||
|
|
@ -2918,7 +2851,7 @@ Use \fB\-\-tlsClusterFile\f1\f1 instead.
|
|||
Specifies the \&.pem file that contains the x.509
|
||||
certificate\-key file for \fBmembership authentication\f1 for the cluster or replica set.
|
||||
.PP
|
||||
Starting with MongoDB 4.0 on macOS or Windows, you can use the
|
||||
On macOS or Windows, you can use the
|
||||
\fB\-\-sslClusterCertificateSelector\f1\f1 option to specify a
|
||||
certificate from the operating system\(aqs secure certificate store
|
||||
instead of a PEM key file. \fB\-\-sslClusterFile\f1\f1 and
|
||||
|
|
@ -2939,7 +2872,7 @@ For more information about TLS/SSL and MongoDB, see
|
|||
\fBConfigure mongod\f1 and mongos\f1 for TLS/SSL\f1 and
|
||||
\fBTLS/SSL Configuration for Clients\f1 .
|
||||
.PP
|
||||
For Windows \fBonly\f1, MongoDB 4.0 and later do not support
|
||||
For Windows \fBonly\f1, MongoDB does not support
|
||||
encrypted PEM files. The \fBmongod\f1\f1 fails to start if
|
||||
it encounters an encrypted PEM file. To securely store and
|
||||
access a certificate for use with membership authentication on
|
||||
|
|
@ -3092,12 +3025,10 @@ contain the intermedia CA certificate \fIand\f1 the root CA certificate.
|
|||
.PP
|
||||
Use \fB\-\-tlsClusterPassword\f1\f1 instead.
|
||||
.PP
|
||||
Specifies the password to de\-crypt the x.509 certificate\-key file
|
||||
Specifies the password to decrypt the x.509 certificate\-key file
|
||||
specified with \fB\-\-sslClusterFile\f1\&. Use the \fB\-\-sslClusterPassword\f1\f1 option only
|
||||
if the certificate\-key file is encrypted. In all cases, the \fBmongod\f1\f1
|
||||
will redact the password from all logging and reporting output.
|
||||
.PP
|
||||
Starting in MongoDB 4.0:
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
On Linux/BSD, if the private key in the x.509 file is encrypted and
|
||||
|
|
@ -3196,11 +3127,10 @@ List. Specify the file name of the \&.pem file using relative or
|
|||
absolute paths.
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
Starting in MongoDB 4.0, you cannot specify a CRL file on
|
||||
You cannot specify a CRL file on
|
||||
macOS. Instead, you can use the system SSL certificate store,
|
||||
which uses OCSP (Online Certificate Status Protocol) to
|
||||
validate the revocation status of certificates. See
|
||||
\fB\-\-sslCertificateSelector\f1\f1 in MongoDB 4.0 and
|
||||
\fB\-\-tlsCertificateSelector\f1\f1 in MongoDB 4.2+ to use the
|
||||
system SSL certificate store.
|
||||
.IP \(bu 2
|
||||
|
|
@ -3225,12 +3155,16 @@ Bypasses the validation checks for TLS/SSL certificates on other
|
|||
servers in the cluster and allows the use of invalid certificates to
|
||||
connect.
|
||||
.PP
|
||||
Starting in MongoDB 4.2, if you specify
|
||||
\fB\-\-tlsAllowInvalidateCertificates\f1 or
|
||||
\fBnet.tls.allowInvalidCertificates: true\f1 when using x.509
|
||||
authentication, an invalid certificate is only sufficient to
|
||||
establish a TLS connection but it is \fIinsufficient\f1 for
|
||||
authentication.
|
||||
Starting in MongoDB 4.0, if you specify any of the following x.509
|
||||
authentication options, an invalid certificate is
|
||||
sufficient only to establish a TLS connection but it is
|
||||
\fIinsufficient\f1 for authentication:
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
\fB\-\-sslAllowInvalidCertificates\f1 or \fBnet.ssl.allowInvalidCertificates: true\f1 for MongoDB 4.0 and later
|
||||
.IP \(bu 2
|
||||
\fB\-\-tlsAllowInvalidCertificates\f1 or \fBnet.tls.allowInvalidCertificates: true\f1 for MongoDB 4.2 and later
|
||||
.RE
|
||||
.PP
|
||||
When using
|
||||
the \fB\-\-sslAllowInvalidCertificates\f1\f1 setting, MongoDB
|
||||
|
|
@ -3262,8 +3196,9 @@ For more information about TLS/SSL and MongoDB, see
|
|||
.PP
|
||||
Use \fB\-\-tlsAllowConnectionsWithoutCertificates\f1\f1 instead.
|
||||
.PP
|
||||
For clients that do not present certificates, \fBmongod\f1\f1 bypasses
|
||||
TLS/SSL certificate validation when establishing the connection.
|
||||
For clients that don\(aqt provide certificates, \fBmongod\f1\f1 or
|
||||
\fBmongos\f1\f1 encrypts the TLS/SSL connection, assuming the
|
||||
connection is successfully made.
|
||||
.PP
|
||||
For clients that present a certificate, however, \fBmongod\f1\f1 performs
|
||||
certificate validation using the root certificate chain specified by
|
||||
|
|
@ -3287,7 +3222,7 @@ incoming connections that use a specific protocol or protocols. To
|
|||
specify multiple protocols, use a comma separated list of protocols.
|
||||
.PP
|
||||
\fB\-\-sslDisabledProtocols\f1\f1 recognizes the following protocols: \fBTLS1_0\f1, \fBTLS1_1\f1,
|
||||
\fBTLS1_2\f1, and starting in version 4.0.4 (and 3.6.9 and 3.4.24), \fBTLS1_3\f1\&.
|
||||
\fBTLS1_2\f1, and \fBTLS1_3\f1\&.
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
On macOS, you cannot disable \fBTLS1_1\f1 and leave both \fBTLS1_0\f1 and
|
||||
|
|
@ -3304,7 +3239,7 @@ The specified disabled protocols overrides any default disabled
|
|||
protocols.
|
||||
.RE
|
||||
.PP
|
||||
Starting in version 4.0, MongoDB disables the use of TLS 1.0 if TLS
|
||||
MongoDB disables the use of TLS 1.0 if TLS
|
||||
1.1+ is available on the system. To enable the disabled TLS 1.0,
|
||||
specify \fBnone\f1 to \fB\-\-sslDisabledProtocols\f1\f1\&. See \fBDisable TLS 1.0\f1\&.
|
||||
.PP
|
||||
|
|
@ -3591,9 +3526,10 @@ requirements.
|
|||
\fBmongod \-\-auditPath\f1
|
||||
.RS
|
||||
.PP
|
||||
Specifies the output file for \fBauditing\f1 if
|
||||
\fB\-\-auditDestination\f1\f1 has value of \fBfile\f1\&. The \fB\-\-auditPath\f1\f1
|
||||
option can take either a full path name or a relative path name.
|
||||
Specifies the output file for auditing if
|
||||
\fB\-\-auditDestination\f1\f1 has value of \fBfile\f1\&. The
|
||||
\fB\-\-auditPath\f1\f1 option can take either a full path name or a
|
||||
relative path name.
|
||||
.PP
|
||||
Available only in MongoDB Enterprise (http://www.mongodb.com/products/mongodb\-enterprise\-advanced?tck=docs_server)
|
||||
and MongoDB Atlas (https://cloud.mongodb.com/user#/atlas/login)\&.
|
||||
|
|
@ -3624,8 +3560,9 @@ and MongoDB Atlas (https://cloud.mongodb.com/user#/atlas/login)\&.
|
|||
.RE
|
||||
.SS SNMP OPTIONS
|
||||
.PP
|
||||
MongoDB Enterprise on macOS does \fInot\f1 include support for SNMP due
|
||||
to SERVER\-29352 (https://jira.mongodb.org/browse/SERVER\-29352)\&.
|
||||
Starting in MongoDB 6.1, \fBSNMP\f1 is removed.
|
||||
All related command line options prevent \fBmongod\f1 from starting.
|
||||
To monitor your deployment, use MongoDB Ops Manager (https://www.mongodb.com/docs/ops\-manager/current/)\&.
|
||||
.PP
|
||||
\fBmongod \-\-snmp\-disabled\f1
|
||||
.RS
|
||||
|
|
@ -3658,15 +3595,15 @@ Runs SNMP as a master. The option is incompatible with \fB\-\-snmp\-disabled\f1\
|
|||
\fBmongod \-\-inMemorySizeGB\f1
|
||||
.RS
|
||||
.PP
|
||||
\fIDefault\f1: 50% of physical RAM less 1 GB
|
||||
\fIDefault\f1: 50% of physical RAM minus 1 GB.
|
||||
.PP
|
||||
Maximum amount of memory to allocate for the \fBin\-memory storage
|
||||
engine\f1 data, including indexes, the oplog (if the
|
||||
\fBmongod\f1\f1 is part of a replica set), sharded
|
||||
cluster metadata, etc.
|
||||
.PP
|
||||
Values can range from 256MB to 10TB and can be a float.
|
||||
.PP
|
||||
Maximum amount of memory to allocate for \fBin\-memory storage
|
||||
engine\f1 data, including indexes, oplog if the
|
||||
\fBmongod\f1\f1 is part of replica set, replica set or sharded
|
||||
cluster metadata, etc.
|
||||
.PP
|
||||
By default, the in\-memory storage engine uses 50% of physical RAM minus
|
||||
1 GB.
|
||||
.PP
|
||||
|
|
@ -3776,7 +3713,7 @@ Available in MongoDB Enterprise only.
|
|||
Hostname or IP address of the KMIP server to connect to. Requires
|
||||
\fB\-\-enableEncryption\f1\f1\&.
|
||||
.PP
|
||||
Starting in MongoDB 4.2.1 (and 4.0.14), you can specify multiple KMIP
|
||||
Starting in MongoDB 4.2.1, you can specify multiple KMIP
|
||||
servers as a comma\-separated list, e.g.
|
||||
\fBserver1.example.com,server2.example.com\f1\&. On startup, the
|
||||
\fBmongod\f1\f1 will attempt to establish a connection to each
|
||||
|
|
@ -3898,11 +3835,14 @@ Available in MongoDB Enterprise only.
|
|||
\fBmongod \-\-kmipClientCertificateFile\f1
|
||||
.RS
|
||||
.PP
|
||||
String containing the path to the client certificate used for
|
||||
authenticating MongoDB to the KMIP server. Requires that a
|
||||
\fB\-\-kmipServerName\f1\f1 be provided.
|
||||
Path to the \fB\&.pem\f1 file used to authenticate MongoDB to the KMIP
|
||||
server. The specified \fB\&.pem\f1 file must contain both the TLS/SSL
|
||||
certificate and key.
|
||||
.PP
|
||||
Starting in 4.0, on macOS or Windows, you can use a certificate
|
||||
To use this option, you must also specify the
|
||||
\fB\-\-kmipServerName\f1\f1 option.
|
||||
.PP
|
||||
On macOS or Windows, you can use a certificate
|
||||
from the operating system\(aqs secure store instead of a PEM key
|
||||
file. See \fB\-\-kmipClientCertificateSelector\f1\f1\&.
|
||||
.PP
|
||||
|
|
@ -3926,7 +3866,7 @@ Available in MongoDB Enterprise only.
|
|||
Path to CA File. Used for validating secure client connection to
|
||||
KMIP server.
|
||||
.PP
|
||||
Starting in 4.0, on macOS or Windows, you can use a certificate
|
||||
On macOS or Windows, you can use a certificate
|
||||
from the operating system\(aqs secure store instead of a PEM key
|
||||
file. See \fB\-\-kmipClientCertificateSelector\f1\f1\&. When using the secure
|
||||
store, you do not need to, but can, also specify the \fB\-\-kmipServerCAFile\f1\f1\&.
|
||||
|
|
@ -3955,11 +3895,25 @@ using \fB\-\-kmipRotateMasterKey\f1\f1\&.
|
|||
.PP
|
||||
\fIDefault\f1: 900 seconds
|
||||
.PP
|
||||
Frequency in seconds at which mongod polls the KMIP server for active keys.
|
||||
Frequency in seconds at which \fBmongod\f1 polls the KMIP server for
|
||||
active keys.
|
||||
.PP
|
||||
To disable disable polling, set the value to \fB\-1\f1\&.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongod \-\-kmipUseLegacyProtocol\f1
|
||||
.RS
|
||||
.PP
|
||||
\fIDefault\f1: false
|
||||
.PP
|
||||
When \fBtrue\f1, \fBmongod\f1 uses KMIP protocol version 1.0 or 1.1 instead
|
||||
of the default version. The default KMIP protocol is version 1.2.
|
||||
.PP
|
||||
To use \fBaudit log encryption\f1
|
||||
with KMIP version 1.0 or 1.1, you must specify
|
||||
\fBauditEncryptKeyWithKMIPGet\f1\f1 at startup.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongod \-\-eseDatabaseKeyRollover\f1
|
||||
.RS
|
||||
.PP
|
||||
|
|
|
|||
File diff suppressed because it is too large
Load Diff
|
|
@ -3,7 +3,7 @@
|
|||
\fIMongoDB Enterprise\f1
|
||||
.SH SYNOPSIS
|
||||
.PP
|
||||
Starting in version 3.4, MongoDB Enterprise provides
|
||||
MongoDB Enterprise provides
|
||||
\fBmongoldap\f1\f1 for testing MongoDB\(aqs LDAP \fBconfiguration
|
||||
options\f1 against a running LDAP server or set
|
||||
of servers.
|
||||
|
|
@ -240,9 +240,6 @@ servers, specify \fIone\f1 LDAP server or any of its replicated instances to
|
|||
4.1.10 (https://www.rfc\-editor.org/rfc/rfc4511.txt)\&. Do not use \fB\-\-ldapServers\f1\f1
|
||||
for listing every LDAP server in your infrastructure.
|
||||
.PP
|
||||
This setting can be configured on a running \fBmongoldap\f1\f1 using
|
||||
\fBsetParameter\f1\f1\&.
|
||||
.PP
|
||||
If unset, \fBmongoldap\f1\f1 cannot use \fBLDAP authentication or authorization\f1\&.
|
||||
.RE
|
||||
.PP
|
||||
|
|
@ -268,9 +265,6 @@ You must use \fB\-\-ldapQueryUser\f1\f1 with \fB\-\-ldapQueryPassword\f1\f1\&.
|
|||
.PP
|
||||
If unset, \fBmongoldap\f1\f1 will not attempt to bind to the LDAP server.
|
||||
.PP
|
||||
This setting can be configured on a running \fBmongoldap\f1\f1 using
|
||||
\fBsetParameter\f1\f1\&.
|
||||
.PP
|
||||
Windows MongoDB deployments can use \fB\-\-ldapBindWithOSDefaults\f1\f1
|
||||
instead of \fB\-\-ldapQueryUser\f1\f1 and \fB\-\-ldapQueryPassword\f1\f1\&. You cannot specify
|
||||
both \fB\-\-ldapQueryUser\f1\f1 and \fB\-\-ldapBindWithOSDefaults\f1\f1 at the same time.
|
||||
|
|
@ -480,9 +474,6 @@ Increasing the value of \fB\-\-ldapTimeoutMS\f1\f1 may prevent connection failur
|
|||
MongoDB server and the LDAP server, if the source of the failure is a
|
||||
connection timeout. Decreasing the value of \fB\-\-ldapTimeoutMS\f1\f1 reduces the time
|
||||
MongoDB waits for a response from the LDAP server.
|
||||
.PP
|
||||
This setting can be configured on a running \fBmongoldap\f1\f1 using
|
||||
\fBsetParameter\f1\f1\&.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongoldap \-\-ldapUserToDNMapping\f1
|
||||
|
|
@ -577,7 +568,7 @@ dc=com??one?(user={0})"\f1
|
|||
.RE
|
||||
.PP
|
||||
An explanation of RFC4514 (https://www.ietf.org/rfc/rfc4514.txt),
|
||||
RFC4515 (https://tools.ietf.org/search/rfc4515),
|
||||
RFC4515 (https://tools.ietf.org/html/rfc4515),
|
||||
RFC4516 (https://tools.ietf.org/html/rfc4516), or LDAP queries is out
|
||||
of scope for the MongoDB Documentation. Please review the RFC directly or
|
||||
use your preferred LDAP resource.
|
||||
|
|
@ -646,9 +637,6 @@ query against the LDAP server, returning the result
|
|||
.PP
|
||||
If \fB\-\-ldapUserToDNMapping\f1\f1 is unset, \fBmongoldap\f1\f1 applies no transformations to the username
|
||||
when attempting to authenticate or authorize a user against the LDAP server.
|
||||
.PP
|
||||
This setting can be configured on a running \fBmongoldap\f1\f1 using the
|
||||
\fBsetParameter\f1\f1 database command.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongoldap \-\-ldapAuthzQueryTemplate\f1
|
||||
|
|
@ -656,7 +644,7 @@ This setting can be configured on a running \fBmongoldap\f1\f1 using the
|
|||
.PP
|
||||
\fIAvailable in MongoDB Enterprise only.\f1
|
||||
.PP
|
||||
A relative LDAP query URL formatted conforming to RFC4515 (https://tools.ietf.org/search/rfc4515) and RFC4516 (https://tools.ietf.org/html/rfc4516) that \fBmongoldap\f1\f1 executes to obtain
|
||||
A relative LDAP query URL formatted conforming to RFC4515 (https://tools.ietf.org/html/rfc4515) and RFC4516 (https://tools.ietf.org/html/rfc4516) that \fBmongoldap\f1\f1 executes to obtain
|
||||
the LDAP groups to which the authenticated user belongs to. The query is
|
||||
relative to the host or hosts specified in \fB\-\-ldapServers\f1\f1\&.
|
||||
.PP
|
||||
|
|
@ -721,10 +709,7 @@ Configure your query with respect to your own unique LDAP configuration.
|
|||
.PP
|
||||
If unset, \fBmongoldap\f1\f1 cannot authorize users using LDAP.
|
||||
.PP
|
||||
This setting can be configured on a running \fBmongoldap\f1\f1 using the
|
||||
\fBsetParameter\f1\f1 database command.
|
||||
.PP
|
||||
An explanation of RFC4515 (https://tools.ietf.org/search/rfc4515),
|
||||
An explanation of RFC4515 (https://tools.ietf.org/html/rfc4515),
|
||||
RFC4516 (https://tools.ietf.org/html/rfc4516) or LDAP queries is out
|
||||
of scope for the MongoDB Documentation. Please review the RFC directly or
|
||||
use your preferred LDAP resource.
|
||||
|
|
|
|||
|
|
@ -16,18 +16,17 @@ Starting in version 4.4, \fBmongos\f1\f1
|
|||
can support \fBhedged reads\f1 to minimize
|
||||
latencies.
|
||||
.IP \(bu 2
|
||||
Starting in version 4.0, MongoDB disables support for TLS 1.0
|
||||
MongoDB disables support for TLS 1.0
|
||||
encryption on systems where TLS 1.1+ is available. For
|
||||
more details, see \fBDisable TLS 1.0\f1\&.
|
||||
.IP \(bu 2
|
||||
The \fBmongos\f1\f1 binary will crash when attempting to connect
|
||||
to \fBmongod\f1\f1 instances whose
|
||||
\fBfeature compatibility version (fCV)\f1 is greater than
|
||||
that of the \fBmongos\f1\f1\&. For example, you cannot connect
|
||||
a MongoDB 4.0 version \fBmongos\f1\f1 to a 4.2
|
||||
sharded cluster with \fBfCV\f1 set to 4.2\&. You
|
||||
can, however, connect a MongoDB 4.0 version
|
||||
\fBmongos\f1\f1 to a 4.2 sharded cluster with \fBfCV\f1 set to 4.0\&.
|
||||
The \fBmongos\f1\f1 binary cannot connect to \fBmongod\f1\f1
|
||||
instances whose \fBfeature compatibility version (fCV)\f1 is greater
|
||||
than that of the \fBmongos\f1\f1\&. For example, you cannot connect
|
||||
a MongoDB 5.0 version \fBmongos\f1\f1 to a 6.0
|
||||
sharded cluster with \fBfCV\f1 set to 6.0\&. You
|
||||
can, however, connect a MongoDB 5.0 version
|
||||
\fBmongos\f1\f1 to a 6.0 sharded cluster with \fBfCV\f1 set to 5.0\&.
|
||||
.RE
|
||||
.SH OPTIONS
|
||||
.PP
|
||||
|
|
@ -38,8 +37,7 @@ MongoDB deprecates the SSL options and instead adds new
|
|||
corresponding TLS options.
|
||||
.IP \(bu 2
|
||||
MongoDB adds
|
||||
\fB\-\-tlsClusterCAFile\f1\f1/\fBnet.tls.clusterCAFile\f1\f1\&. (Also available
|
||||
in 3.4.18+, 3.6.9+, 4.0.3+)
|
||||
\fB\-\-tlsClusterCAFile\f1\f1/\fBnet.tls.clusterCAFile\f1\f1\&.
|
||||
.RE
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
|
|
@ -169,9 +167,6 @@ client connections.
|
|||
.PP
|
||||
\fIDefault\f1: localhost
|
||||
.PP
|
||||
Starting in MongoDB 3.6, \fBmongos\f1\f1 bind to localhost
|
||||
by default. See \fBDefault Bind to Localhost\f1\&.
|
||||
.PP
|
||||
The hostnames and/or IP addresses and/or full Unix domain socket
|
||||
paths on which \fBmongos\f1\f1 should listen for client connections. You
|
||||
may attach \fBmongos\f1\f1 to any interface. To bind to multiple
|
||||
|
|
@ -201,12 +196,12 @@ split network horizon. Starting in MongoDB 5.0, nodes that are only
|
|||
configured with an IP address will fail startup validation and will
|
||||
not start.
|
||||
.PP
|
||||
Before binding to a non\-localhost (e.g. publicly accessible)
|
||||
IP address, ensure you have secured your cluster from unauthorized
|
||||
access. For a complete list of security recommendations, see
|
||||
Before you bind your instance to a publicly\-accessible IP address,
|
||||
you must secure your cluster from unauthorized access. For a complete
|
||||
list of security recommendations, see
|
||||
\fBSecurity Checklist\f1\&. At minimum, consider
|
||||
\fBenabling authentication\f1 and
|
||||
\fBhardening network infrastructure\f1\&.
|
||||
\fBenabling authentication\f1 and \fBhardening
|
||||
network infrastructure\f1\&.
|
||||
.PP
|
||||
For more information about IP Binding, refer to the
|
||||
\fBIP Binding\f1 documentation.
|
||||
|
|
@ -239,12 +234,12 @@ addresses (i.e. \fB0.0.0.0\f1). If \fBmongos\f1\f1 starts with
|
|||
\fBmongos\f1\f1 only supports IPv6 if started with \fB\-\-ipv6\f1\f1\&. Specifying
|
||||
\fB\-\-bind_ip_all\f1\f1 alone does not enable IPv6 support.
|
||||
.PP
|
||||
Before binding to a non\-localhost (e.g. publicly accessible)
|
||||
IP address, ensure you have secured your cluster from unauthorized
|
||||
access. For a complete list of security recommendations, see
|
||||
Before you bind your instance to a publicly\-accessible IP address,
|
||||
you must secure your cluster from unauthorized access. For a complete
|
||||
list of security recommendations, see
|
||||
\fBSecurity Checklist\f1\&. At minimum, consider
|
||||
\fBenabling authentication\f1 and
|
||||
\fBhardening network infrastructure\f1\&.
|
||||
\fBenabling authentication\f1 and \fBhardening
|
||||
network infrastructure\f1\&.
|
||||
.PP
|
||||
For more information about IP Binding, refer to the
|
||||
\fBIP Binding\f1 documentation.
|
||||
|
|
@ -257,6 +252,47 @@ asterisk in quotes to avoid filename pattern expansion).
|
|||
is, you can specify one or the other, but not both.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongos \-\-listenBacklog\f1
|
||||
.RS
|
||||
.PP
|
||||
\fIDefault\f1: Target system \fBSOMAXCONN\f1 constant
|
||||
.PP
|
||||
The maximum number of connections that can exist in the listen
|
||||
queue.
|
||||
.PP
|
||||
Consult your local system\(aqs documentation to understand the
|
||||
limitations and configuration requirements before using this
|
||||
parameter.
|
||||
.PP
|
||||
To prevent undefined behavior, specify a value for this
|
||||
parameter between \fB1\f1 and the local system \fBSOMAXCONN\f1
|
||||
constant.
|
||||
.PP
|
||||
The default value for the \fBlistenBacklog\f1 parameter is set at
|
||||
compile time to the target system \fBSOMAXCONN\f1 constant.
|
||||
\fBSOMAXCONN\f1 is the maximum valid value that is documented for
|
||||
the \fIbacklog\f1 parameter to the \fIlisten\f1 system call.
|
||||
.PP
|
||||
Some systems may interpret \fBSOMAXCONN\f1 symbolically, and others
|
||||
numerically. The actual \fIlisten backlog\f1 applied in practice may
|
||||
differ from any numeric interpretation of the \fBSOMAXCONN\f1 constant
|
||||
or argument to \fB\-\-listenBacklog\f1, and may also be constrained by
|
||||
system settings like \fBnet.core.somaxconn\f1 on Linux.
|
||||
.PP
|
||||
Passing a value for the \fBlistenBacklog\f1 parameter that exceeds the
|
||||
\fBSOMAXCONN\f1 constant for the local system is, by the letter of the
|
||||
standards, undefined behavior. Higher values may be silently integer
|
||||
truncated, may be ignored, may cause unexpected resource
|
||||
consumption, or have other adverse consequences.
|
||||
.PP
|
||||
On systems with workloads that exhibit connection spikes, for which
|
||||
it is empirically known that the local system can honor higher
|
||||
values for the \fIbacklog\f1 parameter than the \fBSOMAXCONN\f1 constant,
|
||||
setting the \fBlistenBacklog\f1 parameter to a higher value may reduce
|
||||
operation latency as observed by the client by reducing the number
|
||||
of connections which are forced into a backoff state.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongos \-\-maxConns\f1
|
||||
.RS
|
||||
.PP
|
||||
|
|
@ -443,7 +479,7 @@ systems. For more information, please see the respective
|
|||
On macOS, PID file management is generally handled by \fBbrew\f1\&. Only use
|
||||
the \fB\-\-pidfilepath\f1\f1 option if you are not using \fBbrew\f1 on your macOS system.
|
||||
For more information, please see the respective
|
||||
\fBInstallation Guide\f1 for your operating system.
|
||||
Installation Guide for your operating system.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongos \-\-keyFile\f1
|
||||
|
|
@ -457,14 +493,12 @@ information.
|
|||
.PP
|
||||
Starting in MongoDB 4.2, \fBkeyfiles for internal membership
|
||||
authentication\f1 use YAML format to allow for
|
||||
multiple keys in a keyfile. The YAML format accepts content of:
|
||||
multiple keys in a keyfile. The YAML format accepts either:
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
a single key string (same as in earlier versions),
|
||||
A single key string (same as in earlier versions)
|
||||
.IP \(bu 2
|
||||
multiple key strings (each string must be enclosed in quotes), or
|
||||
.IP \(bu 2
|
||||
sequence of key strings.
|
||||
A sequence of key strings
|
||||
.RE
|
||||
.PP
|
||||
The YAML format is compatible with the existing single\-key
|
||||
|
|
@ -614,18 +648,13 @@ MongoDB supports the following compressors:
|
|||
.IP \(bu 2
|
||||
\fBsnappy\f1
|
||||
.IP \(bu 2
|
||||
\fBzlib\f1 (Available starting in MongoDB 3.6)
|
||||
\fBzlib\f1
|
||||
.IP \(bu 2
|
||||
\fBzstd\f1 (Available starting in MongoDB 4.2)
|
||||
\fBzstd\f1
|
||||
.RE
|
||||
.PP
|
||||
\fBIn versions 3.6 and 4.0\f1, \fBmongod\f1\f1 and
|
||||
\fBmongos\f1\f1 enable network compression by default with
|
||||
\fBsnappy\f1 as the compressor.
|
||||
.PP
|
||||
\fBStarting in version 4.2\f1, \fBmongod\f1\f1 and
|
||||
\fBmongos\f1\f1 instances default to both \fBsnappy,zstd,zlib\f1
|
||||
compressors, in that order.
|
||||
Both \fBmongod\f1\f1 and \fBmongos\f1\f1 instances
|
||||
default to \fBsnappy,zstd,zlib\f1 compressors, in that order.
|
||||
.PP
|
||||
To disable network compression, set the value to \fBdisabled\f1\&.
|
||||
.PP
|
||||
|
|
@ -675,7 +704,7 @@ could create inaccurate time zone conversions in older versions of
|
|||
MongoDB.
|
||||
.PP
|
||||
To explicitly link to the time zone database in versions of MongoDB
|
||||
prior to 5.0, 4.4.7, 4.2.14, and 4.0.25, download the time zone
|
||||
prior to 5.0, 4.4.7, and 4.2.14, download the time zone
|
||||
database (https://downloads.mongodb.org/olson_tz_db/timezonedb\-latest.zip)\&.
|
||||
and use the \fBtimeZoneInfo\f1\f1 parameter.
|
||||
.RE
|
||||
|
|
@ -707,10 +736,9 @@ For usage examples, see:
|
|||
Specifies the \fBconfiguration servers\f1 for the
|
||||
\fBsharded cluster\f1\&.
|
||||
.PP
|
||||
Starting in MongoDB 3.2, config servers for sharded clusters can be
|
||||
Config servers for sharded clusters are
|
||||
deployed as a \fBreplica set\f1\&. The
|
||||
replica set config servers must run the \fBWiredTiger storage engine\f1\&. MongoDB 3.2 deprecates the use of three mirrored
|
||||
\fBmongod\f1\f1 instances for config servers.
|
||||
replica set config servers must run the \fBWiredTiger storage engine\f1\&.
|
||||
.PP
|
||||
Specify the config server replica set name and the hostname and port of
|
||||
at least one of the members of the config server replica set.
|
||||
|
|
@ -826,7 +854,7 @@ For more information about TLS and MongoDB, see
|
|||
\fBmongos \-\-tlsCertificateKeyFile\f1
|
||||
.RS
|
||||
.PP
|
||||
Starting in 4.0, on macOS or Windows, you can use a certificate from
|
||||
On macOS or Windows, you can use a certificate from
|
||||
the operating system\(aqs secure store instead of specifying a PEM file. See
|
||||
\fB\-\-tlsCertificateSelector\f1\f1\&.
|
||||
.PP
|
||||
|
|
@ -848,12 +876,10 @@ For more information about TLS and MongoDB, see
|
|||
\fBmongos \-\-tlsCertificateKeyFilePassword\f1
|
||||
.RS
|
||||
.PP
|
||||
Specifies the password to de\-crypt the certificate\-key file (i.e.
|
||||
Specifies the password to decrypt the certificate\-key file (i.e.
|
||||
\fB\-\-tlsCertificateKeyFile\f1\f1). Use the \fB\-\-tlsCertificateKeyFilePassword\f1\f1 option only if the
|
||||
certificate\-key file is encrypted. In all cases, the \fBmongos\f1\f1 will
|
||||
redact the password from all logging and reporting output.
|
||||
.PP
|
||||
Starting in MongoDB 4.0:
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
On Linux/BSD, if the private key in the PEM file is encrypted and
|
||||
|
|
@ -940,7 +966,7 @@ For more information about TLS and MongoDB, see
|
|||
\fBmongos \-\-tlsClusterFile\f1
|
||||
.RS
|
||||
.PP
|
||||
Starting in 4.0, on macOS or Windows, you can use a certificate
|
||||
On macOS or Windows, you can use a certificate
|
||||
from the operating system\(aqs secure store instead of a PEM
|
||||
file. See \fB\-\-tlsClusterCertificateSelector\f1\f1\&.
|
||||
.PP
|
||||
|
|
@ -971,12 +997,10 @@ For more information about TLS and MongoDB, see
|
|||
\fBmongos \-\-tlsClusterPassword\f1
|
||||
.RS
|
||||
.PP
|
||||
Specifies the password to de\-crypt the x.509 certificate\-key file
|
||||
Specifies the password to decrypt the x.509 certificate\-key file
|
||||
specified with \fB\-\-tlsClusterFile\f1\&. Use the \fB\-\-tlsClusterPassword\f1\f1 option only
|
||||
if the certificate\-key file is encrypted. In all cases, the \fBmongos\f1\f1
|
||||
will redact the password from all logging and reporting output.
|
||||
.PP
|
||||
Starting in MongoDB 4.0:
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
On Linux/BSD, if the private key in the x.509 file is encrypted and
|
||||
|
|
@ -1002,7 +1026,7 @@ Specifies the \&.pem file that contains the root certificate chain
|
|||
from the Certificate Authority. Specify the file name of the
|
||||
\&.pem file using relative or absolute paths.
|
||||
.PP
|
||||
Starting in 4.0, on macOS or Windows, you can use a certificate from
|
||||
On macOS or Windows, you can use a certificate from
|
||||
the operating system\(aqs secure store instead of a PEM key file. See
|
||||
\fB\-\-tlsCertificateSelector\f1\f1\&. When using the secure store, you
|
||||
do not need to, but can, also specify the \fB\-\-tlsCAFile\f1\f1\&.
|
||||
|
|
@ -1027,7 +1051,7 @@ the \&.pem file specified in the \fB\-\-tlsCAFile\f1\f1 option.
|
|||
\fB\-\-tlsClusterCAFile\f1\f1 lets you use separate Certificate Authorities to verify the
|
||||
client to server and server to client portions of the TLS handshake.
|
||||
.PP
|
||||
Starting in 4.0, on macOS or Windows, you can use a certificate from
|
||||
On macOS or Windows, you can use a certificate from
|
||||
the operating system\(aqs secure store instead of a PEM key file. See
|
||||
\fB\-\-tlsClusterCertificateSelector\f1\f1\&. When using the secure store, you
|
||||
do not need to, but can, also specify the \fB\-\-tlsClusterCAFile\f1\f1\&.
|
||||
|
|
@ -1156,18 +1180,15 @@ information.
|
|||
\fBmongos \-\-tlsCRLFile\f1
|
||||
.RS
|
||||
.PP
|
||||
For MongoDB 4.0 and earlier, see \fB\-\-sslCRLFile\f1\f1\&.
|
||||
.PP
|
||||
Specifies the \&.pem file that contains the Certificate Revocation
|
||||
List. Specify the file name of the \&.pem file using relative or
|
||||
absolute paths.
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
Starting in MongoDB 4.0, you cannot specify a CRL file on
|
||||
You cannot specify a CRL file on
|
||||
macOS. Instead, you can use the system SSL certificate store,
|
||||
which uses OCSP (Online Certificate Status Protocol) to
|
||||
validate the revocation status of certificates. See
|
||||
\fB\-\-sslCertificateSelector\f1\f1 in MongoDB 4.0 and
|
||||
\fB\-\-tlsCertificateSelector\f1\f1 in MongoDB 4.2+ to use the
|
||||
system SSL certificate store.
|
||||
.IP \(bu 2
|
||||
|
|
@ -1186,8 +1207,9 @@ For more information about TLS and MongoDB, see
|
|||
\fBmongos \-\-tlsAllowConnectionsWithoutCertificates\f1
|
||||
.RS
|
||||
.PP
|
||||
For clients that do not present certificates, \fBmongos\f1\f1 bypasses
|
||||
TLS/SSL certificate validation when establishing the connection.
|
||||
For clients that don\(aqt provide certificates, \fBmongod\f1\f1 or
|
||||
\fBmongos\f1\f1 encrypts the TLS/SSL connection, assuming the
|
||||
connection is successfully made.
|
||||
.PP
|
||||
For clients that present a certificate, however, \fBmongos\f1\f1 performs
|
||||
certificate validation using the root certificate chain specified by
|
||||
|
|
@ -1245,7 +1267,7 @@ incoming connections that use a specific protocol or protocols. To
|
|||
specify multiple protocols, use a comma separated list of protocols.
|
||||
.PP
|
||||
\fB\-\-tlsDisabledProtocols\f1\f1 recognizes the following protocols: \fBTLS1_0\f1, \fBTLS1_1\f1,
|
||||
\fBTLS1_2\f1, and starting in version 4.0.4 (and 3.6.9), \fBTLS1_3\f1\&.
|
||||
\fBTLS1_2\f1, and \fBTLS1_3\f1\&.
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
On macOS, you cannot disable \fBTLS1_1\f1 and leave both \fBTLS1_0\f1 and
|
||||
|
|
@ -1262,7 +1284,7 @@ The specified disabled protocols overrides any default disabled
|
|||
protocols.
|
||||
.RE
|
||||
.PP
|
||||
Starting in version 4.0, MongoDB disables the use of TLS 1.0 if TLS
|
||||
MongoDB disables the use of TLS 1.0 if TLS
|
||||
1.1+ is available on the system. To enable the disabled TLS 1.0,
|
||||
specify \fBnone\f1 to \fB\-\-tlsDisabledProtocols\f1\f1\&. See \fBDisable TLS 1.0\f1\&.
|
||||
.PP
|
||||
|
|
@ -1356,7 +1378,7 @@ The server uses and accepts only TLS/SSL encrypted connections.
|
|||
.RE
|
||||
.RE
|
||||
.PP
|
||||
Starting in version 3.4, if \fB\-\-tlsCAFile\f1/\fBnet.tls.CAFile\f1 (or
|
||||
If \fB\-\-tlsCAFile\f1/\fBnet.tls.CAFile\f1 (or
|
||||
their aliases \fB\-\-sslCAFile\f1/\fBnet.ssl.CAFile\f1) is not specified
|
||||
and you are not using x.509 authentication, the system\-wide CA
|
||||
certificate store will be used when connecting to an TLS/SSL\-enabled
|
||||
|
|
@ -1377,7 +1399,7 @@ For more information about TLS/SSL and MongoDB, see
|
|||
Use \fB\-\-tlsPEMKeyFile\f1\f1
|
||||
instead.
|
||||
.PP
|
||||
Starting in 4.0, on macOS or Windows, you can use a certificate from
|
||||
On macOS or Windows, you can use a certificate from
|
||||
the operating system\(aqs secure store instead of a PEM file. See
|
||||
\fB\-\-sslCertificateSelector\f1\f1\&.
|
||||
.PP
|
||||
|
|
@ -1401,12 +1423,10 @@ For more information about TLS/SSL and MongoDB, see
|
|||
.PP
|
||||
Use \fB\-\-tlsPEMKeyPassword\f1\f1 instead.
|
||||
.PP
|
||||
Specifies the password to de\-crypt the certificate\-key file (i.e.
|
||||
Specifies the password to decrypt the certificate\-key file (i.e.
|
||||
\fB\-\-sslPEMKeyFile\f1\f1). Use the \fB\-\-sslPEMKeyPassword\f1\f1 option only if the
|
||||
certificate\-key file is encrypted. In all cases, the \fBmongos\f1\f1 will
|
||||
redact the password from all logging and reporting output.
|
||||
.PP
|
||||
Starting in MongoDB 4.0:
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
On Linux/BSD, if the private key in the PEM file is encrypted and
|
||||
|
|
@ -1430,7 +1450,7 @@ For more information about TLS/SSL and MongoDB, see
|
|||
.PP
|
||||
Use \fB\-\-tlsClusterFile\f1\f1 instead.
|
||||
.PP
|
||||
Starting in 4.0, on macOS or Windows, you can use a certificate
|
||||
On macOS or Windows, you can use a certificate
|
||||
from the operating system\(aqs secure store instead of a PEM key
|
||||
file. See \fB\-\-sslClusterCertificateSelector\f1\f1\&.
|
||||
.PP
|
||||
|
|
@ -1458,12 +1478,10 @@ For more information about TLS/SSL and MongoDB, see
|
|||
.PP
|
||||
Use \fB\-\-tlsClusterPassword\f1\f1 instead.
|
||||
.PP
|
||||
Specifies the password to de\-crypt the x.509 certificate\-key file
|
||||
Specifies the password to decrypt the x.509 certificate\-key file
|
||||
specified with \fB\-\-sslClusterFile\f1\&. Use the \fB\-\-sslClusterPassword\f1\f1 option only
|
||||
if the certificate\-key file is encrypted. In all cases, the \fBmongos\f1\f1
|
||||
will redact the password from all logging and reporting output.
|
||||
.PP
|
||||
Starting in MongoDB 4.0:
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
On Linux/BSD, if the private key in the x.509 file is encrypted and
|
||||
|
|
@ -1491,7 +1509,7 @@ Specifies the \&.pem file that contains the root certificate chain
|
|||
from the Certificate Authority. Specify the file name of the
|
||||
\&.pem file using relative or absolute paths.
|
||||
.PP
|
||||
Starting in 4.0, on macOS or Windows, you can use a certificate from
|
||||
On macOS or Windows, you can use a certificate from
|
||||
the operating system\(aqs secure store instead of a PEM key file. See
|
||||
\fB\-\-sslCertificateSelector\f1\f1\&. When using the secure store, you
|
||||
do not need to, but can, also specify the \fB\-\-sslCAFile\f1\f1\&.
|
||||
|
|
@ -1519,7 +1537,7 @@ the \&.pem file specified in the \fB\-\-sslCAFile\f1\f1 option.
|
|||
\fB\-\-sslClusterCAFile\f1\f1 lets you use separate Certificate Authorities to verify the
|
||||
client to server and server to client portions of the TLS handshake.
|
||||
.PP
|
||||
Starting in 4.0, on macOS or Windows, you can use a certificate from
|
||||
On macOS or Windows, you can use a certificate from
|
||||
the operating system\(aqs secure store instead of a PEM key file. See
|
||||
\fB\-\-sslClusterCertificateSelector\f1\f1\&. When using the secure store, you
|
||||
do not need to, but can, also specify the \fB\-\-sslClusterCAFile\f1\f1\&.
|
||||
|
|
@ -1536,10 +1554,11 @@ For more information about TLS/SSL and MongoDB, see
|
|||
.PP
|
||||
Use \fB\-\-tlsCertificateSelector\f1\f1 instead.
|
||||
.PP
|
||||
Available on Windows and macOS as an alternative to \fB\-\-tlsCertificateKeyFile\f1\f1\&.
|
||||
Available on Windows and macOS as an alternative to
|
||||
\fB\-\-tlsCertificateKeyFile\f1\f1\&.
|
||||
.PP
|
||||
\fB\-\-tlsCertificateKeyFile\f1\f1 and \fB\-\-sslCertificateSelector\f1\f1 options are mutually exclusive. You can only
|
||||
specify one.
|
||||
\fB\-\-tlsCertificateKeyFile\f1\f1 and \fB\-\-sslCertificateSelector\f1\f1
|
||||
options are mutually exclusive. You can only specify one.
|
||||
.PP
|
||||
Specifies a certificate property in order to select a matching
|
||||
certificate from the operating system\(aqs certificate store.
|
||||
|
|
@ -1593,8 +1612,8 @@ Use \fB\-\-tlsClusterCertificateSelector\f1\f1 instead.
|
|||
Available on Windows and macOS as an alternative to
|
||||
\fB\-\-sslClusterFile\f1\f1\&.
|
||||
.PP
|
||||
\fB\-\-sslClusterFile\f1\f1 and \fB\-\-sslClusterCertificateSelector\f1\f1 options are mutually exclusive. You can only
|
||||
specify one.
|
||||
\fB\-\-sslClusterFile\f1\f1 and \fB\-\-sslClusterCertificateSelector\f1\f1
|
||||
options are mutually exclusive. You can only specify one.
|
||||
.PP
|
||||
Specifies a certificate property in order to select a matching
|
||||
certificate from the operating system\(aqs certificate store to use for
|
||||
|
|
@ -1647,11 +1666,10 @@ List. Specify the file name of the \&.pem file using relative or
|
|||
absolute paths.
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
Starting in MongoDB 4.0, you cannot specify a CRL file on
|
||||
You cannot specify a CRL file on
|
||||
macOS. Instead, you can use the system SSL certificate store,
|
||||
which uses OCSP (Online Certificate Status Protocol) to
|
||||
validate the revocation status of certificates. See
|
||||
\fB\-\-sslCertificateSelector\f1\f1 in MongoDB 4.0 and
|
||||
\fB\-\-tlsCertificateSelector\f1\f1 in MongoDB 4.2+ to use the
|
||||
system SSL certificate store.
|
||||
.IP \(bu 2
|
||||
|
|
@ -1672,8 +1690,9 @@ For more information about TLS/SSL and MongoDB, see
|
|||
.PP
|
||||
Use \fB\-\-tlsAllowConnectionsWithoutCertificates\f1\f1 instead.
|
||||
.PP
|
||||
For clients that do not present certificates, \fBmongos\f1\f1 bypasses
|
||||
TLS/SSL certificate validation when establishing the connection.
|
||||
For clients that don\(aqt provide certificates, \fBmongod\f1\f1 or
|
||||
\fBmongos\f1\f1 encrypts the TLS/SSL connection, assuming the
|
||||
connection is successfully made.
|
||||
.PP
|
||||
For clients that present a certificate, however, \fBmongos\f1\f1 performs
|
||||
certificate validation using the root certificate chain specified by
|
||||
|
|
@ -1696,12 +1715,16 @@ Bypasses the validation checks for TLS/SSL certificates on other
|
|||
servers in the cluster and allows the use of invalid certificates to
|
||||
connect.
|
||||
.PP
|
||||
Starting in MongoDB 4.2, if you specify
|
||||
\fB\-\-tlsAllowInvalidateCertificates\f1 or
|
||||
\fBnet.tls.allowInvalidCertificates: true\f1 when using x.509
|
||||
authentication, an invalid certificate is only sufficient to
|
||||
establish a TLS connection but it is \fIinsufficient\f1 for
|
||||
authentication.
|
||||
Starting in MongoDB 4.0, if you specify any of the following x.509
|
||||
authentication options, an invalid certificate is
|
||||
sufficient only to establish a TLS connection but it is
|
||||
\fIinsufficient\f1 for authentication:
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
\fB\-\-sslAllowInvalidCertificates\f1 or \fBnet.ssl.allowInvalidCertificates: true\f1 for MongoDB 4.0 and later
|
||||
.IP \(bu 2
|
||||
\fB\-\-tlsAllowInvalidCertificates\f1 or \fBnet.tls.allowInvalidCertificates: true\f1 for MongoDB 4.2 and later
|
||||
.RE
|
||||
.PP
|
||||
When using
|
||||
the \fB\-\-sslAllowInvalidCertificates\f1\f1 setting, MongoDB
|
||||
|
|
@ -1738,7 +1761,7 @@ incoming connections that use a specific protocol or protocols. To
|
|||
specify multiple protocols, use a comma separated list of protocols.
|
||||
.PP
|
||||
\fB\-\-sslDisabledProtocols\f1\f1 recognizes the following protocols: \fBTLS1_0\f1, \fBTLS1_1\f1,
|
||||
\fBTLS1_2\f1, and starting in version 4.0.4 (and 3.6.9), \fBTLS1_3\f1\&.
|
||||
\fBTLS1_2\f1, and \fBTLS1_3\f1\&.
|
||||
.RS
|
||||
.IP \(bu 2
|
||||
On macOS, you cannot disable \fBTLS1_1\f1 and leave both \fBTLS1_0\f1 and
|
||||
|
|
@ -1755,7 +1778,7 @@ The specified disabled protocols overrides any default disabled
|
|||
protocols.
|
||||
.RE
|
||||
.PP
|
||||
Starting in version 4.0, MongoDB disables the use of TLS 1.0 if TLS
|
||||
MongoDB disables the use of TLS 1.0 if TLS
|
||||
1.1+ is available on the system. To enable the disabled TLS 1.0,
|
||||
specify \fBnone\f1 to \fB\-\-sslDisabledProtocols\f1\f1\&. See \fBDisable TLS 1.0\f1\&.
|
||||
.PP
|
||||
|
|
@ -1941,9 +1964,10 @@ requirements.
|
|||
\fBmongos \-\-auditPath\f1
|
||||
.RS
|
||||
.PP
|
||||
Specifies the output file for \fBauditing\f1 if
|
||||
\fB\-\-auditDestination\f1\f1 has value of \fBfile\f1\&. The \fB\-\-auditPath\f1\f1
|
||||
option can take either a full path name or a relative path name.
|
||||
Specifies the output file for auditing if
|
||||
\fB\-\-auditDestination\f1\f1 has value of \fBfile\f1\&. The
|
||||
\fB\-\-auditPath\f1\f1 option can take either a full path name or a
|
||||
relative path name.
|
||||
.PP
|
||||
Available only in MongoDB Enterprise (http://www.mongodb.com/products/mongodb\-enterprise\-advanced?tck=docs_server)
|
||||
and MongoDB Atlas (https://cloud.mongodb.com/user#/atlas/login)\&.
|
||||
|
|
@ -2269,6 +2293,17 @@ This setting can be configured on a running \fBmongos\f1\f1 using
|
|||
\fBsetParameter\f1\f1\&.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongos \-\-ldapRetryCount\f1
|
||||
.RS
|
||||
.PP
|
||||
\fIDefault\f1: 0
|
||||
.PP
|
||||
\fIAvailable in MongoDB Enterprise only.\f1
|
||||
.PP
|
||||
Number of operation retries by the server LDAP manager after a
|
||||
network error.
|
||||
.RE
|
||||
.PP
|
||||
\fBmongos \-\-ldapUserToDNMapping\f1
|
||||
.RS
|
||||
.PP
|
||||
|
|
@ -2361,7 +2396,7 @@ dc=com??one?(user={0})"\f1
|
|||
.RE
|
||||
.PP
|
||||
An explanation of RFC4514 (https://www.ietf.org/rfc/rfc4514.txt),
|
||||
RFC4515 (https://tools.ietf.org/search/rfc4515),
|
||||
RFC4515 (https://tools.ietf.org/html/rfc4515),
|
||||
RFC4516 (https://tools.ietf.org/html/rfc4516), or LDAP queries is out
|
||||
of scope for the MongoDB Documentation. Please review the RFC directly or
|
||||
use your preferred LDAP resource.
|
||||
|
|
|
|||
Loading…
Reference in New Issue