The service adopts a triple node hot standby architecture, with active nodes switches access to the standby node in seconds when active node becomes unavailable, no manual operation is required.
The size of storage space can be expanded at any time in response to data growth. When storage capacity becomes insufficient, it can be expanded with one click in the console. The user does not have to focus on underlying implementation, enabling convenient and fast scaling.
Multi-dimensional performance monitoring combined with alert features provide users with peace of mind.
Running on a private network with the user networks isolated from each other. Featuring IP whitelist access control, where only IPs from the whitelist can access the database instance; the platform has passed many authoritative security level certification such as Security level 3.
Support various memory specifications, and instance memory specifications can be upgraded according to the actual business scale.
Database data can be backed up at any time, and backup data can be automatically uploaded to object storage.
Users may restore a new database instance using backup files.
Provide a full range of monitoring data and indicators, users may view monitoring data recorded in the last 6 months, and display it in a chart to demonstrate the dynamic performance of the instance anytime, anywhere.
Triple node replica set architecture, with three data nodes located on different physical servers, automatically synchronizes data. If the primary node is not available, the system will automatically switch to a standby node to continue to provide services.
Cluster architecture, shard server adopts triple node replica set architecture, which is known to be reliable and stable. The system can flexibly configure the number of proxy service (mongos), and dynamically expand the storage space and read-write performance of the database system.
Data persistence mechanism provides high-speed read and write capability for data persistence.
IP whitelist access control: only Ips from the whitelist can access the database instance.
Running on private network to ensure higher levels of data security.
Access link SSL encryption, DDoS cloud mitigation and other security capabilities combined with the capabilities of the Wangsu platform.