Synopsis
MongoDB provides a number of configuration options that you can set using:
the
setParametercommand:db.adminCommand( { setParameter: 1, <parameter>: <value> } ) the
setParameterconfiguration setting:setParameter: <parameter1>: <value1> ... the
--setParametercommand-line option formongodandmongos:mongod --setParameter <parameter>=<value> mongos --setParameter <parameter>=<value>
For additional configuration options, see
Configuration File Options, mongod and
mongos.
Parameters
Authentication Parameters
authenticationMechanismsAvailable for both
mongodandmongos.Specifies the list of authentication mechanisms the server accepts. Set this to one or more of the following values. If you specify multiple values, use a comma-separated list and no spaces. For descriptions of the authentication mechanisms, see Authentication.
ValueDescriptionRFC 5802 standard Salted Challenge Response Authentication Mechanism using the SHA-1 hash function.
RFC 7677 standard Salted Challenge Response Authentication Mechanism using the SHA-256 hash function.
MongoDB TLS/SSL certificate authentication.
GSSAPI (Kerberos)
External authentication using Kerberos. This mechanism is available only in MongoDB Enterprise.
PLAIN (LDAP SASL)
External authentication using LDAP. You can also use
PLAINfor authenticating in-database users.PLAINtransmits passwords in plain text. This mechanism is available only in MongoDB Enterprise.You can only set
authenticationMechanismsduring start-up.For example, to specify both
PLAINandSCRAM-SHA-256as the authentication mechanisms, use the following command:mongod --setParameter authenticationMechanisms=PLAIN,SCRAM-SHA-256 --auth
awsSTSRetryCountChanged in version 7.0: (Also starting in 6.0.7, 5.0.18, 4.4.22)
In previous versions, AWS IAM authentication retried only when the server returned an HTTP 500 error.
Available for both
mongodandmongos.Type: integer
Default: 2
For MongoDB deployments using AWS IAM credentials or AWS IAM environment variables.
Maximim number of AWS IAM authentication retries after a connection failure.
The following example sets
awsSTSRetryCountto15retries:mongod --setParameter awsSTSRetryCount=15 Alternatively, the following examples uses the
setParametercommand withinmongoshell:db.adminCommand( { setParameter: 1, awsSTSRetryCount: 15 } )
clusterAuthModeAvailable for both
mongodandmongos.Set the
clusterAuthModeto eithersendX509orx509. Useful during rolling upgrade to use x509 for membership authentication to minimize downtime.For more information about TLS/SSL and MongoDB, see Configure
mongodandmongosfor TLS/SSL and TLS/SSL Configuration for Clients .db.adminCommand( { setParameter: 1, clusterAuthMode: "sendX509" } )
enableLocalhostAuthBypassAvailable for both
mongodandmongos.Specify
0orfalseto disable localhost authentication bypass. Enabled by default.enableLocalhostAuthBypassis not available usingsetParameterdatabase command. Use thesetParameteroption in the configuration file or the--setParameteroption on the command line.See Localhost Exception for more information.
KeysRotationIntervalSecNew in version 3.6.
Default: 7776000 seconds (90 days)
Specifies the number of seconds for which an HMAC signing key is valid before rotating to the next one. This parameter is intended primarily to facilitate authentication testing.
You can only set
KeysRotationIntervalSecduring start-up, and cannot change this setting with thesetParameterdatabase command.
ldapForceMultiThreadModeNew in version 4.2.
Default: false
Enables the performance of concurrent LDAP operations.
Note
Only if you are certain that your instance of
libldapis safe to use in this mode, enable this flag. You may experience crashes of the MongoDB process if thelibldapversion you are using is not thread safe.You must use
ldapForceMultiThreadModeto use LDAP connection pool. To enable LDAP connection pool, setldapForceMultiThreadModeandldapUseConnectionPooltotrue.Tip
If you have any concerns regarding your MongoDB version, OS version or libldap version, please contact MongoDB Support.
ldapQueryPasswordNew in version 4.4.
Available for both
mongodandmongos.Type: string
The password used to bind to an LDAP server. You must use
ldapQueryUserwith this parameter.If not set, mongod or mongos does not attempt to bind to the LDAP server.
ldapQueryUserNew in version 4.4.
Available for both
mongodandmongos.Type: string
The user that binds to an LDAP server. You must use
ldapQueryPasswordwith this parameter.If not set, mongod or mongos does not attempt to bind to the LDAP server.
ldapRetryCountNew in version 6.1.
Available for both
mongodandmongos.Type: integer
Default: 0
For MongoDB deployments using LDAP Authorization.
Number of operation retries by the server LDAP manager after a network error.
For example, the following sets
ldapRetryCountto3seconds:mongod --ldapRetryCount=3 Or, if using the
setParametercommand withinmongo:db.adminCommand( { setParameter: 1, ldapRetryCount: 3 } )
ldapUserCacheInvalidationIntervalFor use with MongoDB deployments using LDAP Authorization. Available for
mongodinstances only.The interval (in seconds) that the
mongodinstance waits between external user cache flushes. After MongoDB flushes the external user cache, MongoDB reacquires authorization data from the LDAP server the next time an LDAP-authorized user issues an operation.Increasing the value specified increases the amount of time MongoDB and the LDAP server can be out of sync, but reduces the load on the LDAP server. Conversely, decreasing the value specified decreases the time MongoDB and the LDAP server can be out of sync while increasing the load on the LDAP server.
Defaults to 30 seconds.
ldapUseConnectionPoolSpecifies whether MongoDB should use connection pooling when connecting to the LDAP server for authentication/authorization.
MongoDB uses the following default values:
true on Windows.
true on Linux where MongoDB Enterprise binaries are linked against
libldap_r.false on Linux where MongoDB Enterprise binaries are linked against
libldap.
You can only set
ldapUseConnectionPoolduring start-up, and cannot change this setting with thesetParameterdatabase command.
ldapConnectionPoolUseLatencyForHostPriorityNew in version 4.2.1.
Default: true
A boolean that determines whether the LDAP connection pool (see
ldapUseConnectionPool) should use latency of the LDAP servers to determine the connection order (from lowest latency to highest).You can only set
ldapConnectionPoolUseLatencyForHostPriorityduring start-up, and cannot change this setting during runtime with thesetParameterdatabase command.
ldapConnectionPoolMinimumConnectionsPerHostNew in version 4.2.1.
Default: 1
The minimum number of connections to keep open to each LDAP server.
You can only set
ldapConnectionPoolMinimumConnectionsPerHostduring start-up, and cannot change this setting during runtime with thesetParameterdatabase command.
ldapConnectionPoolMaximumConnectionsPerHostNew in version 4.2.1.
Changed starting in MongoDB version 4.4.15 Changed default value to
2147483647. In previous versions, the default is unset.Default: 2147483647
The maximum number of connections to keep open to each LDAP server.
You can only set
ldapConnectionPoolMaximumConnectionsPerHostduring start-up, and cannot change this setting during runtime with thesetParameterdatabase command.
ldapConnectionPoolMaximumConnectionsInProgressPerHostNew in version 4.2.1.
Changed starting in MongoDB version 4.4.15 Changed default value to
2. In previous versions, the default is unset.Default: 2
The maximum number of in-progress connect operations to each LDAP server.
You can only set
ldapConnectionPoolMaximumConnectionsInProgressPerHostduring start-up, and cannot change this setting with thesetParameterdatabase command.
ldapConnectionPoolHostRefreshIntervalMillisNew in version 4.2.1.
Default: 60000
The number of milliseconds in-between health checks of the pooled LDAP connections.
You can only set
ldapConnectionPoolHostRefreshIntervalMillisduring start-up, and cannot change this setting with thesetParameterdatabase command.
ldapConnectionPoolIdleHostTimeoutSecsNew in version 4.2.1.
Default: 300
The maximum number of seconds that the pooled connections to an LDAP server can remain idle before being closed.
You can only set
ldapConnectionPoolIdleHostTimeoutSecsduring start-up, and cannot change this setting with thesetParameterdatabase command.
maxValidateMemoryUsageMBNew in version 4.4.7.
Default: 200
The maximum memory usage limit in megabytes for the
validatecommand. If the limit is exceeded,validatereturns as many results as possible and warns that not all corruption might be reported because of the limit.You can set
maxValidateMemoryUsageMBduring startup, and can change this setting using thesetParameterdatabase command.
ocspEnabledNew in version 4.4: Available on Linux and macOS.
Default: true
The flag that enables or disables OCSP.
You can only set
ocspEnabledduring startup in theconfiguration fileor with the--setParameteroption on the command line. For example, the following disables OCSP:mongod --setParameter ocspEnabled=false ...
ocspStaplingRefreshPeriodSecsNew in version 4.4: Available on Linux.
The number of seconds to wait before refreshing the stapled OCSP status response. Specify a number greater than or equal to 1.
You can only set
ocspStaplingRefreshPeriodSecsduring startup in theconfiguration fileor with the--setParameteroption on the command line. For example, the following sets the parameter to 3600 seconds:mongod --setParameter ocspStaplingRefreshPeriodSecs=3600 ... Renamed from
ocspValidationRefreshPeriodSecstoocspStaplingRefreshPeriodSecsin MongoDB 4.4.1.
opensslCipherConfigNew in version 3.6.
With the use of native TLS/SSL libraries, the parameter
opensslCipherConfigis supported for Linux/BSD and no longer supported in Windows and macOS. See TLS/SSL.Specify the cipher string for OpenSSL when using TLS/SSL encryption. For a list of cipher strings, see https://www.openssl.org/docs/man1.1.1/man1/ciphers.html
You can only set
opensslCipherConfigduring start-up, and cannot change this setting using thesetParameterdatabase command.For version 4.2 and greater, the use of
TLSoptions is preferred overSSLoptions. The TLS options have the same functionality as theSSLoptions.mongod --setParameter opensslCipherConfig='HIGH:!EXPORT:!aNULL@STRENGTH' --tlsMode requireTLS --tlsCertificateKeyFile Certs/server.pem
opensslDiffieHellmanParametersAvailable on Linux only
Specify the path to the PEM file that contains the OpenSSL Diffie-Hellman parameters. Specifying the OpenSSL Diffie-Hellman parameters enables support for Ephemeral Diffie-Hellman (DHE) cipher suites during TLS/SSL encryption.
Ephemeral Diffie-Hellman (DHE) cipher suites (and Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) cipher suites) provide Forward Secrecy. Forward Secrecy cipher suites create an ephemeral session key that is protected by the server's private key but never transmitted. This ensures that even if a server's private key is compromised, you cannot decrypt past sessions with the compromised key.
Note
Starting in MongoDB 4.2, if
opensslDiffieHellmanParametersis unset but ECDHE is enabled, MongoDB enables DHE usingffdhe3072Diffie-Hellman parameter, as defined in RFC-7919#appendix-A.2. Theffdhe3072is a strong parameter (i.e. size is greater than 1024). Strong parameters are not supported with Java 6 and 7 unless extended support has been purchased from Oracle.You can only set
opensslDiffieHellmanParametersduring startup, and cannot change this setting using thesetParameterdatabase command.If for performance reasons, you need to disable support for DHE cipher suites, use the
opensslCipherConfigparameter:mongod --setParameter opensslCipherConfig='HIGH:!EXPORT:!aNULL:!DHE:!kDHE@STRENGTH' ...
saslauthdPathNote
Available only in MongoDB Enterprise (except MongoDB Enterprise for Windows).
Available for both
mongodandmongos.Specify the path to the Unix Domain Socket of the
saslauthdinstance to use for proxy authentication.
saslHostNameAvailable for both
mongodandmongos.saslHostNameoverrides MongoDB's default hostname detection for the purpose of configuring SASL and Kerberos authentication.saslHostNamedoes not affect the hostname of themongodormongosinstance for any purpose beyond the configuration of SASL and Kerberos.You can only set
saslHostNameduring start-up, and cannot change this setting using thesetParameterdatabase command.Note
saslHostNamesupports Kerberos authentication and is only included in MongoDB Enterprise. For more information, see the following:
saslServiceNameAvailable for both
mongodandmongos.Allows users to override the default Kerberos service name component of the Kerberos principal name, on a per-instance basis. If unspecified, the default value is
mongodb.MongoDB only permits setting
saslServiceNameat startup. ThesetParametercommand can not change this setting.saslServiceNameis only available in MongoDB Enterprise.Important
Ensure that your driver supports alternate service names.
scramIterationCountDefault:
10000Available for both
mongodandmongos.Changes the number of hashing iterations used for all new
SCRAM-SHA-1passwords. More iterations increase the amount of time required for clients to authenticate to MongoDB, but makes passwords less susceptible to brute-force attempts. The default value is ideal for most common use cases and requirements.If you modify this value, it does not change the iteration count for existing passwords. The
scramIterationCountvalue must be5000or greater.For example, the following sets the
scramIterationCountto12000.mongod --setParameter scramIterationCount=12000 Or, if using the
setParametercommand within themongoshell:db.adminCommand( { setParameter: 1, scramIterationCount: 12000 } )
scramSHA256IterationCountDefault:
15000Available for both
mongodandmongos.Changes the number of hashing iterations used for all new
SCRAM-SHA-256passwords. More iterations increase the amount of time required for clients to authenticate to MongoDB, but makes passwords less susceptible to brute-force attempts. The default value is ideal for most common use cases and requirements.If you modify this value, it does not change iteration count for existing passwords. The
scramSHA256IterationCountvalue must be5000or greater.For example, the following sets the
scramSHA256IterationCountto20000.mongod --setParameter scramSHA256IterationCount=20000 Or, if using the
setParametercommand within themongoshell:db.adminCommand( { setParameter: 1, scramSHA256IterationCount: 20000 } )
sslModeAvailable for both
mongodandmongos.Set the
net.ssl.modeto eitherpreferSSLorrequireSSL. Useful during rolling upgrade to TLS/SSL to minimize downtime.For more information about TLS/SSL and MongoDB, see Configure
mongodandmongosfor TLS/SSL and TLS/SSL Configuration for Clients .db.adminCommand( { setParameter: 1, sslMode: "preferSSL" } ) Tip
tlsModeNew in version 4.2.
Available for both
mongodandmongos.Set to either:
preferTLSrequireTLS
The
tlsModeparameter is useful during rolling upgrade to TLS/SSL to minimize downtime.db.adminCommand( { setParameter: 1, tlsMode: "preferTLS" } ) For more information about TLS/SSL and MongoDB, see Configure
mongodandmongosfor TLS/SSL and TLS/SSL Configuration for Clients .Tip
tlsOCSPStaplingTimeoutSecsNew in version 4.4: Available for Linux.
The maximum number of seconds the
mongod/mongosinstance should wait to receive the OCSP status response for its certificates.Specify an integer greater than or equal to (
>=) 1. If unset,tlsOCSPStaplingTimeoutSecsuses thetlsOCSPVerifyTimeoutSecsvalue.You can only set
tlsOCSPStaplingTimeoutSecsduring startup in theconfiguration fileor with the--setParameteroption on the command line. For example, the following sets thetlsOCSPStaplingTimeoutSecsto 20 seconds:mongod --setParameter tlsOCSPStaplingTimeoutSecs=20 ...
tlsOCSPVerifyTimeoutSecsNew in version 4.4: Available for Linux and Windows.
Default: 5
The maximum number of seconds that the
mongod/mongosshould wait for the OCSP response when verifying server certificates.Specify an integer greater than or equal to (
>=) 1.You can only set
tlsOCSPVerifyTimeoutSecsduring startup in theconfiguration fileor with the--setParameteroption on the command line. For example, the following sets thetlsOCSPVerifyTimeoutSecsto 20 seconds:mongod --setParameter tlsOCSPVerifyTimeoutSecs=20 ...
tlsUseSystemCAAvailable for
mongodonly.Type: boolean
Default: false
Specifies whether MongoDB loads TLS certificates that are already available to the operating system's certificate authority.
Important
When starting a
mongodinstance with TLS/SSL enabled, you must specify a value for the--tlsCAFileflag, thenet.tls.CAFileconfiguration option, or thetlsUseSystemCAparameter.--tlsCAFile,tls.CAFile, andtlsUseSystemCAare all mutually exclusive.You can set
tlsUseSystemCAonly during startup in theconfiguration fileor with the--setParameteroption on the command line. For example, to settlsUseSystemCAtotrue:mongod --setParameter tlsUseSystemCA=true For more information about TLS/SSL and MongoDB, see Configure
mongodandmongosfor TLS/SSL and TLS/SSL Configuration for Clients .
tlsWithholdClientCertificateDefault: false
New in version 4.2.
Available for both
mongodandmongos.A TLS certificate is set for a
mongodormongoseither by the--tlsClusterFileoption or by the--tlsCertificateKeyFileoption when--tlsClusterFileis not set. If the TLS certificate is set, by default, the instance sends the certificate when initiating intra-cluster communications with othermongodormongosinstances in the deployment. SettlsWithholdClientCertificateto1ortrueto direct the instance to withhold sending its TLS certificate during these communications. Use this option with--tlsAllowConnectionsWithoutCertificates(to allow inbound connections without certificates) on all members of the deployment.tlsWithholdClientCertificateis mutually exclusive with--clusterAuthMode x509.
tlsX509ClusterAuthDNOverrideNew in version 4.2.
Available for both
mongodandmongos.An alternative Distinguished Name (DN) that the instance can also use to identify members of the deployment.
For a MongoDB deployment that uses x.509 certificates for
clusterAuthMode, deployment members identify each other using x.509 certificates (net.tls.clusterFile, if specified, andnet.tls.certificateKeyFile) during intra-cluster communications. For members of the same deployment, theDNfrom their certificates must have the same Organization attributes (O's), the Organizational Unit attributes (OU's), and the Domain Components (DC's).If
tlsX509ClusterAuthDNOverrideis set for a member, the member can also use the override value when comparing theDNcomponents (O's,OU's, andDC's) of the presented certificates. That is the member checks the presented certificates against itsnet.tls.clusterFile/net.tls.certificateKeyFile. If the DN does not match, the member checks the presented certificate against thetlsX509ClusterAuthDNOverridevalue.Note
If set, you must set this parameter on all members of the deployment.
You can use this parameter for a rolling update of certificates to new certificates that contain a new
DNvalue. See Rolling Update of x.509 Cluster Certificates that Contain New DN.For more information about membership certificate requirements, see Member Certificate Requirements for details.
tlsX509ExpirationWarningThresholdDaysNew in version 4.4.
Default : 30
Available for both
mongodandmongos.Starting in MongoDB 4.4,
mongod/mongoslogs a warning on connection if the presented x.509 certificate expires within30days of themongod/mongossystem clock. Use thetlsX509ExpirationWarningThresholdDaysparameter to control the certificate expiration warning threshold:Increase the parameter value to trigger warnings farther ahead of the certificate expiration date.
Decrease the parameter value to trigger warnings closer to the certificate expiration date.
Set the parameter to
0to disable the warning.
This parameter has a minimum value of
0.You can only set
tlsX509ExpirationWarningThresholdDaysduringmongod/mongosstartup using either:The
setParameterconfiguration setting, orThe
mongod --setParameter/mongos --setParametercommand line option.
See x.509 Certificates Nearing Expiry Trigger Warnings for more information on x.509 expiration warnings in MongoDB 4.4.
For more information on x.509 certificate validity, see RFC 5280 4.1.2.5.
sslWithholdClientCertificateDefault: false
Deprecated since version 4.2: Use
tlsWithholdClientCertificateinstead.Available for both
mongodandmongos.A TLS certificate is set for a
mongodormongoseither by the--tlsClusterFileoption or by the--tlsCertificateKeyFileoption when--tlsClusterFileis not set. If the TLS certificate is set, by default, the instance sends the certificate when initiating intra-cluster communications with othermongodormongosinstances in the deployment. SetsslWithholdClientCertificateto1ortrueto direct the instance to withhold sending its TLS certificate during these communications. Use this option with--tlsAllowConnectionsWithoutCertificates(to allow inbound connections without certificates) on all members of the deployment.sslWithholdClientCertificateis mutually exclusive with--clusterAuthMode x509.
userCacheInvalidationIntervalSecsDefault: 30
Available for
mongosonly.On a
mongosinstance, specifies the interval (in seconds) at which themongosinstance checks to determine whether the in-memory cache of user objects has stale data, and if so, clears the cache. If there are no changes to user objects,mongoswill not clear the cache.This parameter has a minimum value of
1second and a maximum value of86400seconds (24 hours).
authFailedDelayMsDefault: 0
Available for both
mongodandmongos.New in version 3.4.
Note
Enterprise Feature
Available in MongoDB Enterprise only.
The number of milliseconds to wait before informing clients that their authentication attempt has failed. This parameter may be in the range
0to5000, inclusive.Setting this parameter makes brute-force login attacks on a database more time-consuming. However, clients waiting for a response from the MongoDB server still consume server resources, and this may adversely impact benign login attempts if the server is denying access to many other clients simultaneously.
allowRolesFromX509CertificatesDefault: true
Available for both
mongodandmongos.A boolean flag that allows or disallows the retrieval of authorization roles from client x.509 certificates.
You can only set
allowRolesFromX509Certificatesduring startup in the config file or on the command line.
General Parameters
connPoolMaxShardedConnsPerHostDefault: 200
Available for both
mongodandmongos.Sets the maximum size of the legacy connection pools for communication to the shards. The size of a pool does not prevent the creation of additional connections, but does prevent the connection pools from retaining connections above this limit.
Note
The parameter is separate from the connections in TaskExecutor pools. See
ShardingTaskExecutorPoolMaxSize.Increase the
connPoolMaxShardedConnsPerHostvalue only if the number of connections in a connection pool has a high level of churn or if the total number of created connections increase.You can only set
connPoolMaxShardedConnsPerHostduring startup in the config file or on the command line. For example:mongos --setParameter connPoolMaxShardedConnsPerHost=250
connPoolMaxShardedInUseConnsPerHostNew in version 3.6.3.
Available for both
mongodandmongos.Sets the maximum number of in-use connections at any given time for the legacy sharded cluster connection pools.
By default, the parameter is unset.
You can only set
connPoolMaxShardedConnsPerHostduring startup in the config file or on the command line. For example:mongos --setParameter connPoolMaxShardedInUseConnsPerHost=100
shardedConnPoolIdleTimeoutMinutesNew in version 3.6.3.
Available for both
mongodandmongos.Sets the time limit that a connection in the legacy sharded cluster connection pool can remain idle before being closed.
By default, the parameter is unset.
You can only set
shardedConnPoolIdleTimeoutMinutesduring startup in the config file or on the command line. For example:mongos --setParameter shardedConnPoolIdleTimeoutMinutes=10
connPoolMaxConnsPerHostDefault: 200
Available for both
mongodandmongos.Sets the maximum size of the legacy connection pools for outgoing connections to other
mongodinstances in the global connection pool. The size of a pool does not prevent the creation of additional connections, but does prevent a connection pool from retaining connections in excess of the value ofconnPoolMaxConnsPerHost.Note
The parameter is separate from the connections in TaskExecutor pools. See
ShardingTaskExecutorPoolMaxSize.Only adjust this setting if your driver does not pool connections and you're using authentication in the context of a sharded cluster.
You can only set
connPoolMaxConnsPerHostduring startup in the config file or on the command line. For example:mongod --setParameter connPoolMaxConnsPerHost=250
connPoolMaxInUseConnsPerHostNew in version 3.6.3.
Available for both
mongodandmongos.Sets the maximum number of in-use connections at any given time for for outgoing connections to other
mongodinstances in the legacy global connection pool.By default, the parameter is unset.
You can only set
connPoolMaxInUseConnsPerHostduring startup in the config file or on the command line. For example:mongod --setParameter connPoolMaxInUseConnsPerHost=100
globalConnPoolIdleTimeoutMinutesNew in version 3.6.3.
Available for both
mongodandmongos.Sets the time limit that connection in the legacy global connection pool can remain idle before being closed.
By default, the parameter is unset.
You can only set
globalConnPoolIdleTimeoutMinutesduring startup in the config file or on the command line. For example:mongos --setParameter globalConnPoolIdleTimeoutMinutes=10
cursorTimeoutMillisDefault: 600000 (i.e. 10 minutes)
Available for both
mongodandmongos.Sets the expiration threshold in milliseconds for idle cursors before MongoDB removes them; i.e. MongoDB removes cursors that have been idle for the specified
cursorTimeoutMillis.For example, the following sets the
cursorTimeoutMillisto300000milliseconds (i.e. 5 minutes).mongod --setParameter cursorTimeoutMillis=300000 Or, if using the
setParametercommand within themongoshell:db.adminCommand( { setParameter: 1, cursorTimeoutMillis: 300000 } ) Setting
cursorTimeoutMillisto less than or equal to0results in all cursors being immediately eligible for timeout. Generally, the timeout value should be greater than the average amount of time for a query to return results. Use tools like thecursor.explain()cursor modifier to analyze the average query time and select an appropriate timeout period.Warning
Starting in MongoDB 4.4.8, MongoDB cleans up orphaned cursors linked to sessions as part of session management. This means that orphaned cursors with session ids do not use
cursorTimeoutMillisto control the timeout.For operations that return a cursor and have an idle period longer than
localLogicalSessionTimeoutMinutes, useMongo.startSession()to perform the operation within an explicit session. To refresh the session, run therefreshSessionscommand. For details, see Refresh a Cursor withrefreshSessions.
failIndexKeyTooLongRemoved in 4.4
Important
MongoDB 4.4 removes the deprecated
failIndexKeyTooLongparameter. Attempting to use this parameter with MongoDB 4.4 will result in an error.MongoDB 4.2 deprecates the
failIndexKeyTooLongparameter and removes the Index Key Length Limit for featureCompatibilityVersion (fCV) set to"4.2"or greater.
Setting
failIndexKeyTooLongtofalseis a temporary workaround, not a permanent solution to the problem of oversized index keys. WithfailIndexKeyTooLongset tofalse, queries can return incomplete results if they use indexes that skip over documents whose indexed fields exceed the Index Key Length Limit.failIndexKeyTooLongdefaults totrue.Issue the following command to disable the index key length validation:
db.adminCommand( { setParameter: 1, failIndexKeyTooLong: false } ) You can also set
failIndexKeyTooLongat startup time with the following option:mongod --setParameter failIndexKeyTooLong=false
maxNumActiveUserIndexBuildsAvailable for
mongodonly.Type: integer
Default: 3
Sets the maximum number of concurrent index builds allowed on the primary. This is a global limit that applies across all collections.
Increasing the value of
maxNumActiveUserIndexBuildsallows additional concurrent index builds at the cost of increased pressure on the WiredTiger cache.System indexes are not limited to
maxNumActiveUserIndexBuilds, however a system index build counts against the limit for user index builds.After the server reaches
maxNumActiveUserIndexBuilds, it blocks additional user index builds until the number of concurrent index builds drops below themaxNumActiveUserIndexBuildslimit. If an index build is blocked, the server logs this message:Too many index builds running simultaneously, waiting until the number of active index builds is below the threshold. The following command sets a limit of 4 concurrent index builds:
db.adminCommand( { setParameter: 1, maxNumActiveUserIndexBuilds: 4 } ) See also:
notablescanAvailable for
mongodonly.Specify whether all queries must use indexes. If
1, MongoDB will not execute queries that require a collection scan and will return an error.Consider the following example which sets
notablescanto1or true:db.adminCommand( { setParameter: 1, notablescan: 1 } ) Setting
notablescanto1can be useful for testing application queries, for example, to identify queries that scan an entire collection and cannot use an index.To detect unindexed queries without
notablescan, consider reading the Evaluate Performance of Current Operations and Optimize Query Performance sections and using thelogLevelparameter,mongostatand profiling.Don't run production
mongodinstances withnotablescanbecause preventing collection scans can potentially affect queries in all databases, including administrative queries.
ttlMonitorEnabledAvailable for
mongodonly.Default:
trueTo support TTL Indexes,
mongodinstances have a background thread that is responsible for deleting documents from collections with TTL indexes.To disable this worker thread for a
mongod, setttlMonitorEnabledtofalse, as in the following operations:db.adminCommand( { setParameter: 1, ttlMonitorEnabled: false } ) Alternately, you may disable the thread at startup time by starting the
mongodinstance with the following option:mongod --setParameter ttlMonitorEnabled=false Important
Do not run production
mongodinstances withttlMonitorEnableddisabled, except under guidance from MongoDB support. Preventing TTL document removal can negatively impact MongoDB internal system operations that depend on TTL Indexes.
tcpFastOpenServerNew in version 4.4.
Available for both
mongodandmongos.Default:
trueEnables support for accepting inbound TCP Fast Open (TFO) connections to the
mongod/mongosfrom a client. TFO requires both the client andmongod/mongoshost machine support and enable TFO:- Windows
The following Windows operating systems support TFO:
Microsoft Windows Server 2016 and later.
Microsoft Windows 10 Update 1607 and later.
- macOS
- macOS 10.11 (El Capitan) and later support TFO.
- Linux
Linux operating systems running Linux Kernel 3.7 or later can support inbound TFO.
Set the value of
/proc/sys/net/ipv4/tcp_fastopento enable inbound TFO connections:Set to
2to enable only inbound TFO connections.Set to
3to enable inbound and outbound TFO connections.
This parameter has no effect if the host operating system does not support or is not configured to support TFO connections.
You can only set this parameter on startup, using either the
setParameterconfiguration file setting or the--setParametercommand line option.See Support for TCP Fast Open for more information on MongoDB TFO support.
Tip
tcpFastOpenClientNew in version 4.4.
Available for both
mongodandmongos.Default:
trueLinux Operating System Only
Enables support for outbound TCP Fast Open (TFO) connections from the
mongod/mongosto a client. TFO requires both the client and themongod/mongoshost machine support and enable TFO.Linux operating systems running Linux Kernel 4.11 or later can support outbound TFO.
Set the value of
/proc/sys/net/ipv4/tcp_fastopento enable outbound TFO connections:1to enable only outbound TFO connections.3to enable inbound and outbound TFO connections.
This parameter has no effect if the host operating system does not support or is not configured to support TFO connections.
You can only set this parameter on startup, using either the
setParameterconfiguration file setting or the--setParametercommand line option.See Support for TCP Fast Open for more information on MongoDB TFO support.
Tip
tcpFastOpenQueueSizeNew in version 4.4.
Available for both
mongodandmongos.Default:
1024As part of establishing a TCP Fast Open (TFO) connection, the client submits a valid TFO cookie to the
mongod/mongosbefore completion of the standard TCP 3-way handshake. Themongod/mongoskeeps a queue of all such pending TFO connections.The
tcpFastOpenQueueSizeparameter sets the size of the queue of pending TFO connections. While the queue is full, themongod/mongosfalls back to the normal three-way handshake for incoming client requests and ignores the presence of TFO cookies. Once the queue size falls back below the limit, themongod/mongosbegins accepting new TFO cookies.Increasing the default queue size may improve the effect of TFO on network performance. However, large queue sizes also increase the risk of server resource exhaustion due to excessive incoming TFO requests.
Decreasing the default queue size may reduce the risk of resource server resource exhaustion due to excessive incoming TFO requests. However, small queue sizes may also reduce the effect of TFO on network performance.
The minimum queue size is
0. A queue of0effectively disables TFO.
This parameter has no effect on host operating systems that do not support or are not configured for TFO connections. See Support for TCP Fast Open for more information on MongoDB TFO support.
disableJavaScriptJITAvailable for
mongodonly.The MongoDB JavaScript engine uses SpiderMonkey, which implements Just-in-Time (JIT) compilation for improved performance when running scripts.
To enable the JIT, set
disableJavaScriptJITtofalse, as in the following example:db.adminCommand( { setParameter: 1, disableJavaScriptJIT: false } ) Note
$wherewill reuse existing JavaScript interpreter contexts, so changes todisableJavaScriptJITmay not take effect immediately for these operations.Alternately, you may enable the JIT at startup time by starting the
mongodinstance with the following option:mongod --setParameter disableJavaScriptJIT=false
maxIndexBuildMemoryUsageMegabytesNew in version 3.4.
Default:
200 (For versions 4.2.3 and later)
500 (For versions 4.2.2 and earlier)
Limits the amount of memory that simultaneous index builds on one collection may consume for the duration of the builds. The specified amount of memory is shared between all indexes built using a single
createIndexescommand or its shell helperdb.collection.createIndexes().The memory consumed by an index build is separate from the WiredTiger cache memory (see
cacheSizeGB).Index builds may be initiated either by a user command such as Create Index or by an administrative process such as an initial sync. Both are subject to the limit set by
maxIndexBuildMemoryUsageMegabytes.An initial sync operation populates only one collection at a time and has no risk of exceeding the memory limit. However, it is possible for a user to start index builds on multiple collections in multiple databases simultaneously and potentially consume an amount of memory greater than the limit set in
maxIndexBuildMemoryUsageMegabytes.Tip
To minimize the impact of building an index on replica sets and sharded clusters with replica set shards, use a rolling index build procedure as described on Rolling Index Builds on Replica Sets.
For feature compatibility version (fcv)
"4.2"and later, the index build memory limit applies to all index builds.
reportOpWriteConcernCountersInServerStatusDefault: false
A boolean flag that determines whether the
db.serverStatus()method andserverStatuscommand returnopWriteConcernCountersinformation. [1]You can only set
reportOpWriteConcernCountersInServerStatusduring startup in the config file or on the command line. For example:mongod --setParameter reportOpWriteConcernCountersInServerStatus=true [1] Enabling reportOpWriteConcernCountersInServerStatuscan have a negative performance impact; specificaly, when running without TLS.
watchdogPeriodSecondsAvailable for
mongodonly.Type: integer
Default: -1 (disabled)
Determines how frequent the Storage Node Watchdog checks the status of the monitored filesystems:
The
--dbpathdirectoryThe
journaldirectory inside the--dbpathdirectory ifjournalingis enabledThe directory of
--logpathfileThe directory of
--auditPathfile
Valid values for
watchdogPeriodSecondsare:-1(the default), to disable/pause Storage Node Watchdog, orAn integer greater than or equal to 60.
Note
If a filesystem on a monitored directory becomes unresponsive, it can take a maximum of nearly twice the value of
watchdogPeriodSecondsto terminate themongod.If any of its monitored directory is a symlink to other volumes, the Storage Node Watchdog does not monitor the symlink target. For example, if the
mongodusesstorage.directoryPerDB: true(or--directoryperdb) and symlinks a database directory to another volume, the Storage Node Watchdog does not follow the symlink to monitor the target.
To enable Storage Node Watchdog,
watchdogPeriodSecondsmust be set during startup.mongod --setParameter watchdogPeriodSeconds=60 You can only enable the Storage Node Watchdog at startup. However, once enabled, you can pause the Storage Node Watchdog or change the
watchdogPeriodSecondsduring runtime.Once enabled,
To pause the Storage Node Watchdog during runtime, set
watchdogPeriodSecondsto -1.db.adminCommand( { setParameter: 1, watchdogPeriodSeconds: -1 } ) To resume or change the period during runtime, set
watchdogPeriodSecondsto a number greater than or equal to 60.db.adminCommand( { setParameter: 1, watchdogPeriodSeconds: 120 } )
Note
It is an error to set
watchdogPeriodSecondsat runtime if the Storage Node Watchdog was not enabled at startup time.
tcmallocAggressiveMemoryDecommitType: integer (
0or1only)Default: 0
If you enable
tmallocAggressiveMemoryDecommit, MongoDB:releases a chunk of memory to system, and
attempts to return all neighboring free chunks.
A value of
1enablestcmallocAggressiveMemoryDecommit;0disables this parameter.If you enable this parameter, the system will require new memory allocations for use. Consider enabling
tcmallocAggressiveMemoryDecommitonly on memory-constrained systems and after pursuing other memory and performance options.Despite the potential performance degradation when using
tcmallocAggressiveMemoryDecommit, it is often preferred over usingtcmallocReleaseRate.
tcmallocReleaseRateNew in version 4.2.3.
Default: 1.0
Specifies the tcmalloc release rate (TCMALLOC_RELEASE_RATE). Per https://gperftools.github.io/gperftools/tcmalloc.html#runtime TCMALLOC_RELEASE_RATE is described as the "Rate at which we release unused memory to the system, via madvise(MADV_DONTNEED), on systems that support it. Zero means we never release memory back to the system. Increase this flag to return memory faster; decrease it to return memory slower. Reasonable rates are in the range [0,10]."
Note
Consider using
tcmallocAggressiveMemoryDecommitinstead oftcmallocReleaseRate, unless you see a significant performance degradation when usingtcmallocAggressiveMemoryDecommit.To modify the release rate during run time, you can use the
setParametercommand; for example:db.adminCommand( { setParameter: 1, tcmallocReleaseRate: 5.0 } ) You can also set
tcmallocReleaseRateat startup time; for example:mongod --setParameter "tcmallocReleaseRate=5.0"
Logging Parameters
logLevelAvailable for both
mongodandmongos.Specify an integer between
0and5signifying the verbosity of the logging, where5is the most verbose. [2]The default
logLevelis0(Informational).The following example sets the
logLevelto2:db.adminCommand( { setParameter: 1, logLevel: 2 } ) [2] Starting in version 4.2, MongoDB includes the Debug verbosity level (1-5) in the log messages. For example, if the verbosity level is 2, MongoDB logs D2. In previous versions, MongoDB log messages only specifiedDfor Debug level.
logComponentVerbosityAvailable for both
mongodandmongos.Sets the verbosity levels of various components for log messages. The verbosity level determines the amount of Informational and Debug messages MongoDB outputs. [3]
The verbosity level can range from
0to5:0is the MongoDB's default log verbosity level, to include Informational messages.1to5increases the verbosity level to include Debug messages.
For a component, you can also specify
-1to inherit the parent's verbosity level.To specify the verbosity level, use a document similar to the following:
{ verbosity: <int>, <component1>: { verbosity: <int> }, <component2>: { verbosity: <int>, <component3>: { verbosity: <int> } }, ... } For the components, you can specify just the
<component>: <int>in the document, unless you are setting both the parent verbosity level and that of the child component(s) as well:{ verbosity: <int>, <component1>: <int> , <component2>: { verbosity: <int>, <component3>: <int> } ... } The top-level
verbosityfield corresponds tosystemLog.verbositywhich sets the default level for all components. The default value ofsystemLog.verbosityis0.The components correspond to the following settings:
Unless explicitly set, the component has the verbosity level of its parent. For example,
storageis the parent ofstorage.journal. That is, if you specify astorageverbosity level, this level also applies to:storage.journalcomponents unless you specify the verbosity level forstorage.journal.storage.recoverycomponents unless you specify the verbosity level forstorage.recovery.
For example, the following sets the
default verbosity levelto1, thequeryto2, thestorageto2, and thestorage.journalto1.db.adminCommand( { setParameter: 1, logComponentVerbosity: { verbosity: 1, query: { verbosity: 2 }, storage: { verbosity: 2, journal: { verbosity: 1 } } } } ) You can also set parameter
logComponentVerbosityat startup time, passing the verbosity level document as a string.mongod --setParameter "logComponentVerbosity={command: 3}" The
mongoshell also provides thedb.setLogLevel()to set the log level for a single component. For various ways to set the log verbosity level, see Configure Log Verbosity Levels.[3] Starting in version 4.2, MongoDB includes the Debug verbosity level (1-5) in the log messages. For example, if the verbosity level is 2, MongoDB logs D2. In previous versions, MongoDB log messages only specifiedDfor Debug level.
maxLogSizeKBNew in version 3.4.
Available for both
mongodandmongos.Type: non-negative integer
Default: 10
Specifies the maximum size, in kilobytes, for an individual attribute field in a log entry; attributes exceeding this limit are truncated.
Truncated attribute fields print field content up to the
maxLogSizeKBlimit and excise field content past that limit, retaining valid JSON formating. Log entires that contain truncated attributes append atruncatedobject to the end of the log entry.See log message truncation for more information.
A value of
0disables truncation entirely. Negative values for this parameter are not valid.Warning
Using a large value, or disabling truncation with a value of
0, may adversely affect system performance and negatively impact database operations.The following example sets the maximum log line size to
20kilobytes:mongod --setParameter maxLogSizeKB=20
quietAvailable for both
mongodandmongos.Sets quiet logging mode. If
1,mongodwill go into a quiet logging mode which will not log the following events/activities:connection events;
the
dropcommand, thedropIndexescommand, thevalidatecommand; andreplication synchronization activities.
Consider the following example which sets the
quietparameter to1:db.adminCommand( { setParameter: 1, quiet: 1 } )
redactClientLogDataNew in version 3.4.
Available for both
mongodandmongos.Type: boolean
Note
Enterprise Feature
Available in MongoDB Enterprise only.
Configure the
mongodormongosto redact any message accompanying a given log event before logging. This prevents the program from writing potentially sensitive data stored on the database to the diagnostic log. Metadata such as error or operation codes, line numbers, and source file names are still visible in the logs.Use
redactClientLogDatain conjunction with Encryption at Rest and TLS/SSL (Transport Encryption) to assist compliance with regulatory requirements.To enable log redaction at startup, you can either:
Start
mongodwith the--redactClientLogDataoption:mongod --redactClientLogData Set the
security.redactClientLogDataoption in the configuration file:security: redactClientLogData: true ...
You can't use the
--setParameteroption to setredactClientLogDataat startup.To enable log redaction on a running
mongodormongos, use the following command:db.adminCommand( { setParameter: 1, redactClientLogData : true } )
traceExceptionsAvailable for both
mongodandmongos.Configures
mongodto log full source code stack traces for every database and socket C++ exception, for use with debugging. Iftrue,mongodwill log full stack traces.Consider the following example which sets the
traceExceptionstotrue:db.adminCommand( { setParameter: 1, traceExceptions: true } )
suppressNoTLSPeerCertificateWarningAvailable for both
mongodandmongos.Type: boolean
Default: false
By default, a
mongodormongoswith TLS/SSL enabled andnet.ssl.allowConnectionsWithoutCertificates:truelets clients connect without providing a certificate for validation while logging an warning. SetsuppressNoTLSPeerCertificateWarningto1ortrueto suppress those warnings.The following operation sets
suppressNoTLSPeerCertificateWarningtotrue:db.adminCommand( { setParameter: 1, suppressNoTLSPeerCertificateWarning: true} )
Diagnostic Parameters
To facilitate analysis of the MongoDB server behavior by MongoDB engineers, MongoDB logs server statistics to diagnostic files at periodic intervals.
For mongod, the diagnostic data files are stored in the
diagnostic.data directory under the mongod instance's
--dbpath or storage.dbPath.
For mongos, the diagnostic data files, by default, are
stored in a directory under the mongos instance's
--logpath or systemLog.path directory. The diagnostic
data directory is computed by truncating the logpath's file
extension(s) and concatenating diagnostic.data to the remaining
name.
For example, if mongos has --logpath
/var/log/mongodb/mongos.log.201708015, then the diagnostic data
directory is /var/log/mongodb/mongos.diagnostic.data/ directory. To
specify a different diagnostic data directory for mongos,
set the diagnosticDataCollectionDirectoryPath parameter.
The following parameters support diagnostic data capture (FTDC):
Note
The default values for the diagnostic data capture interval and the maximum sizes are chosen to provide useful data to MongoDB engineers with minimal impact on performance and storage size. Typically, these values will only need modifications as requested by MongoDB engineers for specific diagnostic purposes.
diagnosticDataCollectionEnabledNew in version 3.2.
Type: boolean
Default: true
Determines whether to enable the collecting and logging of data for diagnostic purposes. Diagnostic logging is enabled by default.
For example, the following disables the diagnostic collection:
mongod --setParameter diagnosticDataCollectionEnabled=false
diagnosticDataCollectionDirectoryPathNew in version 3.4.14.
Type: String
Available for
mongosonly.Warning
If Full Time Diagnostic Data Capture (FTDC) is disabled with
diagnosticDataCollectionEnabledor ifsystemLog.destinationis set tosyslog, you must restartmongosafter settingdiagnosticDataCollectionDirectoryPath.Specify the directory for the diagnostic directory for
mongos. If the directory does not exist,mongoscreates the directory.If unspecified, the diagnostic data directory is computed by truncating the
mongosinstance's--logpathorsystemLog.pathfile extension(s) and concatenatingdiagnostic.data.For example, if
mongoshas--logpath /var/log/mongodb/mongos.log.201708015, then the diagnostic data directory is/var/log/mongodb/mongos.diagnostic.data/.If the
mongoscannot create the specified directory, the diagnostic data capture is disabled for that instance.mongosmay not be able to create the specified directory if a file with the same name already exists in the path or if the process does not have permissions to create the directory.
diagnosticDataCollectionDirectorySizeMBAvailable for both
mongodandmongos.Type: integer
Default: 200
Specifies the maximum size, in megabytes, of the
diagnostic.datadirectory. If directory size exceeds this number, the oldest diagnostic files in the directory are automatically deleted based on the timestamp in the file name.For example, the following sets the maximum size of the directory to
250megabytes:mongod --setParameter diagnosticDataCollectionDirectorySizeMB=250 The minimum value for
diagnosticDataCollectionDirectorySizeMBis10megabytes.diagnosticDataCollectionDirectorySizeMBmust be greater than maximum diagnostic file sizediagnosticDataCollectionFileSizeMB.
diagnosticDataCollectionFileSizeMBNew in version 3.2.
Type: integer
Default: 10
Specifies the maximum size, in megabytes, of each diagnostic file. If the file exceeds the maximum file size, MongoDB creates a new file.
For example, the following sets the maximum size of each diagnostic file to
20megabytes:mongod --setParameter diagnosticDataCollectionFileSizeMB=20 The minimum value for
diagnosticDataCollectionFileSizeMBis1megabyte.
diagnosticDataCollectionPeriodMillisNew in version 3.2.
Type: integer
Default: 1000
Specifies the interval, in milliseconds, at which to collect diagnostic data.
For example, the following sets the interval to
5000milliseconds or 5 seconds:mongod --setParameter diagnosticDataCollectionPeriodMillis=5000 The minimum value for
diagnosticDataCollectionPeriodMillisis100milliseconds.
Logical Session
enableOverrideClusterChainingSettingNew in version 4.4.8.
Available for both
mongodandmongos.Type: boolean
Default: false
If
enableOverrideClusterChainingSettingistrue, replica set secondary members can replicate data from other secondary members even ifsettings.chainingAllowedisfalse.You can only set
enableOverrideClusterChainingSettingat startup and cannot change this setting with thesetParametercommand.For example, to set the
enableOverrideClusterChainingSettingfor amongodinstance totrue:mongod --setParameter enableOverrideClusterChainingSetting=true
logicalSessionRefreshMillisAvailable for both
mongodandmongos.Type: integer
Default: 300000 (i.e. 5 minutes)
The interval (in milliseconds) at which the cache refreshes its logical session records against the main session store.
You can only set
logicalSessionRefreshMillisat startup and cannot change this setting with thesetParametercommand.For example, to set the
logicalSessionRefreshMillisfor amongodinstance to 10 minutes:mongod --setParameter logicalSessionRefreshMillis=600000
localLogicalSessionTimeoutMinutesNew in version 3.6.
Available for both
mongodandmongos.Type: integer
Default: 30
Warning
For testing purposes only
This parameter is intended for testing purposes only and not for production use.
The time in minutes that a session remains active after its most recent use. Sessions that have not received a new read/write operation from the client or been refreshed with
refreshSessionswithin this threshold are cleared from the cache. State associated with an expired session may be cleaned up by the server at any time.This parameter applies only to the instance on which it is set. To set this parameter on replica sets and sharded clusters, you must specify the same value on every member; otherwise, sessions will not function properly.
You can only set
localLogicalSessionTimeoutMinutesat startup and cannot change this setting with thesetParametercommand.For example, to set the
localLogicalSessionTimeoutMinutesfor a testmongodinstance to 20 minutes:mongod --setParameter localLogicalSessionTimeoutMinutes=20
maxAcceptableLogicalClockDriftSecsNew in version 3.6.
Available for both
mongodandmongos.Type: integer
Default: 31536000 (1 year)
The maximum amount by which the current cluster time can be advanced; i.e.,
maxAcceptableLogicalClockDriftSecsis the maximum difference between the new value of the cluster time and the current cluster time. Cluster time is a logical time used for ordering of operations.You cannot advance the cluster time to a new value if the new cluster time differs from the current cluster time by more than
maxAcceptableLogicalClockDriftSecs,You can only set
maxAcceptableLogicalClockDriftSecsat startup and cannot change this setting with thesetParametercommand.For example, to set the
maxAcceptableLogicalClockDriftSecsfor amongodinstance to 15 minutes:mongod --setParameter maxAcceptableLogicalClockDriftSecs=900
maxSessionsAvailable for both
mongodandmongos.Type: integer
Default: 1000000
The maximum number of sessions that can be cached.
You can only set
maxSessionsduring start-up.For example, to set the
maxSessionsfor amongodinstance to 1000:mongod --setParameter maxSessions=1000
periodicNoopIntervalSecsAvailable for
mongodonly.Type: integer
Default: 10
The duration in seconds between noop writes on each individual node.
You can only set the parameter during startup, and cannot change this setting using the
setParameterdatabase command.Note
To modify this value for a MongoDB Atlas cluster, you must contact Atlas Support.
The following example sets the
periodicNoopIntervalSecsto 1 second at startup:mongod --setParameter periodicNoopIntervalSecs=1
TransactionRecordMinimumLifetimeMinutesNew in version 3.6.
Available for
mongodonly.Type: integer
Default: 30
The minimum lifetime a transaction record exists in the
transactionscollection before the record becomes eligible for cleanup.You can only set
TransactionRecordMinimumLifetimeMinutesat startup and cannot change this setting with thesetParametercommand.For example, to set the
TransactionRecordMinimumLifetimeMinutesfor amongodinstance to 20 minutes:mongod --setParameter TransactionRecordMinimumLifetimeMinutes=20
enableFlowControlNew in version 4.2.
Type: boolean
Default: true
Enables or disables the mechanism that controls the rate at which the primary applies its writes with the goal of keeping the secondary members'
majority committedlag under a configurable maximum value.Note
For flow control to engage, the replica set/sharded cluster must have: featureCompatibilityVersion (fCV) of
4.2and read concernmajority enabled. That is, enabled flow control has no effect if fCV is not4.2or if read concern majority is disabled.
flowControlTargetLagSecondsNew in version 4.2.
Type: integer
Default: 10
The target maximum
majority committedlag when running with flow control. When flow control is enabled, the mechanism attempts to keep themajority committedlag under the specified seconds. The parameter has no effect if flow control is disabled.The specified value must be greater than 0.
In general, the default settings should suffice; however, if modifying from the default value, decreasing, rather than increasing, the value may prove to be more useful.
flowControlWarnThresholdSecondsNew in version 4.2.
Type: integer
Default: 10
The amount of time to wait to log a warning once the flow control mechanism detects the majority commit point has not moved.
The specified value must be greater than or equal to 0, with 0 to disable warnings.
initialSyncTransientErrorRetryPeriodSecondsNew in version 4.4.
Type: integer
Default: 86400
The amount of time in seconds a secondary performing initial sync attempts to resume the process if interrupted by a transient network error. The default value is equivalent to 24 hours.
initialSyncSourceReadPreferenceNew in version 4.4.
Type: String
Available for
mongodonly.The preferred source for performing initial sync. Specify one of the following read preference modes:
primaryPreferred(Default for voting replica set members)nearest(Default for newly added or non-voting replica set members)
If the replica set has disabled
chaining, the defaultinitialSyncSourceReadPreferenceread preference mode isprimary.You cannot specify a tag set or
maxStalenessSecondstoinitialSyncSourceReadPreference.If the
mongodcannot find a sync source based on the specified read preference, it logs an error and restarts the initial sync process. Themongodexits with an error if it cannot complete the initial sync process after10attempts. For more information on sync source selection, see Initial Sync Source Selection.initialSyncSourceReadPreferencetakes precedence over the replica set'ssettings.chainingAllowedsetting when selecting an initial sync source. After a replica set member successfully completes initial sync, it defers to the value ofchainingAllowedwhen selecting a replication sync source.You can only set this parameter on startup, using either the
setParameterconfiguration file setting or the--setParametercommand line option.
oplogFetcherUsesExhaustNew in version 4.4.
Available for
mongodonly.Type: boolean
Default: true
Enables or disables streaming replication. Set the value to
trueto enable streaming replication.Set the value to
falseto disable streaming replication. If disabled, secondaries fetch batches of oplog entries by issuing a request to their sync from source and waiting for a response. This requires a network roundtrip for each batch of oplog entries.You can only set this parameter on startup, using either the
setParameterconfiguration file setting or the--setParametercommand line option.
oplogInitialFindMaxSecondsNew in version 3.6.
Type: integer
Default: 60
Available for
mongodonly.Maximum time in seconds for a member of a replica set to wait for the
findcommand to finish during data synchronization.
replWriterThreadCountNew in version 3.2.
Type: integer
Default: 16
Available for
mongodonly.Maximum number of threads to use to apply replicated operations in parallel. Values can range from 1 to 256 inclusive. However, the maximum number of threads used is capped at twice the number of available cores.
You can only set
replWriterThreadCountat startup and cannot change this setting with thesetParametercommand.
replWriterMinThreadCountNew in version 4.4.7.
Type: integer
Default: 0
Available for
mongodonly.Minimum number of threads to use to apply replicated operations in parallel. Values can range from 0 to 256 inclusive. You can only set
replWriterMinThreadCountat startup and cannot change this setting with thesetParametercommand.Parallel application of replication operations uses up to
replWriterThreadCountthreads. IfreplWriterMinThreadCountis configured with a value less thanreplWriterThreadCount, the thread pool will timeout idle threads until the total count of threads in the thread pool is equal toreplWriterMinThreadCount.replWriterMinThreadCountmust be configured with a value that is less than or equal toreplWriterThreadCount.
rollbackTimeLimitSecsType: 64-bit integer
Default: 86400 (1 day)
Maximum age of data that can be rolled back. Negative values for this parameter are not valid.
If the time between the end of the to-be-rolledback instance's oplog and the first operation after the common point (the last point where the source node and the to-be-rolledback node had the same data) exceeds this value, the rollback will fail.
To effectively have an unlimited rollback period, set the value to
2147483647which is the maximum value allowed and equivalent to roughly 68 years.
waitForSecondaryBeforeNoopWriteMSNew in version 3.6.
Available for
mongodonly.Type: integer
Default: 10
The length of time (in milliseconds) that a secondary must wait if the
afterClusterTimeis greater than the last applied time from the oplog. After thewaitForSecondaryBeforeNoopWriteMSpasses, if theafterClusterTimeis still greater than the last applied time, the secondary makes a no-op write to advance the last applied time.The following example sets the
waitForSecondaryBeforeNoopWriteMSto 20 milliseconds:mongod --setParameter waitForSecondaryBeforeNoopWriteMS=20 During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, waitForSecondaryBeforeNoopWriteMS: 20 } )
createRollbackDataFilesAvailable for
mongodonly.Type: boolean
Default: true
Flag that determines whether MongoDB creates rollback files that contains documents affected during a rollback.
By default,
createRollbackDataFilesistrueand MongoDB creates the rollback files.The following example sets
createRollbackDataFilesto false so that the rollback files are not created:mongod --setParameter createRollbackDataFiles=false During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, createRollbackDataFiles: false } ) For more information, see Collect Rollback Data.
replBatchLimitBytesDefault: 104857600 (100MB)
Sets the maximum oplog application batch size in bytes.
Values can range from 16777216 (16MB) to 104857600 (100MB) inclusive.
The following example sets
replBatchLimitBytesto 64 MB so that the rollback files are not created:mongod --setParameter replBatchLimitBytes=67108864 During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, replBatchLimitBytes: 64 * 1024 * 1024 } )
mirrorReadsAvailable for
mongodonly.New in version 4.4.
Type: Document
Default:
{ samplingRate: 0.01, maxTimeMS: 1000 }Specifies the settings for mirrored reads for the
mongodinstance. The settings only take effect when the member is a primary.The parameter
mirrorReadstakes a JSON document with the following fields:FieldDescriptionsamplingRateThe sampling rate used to mirror a subset of operations that support mirroring to a subset of electable (i.e.
priority greater than 0) secondaries. That is, the primary mirrors reads to each electable secondary at the specified sampling rate.Valid values are:
0.0Turns off mirroring.
1.0The primary mirrors all operations that supports mirroring to each electable secondary.
Number between
0.0and1.0(exclusive)The primary randomly samples each electable secondary at the specified rate to be sent mirrored reads.
For example, given a replica set with a primary and two electable secondaries and a sampling rate of
0.10, the primary mirrors reads to each electable secondary at the sampling rate of 10 percent such that one read may be mirrored to one secondary and not to the other or to both or to neither. That is, if the primary receives100operations that can be mirrored, the sampling rate of0.10may result in8reads being mirrored to one secondary and13reads to the other or10to each, etc.The default value is
0.01.maxTimeMSThe maximum time in milliseconds for the mirrored reads. The default value is
1000.The
maxTimeMSfor the mirrored reads is separate from themaxTimeMSof the original read being mirrored.You can set
mirrorReadsduring startup in theconfiguration fileor with the--setParameteroption on the command line. If specifying from the configuration file or on the command line, enclose themirrorReadsdocument in quotes.For example, the following sets the mirror reads sampling rate to
0.10from the command line:mongod --setParameter mirrorReads='{ samplingRate: 0.10 }' Or, to specify in a configuration file:
setParameter: mirrorReads: '{samplingRate: 0.10}' Or if using the
setParametercommand in amongoshell connected to a runningmongod, do not enclose the document in quotes:db.adminCommand( { setParameter: 1, mirrorReads: { samplingRate: 0.10 } } )
Sharding Parameters
Note
Starting in version 4.2, MongoDB removes the parameter
AsyncRequestsSenderUseBaton and always enables the performance
enhancement controlled by the parameter.
disableResumableRangeDeleterNew in version 4.4.
Type: boolean
Default: false
Available for
mongodonly.If set on a shard's primary, specifies if range deletion is paused on the shard. If set to
true, cleanup of chunk`ranges containing :term:`orphaned documents is paused. The shard can continue to donate chunks to other shards, but the donated documents will not be removed from this shard until you set this parameter tofalse. This shard can continue to receive chunks from other shards as long as it does not have a pending range deletion task in theconfig.rangeDeletionscollection that overlaps with the incoming chunk's range.When
disableResumableRangeDeleteristrue, chunk migrations fail if orphaned documents exist on the recipient shard's primary in the same range as the incoming chunks.The parameter has no effect on the
mongodif it is not the shard's primary.Important
If you set
disableResumableRangeDeleterparameter totrue, ensure that you apply it consistently for all members in the shard's replica set. In the event of a failover, this setting's value on the new primary dictates the behavior of the range deleter.You can only set this parameter during start-up and cannot change this setting using the
setParameterdatabase command.mongod --setParameter disableResumableRangeDeleter=false
enableShardedIndexConsistencyCheckNew in version 4.4: (Also available starting in 4.2.6.)
Type: boolean
Default: true
Available for
mongodonly.If set on the config server's primary, enables or disables the index consistency check for sharded collections. The parameter has no effect on the
mongodif it is not the config server's primary.The following example sets
enableShardedIndexConsistencyChecktofalsefor a config server primary:mongod --setParameter enableShardedIndexConsistencyCheck=false During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, enableShardedIndexConsistencyCheck: false } ) Tip
shardedIndexConsistencyCheckIntervalMSparametershardedIndexConsistencymetrics returned by theserverStatuscommand.
opportunisticSecondaryTargetingNew in version 4.4.15.
Type: boolean
Default:
falseAvailable for
mongosonly.Determines whether
mongosperforms opportunistic reads against replica sets.When this parameter is set to
true,mongosdirects secondary reads to secondaries with active connections. It sends the request to the first secondary that accepts the connection. When this parameter is set tofalse,mongosholds secondary reads until it can establish a connection to a specific secondary, (except in the case of hedged reads).Note
For example, to set
opportunisticSecondaryTargetingduring startup:mongos --setParameter opportunisticSecondaryTargeting=true
routingTableCacheChunkBucketSizeNew in version 4.4.25.
Available for both
mongodandmongos.Type: integer
Default: 500
Specifies the size of the routing table cache buckets used to implement chunk grouping optimization. Must be greater than or equal to
0.For example, to set the cache chunk bucket size to
1000on amongod, issue the following at startup:mongod --setParameter routingTableCacheChunkBucketSize=1000 routingTableCacheChunkBucketSizecannot be updated during run time.
shardedIndexConsistencyCheckIntervalMSNew in version 4.4: (Also available starting in 4.2.6.)
Type: integer
Default: 600000
Available for
mongodonly.If set on the config server's primary, the interval, in milliseconds, at which the config server's primary checks the index consistency of sharded collections. The parameter has no effect on the
mongodif it is not the config server's primary.You can only set the parameter during startup, and cannot change this setting using the
setParameterdatabase command.For example, the following sets the interval at 300000 milliseconds (i.e. 5 minutes) at startup:
mongod --setParameter shardedIndexConsistencyCheckIntervalMS=300000 Tip
enableShardedIndexConsistencyCheckparametershardedIndexConsistencymetrics returned by theserverStatuscommandq
enableFinerGrainedCatalogCacheRefreshNew in version 4.4.
Type: boolean
Default: true
Available for both
mongodandmongos.This parameter allows the catalog cache to be refreshed only if the shard needs to be refreshed. If disabled, any stale chunk will cause the entire chunk distribution for a collection to be considered stale and force all routers who contact the shard to refresh their shard catalog cache.
You can only set this parameter during start-up and cannot change this setting using the
setParameterdatabase command.mongod --setParameter enableFinerGrainedCatalogCacheRefresh=true mongos --setParameter enableFinerGrainedCatalogCacheRefresh=true
maxTimeMSForHedgedReadsNew in version 4.4.
Type: integer
Default: 150
Available for
mongosonly.Specifies the maximum time limit (in milliseconds) for the hedged read. That is, the additional read sent to hedge the read operation uses the
maxTimeMSvalue ofmaxTimeMSForHedgedReadswhile the read operation that is being hedged uses themaxTimeMSvalue specified for the operation.For example, to set the limit to 200 milliseconds, you can issue the following during startup:
mongos --setParameter maxTimeMSForHedgedReads=200 Or if using the
setParametercommand in amongoshell connected to a runningmongos:db.adminCommand( { setParameter: 1, maxTimeMSForHedgedReads: 200 } )
maxCatchUpPercentageBeforeBlockingWritesNew in version 4.4.7: (Also available starting in 4.2.15)
Type: integer
Default: 10
Available for
mongodonly.For
moveChunkoperations, specifies the maximum percentage of untrasferred data allowed by the migration protocol (expressed in percentage of the total chunk size) to transition from thecatchupphase to thecommitphase.Setting a higher catchup percentage can decrease the amount of time it takes for the migration to complete at the cost of increased latency during concurrent
upsertanddeleteoperations.For example, to set the maximum percentage to 20, you can issue the followingduring startup:
mongod --setParameter maxCatchUpPercentageBeforeBlockingWrites=20 You cannot change
maxCatchUpPercentageBeforeBlockingWritesduring runtime.
readHedgingModeNew in version 4.4.
Type: string
Default: on
Available for
mongosonly.Specifies whether
mongossupports hedged reads for those read operations whose read preference have enabled the hedged read option.Available values are:
ValueDescriptiononThe
mongosinstance supports hedged reads for read operations whose read preference have enabled the hedged read option.offThe
mongosinstance does not support hedged reads. That is, hedged reads are unavailable, even for read operations whose read preference have enabled the hedged read option.For example, to turn off hedged read support for a
mongosinstance, you can issue the following during startup:mongos --setParameter readHedgingMode=off Or if using the
setParametercommand in amongoshell connected to a runningmongos:db.adminCommand( { setParameter: 1, readHedgingMode: "off" } )
ShardingTaskExecutorPoolHostTimeoutMSType: integer
Default: 300000 (i.e. 5 minutes)
Available for both
mongodandmongos.Maximum time that
mongosgoes without communication to a host beforemongosdrops all connections to the host.If set,
ShardingTaskExecutorPoolHostTimeoutMSshould be greater than the sum ofShardingTaskExecutorPoolRefreshRequirementMSandShardingTaskExecutorPoolRefreshTimeoutMS. Otherwise,mongosadjusts the value ofShardingTaskExecutorPoolHostTimeoutMSto be greater than the sum.The following example sets
ShardingTaskExecutorPoolHostTimeoutMSto120000during startup:mongos --setParameter ShardingTaskExecutorPoolHostTimeoutMS=120000 During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, ShardingTaskExecutorPoolHostTimeoutMS: 120000 } )
ShardingTaskExecutorPoolMaxConnectingNew in version 3.6.
Type: integer
Default: 2
Available for both
mongodandmongos.Maximum number of simultaneous initiating connections (including pending connections in setup/refresh state) each TaskExecutor connection pool can have to a
mongodinstance. You can set this parameter to control the rate at whichmongosadds connections to amongodinstance.If set,
ShardingTaskExecutorPoolMaxConnectingshould be less than or equal toShardingTaskExecutorPoolMaxSize. If it is greater,mongosignores theShardingTaskExecutorPoolMaxConnectingvalue.The following example sets
ShardingTaskExecutorPoolMaxConnectingto20during startup:mongos --setParameter ShardingTaskExecutorPoolMaxConnecting=20 During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, ShardingTaskExecutorPoolMaxConnecting: 20 } )
ShardingTaskExecutorPoolMaxSizeType: integer
Default: 2 64 - 1
Available for both
mongodandmongos.Maximum number of outbound connections each TaskExecutor connection pool can open to any given
mongodinstance. The maximum possible connections to any given host across all TaskExecutor pools is:ShardingTaskExecutorPoolMaxSize * taskExecutorPoolSize The following example sets
ShardingTaskExecutorPoolMaxSizeto20during startup:mongos --setParameter ShardingTaskExecutorPoolMaxSize=20 During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, ShardingTaskExecutorPoolMaxSize: 20 } ) mongoscan have up tonTaskExecutor connection pools, wherenis the number of cores. SeetaskExecutorPoolSize.
ShardingTaskExecutorPoolMaxSizeForConfigServersNew in version 4.4.16.
Type: integer
Default: -1
Available for both
mongodandmongos.Optional override for
ShardingTaskExecutorPoolMaxSizeto set the maximum number of outbound connections each TaskExecutor connection pool can open to a configuration server.When set to:
-1,ShardingTaskExecutorPoolMaxSizeis used. This is the default.an integer value greater than
-1, overrides the maximum number of outbound connections each TaskExecutor connection pool can open to a configuration server.
Parameter only applies to sharded deployments.
The following example sets
ShardingTaskExecutorPoolMaxSizeto2during startup, which sets the maximum number of outbound connections each TaskExecutor connection pool can open to a configuration server to2:mongos --setParameter ShardingTaskExecutorPoolMaxSizeForConfigServers=2 During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, ShardingTaskExecutorPoolMaxSizeForConfigServers: 2 } )
ShardingTaskExecutorPoolMinSizeType: integer
Default: 1
Available for both
mongodandmongos.Minimum number of outbound connections each TaskExecutor connection pool can open to any given
mongodinstance.ShardingTaskExecutorPoolMinSizeconnections are created the first time a connection to a new host is requested from the pool. While the pool is idle, the pool maintains this number of connections untilShardingTaskExecutorPoolHostTimeoutMSmilliseconds pass without any application using that pool.For a
mongosusing thewarmMinConnectionsInShardingTaskExecutorPoolOnStartupparameter, theShardingTaskExecutorPoolMinSizeparameter also controls how many connections to each shard host are established on startup of themongosinstance before it begins accepting incoming client connections.Note
In MongoDB 4.4, the
warmMinConnectionsInShardingTaskExecutorPoolOnStartupparameter is enabled by default for themongos.The following example sets
ShardingTaskExecutorPoolMinSizeto2during startup:mongos --setParameter ShardingTaskExecutorPoolMinSize=2 During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, ShardingTaskExecutorPoolMinSize: 2 } ) mongoscan have up tonTaskExecutor connection pools, wherenis the number of cores. SeetaskExecutorPoolSize.
ShardingTaskExecutorPoolMinSizeForConfigServersNew in version 4.4.16.
Type: integer
Default: -1
Available for both
mongodandmongos.Optional override for
ShardingTaskExecutorPoolMinSizeto set the minimum number of outbound connections each TaskExecutor connection pool can open to a configuration server.When set to:
-1,ShardingTaskExecutorPoolMinSizeis used. This is the default.an integer value greater than
-1, overrides the minimum number of outbound connections each TaskExecutor connection pool can open to a configuration server.
Parameter only applies to sharded deployments.
The following example sets
ShardingTaskExecutorPoolMinSizeto2during startup, which sets the minimum number of outbound connections each TaskExecutor connection pool can open to a configuration server to2:mongos --setParameter ShardingTaskExecutorPoolMinSizeForConfigServers=2 During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, ShardingTaskExecutorPoolMinSizeForConfigServers: 2 } )
ShardingTaskExecutorPoolRefreshRequirementMSType: integer
Default: 60000 (1 minute)
Available for both
mongodandmongos.Maximum time the
mongoswaits before attempting to heartbeat a resting connection in the pool.If set,
ShardingTaskExecutorPoolRefreshRequirementMSshould be greater thanShardingTaskExecutorPoolRefreshTimeoutMS. Otherwise,mongosadjusts the value ofShardingTaskExecutorPoolRefreshTimeoutMSto be less thanShardingTaskExecutorPoolRefreshRequirementMS.The following example sets
ShardingTaskExecutorPoolRefreshRequirementMSto90000during startup:mongos --setParameter ShardingTaskExecutorPoolRefreshRequirementMS=90000 During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, ShardingTaskExecutorPoolRefreshRequirementMS: 90000 } )
ShardingTaskExecutorPoolRefreshTimeoutMSType: integer
Default: 20000 (20 seconds)
Available for both
mongodandmongos.Maximum time the
mongoswaits for a heartbeat before timing out the heartbeat.If set,
ShardingTaskExecutorPoolRefreshTimeoutMSshould be less thanShardingTaskExecutorPoolRefreshRequirementMS. Otherwise,mongosadjusts the value ofShardingTaskExecutorPoolRefreshTimeoutMSto be less thanShardingTaskExecutorPoolRefreshRequirementMS.The following example sets
ShardingTaskExecutorPoolRefreshTimeoutMSto30000during startup:mongos --setParameter ShardingTaskExecutorPoolRefreshTimeoutMS=30000 During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, ShardingTaskExecutorPoolRefreshTimeoutMS: 30000 } )
ShardingTaskExecutorPoolReplicaSetMatchingNew in version 4.2.
Changed in version 4.4.5: (Also starting in 4.2.13)
Type: string
Default: "automatic"
Available for both
mongodandmongos.On a
mongosinstance, this parameter sets the policy that determines the minimum size limit of its connection pools to nodes within replica sets.On a
mongodinstance, this parameter sets the policy that determines the minimum size limit of its connection pools to nodes within other replica sets.Note that this parameter only manages connections for operations that are directly related to user requests and CRUD operations.
Available values are:
Matching PolicyDescription"automatic"(Default)Starting in 4.4.5 (and 4.2.13),
"automatic"is the new default value.When set for a
mongos, the instance follows the behavior specified for the"matchPrimaryNode"option.When set for a
mongod, the instance follows the behavior specified for the"disabled"option.Note
If the
ShardingTaskExecutorPoolReplicaSetMatchingis set to"automatic", thereplicaSetMatchingStrategystill describes the actual policy being used, not"automatic". To find the value of theShardingTaskExecutorPoolReplicaSetMatching, usegetParameterwhich returns the value of the server parameter."matchPrimaryNode"When set for a
mongos, the minimum size limit of the instance's connection pool to each secondary of a replica set in the sharded cluster (specifically, shard replica set and config servers) is equal to the size of its connection pool to that replica set's primary.When set for a
mongod, the minimum size limit of the instance's connection pool to each secondary of another replica set in the sharded cluster (specifically, shard replica set and config servers) is equal to the size of its connection pool to that replica set's primary.Warning
If multiple shard servers in your topology can experience a rapid influx of cross-shard operations, do not set this option on your
mongodinstances.In case of a primary stepdown,
matchPrimaryNodeensures that any secondary that becomes the primary can handle the current level of primary reads and writes."matchBusiestNode"When set for a
mongos, the instance's minimum size limit of the connection pool to each member of a replica set in the sharded cluster (specifically, shard replica set and config servers) is equal to the largest among the active connection counts to the primary and each secondary member of that replica set.When set for a
mongod, the instance's minimum size limit of the connection pool to each member of another replica set in the sharded cluster (specifically, shard replica set and config servers) is equal to the largest among the active connection counts to the primary and each secondary member of that replica set.With
"matchBusiestNode",mongosmaintains enough connections to each secondary to handle the current level of primary and secondary reads and writes. The number of connections to maintain in the pool decreases as the number of active connections decreases."disabled"When set for a
mongos, the instance's minimum number of connections in the instance's connection pool to each node of a replica set in the sharded clusterv (specifically, shard replica set and config servers) is equal to theShardingTaskExecutorPoolMinSize.When set for a
mongod, the instance's minimum number of connections in the instance's connection pool to each node of another replica set in the sharded cluster (specifically, shard replica set and config servers) is equal to theShardingTaskExecutorPoolMinSize.The following example sets the
ShardingTaskExecutorPoolReplicaSetMatchingto"automatic"during startup:mongod --setParameter ShardingTaskExecutorPoolReplicaSetMatching="automatic" During runtime, you can also set the parameter with the
setParametercommand:db.adminCommand( { setParameter: 1, ShardingTaskExecutorPoolReplicaSetMatching: "automatic" } )
taskExecutorPoolSizeType: integer
Default: 1
Available for
mongosonly.The number of Task Executor connection pools to use for a given
mongos.If the parameter value is
0or less, the number of Task Executor connection pools is the number of cores with the following exceptions:If the number of cores is less than 4, the number of Task Executor connection pools is 4.
If the number of cores is greater than 64, the number of Task Executor connection pools is 64.
When running MongoDB on Linux, you cannot modify the
taskExecutorPoolSizefrom the default value of1. You may modify this parameter when running MongoDB on Windows or macOS.The default value of
taskExecutorPoolSizeis1.You can only set this parameter during start-up and cannot change this setting using the
setParameterdatabase command.mongos --setParameter taskExecutorPoolSize=6
loadRoutingTableOnStartupNew in version 4.4.
Type: boolean
Default: true
Available for
mongosonly.Configures a
mongosinstance to preload the routing table for a sharded cluster on startup. With this setting enabled, themongoscaches the cluster-wide routing table for each sharded collection as part of its startup procedure, before it begins accepting client connections.Without this setting enabled, the
mongosonly loads a routing table as needed for incoming client connections, and only loads the specific routing table for the namespace of a given request.A
mongosinstance with theloadRoutingTableOnStartupparameter enabled may experience longer startup times, but will result in faster servicing of initial client connections once started.loadRoutingTableOnStartupis enabled by default.You can only set this parameter on startup, using either the
setParameterconfiguration file setting or the--setParametercommand line option.
warmMinConnectionsInShardingTaskExecutorPoolOnStartupNew in version 4.4.
Type: boolean
Default: true
Available for
mongosonly.Configures a
mongosinstance to prewarm its connection pool on startup. With this parameter enabled, themongosattempts to establishShardingTaskExecutorPoolMinSizenetwork connections to each shard server as part of its startup procedure, before it begins accepting client connections.A timeout for this behavior can be configured with the
warmMinConnectionsInShardingTaskExecutorPoolOnStartupWaitMSparameter. If this timeout is reached, themongoswill begin accepting client connections regardless of the size of its connection pool.A
mongosinstance with this parameter enabled may experience longer startup times, but will result in faster servicing of initial client connections once started.warmMinConnectionsInShardingTaskExecutorPoolOnStartupis enabled by default.You can only set this parameter on startup, using either the
setParameterconfiguration file setting or the--setParametercommand line option.
warmMinConnectionsInShardingTaskExecutorPoolOnStartupWaitMSNew in version 4.4.
Type: integer
Default: 2000 (i.e. 2 seconds)
Available for
mongosonly.Sets the timeout threshold in milliseconds for a
mongosto wait forShardingTaskExecutorPoolMinSizeconnections to be established per shard host when using thewarmMinConnectionsInShardingTaskExecutorPoolOnStartupparameter. If this timeout is reached, themongoswill begin accepting client connections regardless of the size of its connection pool.You can only set this parameter on startup, using either the
setParameterconfiguration file setting or the--setParametercommand line option.
migrateCloneInsertionBatchDelayMSAvailable for
mongodonly.Type: Non-negative integer
Default: 0
Time in milliseconds to wait between batches of insertions during cloning step of the migration process. This wait is in addition to the
secondaryThrottle.The default value of
0indicates no additional wait.The following sets the
migrateCloneInsertionBatchDelayMSto 200 milliseconds:mongod --setParameter migrateCloneInsertionBatchDelayMS=200 The parameter may also be set using the
setParametercommand:db.adminCommand( { setParameter: 1, migrateCloneInsertionBatchDelayMS: 200 } )
migrateCloneInsertionBatchSizeAvailable for
mongodonly.Type: Non-negative integer
Default: 0
The maximum number of documents to insert in a single batch during the cloning step of the migration process.
The default value of
0indicates no maximum number of documents per batch. However, in practice, this results in batches that contain up to 16 MB of documents.The following sets the
migrateCloneInsertionBatchSizeto 100 documents:mongod --setParameter migrateCloneInsertionBatchSize=100 The parameter may also be set using the
setParametercommand:db.adminCommand( { setParameter: 1, migrateCloneInsertionBatchSize: 100 } )
orphanCleanupDelaySecsNew in version 3.6.
Default: 900 (15 minutes)
Available for
mongodonly.Minimum delay before a migrated chunk is deleted from the source shard.
Before deleting the chunk during chunk migration, MongoDB waits for
orphanCleanupDelaySecsor for in-progress queries involving the chunk to complete on the shard primary, whichever is longer.However, because the shard primary has no knowledge of in-progress queries run on the shard secondaries, queries that use the chunk but are run on secondaries may see documents disappear if these queries take longer than the time to complete the shard primary queries and the
orphanCleanupDelaySecs.Note
This behavior only affects in-progress queries that start before the chunk migration. Queries that start after the chunk migration starts will not use the migrating chunk.
If a shard has storage constraints, consider reducing this value temporarily. If running queries that exceed 15 minutes on shard secondaries, consider increasing this value.
The following sets the
orphanCleanupDelaySecsto 20 minutes:mongod --setParameter orphanCleanupDelaySecs=1200 This may also be set using the
setParametercommand:db.adminCommand( { setParameter: 1, orphanCleanupDelaySecs: 1200 } )
rangeDeleterBatchDelayMSAvailable for
mongodonly.Type: Non-negative integer
Default: 20
The amount of time in milliseconds to wait before the next batch of deletion during the cleanup stage of chunk migration (or the
cleanupOrphanedcommand).In MongoDB 3.4, consider whether _secondaryThrottle is set before modifying the
rangeDeleterBatchDelayMS. In MongoDB 3.4, the _secondaryThrottle replication delay occurs after each document deletion instead of after the batch deletion.In MongoDB 3.6+, the _secondaryThrottle replication delay occurs after each batch deletion.
The following sets the
rangeDeleterBatchDelayMSto 200 milliseconds:mongod --setParameter rangeDeleterBatchDelayMS=200 The parameter may also be set using the
setParametercommand:db.adminCommand( { setParameter: 1, rangeDeleterBatchDelayMS: 200 } )
rangeDeleterBatchSizeAvailable for
mongodonly.Type: Non-negative integer
Default: 2147483647 starting in MongoDB 4.4.12 (128 in earlier MongoDB versions)
The maximum number of documents in each batch to delete during the cleanup stage of chunk migration (or the
cleanupOrphanedcommand).A value of
0indicates that the system chooses the default value.The following example sets
rangeDeleterBatchSizeto 32 documents:mongod --setParameter rangeDeleterBatchSize=32 The parameter may also be set using the
setParametercommand:db.adminCommand( { setParameter: 1, rangeDeleterBatchSize: 32 } )
skipShardingConfigurationChecksNew in version 3.6.3.
Available for
mongodonly.Type: boolean
Default: false
When
true, allows for starting a shard member or config server member as a standalone for maintenance operations. This parameter is mutually exclusive with the--configsvror--shardsvroptions.You can only set this parameter during start-up and cannot change this setting using the
setParameterdatabase command.mongod --setParameter skipShardingConfigurationChecks=true Important
Once maintenance has completed, remove the
skipShardingConfigurationChecksparameter when restarting themongod.
findChunksOnConfigTimeoutMSNew in version 5.0.
Available for both
mongodandmongos.Type: Non-negative integer
Default: 900000
The timeout in milliseconds for find operations on
chunks.If there is a large number of chunks in the cluster and queries on the
chunkscollection fail with the errorExceededTimeLimit, increase the parameter value:mongod --setParameter findChunksOnConfigTimeoutMS=1000000
Storage Parameters
journalCommitIntervalAvailable for
mongodonly.Specify an integer between
1and500signifying the number of milliseconds (ms) between journal commits.Consider the following example which sets the
journalCommitIntervalto200ms:db.adminCommand( { setParameter: 1, journalCommitInterval: 200 } )
syncdelayAvailable for
mongodonly.Specify the interval in seconds when
mongodflushes its working memory to disk. By default,mongodflushes memory to disk every 60 seconds. In almost every situation you should not set this value and use the default setting.Consider the following example which sets the
syncdelayto60seconds:db.adminCommand( { setParameter: 1, syncdelay: 60 } ) To provide durable data, WiredTiger uses checkpoints. For more details, see Journaling and the WiredTiger Storage Engine.
honorSystemUmaskNew in version 3.6.
Available for
mongodonly.Default:
falseIf
honorSystemUmaskis set totrue, new files created by MongoDB have permissions in accordance with the user'sumasksettings. You cannot setprocessUmaskifhonorSystemUmaskis set totrue.If
honorSystemUmaskis set tofalse, new files created by MongoDB have permissions set to600, which gives read and write permissions only to the owner. New directories have permissions set to700. You can useprocessUmaskto override the default permissions for groups and other users on all new files created by MongoDB.You can only set this parameter during start-up and cannot change this setting using the
setParameterdatabase command.mongod --setParameter honorSystemUmask=true Note
honorSystemUmaskis not available on Windows systems.
processUmaskNew in version 4.4.
Available for
mongodonly.Overrides the default permissions used for groups and other users when
honorSystemUmaskis set tofalse. By default, whenhonorSystemUmaskis set tofalse, new files created by MongoDB have permissions set to600. Use theprocessUmaskparameter to override this default with a customumaskvalue. The file owner inherits permissions from the systemumask.You cannot set this parameter if
honorSystemUmaskis set totrue. You can only set this parameter during start-up and cannot change this setting using thesetParameterdatabase command.Consider the following example, which sets the permissions for groups and other users to read/write only and retains the system
umasksettings for the owner:mongod --setParameter processUmask=011 Note
processUmaskis not available on Windows systems.
WiredTiger Parameters
wiredTigerMaxCacheOverflowSizeGBNote
Deprecated in MongoDB 4.4
MongoDB deprecates the
wiredTigerMaxCacheOverflowSizeGBparameter. The parameter has no effect starting in MongoDB 4.4.Default: 0 (No specified maximum)
Available for
mongodonly.Specify the maximum size (in GB) for the "lookaside (or cache overflow) table" file
WiredTigerLAS.wtfor MongoDB 4.2.1-4.2.x. The file no longer exists starting in version 4.4.The parameter can accept the following values:
ValueDescription0The default value. If set to
0, the file size is unbounded.number >= 0.1
You can only set this parameter during runtime using the
setParameterdatabase command:db.adminCommand( { setParameter: 1, wiredTigerMaxCacheOverflowSizeGB: 100 } ) To set the maximum size during start up, use the
storage.wiredTiger.engineConfig.maxCacheOverflowFileSizeGBinstead.New in version 4.2.1.
wiredTigerConcurrentReadTransactionsAvailable for
mongodonly.Available for the WiredTiger storage engine only.
Specify the maximum number of concurrent read transactions allowed into the WiredTiger storage engine.
db.adminCommand( { setParameter: 1, wiredTigerConcurrentReadTransactions: <num> } )
wiredTigerConcurrentWriteTransactionsAvailable for
mongodonly.Available for the WiredTiger storage engine only.
Specify the maximum number of concurrent write transactions allowed into the WiredTiger storage engine.
db.adminCommand( { setParameter: 1, wiredTigerConcurrentWriteTransactions: <num> } )
wiredTigerEngineRuntimeConfigAvailable for
mongodonly.Specify
wiredTigerstorage engine configuration options for a runningmongodinstance. You can only set this parameter using thesetParametercommand and not using the command line or configuration file option.Warning
Avoid modifying the
wiredTigerEngineRuntimeConfigunless under the direction from MongoDB engineers as this setting has major implication across both WiredTiger and MongoDB.Consider the following operation prototype:
db.adminCommand({ "setParameter": 1, "wiredTigerEngineRuntimeConfig": "<option>=<setting>,<option>=<setting>" }) See the WiredTiger documentation for all available WiredTiger configuration options.
Auditing Parameters
auditAuthorizationSuccessDefault:
falseNote
Available only in MongoDB Enterprise and MongoDB Atlas.
Available for both
mongodandmongos.Enables the auditing of authorization successes for the authCheck action.
When
auditAuthorizationSuccessisfalse, the audit system only logs the authorization failures forauthCheck.To enable the audit of authorization successes, issue the following command:
db.adminCommand( { setParameter: 1, auditAuthorizationSuccess: true } ) Enabling
auditAuthorizationSuccessdegrades performance more than logging only the authorization failures.Tip
transactionLifetimeLimitSecondsAvailable for
mongodonly.Default: 60
Specifies the lifetime of multi-document transactions. Transactions that exceeds this limit are considered expired and will be aborted by a periodic cleanup process. The cleanup process runs every
transactionLifetimeLimitSeconds/2 seconds or at least once per every 60 seconds.The cleanup process helps relieve storage cache pressure.
The minimum value for transactionLifetimeLimitSeconds is
1second.The following sets the
transactionLifetimeLimitSecondsto30seconds:db.adminCommand( { setParameter: 1, transactionLifetimeLimitSeconds: 30 } ) You can also set parameter
transactionLifetimeLimitSecondsat startup time.mongod --setParameter "transactionLifetimeLimitSeconds=30" To set the parameter for a sharded cluster, the parameter must be modified for all shard replica set members.
maxTransactionLockRequestTimeoutMillisAvailable for
mongodonly.Type: integer
Default: 5
The maximum amount of time in milliseconds that multi-document transactions should wait to acquire locks required by the operations in the transaction.
If the transaction cannot acquire the locks after waiting
maxTransactionLockRequestTimeoutMillis, the transaction aborts.By default, multi-document transactions wait
5milliseconds. That is, if the transaction cannot acquire the locks within5milliseconds, the transaction aborts. If an operation provides a greater timeout in a lock request,maxTransactionLockRequestTimeoutMillisoverrides the operation-specific timeout.You can set
maxTransactionLockRequestTimeoutMillisto:0such that if the transaction cannot acquire the required locks immediately, the transaction aborts.A number greater than
0to wait the specified time to acquire the required locks. This can help obviate transaction aborts on momentary concurrent lock acquisitions, like fast-running metadata operations. However, this could possibly delay the abort of deadlocked transaction operations.-1to use the operation specific timeout.
The following sets the
maxTransactionLockRequestTimeoutMillisto20milliseconds:db.adminCommand( { setParameter: 1, maxTransactionLockRequestTimeoutMillis: 20 } ) You can also set this parameter during start-up:
mongod --setParameter maxTransactionLockRequestTimeoutMillis=20
shouldMultiDocTxnCreateCollectionAndIndexesNew in version 4.4.
Type: boolean
Default: true
A flag that enables or disables the creation of a collection or an index inside transactions. Set the parameter to:
trueto enable. (Default)falseto disable.
You can set the parameter during startup or runtime.
Important
When setting the parameter for a sharded cluster, set the parameter on all shards.
To set the parameter at startup, specify the parameter in the
configuration fileor with the--setParameteroption on the command line. For example:mongod --setParameter shouldMultiDocTxnCreateCollectionAndIndexes=false To modify during runtime, you can use the
setParametercommand; for example:db.adminCommand( { setParameter: 1, shouldMultiDocTxnCreateCollectionAndIndexes: false } )