Configuring MongoDB workspace data connections
During workspace creation, under Connection Type, select MongoDB.
Connecting to the source database
The Source Settings section contains the connection information for the source database.
Providing the connection details
To provide the connection details, you can either populate the connection fields or use a connection string.
Populating the connection fields
By default, Use connection string is off, and you provide the connection values in the individual fields:
In the Server field, provide the host name or IP address of the MongoDB instance.
In the Database field, provide the name of the MongoDB database.
In the Port field, provide the port number to connect to the server host.
In the Username field, provide the username of a MongoDB user in your authentication database.
For the password, you can either specify the password manually, or you can select a secret name from a secrets manager. The selected secret must store a password. The secrets manager option only displays if at least one secrets manager is configured. For more information about configuring the available secrets managers, go to Configuring secrets managers for database connections. To enter the password manually:
Click Provide Password.
In the password field, enter the password.
To use a secret name from a secrets manager:
Click Use Secrets Manager.
From the secrets manager dropdown list, select the secrets manager. Structural connects to the secrets manager and retrieves a list of available secret names.
From the secret name dropdown list, select the secret name.
In the Authentication Database, provide the database where the MongoDB user that you authenticate with is stored. The default is often the admin database.
To test the connection to the source database, click Test Source Connection.
Using a connection string
To use a connection string to connect to the source database:
Toggle Use Connection String to the on position.
In the Connection String field, provide a MongoDB connection string. For the password, use
<password>
as a placeholder value.In the Database field, provide the name of the MongoDB database.
In the Password field, provide the password to use to replace
<password>
.To provide the user password to replace
<password>
, you can either specify the password manually, or you can select a secret name from a secrets manager. The selected secret must store a password. The secrets manager option only displays if at least one secrets manager is configured. For information about configuring the available secrets managers, go to Configuring secrets managers for database connections. To enter the password manually:Click Provide Password.
In the password field, enter the password.
To use a secret name from a secrets manager:
Click Use Secrets Manager.
From the secrets manager dropdown list, select the secrets manager. Structural connects to the secrets manager and retrieves a list of available secret names.
From the secret name dropdown list, select the secret name.
To test the connection to the source database, click Test Source Connection.
Using a DNS seed list
The Use Srv setting indicates whether you connect to a DNS seed list.
By default, the toggle is in the off position.
If you connect to a DNS seed list, then toggle the setting to the on position.
Ensuring encryption of source database authentication
The Enable SSL/TLS setting indicates whether to encrypt the source database authentication.
By default, the setting is in the on position. We strongly recommend that you do not turn off this setting.
Trusting the server certificate
To indicate that Tonic Structural should trust the server certificate, toggle Trust Server Certificate to the on position.
Providing your own client certificate
To specify your own client certificate for authentication:
Click the expand icon for Client certificate settings.
For Client Cert, choose the client certificate file.
For Client Key, choose the key file for the client certificate.
For Root Cert, choose the root certificate file.
Blocking data generation on all schema changes
By default, data generation is not blocked for schema changes that do not conflict with your workspace configuration.
To block data generation when there are any schema changes, regardless of whether they conflict with your workspace configuration, toggle Block data generation on schema changes to the on position.
Connecting to the destination database
The Destination Settings section contains the connection information for the destination database.
Copying the connection details from the source database
To copy the connection and authentication details from the source database:
Click Copy Settings from Source.
For the password, you can either specify the password manually, or you can select a secret name from a secrets manager. The selected secret must store a password. The secrets manager option only displays if at least one secrets manager is configured. For information about configuring the available secrets managers, go to Configuring secrets managers for database connections. To enter the password manually:
Click Provide Password.
In the password field, enter the password.
To use a secret name from a secrets manager:
Click Use Secrets Manager.
From the secrets manager dropdown list, select the secrets manager. Structural connects to the secrets manager and retrieves a list of available secret names.
From the secret name dropdown list, select the secret name.
To test the connection to the destination database, click Test Destination Connection.
Providing destination database connection details
If you don't copy the details from the source database, then you can either populate the connection fields or use a connection string.
Populating the connection fields
By default, Use connection string is off, and you provide the connection values in the individual fields:
In the Server field, provide the host name or IP address of the MongoDB instance.
In the Database field, provide the name of the MongoDB database.
In the Port field, provide the port number to connect to the server host.
In the Username field, provide the username of a MongoDB user in your authentication database.
For the password, you can either specify the password manually, or you can select a secret name from a secrets manager. The selected secret must store a password. The secrets manager option only displays if at least one secrets manager is configured. For information about configuring the available secrets managers, go to Configuring secrets managers for database connections. To enter the password manually:
Click Provide Password.
In the password field, enter the password.
To use a secret name from a secrets manager:
Click Use Secrets Manager.
From the secrets manager dropdown list, select the secrets manager. Structural connects to the secrets manager and retrieves a list of available secret names.
From the secret name dropdown list, select the secret name.
In the Authentication Database, provide the database where the MongoDB user that you authenticate with is stored. The default is often the admin database.
To test the connection to the destination database, click Test Destination Connection.
Using a connection string
To use a connection string to connect to the destination database:
Toggle Use Connection String to the on position.
In the Connection String field, provide a MongoDB connection string. For the password, use
<password>
as a placeholder value.In the Database field, provide the name of the MongoDB database.
In the Password field, provide the password to use to replace
<password>
.To provide the user password to replace
<password>
, you can either specify the password manually, or you can select a secret name from a secrets manager. The selected secret must store a password. The secrets manager option only displays if at least one secrets manager is configured. For information about configuring the available secrets managers, go to Configuring secrets managers for database connections. To enter the password manually:Click Provide Password.
In the password field, enter the password.
To use a secret name from a secrets manager:
Click Use Secrets Manager.
From the secrets manager dropdown list, select the secrets manager. Structural connects to the secrets manager and retrieves a list of available secret names.
From the secret name dropdown list, select the secret name.
To test the connection to the destination database, click Test Destination Connection.
Using a DNS seed list
The Use Srv setting indicates whether you connect to a DNS seed list.
By default, the toggle is in the off position.
If you connect to a DNS seed list, then toggle the setting to the on position.
Ensuring encryption of destination database authentication
By default, SSL is enabled, and Enable SSL/TLS is in the on position. We strongly recommend that you do not turn off SSL.
Trusting the server certificate
To indicate that Structural should trust the server certificate, toggle Trust Server Certificate to the on position.
Providing your own client certificate
To specify your own client certificate for authentication:
Click the expand icon for Client certificate settings.
For Client Cert, choose the client certificate file.
For Client Key, choose the key file for the client certificate.
For Root Cert, choose the root certificate file.
Last updated
Was this helpful?