Docs Menu

Restore a Cluster from a Cloud Backup

On this page

  • Restore Restrictions
  • Fallback Snapshots
  • Prerequisites
  • Procedure
  • Restore a Snapshot of a Cluster with Encryption at Rest
  • View Status of Snapshot Restorations
Note
Feature Unavailable in Free-Tier Clusters

This feature is not available for M0 free clusters. To learn more about which features are unavailable, see Atlas M0 (Free Cluster), M2, and M5 Limitations.

Atlas lets you restore data from a scheduled Cloud Backup.

Note

You must have the Project Owner role for the Atlas projects that contain the source and target clusters to restore data from one Atlas cluster to another.

Tip
See also:
  • Atlas can only restore to a replica set or sharded cluster that uses the same encryption provider as the source snapshot cluster.
  • The target cluster must run the same or newer release version of MongoDB as the snapshot MongoDB version.
  • Atlas can't restore a sharded cluster snapshot to a replica set.

If a scheduled snapshot fails for any reason, Atlas attempts to repeat the snapshot process. If necessary, you may use the resulting fallback snapshot to restore the cluster. This isn't recommended: fallback snapshots use a different process from regular snapshots. They may contain inconsistent data.

Fallback snapshots are marked in the UI with a warning icon, and a warning message appears in the restore modal window if the restore uses a fallback snapshot.

Warning

Restoring your cluster from a fallback snapshot may result in inconsistent data across your cluster, and should be considered an option of last resort.

You must ensure that the target Atlas cluster does not receive client requests during restoration. You must either:

  • Restore to a new Atlas cluster and reconfigure your application to use that new cluster once the new deployment is running, or
  • Ensure that the target Atlas cluster cannot receive client requests while you restore data.
Important
Restoring Snapshots for Clusters using Encryption at Rest

Atlas automatically encrypts Cloud Backups for clusters using Encryption at Rest using Customer Key Management, in addition to the existing encryption applied to all Atlas storage and snapshot volumes. For documentation on restoring an encrypted snapshot, see Restore a Snapshot of a Cluster with Encryption at Rest

The following instructions only apply to snapshots for clusters not using Encryption at Rest.

Important

Atlas deletes all existing data on the target cluster prior to the restore. The cluster will be unavailable for the duration of the restore.

  1. Click Restore in the Actions column for the snapshot you want to restore.
  2. From the Restore dialog, select the target cluster to which you want to restore.

    Note

    To optimize performance and reduce the amount of time it takes to restore, use these tips:

    • Select a target cluster that isn't a global, multi-region, or multi-cloud cluster.
    • Select a target cluster that belongs to the same Atlas project and the same cloud provider region as the snapshot.
    • Select a cluster tier with the same storage capacity as the capacity of the original volume used by the source cluster.
    • If the target cluster runs on AWS with configured IOPS, select the configured IOPS to fall within the valid range.
    • Select a tier that hasn't been configured to use NVMe storage. The tier can support NVMe storage, but if you enable NVMe, restore performance degrades.
  3. Click Restore.
  4. Restart your application and ensure it uses the new target cluster.
Important

Snapshots of clusters using Encryption at Rest using your Key Management can only restore to other clusters that use Encryption at Rest. You cannot restore a snapshot with Encryption at Rest to a Cloud Manager project.

If the target project does not have a cluster with Encryption at Rest enabled, you can either deploy a cluster with Encryption at Rest, or enable Encryption at Rest in an existing cluster.

Clusters which use AWS KMS encrypt their PIT restore oplog data with the customer's CMK. The current CMK must be valid for the encrypted oplog data to perform a restore from a snapshot.

  1. Click Databases in the top-left corner of Atlas.
  2. From the Database Deployments view, click on the cluster name.
  3. Click the Backup tab.

    If the cluster has no Backup tab, then Atlas backups are disabled for that cluster and no snapshots are available. You can enable backups when modifying the cluster.

  4. Click Restore in the Actions column for the snapshot you want to restore.
  5. From the Restore dialog, select the target Atlas Project to which you want to restore. You can restore to any Atlas project for which the authenticated Atlas user has the Project Owner role.
  6. Select the Cluster to restore to. You can only restore to an Atlas replica set running Encryption at Rest. The target cluster must run the same or greater version of MongoDB as the MongoDB Version of the snapshot.

    After the restoration procedure, Atlas triggers a key rotation for MongoDB encryption key. Atlas then encrypts the new MongoDB encryption keys based on the configured Encryption at Rest provider for the target cluster.

  7. Restart your application and ensure it uses the new target cluster.

If Atlas has an issue with the encryption of either the snapshot or the target cluster, it displays one of the following errors:

Error
Result
Cannot restore a non-encrypted snapshot to a cluster with Encryption at Rest enabled.
The snapshot cannot be restored to Atlas.
Target cluster does not have encryption enabled.
You can either deploy a new target cluster with Encryption at Rest, or enable Encryption at Rest on your desired target cluster.
Encryption provider of target cluster does not match selected snapshot's encryption provider.

The encryption provider for the snapshot and target cluster do not match. You can either:

  1. Create a new snapshot with the same encryption provider.
  2. Change the encryption provider for the target cluster.
Encryption credentials on snapshot are not present.
Atlas cannot restore a snapshot whose encryption key was deleted.

Atlas provides a detailed list of completed and in-progress snapshot restorations, including when Atlas took the snapshot and the snapshot's delivery type. To view this list, from a cluster's Backup tab, click the Restores & Downloads tab.

The Status column of the table displays the results of completed snapshots, and the progress of snapshots currently being restored.

  • For manually downloaded snapshots, the Status column displays progress while Atlas prepares the download link. Once the download is ready, the column displays the link to download the snapshot.
  • For automated restores and Continuous Cloud Backup restores, the Status column updates as the restoration progresses on each node in the cluster. When the restoration completes, the column displays the time of completion and the cluster to which Atlas restored the snapshot.
Give Feedback
MongoDB logo
© 2021 MongoDB, Inc.

About

  • Careers
  • Legal Notices
  • Privacy Notices
  • Security Information
  • Trust Center
© 2021 MongoDB, Inc.