Configure IP Access List Entries
On this page
Atlas only allows client connections to the cluster from entries in the project's IP access list. Each entry is either a single IP address or a CIDR-notated range of addresses. For AWS clusters with one or more VPC Peering connections to the same AWS region, you can specify a Security Group associated with a peered VPC.
For Atlas clusters deployed on Google Cloud Platform (GCP) or Microsoft Azure, add the IP addresses of your Google Cloud or Azure services to Atlas project IP access list to grant those services access to the cluster.
The IP access list applies to all clusters in the project and can have up to 200 IP access list entries, with the following exception: projects with an existing sharded cluster created before August 25, 2017 can have up to 100 IP access list entries.
Atlas supports creating temporary IP access list entries that expire within a user-configurable 7-day period.
Atlas audits the creation, deletion, and updates of both temporary and permanent IP access list entries in the project's Activity Feed.
To view the project's Activity Feed, click Activity Feed in the Project section of the left navigation pane.
Tip
See also:
Note
Activity Feed Considerations
Atlas does not report updates to a IP access list entry's comment in the Activity Feed.
When you modify the address of a IP access list entry, the Activity Feed reports two new activities: one for the deletion of the old entry and one for the creation of the new entry.
Required Access
To manage IP Access List entries, you must have Project Owner
access
to the project.
Users with Organization Owner
access must add themselves to the
project as a Project Owner
.
View IP Access List Entries
To list IP access list entries for your project using the Atlas CLI, run the following command:
atlas accessLists list [options]
To return the details for the IP access list entry you specify using the Atlas CLI, run the following command:
atlas accessLists describe <entry> [options]
To learn more about the syntax and parameters for the previous commands, see the Atlas CLI documentation for atlas accessLists list and atlas accessLists describe.
Tip
See: Related Links
In Atlas, go to the Network Access page for your project.
If it's not already displayed, select the organization that contains your project from the Organizations menu in the navigation bar.
If it's not already displayed, select your project from the Projects menu in the navigation bar.
In the sidebar, click Network Access under the Security heading.
Click the IP Access List tab.
IP Address | IP address or CIDR block. If this
cluster is hosted on AWS,
you can provide an AWS Security Group ID as well. | ||||||||||||
Comment | Description or other information about the access list
entry. | ||||||||||||
Status | Status of the IP access list entry:
| ||||||||||||
Actions |
Add IP Access List Entries
To create an IP access list for your project using the Atlas CLI, run the following command:
atlas accessLists create [entry] [options]
To learn more about the command syntax and parameters, see the Atlas CLI documentation for atlas accessLists create.
Tip
See: Related Links
You can use the Atlas Administration API to add existing IP access list entries.
In Atlas, go to the Network Access page for your project.
If it's not already displayed, select the organization that contains your project from the Organizations menu in the navigation bar.
If it's not already displayed, select your project from the Projects menu in the navigation bar.
In the sidebar, click Network Access under the Security heading.
Enter an IP address, CIDR block, or Security Group ID.
Important
Ensure that you add the IP address you will use to
access MongoDB as the admin
user.
Enter the desired IP address or CIDR-notated range of addresses:
Entry | Grants |
---|---|
An IP address | Access from that address. |
A CIDR-notated range of IP addresses | Access from the designated range of addresses. For peer VPC connections, you can specify the CIDR block (or a subset) or the associated Security Group. The Internet provides online tools for converting a range of IP addresses to CIDR, such as http://www.ipaddressguide.com/cidr. ImportantAdding the CIDR |
Security Group ID (AWS Only) | Access via Security Group membership from a peered VPC. ImportantAtlas does not support adding AWS security groups to IP access lists in projects with VPC peering connections in multiple regions. |
(Optional) Set the IP access list as temporary.
Check the Save as temporary access list option to specify a length of time that the IP address will be added. After this time, Atlas removes the address from the IP access list. You can select one of the following time periods for the address to be added:
6 hours
1 day
1 week
In the IP Access List view, temporary access list entries display the time remaining until the address will expire. Once the IP address expires and is deleted, any client or application attempting to connect to the cluster from the address can't access the cluster.
Note
You cannot set AWS security groups as temporary access list entries.
Modify IP Access List Entries
You can't modify IP access list entries with the Atlas CLI. Select a different interface to learn how to modify IP access list entries.
You can use the Atlas Administration API to modify existing IP access list entries.
In Atlas, go to the Network Access page for your project.
If it's not already displayed, select the organization that contains your project from the Organizations menu in the navigation bar.
If it's not already displayed, select your project from the Projects menu in the navigation bar.
In the sidebar, click Network Access under the Security heading.
Edit the target IP access list entry
Click Edit for the entry you want to modify.
You can modify the IP address or CIDR block of the entry and the comment associated with the entry. If the entry is temporarily added, Atlas displays the remaining time until it will remove the entry and a dropdown to modify the duration of the IP access list entry or convert it to a permanent entry.
Note
You can't change a permanent IP access list entry to be temporary.
Delete IP Access List Entries
Important
When you remove an entry from the IP access list, existing connections from the removed addresses may remain open for a variable amount of time. How much time passes before Atlas closes the connection depends on several factors, including:
how the connection was established
how the application or driver using the address behaves
which protocol (like TCP or UDP) the connection uses
To delete an IP access list from your project using the Atlas CLI, run the following command:
atlas accessLists delete <entry> [options]
To learn more about the command syntax and parameters, see the Atlas CLI documentation for atlas accessLists delete.
Tip
See: Related Links
You can use the Atlas Administration API to delete existing users.
In Atlas, go to the Network Access page for your project.
If it's not already displayed, select the organization that contains your project from the Organizations menu in the navigation bar.
If it's not already displayed, select your project from the Projects menu in the navigation bar.
In the sidebar, click Network Access under the Security heading.