Creating a Graph Without Using a Template
- Log in to the GES console and click Create Graph in the upper right corner of the home page. The Create Graph page is displayed.
- On the Create Graph page, set the following parameters:
- In the Configure step, set the graph name and software version.
Parameter
Description
Graph Name
You can set a name or use the default name. After a graph is created, its name cannot be changed.
The graph name must:
- Contain 4 to 50 characters and start with a letter.
- Be case-insensitive.
- Contain only letters, digits, and underscores (_).
GES Software Version
The system uses the latest version by default, and only the default version is available.
- Specify the network information, including VPC, Subnet, Security Group, Enterprise Project, and Public Network Access.
Parameter
Description
VPC
A VPC is a secure, isolated, and logical network environment.
Select the VPC for which you want to create the graph and click View VPC to view the name and ID of the VPC.
NOTE:If your account has VPCs, a VPC will be automatically selected. You can change it as needed. If no VPC is available, you need to create a VPC. After the VPC is created, it will be automatically selected.
Subnet
A subnet provides dedicated network resources that are logically isolated from other networks for network security.
Select the subnet for which you want to create the graph to enter the VPC and view the name and ID of the subnet.
Security Group
A security group implements access control for ECSs that have the same security protection requirements in a VPC.- Click View Security Group to learn security group details.
Public Network Access
The public network access to the graph. Set this parameter as you need.
Do not use: A graph instance without an elastic IP (EIP) cannot be accessed over the Internet. However, the graph instance can be accessed through ECSs deployed on a private network.
Buy now: GES automatically allocates an EIP with exclusive bandwidth to the graph instance so that the graph instance can be accessed over the Internet using the EIP. In addition, GES uses the tenant permission to automatically create an agency with the prefix of ges_agency_default in the project to support EIP binding.
Specify: Select an EIP to allow the graph instance to be accessed over the Internet.
Tag
Tags for a resource. Enter a tag key and value, and click Add to add the tag.
You can view the added tag in the graph details and search for graphs by tag on the Graph Management page.
NOTE:It is recommended that you use TMS's predefined tag function to add the same tag to different cloud resources.
Security Mode
If you enable the security mode, communications will be encrypted when you access a graph instance, and only HTTPS can be used when you call APIs. This function affects GES performance.
Cryptographic Algorithm
Available values are as follows:- General cryptographic algorithms (SM series cryptographic algorithms not supported) are used by all components to store and transmit sensitive data. These algorithms that do not have special requirements.
- SM series commercial encryption algorithm (compatible with the international general algorithm) is supported. Sensitive data of all components is stored using this algorithm. The SM series commercial encryption algorithm and international algorithm can be used for data transmission.
- Set graph parameters.
Parameter
Description
Cross-AZ HA
Whether to support cross-AZ cluster.
If this function is enabled, graph instances are distributed in different AZs to enhance reliability.
Purpose
Purpose of the graph to be created.
Enterprise production: High reliability and concurrency are supported, suitable for production and large-scale applications.
Developer learning: A complete function experience is offered, suitable for developer learning.
Versions
GES editions.
- Memory edition: The capacity is limited and a maximum of 10 billion edges are supported. Storage and compute based on memory storage. This edition is preset with a variety of algorithms, and Gremlin and Cypher query languages are supported.
- Database edition: The storage capacity is unlimited. Storage and compute based on distributed key-value databases. This edition has higher performance and has unlimited capacity, but it supports only the Cypher queries.
Compute Resource
Type of compute resources.
An elastic cloud server (ECS) is a computer system that has complete hardware, an operating system (OS), and network functions and runs in a secure, isolated environment.
CPU Architecture
Currently, GES supports X86 and Kunpeng.
Graph Size (Edges)
Available options based on your resource quota.
Different graph specifications are displayed for Enterprise production and Developer learning.
- Development learning: Currently, there is only 10-thousand-edge graphs are available for this purpose, regardless of the edition.
- Enterprise production: The specifications vary depending on the edition.
- Memory edition: Available options are million-edge, 10-million-edge, 100-million-edge, billion-edge, billion-edge-pro, and 10-billion-edge.
- Database edition: Available options are billion-edge, 10-billion-edge, and 100-billion-edge.
NOTE:Graph size, which is based on the number of edges. The value is not accurate. If there are a large number of vertices and properties, you are advised to apply for graphs with a larger size.
Vertex ID Type
Only fixed-length string and hash types are available for graphs of the database edition.
- Fixed-length string: Vertex IDs are used for internal storage and compute. Specify the length limit. If the IDs are too long, the query performance can be reduced. Specify the length limit based on your dataset vertex IDs. If you cannot determine the maximum length, set the ID type to Hash.
- Hash: Vertex IDs are converted into hash code for storage and compute. There is no limit on the ID length. However, there is an extremely low probability, approximately 10^(-43), that the vertex IDs will conflict.
NOTE:If you cannot determine the maximum length of a vertex ID, set this parameter to Hash.
- Advanced Settings: Set this parameter to Default or Custom.
- Default: Use the default values.
- Custom:
- If you choose the memory edition, the options include Encrypt Instance, Operation Audit, and Fine-Grained Permission.
Parameter
Description
Encrypted Instance
Whether to encrypt a graph instance. Key Source is default to KMS. KMS Key: Select the key as needed.
NOTE:Some functions will be affected if you disable or delete a KMS key.
Full-Text Index
Whether to enable full-text search, fuzzy search, prefix search, and regular expression match.
NOTE:- Currently, only billion-edge-pro and 100-billion-edge (database edition) graphs support this feature.
Fine-Grained Permission
Whether to enable fine-grained permission management. If this function is enabled, the traverse, read, and write permissions can be set for specific attributes each label.
Operation Audit
Whether to enable operation audit
Multiple labels
After this option is enabled, multiple labels can be set for the same vertex in the graph.
NOTE:
- In the Configure step, set the graph name and software version.
- Click Next. The Confirm page is displayed.
- Confirm the information and click Submit to create the graph.
- After the submission is successful, the Finish tab page is displayed. You can click Back to Task Center to view the status and running result of the created graph.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.