Halaman ini belum tersedia dalam bahasa lokal Anda. Kami berusaha keras untuk menambahkan lebih banyak versi bahasa. Terima kasih atas dukungan Anda.

Compute
Elastic Cloud Server
Huawei Cloud Flexus
Bare Metal Server
Auto Scaling
Image Management Service
Dedicated Host
FunctionGraph
Cloud Phone Host
Huawei Cloud EulerOS
Networking
Virtual Private Cloud
Elastic IP
Elastic Load Balance
NAT Gateway
Direct Connect
Virtual Private Network
VPC Endpoint
Cloud Connect
Enterprise Router
Enterprise Switch
Global Accelerator
Management & Governance
Cloud Eye
Identity and Access Management
Cloud Trace Service
Resource Formation Service
Tag Management Service
Log Tank Service
Config
OneAccess
Resource Access Manager
Simple Message Notification
Application Performance Management
Application Operations Management
Organizations
Optimization Advisor
IAM Identity Center
Cloud Operations Center
Resource Governance Center
Migration
Server Migration Service
Object Storage Migration Service
Cloud Data Migration
Migration Center
Cloud Ecosystem
KooGallery
Partner Center
User Support
My Account
Billing Center
Cost Center
Resource Center
Enterprise Management
Service Tickets
HUAWEI CLOUD (International) FAQs
ICP Filing
Support Plans
My Credentials
Customer Operation Capabilities
Partner Support Plans
Professional Services
Analytics
MapReduce Service
Data Lake Insight
CloudTable Service
Cloud Search Service
Data Lake Visualization
Data Ingestion Service
GaussDB(DWS)
DataArts Studio
Data Lake Factory
DataArts Lake Formation
IoT
IoT Device Access
Others
Product Pricing Details
System Permissions
Console Quick Start
Common FAQs
Instructions for Associating with a HUAWEI CLOUD Partner
Message Center
Security & Compliance
Security Technologies and Applications
Web Application Firewall
Host Security Service
Cloud Firewall
SecMaster
Anti-DDoS Service
Data Encryption Workshop
Database Security Service
Cloud Bastion Host
Data Security Center
Cloud Certificate Manager
Edge Security
Situation Awareness
Managed Threat Detection
Blockchain
Blockchain Service
Web3 Node Engine Service
Media Services
Media Processing Center
Video On Demand
Live
SparkRTC
MetaStudio
Storage
Object Storage Service
Elastic Volume Service
Cloud Backup and Recovery
Storage Disaster Recovery Service
Scalable File Service Turbo
Scalable File Service
Volume Backup Service
Cloud Server Backup Service
Data Express Service
Dedicated Distributed Storage Service
Containers
Cloud Container Engine
Software Repository for Container
Application Service Mesh
Ubiquitous Cloud Native Service
Cloud Container Instance
Databases
Relational Database Service
Document Database Service
Data Admin Service
Data Replication Service
GeminiDB
GaussDB
Distributed Database Middleware
Database and Application Migration UGO
TaurusDB
Middleware
Distributed Cache Service
API Gateway
Distributed Message Service for Kafka
Distributed Message Service for RabbitMQ
Distributed Message Service for RocketMQ
Cloud Service Engine
Multi-Site High Availability Service
EventGrid
Dedicated Cloud
Dedicated Computing Cluster
Business Applications
Workspace
ROMA Connect
Message & SMS
Domain Name Service
Edge Data Center Management
Meeting
AI
Face Recognition Service
Graph Engine Service
Content Moderation
Image Recognition
Optical Character Recognition
ModelArts
ImageSearch
Conversational Bot Service
Speech Interaction Service
Huawei HiLens
Video Intelligent Analysis Service
Developer Tools
SDK Developer Guide
API Request Signing Guide
Terraform
Koo Command Line Interface
Content Delivery & Edge Computing
Content Delivery Network
Intelligent EdgeFabric
CloudPond
Intelligent EdgeCloud
Solutions
SAP Cloud
High Performance Computing
Developer Services
ServiceStage
CodeArts
CodeArts PerfTest
CodeArts Req
CodeArts Pipeline
CodeArts Build
CodeArts Deploy
CodeArts Artifact
CodeArts TestPlan
CodeArts Check
CodeArts Repo
Cloud Application Engine
MacroVerse aPaaS
KooMessage
KooPhone
KooDrive
On this page

Show all

Help Center/ Graph Engine Service/ User Guide/ Creating Graphs/ Creating a Graph Without Using a Template

Creating a Graph Without Using a Template

Updated on 2025-01-02 GMT+08:00
  1. Log in to the GES console and click Create Graph in the upper right corner of the Overview page.
  2. Select the Region where the cluster works from the drop-down list in the upper left corner of the page.
  3. On the Create Graph page, click the Customize Graph tab and set the following parameters:
    1. In the Configure step, set the graph name and software version.
      Figure 1 Graph name and software version

      Parameter

      Description

      Graph Name

      You can set a name or use the default name. After a graph is created, its name cannot be changed.

      The graph name must:

      • Contain 4 to 50 characters and start with a letter.
      • Be case-insensitive.
      • Contain only letters, digits, and underscores (_).

      GES Software Version

      The system uses the latest version by default, and only the default version is available.

    2. Set network parameters, including VPC, Subnet, Security Group, Enterprise Project, and Public Network Access.
      Figure 2 Network information

      Parameter

      Description

      VPC

      A VPC is a secure, isolated, and logical network environment.

      Select the VPC for which you want to create the graph and click View VPC to view the name and ID of the VPC.

      NOTE:

      If your account has VPCs, a VPC will be automatically selected. You can change it as needed. If no VPC is available, you need to create a VPC. After the VPC is created, it will be automatically selected.

      Subnet

      A subnet provides dedicated network resources that are logically isolated from other networks for network security.

      Select the subnet for which you want to create the graph to enter the VPC and view the name and ID of the subnet.

      Security Group

      A security group implements access control for ECSs that have the same security protection requirements in a VPC.
      • Click Learn how to configure a security group. to get instructions.
      • Click View Security Group to learn security group details.

      Public Network Access

      The public network access to the graph. Set this parameter as you need.

      Do not use: A graph instance without an elastic IP (EIP) cannot be accessed over the Internet. However, the graph instance can be accessed through ECSs deployed on a private network.

      Buy now: GES automatically allocates an EIP with exclusive bandwidth to the graph instance so that the graph instance can be accessed over the Internet using the EIP. In addition, GES uses the tenant permission to automatically create an agency with the prefix of ges_agency_default in the project to support EIP binding.

      Specify: Select an EIP to allow the graph instance to be accessed over the Internet.

      Click Create EIP to access the VPC management console and create an EIP.

      Enterprise Project

      Centrally manages cloud resources and members by project.

      Click Create Enterprise Project to go to the Enterprise Project Management page.

      Tag

      Tags for a resource. Enter a tag key and value, and click Add to add the tag.

      You can view the added tag in the graph details and search for graphs by tag on the Graph Management page.

      Figure 3 Viewing tag details
      NOTE:

      It is recommended that you use TMS's predefined tag function to add the same tag to different cloud resources.

      Security Mode

      If you enable the security mode, communications will be encrypted when you access a graph instance, and only HTTPS can be used when you call APIs. This function affects GES performance.

      Cryptographic Algorithm

      Available values are as follows:
      • General cryptographic algorithms (SM series cryptographic algorithms not supported) are used by all components to store and transmit sensitive data. These algorithms that do not have special requirements.
      • SM series commercial encryption algorithm (compatible with the international general algorithm) is supported. Sensitive data of all components is stored using this algorithm. The SM series commercial encryption algorithm and international algorithm can be used for data transmission.
    3. Set graph parameters.
      Figure 4 Graph parameters

      Parameter

      Description

      Cross-AZ HA

      Whether to support cross-AZ cluster.

      If this function is enabled, graph instances are distributed in different AZs to enhance reliability.

      Purpose

      Purpose of the graph to be created.

      Enterprise production: High reliability and concurrency are supported, suitable for production and large-scale applications.

      Developer learning: A complete function experience is offered, suitable for developer learning.

      Versions

      GES editions.

      • Memory edition: The capacity is limited and a maximum of 10 billion edges are supported. Storage and compute based on memory storage. This edition is preset with a variety of algorithms, and Gremlin and Cypher query languages are supported.
      • Database edition: The storage capacity is unlimited. Storage and compute based on distributed key-value databases. This edition has higher performance and has unlimited capacity, but it supports only the Cypher queries.

      Vertex ID Type (This parameter is available only when you choose the database edition.)

      The options include String (fixed length), String (variable length), and Hash.

      • String (fixed length): Vertex IDs are used for internal storage and compute. Specify the length limit. If the IDs are too long, the query performance can be reduced. Specify the length limit based on your dataset vertex IDs. If you cannot determine the maximum length, set the ID type to hash.
      • String (variable length): The length of the vertex IDs written by the user is not limited. However, if the IDs are too long, the read and write performance is affected. It is recommended that the length be within 1,000 bytes, with a maximum of 4,000 bytes.
      • Hash: Vertex IDs are converted into hash code for storage and compute. There is no limit on the ID length. However, there is an extremely low probability, approximately 10^(-43), that the vertex IDs will conflict.
      NOTE:

      If you cannot determine the maximum length of a vertex ID, set this parameter to Hash.

      SortKey Type (This parameter is available only when you choose the database edition.)

      Different SortKey values are configured to distinguish duplicate edges (edges with the same source vertex, end vertex, and label). The options include:

      • Integer: The value is an integer, which saves space.
      • String (byte length less than or equal to 40)
      • String (variable length): The length is not limited. However, if the IDs are too long, the read and write performance is affected. It is recommended that the length be within 1,000 bytes, with a maximum of 2,000 bytes.

      Compute Resource

      Type of compute resources.

      An elastic cloud server (ECS) is a computer system that has complete hardware, an operating system (OS), and network functions and runs in a secure, isolated environment.

      CPU Architecture

      Currently, GES supports X86 and Kunpeng.

      Graph Size (Edges)

      Available options based on your resource quota.

      Different graph specifications are displayed for Enterprise production and Developer learning.

      • Development learning: Currently, there is only Ten-thousand-edge graphs are available for this purpose, regardless of the edition.
      • Enterprise production: The specifications vary depending on the edition.
        • Memory edition: The options are Million-edge, Ten-million-edge, Hundred-million-edge, Billion-edge, Billion-edge-pro, and Ten-billion-edge.
        • Database edition: The options are Billion-edge, Ten-billion-edge, and Hundred-billion-edge.
      NOTE:

      Graph size, which is based on the number of edges. The value is not accurate. If there are a large number of vertices and properties, you are advised to apply for graphs with a larger size.

    4. Advanced Settings: Set this parameter to Default or Custom.
      • Default: Use the default values.
      • Custom:
        • When you set Versions to Memory edition, you need to set the following custom parameters: Fine-Grained Permission and Multiple labels.
          Figure 5 Advanced settings for the memory edition

        Parameter

        Description

        Fine-Grained Permission

        Whether to enable fine-grained permission management. If this function is enabled, the traverse, read, and write permissions can be set for specific properties of a label.

        Multiple labels

        After this option is enabled, multiple labels can be set for the same vertex in the graph.

        NOTE:
        1. Only the memory edition supports this function.
        2. Each label corresponds to a unique property. When the API for querying vertex details is called, information about all labels and corresponding properties on the vertex is returned. Property filtering queries filter different labels on the vertex.
        • If you choose the database edition, you can enable or disable HyG computing engine and Fine-Grained Permission.
          Figure 6 Advanced settings for the database edition

          Parameter

          Description

          HyG computing engine

          HyG is a high-performance distributed graph computing framework that supports many graph analysis algorithms. HyG engine is suitable for complex graph analysis.

          Fine-Grained Permission

          Whether to enable fine-grained permission management. If this function is enabled, the traverse, read, and write permissions can be set for specific properties of a label.

  4. Click Next. The Confirm page is displayed.
  5. Confirm the information and click Submit to create the graph.
  6. After the submission is successful, the Finish tab page is displayed. You can click Back to Task Center to view the status and running result of the created graph.

Kami menggunakan cookie untuk meningkatkan kualitas situs kami dan pengalaman Anda. Dengan melanjutkan penelusuran di situs kami berarti Anda menerima kebijakan cookie kami. Cari tahu selengkapnya

Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback